Digital Image Forensic - Methoden: Literatur

Literatur zur Digitalen Bildforensik



2017

  1. J. Abdessamad, A. ElAdel & M. Zaied
    A sparse representation-based approach for copy-move image forgery detection in smooth regions
    Verikas, A., Radeva, P., Nikolaev, D. P., Zhang, W. & Zhou, J. (ed.)
    Ninth International Conference on Machine Vision (ICMV 2016)
    SPIE-Intl Soc Optical Eng, 2017
    DOI: 10.1117/12.2268766
    BibTeX
    @inproceedings{Abdessamad_2017,
     author = {Abdessamad, Jalila and ElAdel, Asma and Zaied, Mourad},
     title = {A sparse representation-based approach for copy-move image forgery detection in smooth regions},
     booktitle = {Ninth International Conference on Machine Vision (ICMV 2016)},
     publisher = {SPIE-Intl Soc Optical Eng},
     year = {2017}}
    
  2. J. Alakuijala, R. Obryk, O. Stoliarchuk, Z. Szabadka, L. Vandevenne & J. Wassenberg
    Guetzli: Perceptually Guided JPEG Encoder
    arXiv, 2017
    BibTeX
    @article{Alakuijala2017,
     author = {Alakuijala, Jyrki and Obryk, Robert and Stoliarchuk, Ostap and Szabadka, Zoltan and Vandevenne, Lode and Wassenberg, Jan},
     title = {Guetzli: Perceptually Guided JPEG Encoder},
     journal = {arXiv},
     year = {2017}}
    
  3. Z. Al-Ameen & C. Al-Atroshi
    Modern Visibility Enhancement and Tampering Detection Tools of Digital Image Forensics: A Laconic Review
    TechArt: Journal of Arts and Imaging Science, 2017, Vol. 4(1)
    DOI: 10.15323/techart.2017.2.4.1.32
    BibTeX
    @article{Al-Ameen2017,
     author = {Al-Ameen, Zohair and Al-Atroshi, Chiai},
     title = {Modern Visibility Enhancement and Tampering Detection Tools of Digital Image Forensics: A Laconic Review},
     journal = {TechArt: Journal of Arts and Imaging Science},
     year = {2017},
     volume = {4},
     number = {1}}
    
  4. L. Alamro & N. Yusoffthe
    Copy-Move Forgery Detection using Integrated DWT and SURF
    Journal of Telecommunication, Electronic and Computer Engineering, 2017, Vol. 9(1-2)
    BibTeX
    @article{Alamro2017,
     author = {Alamro, Loai and Yusoffthe, Nooraini},
     title = {Copy-Move Forgery Detection using Integrated DWT and SURF},
     journal = {Journal of Telecommunication, Electronic and Computer Engineering},
     year = {2017},
     volume = {9},
     number = {1-2}}
    
  5. G. Alikhajeh, A. Mirzaei, M. Safayani & M. Ghaffari
    Duplicate matching and estimating features for detection of copy-move images forgery
    arXiv, 2017
    BibTeX
    @article{Alikhajeh2017,
     author = {Alikhajeh, Ghassem and Mirzaei, Abdolreza and Safayani, Mehran and Ghaffari, Meysam},
     title = {Duplicate matching and estimating features for detection of copy-move images forgery},
     journal = {arXiv},
     year = {2017}}
    
  6. O.M. Al-Qershi & B.E. Khoo
    Comparison of Matching Methods for Copy-move Image Forgery Detection
    9th International Conference on Robotic, Vision, Signal Processing and Power Applications
    Springer, 2017
    DOI: 10.1007/978-981-10-1721-6_23
    BibTeX
    @incollection{Al-Qershi2017,
     author = {Al-Qershi, Osamah M. and Khoo, Bee Ee},
     title = {Comparison of Matching Methods for Copy-move Image Forgery Detection},
     booktitle = {9th International Conference on Robotic, Vision, Signal Processing and Power Applications},
     publisher = {Springer},
     year = {2017}}
    
  7. I. Amerini, R. Caldelli, A.D. Mastio, A.D. Fuccia, C. Molinari & A.P. Rizzo
    Dealing with video source identification in social networks
    Signal Processing: Image Communication, Elsevier BV, 2017, Vol. 57, pp. 1-7
    DOI: 10.1016/j.image.2017.04.009
    BibTeX
    @article{Amerini_2017,
     author = {Amerini, Irene and Caldelli, Roberto and Mastio, Andrea Del and Fuccia, Andrea Di and Molinari, Cristiano and Rizzo, Anna Paola},
     title = {Dealing with video source identification in social networks},
     journal = {Signal Processing: Image Communication},
     publisher = {Elsevier BV},
     year = {2017},
     volume = {57},
     pages = {1--7}}
    
  8. R.S. Ayyalasomayajula & V. Pankajakshan
    Differentiating Photographic and PRCG Images Using Tampering Localization Features
    Proceedings of International Conference on Computer Vision and Image Processing
    Springer, 2017
    DOI: 10.1007/978-981-10-2107-7_39
    BibTeX
    @incollection{Ayyalasomayajula2017,
     author = {Ayyalasomayajula, Roshan Sai and Pankajakshan, Vinod},
     title = {Differentiating Photographic and PRCG Images Using Tampering Localization Features},
     booktitle = {Proceedings of International Conference on Computer Vision and Image Processing},
     publisher = {Springer},
     year = {2017}}
    
  9. A. Biedermann, S. Bozza, F. Taroni & C. Aitken
    The consequences of understanding expert probability reporting as a decision
    Science & Justice, Elsevier BV, 2017, Vol. 57(1), pp. 80-85
    DOI: 10.1016/j.scijus.2016.10.005
    BibTeX
    @article{Biedermann2017,
     author = {Biedermann, A. and Bozza, S. and Taroni, F. and Aitken, C.},
     title = {The consequences of understanding expert probability reporting as a decision},
     journal = {Science & Justice},
     publisher = {Elsevier BV},
     year = {2017},
     volume = {57},
     number = {1},
     pages = {80--85}}
    
  10. J. Brogan, P. Bestagini, A. Bharati, A. Pinto, D. Moreira, K. Bowyer, P. Flynn, A. Rocha & W. Scheirer
    Spotting the Difference: Context Retrieval and Analysis for Improved Forgery Detection and Localization
    arxiv, 2017
    BibTeX
    @article{Brogan2017,
     author = {Brogan, Joel and Bestagini, Paolo and Bharati, Aparna and Pinto, Allan and Moreira, Daniel and Bowyer, Kevin and Flynn, Patrick and Rocha, Anderson and Scheirer, Walter},
     title = {Spotting the Difference: Context Retrieval and Analysis for Improved Forgery Detection and Localization},
     journal = {arxiv},
     year = {2017}}
    
  11. M. Brouwers & R. Mousa
    Automatic comparison of photo response non uniformity (PRNU) on Youtube
    System and Network Engineering • January 2017, 2017
    BibTeX
    @article{Brouwers2017,
     author = {Brouwers, Marcel and Mousa, Rahaf},
     title = {Automatic comparison of photo response non uniformity (PRNU) on Youtube},
     journal = {System and Network Engineering • January 2017},
     year = {2017}}
    
  12. R. Caldelli, R. Becarelli & I. Amerini
    Image Origin Classification based on Social Network Provenance
    IEEE Transactions on Information Forensics and Security, 2017, Vol. PP(99), pp. 1
    DOI: 10.1109/TIFS.2017.2656842
    BibTeX
    @article{Caldelli2017,
     author = {Caldelli, R. and Becarelli, R. and Amerini, I.},
     title = {Image Origin Classification based on Social Network Provenance},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2017},
     volume = {PP},
     number = {99},
     pages = {1}}
    
  13. G. Cattaneo, G. Roscigno & U.F. Petrillo
    Improving the experimental analysis of tampered image detection algorithms for biometric systems
    Pattern Recognition Letters, Elsevier BV, 2017
    DOI: 10.1016/j.patrec.2017.01.006
    BibTeX
    @article{Cattaneo2017,
     author = {Cattaneo, Giuseppe and Roscigno, Gianluca and Petrillo, Umberto Ferraro},
     title = {Improving the experimental analysis of tampered image detection algorithms for biometric systems},
     journal = {Pattern Recognition Letters},
     publisher = {Elsevier BV},
     year = {2017}}
    
  14. S. Chakraborty & M. Kirchner
    PRNU-based Image Manipulation Localization with Discriminative Random Fields
    2017
    BibTeX
    @unpublished{Chakraborty2017,
     author = {Chakraborty, S. and Kirchner, M.},
     title = {PRNU-based Image Manipulation Localization with Discriminative Random Fields},
     year = {2017}}
    
  15. Z. Chen, Y. Zhao & R. Ni
    Detection of operation chain: JPEG-Resampling-JPEG
    Signal Processing: Image Communication, Elsevier BV, 2017, Vol. 57, pp. 8-20
    DOI: 10.1016/j.image.2017.04.008
    BibTeX
    @article{Chen2017,
     author = {Chen, Zhipeng and Zhao, Yao and Ni, Rongrong},
     title = {Detection of operation chain: JPEG-Resampling-JPEG},
     journal = {Signal Processing: Image Communication},
     publisher = {Elsevier BV},
     year = {2017},
     volume = {57},
     pages = {8--20}}
    
  16. H.-Y. Choi, D.-K. Hyun, S. Choi & H.-K. Lee
    Enhanced resampling detection based on image correlation of 3D stereoscopic images
    EURASIP Journal on Image and Video Processing, Springer, 2017, Vol. 2017(1), pp. 1
    DOI: 10.1186/s13640-017-0170-9
    BibTeX
    @article{Choi2017a,
     author = {Choi, Hak-Yeol and Hyun, Dai-Kyung and Choi, Sunghee and Lee, Heung-Kyu},
     title = {Enhanced resampling detection based on image correlation of 3D stereoscopic images},
     journal = {EURASIP Journal on Image and Video Processing},
     publisher = {Springer},
     year = {2017},
     volume = {2017},
     number = {1},
     pages = {1}}
    
  17. H.-Y. Choi, H.-U. Jang, J. Son, D. Kim & H.-K. Lee
    Content Recapture Detection Based on Convolutional Neural Networks
    Information Science and Applications 2017
    Springer Nature, 2017, pp. 339-346
    DOI: 10.1007/978-981-10-4154-9_40
    BibTeX
    @incollection{Choi2017,
     author = {Choi, Hak-Yeol and Jang, Han-Ul and Son, Jeongho and Kim, Dongkyu and Lee, Heung-Kyu},
     title = {Content Recapture Detection Based on Convolutional Neural Networks},
     booktitle = {Information Science and Applications 2017},
     publisher = {Springer Nature},
     year = {2017},
     pages = {339--346}}
    
  18. F. Costa, A. Oliveira, P. Ferrara, Z. Dias, S. Goldenstein & A. Rocha
    New dissimilarity measures for image phylogeny reconstruction
    Pattern Analysis and Applications, Springer, 2017, pp. 1
    DOI: 10.1007/s10044-017-0616-9
    BibTeX
    @article{Costa2017,
     author = {Costa, Filipe and Oliveira, Alberto and Ferrara, Pasquale and Dias, Zanoni and Goldenstein, Siome and Rocha, Anderson},
     title = {New dissimilarity measures for image phylogeny reconstruction},
     journal = {Pattern Analysis and Applications},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  19. D. Cozzolino, G. Poggi & L. Verdoliva
    Recasting Residual-based Local Descriptors as Convolutional Neural Networks: an Application to Image Forgery Detection
    arX, 2017
    BibTeX
    @article{Cozzolino2017,
     author = {Cozzolino, Davide and Poggi, Giovanni and Verdoliva, Luisa},
     title = {Recasting Residual-based Local Descriptors as Convolutional Neural Networks: an Application to Image Forgery Detection},
     journal = {arX},
     year = {2017}}
    
  20. R. Cristin & V. Cyril Raj
    Consistency features and fuzzy-based segmentation for shadow and reflection detection in digital image forgery
    Science China Information Sciences, Springer, 2017, Vol. 60(8), pp. 1
    DOI: 10.1007/s11432-016-0478-y
    BibTeX
    @article{Cristin2017,
     author = {Cristin, Rajan and Cyril Raj, Velankanni},
     title = {Consistency features and fuzzy-based segmentation for shadow and reflection detection in digital image forgery},
     journal = {Science China Information Sciences},
     publisher = {Springer},
     year = {2017},
     volume = {60},
     number = {8},
     pages = {1}}
    
  21. A.P. Dawid
    Forensic likelihood ratio: Statistical problems and pitfalls
    Science & Justice, Elsevier BV, 2017, Vol. 57(1), pp. 73-75
    DOI: 10.1016/j.scijus.2016.09.002
    BibTeX
    @article{Dawid2017,
     author = {Dawid, A. Philip},
     title = {Forensic likelihood ratio: Statistical problems and pitfalls},
     journal = {Science & Justice},
     publisher = {Elsevier BV},
     year = {2017},
     volume = {57},
     number = {1},
     pages = {73--75}}
    
  22. V.M. Devagiri
    Splicing Forgery Detection and the Impact of Image Resolution
    Faculty of Computing Blekinge Institute of Technology SE-371 79 Karlskrona Sweden, Faculty of Computing Blekinge Institute of Technology SE-371 79 Karlskrona Sweden, 2017
    BibTeX
    @mastersthesis{Devagiri2017,
     author = {Devagiri, Vishnu Manasa},
     title = {Splicing Forgery Detection and the Impact of Image Resolution},
     school = {Faculty of Computing Blekinge Institute of Technology SE-371 79 Karlskrona Sweden},
     year = {2017}}
    
  23. M. Emam, Q. Han & H. Zhang
    Two-stage Keypoint Detection Scheme for Region Duplication Forgery Detection in Digital Images
    Journal of Forensic Sciences, Wiley-Blackwell, 2017
    DOI: 10.1111/1556-4029.13456
    BibTeX
    @article{Emam2017,
     author = {Emam, Mahmoud and Han, Qi and Zhang, Hongli},
     title = {Two-stage Keypoint Detection Scheme for Region Duplication Forgery Detection in Digital Images},
     journal = {Journal of Forensic Sciences},
     publisher = {Wiley-Blackwell},
     year = {2017}}
    
  24. H. Farid
    How to Detect Faked Photos
    American Scientist, 2017
    BibTeX
    @article{Farid2017,
     author = {Farid, Hany},
     title = {How to Detect Faked Photos},
     journal = {American Scientist},
     year = {2017}}
    
  25. H.G. Hadigheh & G. bin sulong
    Feature base fusion for splicing forgery detection based on neuro fuzzy
    arXiv, 2017
    BibTeX
    @article{Hadigheh2017,
     author = {Hadigheh, Habib Ghaffari and bin sulong, Ghazali},
     title = {Feature base fusion for splicing forgery detection based on neuro fuzzy},
     journal = {arXiv},
     year = {2017}}
    
  26. K. Hayat & T. Qazi
    Forgery detection in digital images via discrete wavelet and discrete cosine transforms
    Computers & Electrical Engineering, Elsevier BV, 2017
    DOI: 10.1016/j.compeleceng.2017.03.013
    BibTeX
    @article{Hayat2017,
     author = {Hayat, Khizar and Qazi, Tanzeela},
     title = {Forgery detection in digital images via discrete wavelet and discrete cosine transforms},
     journal = {Computers & Electrical Engineering},
     publisher = {Elsevier BV},
     year = {2017}}
    
  27. X. He, Q. Guan, Y. Tong, X. Zhao & H. Yu
    A Novel Robust Image Forensics Algorithm Based on L1-Norm Estimation
    Digital Forensics and Watermarking, Springer, 2017
    DOI: 10.1007/978-3-319-53465-7_11
    BibTeX
    @article{He2017,
     author = {He, Xin and Guan, Qingxiao and Tong, Yanfei and Zhao, Xianfeng and Yu, Haibo},
     title = {A Novel Robust Image Forensics Algorithm Based on L1-Norm Estimation},
     journal = {Digital Forensics and Watermarking},
     publisher = {Springer},
     year = {2017}}
    
  28. M.S. Hossain, M.F. Alhamid & G. Muhammad
    Collaborative analysis model for trending images on social networks
    Future Generation Computer Systems, Elsevier BV, 2017
    DOI: 10.1016/j.future.2017.01.030
    BibTeX
    @article{Shamim_Hossain_2017,
     author = {Hossain, M. Shamim and Alhamid, Mohammed F. and Muhammad, Ghulam},
     title = {Collaborative analysis model for trending images on social networks},
     journal = {Future Generation Computer Systems},
     publisher = {Elsevier BV},
     year = {2017}}
    
  29. M. Hu, X. Wang, G. Xu & H. Yu
    A Detection Method for Copy- Move Image Forgery Using Frequency -Based Techniques
    Journal of Image and Signal Processing, Hans Publishers, 2017, Vol. 06(01), pp. 8-16
    DOI: 10.12677/jisp.2017.61002
    BibTeX
    @article{Hu2017,
     author = {Hu, Meidong and Wang, Xiaotong and Xu, Guanlei and Yu, Hao},
     title = {A Detection Method for Copy- Move Image Forgery Using Frequency -Based Techniques},
     journal = {Journal of Image and Signal Processing},
     publisher = {Hans Publishers},
     year = {2017},
     volume = {06},
     number = {01},
     pages = {8--16}}
    
  30. M. Javanmard & R. Refayen
    Using Sensor Pattern Noise for Camera Identification
    International Journal of Computer Science and Information Security, 2017
    BibTeX
    @article{Javanmard2017,
     author = {Javanmard, Mahdi and Refayen, Raheleh},
     title = {Using Sensor Pattern Noise for Camera Identification},
     journal = {International Journal of Computer Science and Information Security},
     year = {2017}}
    
  31. D.-J. Jung & H.-K. Lee
    Frame-rate conversion detection based on periodicity of motion artifact
    Multimedia Tools and Applications, Springer, 2017, pp. 1
    DOI: 10.1007/s11042-017-4519-y
    BibTeX
    @article{Jung2017,
     author = {Jung, Dae-Jin and Lee, Heung-Kyu},
     title = {Frame-rate conversion detection based on periodicity of motion artifact},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  32. A. Kashyap, R.S. Parmar, M. Agrawal & H. Gupta
    An Evaluation of Digital Image Forgery Detection Approaches
    arX, 2017
    BibTeX
    @article{Kashyap2017,
     author = {Kashyap, Abhishek and Parmar, Rajesh Singh and Agrawal, Megha and Gupta, Hariom},
     title = {An Evaluation of Digital Image Forgery Detection Approaches},
     journal = {arX},
     year = {2017}}
    
  33. A. Kuznetsov & V. Myasnikov
    Using Efficient Linear Local Features in the Copy-Move Forgery Detection Task
    Analysis of Images, Social Networks and Texts, Springer, 2017
    DOI: 10.1007/978-3-319-52920-2_28
    BibTeX
    @article{Kuznetsov2017,
     author = {Kuznetsov, Andrey and Myasnikov, Vladislav},
     title = {Using Efficient Linear Local Features in the Copy-Move Forgery Detection Task},
     journal = {Analysis of Images, Social Networks and Texts},
     publisher = {Springer},
     year = {2017}}
    
  34. S.-h. Lee, D.-h. Kim, T.-w. Oh, K.-b. Kim & H.-y. Lee
    Digital Video Source Identification Using Sensor Pattern Noise with Morphology Filtering -- 모폴로지 필터링 기반 센서 패턴 노이즈를 이용한 디지털 동영상 획득 장치 판별 기술
    KIPS Tr. Software and Data Eng., 2017, Vol. 6(1)
    DOI: 10.3745/KTSDE.2017.6.1.15
    BibTeX
    @article{Lee2017,
     author = {Lee, Sang-hyeong and Kim, Dong-hyun and Oh, Tae-woo and Kim, Ki-bom and Lee, Hae-yeoun},
     title = {Digital Video Source Identification Using Sensor Pattern Noise with Morphology Filtering -- 모폴로지 필터링 기반 센서 패턴 노이즈를 이용한 디지털 동영상 획득 장치 판별 기술},
     journal = {KIPS Tr. Software and Data Eng.},
     year = {2017},
     volume = {6},
     number = {1}}
    
  35. T. Le-Tien, T. Huynh-Kha, L.P. Cong-Hoan & A. Tran-Hong
    Combined Zernike Moment and Multiscale Analysis for Tamper Detection in Digital Images
    Informatica, 2017, Vol. 41, pp. 59-70
    BibTeX
    @article{Le-Tien2017,
     author = {Le-Tien, Thuong and Huynh-Kha, Tu and Cong-Hoan, Long Pham and Tran-Hong, An},
     title = {Combined Zernike Moment and Multiscale Analysis for Tamper Detection in Digital Images},
     journal = {Informatica},
     year = {2017},
     volume = {41},
     pages = {59--70}}
    
  36. H. Li, W. Luo, X. qiu & J. Huang
    Image Forgery Localization via Integrating Tampering Possibility Maps
    IEEE Transactions on Information Forensics and Security, 2017, Vol. PP(99), pp. 1
    DOI: 10.1109/TIFS.2017.2656823
    BibTeX
    @article{Li2017,
     author = {Li, H. and Luo, W. and qiu, X. and Huang, J.},
     title = {Image Forgery Localization via Integrating Tampering Possibility Maps},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2017},
     volume = {PP},
     number = {99},
     pages = {1}}
    
  37. C. Liu & M. Kirchner
    Linear Filter Kernel Estimation Based on Digital Camera Sensor Noise
    2017
    BibTeX
    @unpublished{Liu2017b,
     author = {Liu, Chang and Kirchner, Matthias},
     title = {Linear Filter Kernel Estimation Based on Digital Camera Sensor Noise},
     year = {2017}}
    
  38. Q. Liu
    An approach to detecting JPEG down-recompression and seam carving forgery under recompression anti-forensics
    Pattern Recognition, Elsevier BV, 2017, Vol. 65, pp. 35-46
    DOI: 10.1016/j.patcog.2016.12.010
    BibTeX
    @article{Liu2017a,
     author = {Liu, Qingzhong},
     title = {An approach to detecting JPEG down-recompression and seam carving forgery under recompression anti-forensics},
     journal = {Pattern Recognition},
     publisher = {Elsevier BV},
     year = {2017},
     volume = {65},
     pages = {35--46}}
    
  39. Y. Liu, R. Ni & Y. Zhao
    Forensics of Operation History Including Image Blurring and Noise Addition based on Joint Features
    Advances in Intelligent Information Hiding and Multimedia Signal Processing
    Springer, 2017
    DOI: 10.1007/978-3-319-50212-0_11
    BibTeX
    @incollection{Liu2017,
     author = {Liu, Yahui and Ni, Rongrong and Zhao, Yao},
     title = {Forensics of Operation History Including Image Blurring and Noise Addition based on Joint Features},
     booktitle = {Advances in Intelligent Information Hiding and Multimedia Signal Processing},
     publisher = {Springer},
     year = {2017}}
    
  40. F. Luan, S. Paris, E. Shechtman & K. Bala
    Deep Photo Style Transfer
    arXiv, 2017
    BibTeX
    @article{Luan2017,
     author = {Luan, Fujun and Paris, Sylvain and Shechtman, Eli and Bala, Kavita},
     title = {Deep Photo Style Transfer},
     journal = {arXiv},
     year = {2017}}
    
  41. Y. Lyu, X. Shen & H. Chen
    Copy-Paste Detection Based on a SIFT Marked Graph Feature Vector
    Chinese Journal of Electronics, 2017
    BibTeX
    @article{Lyu2017,
     author = {Lyu, Y. and Shen, X. and Chen, H.},
     title = {Copy-Paste Detection Based on a SIFT Marked Graph Feature Vector},
     journal = {Chinese Journal of Electronics},
     year = {2017}}
    
  42. F. Marra, G. Poggi, C. Sansone & L. Verdoliva
    A deep learning approach for iris sensor model identification
    Pattern Recognition Letters, Elsevier BV, 2017
    DOI: 10.1016/j.patrec.2017.04.010
    BibTeX
    @article{Marra_2017,
     author = {Marra, Francesco and Poggi, Giovanni and Sansone, Carlo and Verdoliva, Luisa},
     title = {A deep learning approach for iris sensor model identification},
     journal = {Pattern Recognition Letters},
     publisher = {Elsevier BV},
     year = {2017}}
    
  43. K.A. Martire, G. Edmond, D.J. Navarro & B.R. Newell
    On the likelihood of “encapsulating all uncertainty”
    Science & Justice, Elsevier BV, 2017, Vol. 57(1), pp. 76-79
    DOI: 10.1016/j.scijus.2016.10.004
    BibTeX
    @article{Martire2017,
     author = {Martire, Kristy A. and Edmond, Gary and Navarro, Daniel J. and Newell, Ben R.},
     title = {On the likelihood of “encapsulating all uncertainty”},
     journal = {Science & Justice},
     publisher = {Elsevier BV},
     year = {2017},
     volume = {57},
     number = {1},
     pages = {76--79}}
    
  44. A. Meenakshi Sundaram & C. Nandini
    ASRD: Algorithm for Spliced Region Detection in Digital Image Forensics
    Software Engineering Trends and Techniques in Intelligent Systems, Springer, 2017
    DOI: 10.1007/978-3-319-57141-6_10
    BibTeX
    @article{MeenakshiSundaram2017,
     author = {Meenakshi Sundaram, A. and Nandini, C.},
     title = {ASRD: Algorithm for Spliced Region Detection in Digital Image Forensics},
     journal = {Software Engineering Trends and Techniques in Intelligent Systems},
     publisher = {Springer},
     year = {2017}}
    
  45. F.G.B.D. Natale & G. Boato
    Detecting morphological filtering of binary images
    IEEE Transactions on Information Forensics and Security, 2017, Vol. PP(99), pp. 1
    DOI: 10.1109/TIFS.2017.2656472
    BibTeX
    @article{Natale2017,
     author = {Natale, F. G. B. De and Boato, G.},
     title = {Detecting morphological filtering of binary images},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2017},
     volume = {PP},
     number = {99},
     pages = {1}}
    
  46. J. Ni, C. Chen, Z. Shen & Y.Q. Shi
    Blind Forensics of Successive Geometric Transformations in Digital Images using Spectral Method: Theory and Applications
    #IEEE_J_IP#, 2017, Vol. PP(99), pp. 1
    DOI: 10.1109/TIP.2017.2682963
    BibTeX
    @article{Ni2017,
     author = {Ni, J. and Chen, C. and Shen, Z. and Shi, Y. Q.},
     title = {Blind Forensics of Successive Geometric Transformations in Digital Images using Spectral Method: Theory and Applications},
     journal = {#IEEE_J_IP#},
     year = {2017},
     volume = {PP},
     number = {99},
     pages = {1}}
    
  47. Y. Niu, Y. Zhao & R. Ni
    Robust Median Filtering Detection based on Local Difference Descriptor
    Signal Processing: Image Communication, Elsevier BV, 2017
    DOI: 10.1016/j.image.2017.01.008
    BibTeX
    @article{Niu_2017,
     author = {Niu, Yakun and Zhao, Yao and Ni, RongRong},
     title = {Robust Median Filtering Detection based on Local Difference Descriptor},
     journal = {Signal Processing: Image Communication},
     publisher = {Elsevier BV},
     year = {2017}}
    
  48. A. Peng, Y. Wu & X. Kang
    Revealing Traces of Image Resampling and Resampling Antiforensics
    Advances in Multimedia, 2017
    DOI: 10.1155/2017/7130491
    BibTeX
    @article{Peng2017,
     author = {Peng, Anjie and Wu, Yadong and Kang, Xiangui},
     title = {Revealing Traces of Image Resampling and Resampling Antiforensics},
     journal = {Advances in Multimedia},
     year = {2017}}
    
  49. C.S. Prakash, K.V. Anand & S. Maheshkar
    Detection of Copy-move Image Forgery Using Dct
    Advances in Computational Intelligence
    Springer, 2017
    DOI: 10.1007/978-981-10-2525-9_25
    BibTeX
    @incollection{Prakash2017,
     author = {Prakash, Choudhary Shyam and Anand, Kumar Vijay and Maheshkar, Sushila},
     title = {Detection of Copy-move Image Forgery Using Dct},
     booktitle = {Advances in Computational Intelligence},
     publisher = {Springer},
     year = {2017}}
    
  50. C.S. Prakash & S. Maheshkar
    Detection Algorithm for Copy-Move Forgery Based on Circle Block
    Proceedings of International Conference on Computer Vision and Image Processing, Springer, 2017
    DOI: 10.1007/978-981-10-2107-7_32
    BibTeX
    @article{Prakash2017a,
     author = {Prakash, Choudhary Shyam and Maheshkar, Sushila},
     title = {Detection Algorithm for Copy-Move Forgery Based on Circle Block},
     journal = {Proceedings of International Conference on Computer Vision and Image Processing},
     publisher = {Springer},
     year = {2017}}
    
  51. T. Qiao, F. Retraint, R. Cogranne & T.H. Thai
    Individual camera device identification from JPEG images
    Signal Processing: Image Communication, Elsevier BV, 2017, Vol. 52, pp. 74-86
    DOI: 10.1016/j.image.2016.12.011
    BibTeX
    @article{Qiao2017,
     author = {Qiao, Tong and Retraint, Florent and Cogranne, Rémi and Thai, Thanh Hai},
     title = {Individual camera device identification from JPEG images},
     journal = {Signal Processing: Image Communication},
     publisher = {Elsevier BV},
     year = {2017},
     volume = {52},
     pages = {74--86}}
    
  52. T. Qiao, A. Zhu & F. Retraint
    Exposing image resampling forgery by using linear parametric model
    Multimedia Tools and Applications, Springer, 2017, pp. 1
    DOI: 10.1007/s11042-016-4314-1
    BibTeX
    @article{Qiao2017a,
     author = {Qiao, Tong and Zhu, Aichun and Retraint, Florent},
     title = {Exposing image resampling forgery by using linear parametric model},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  53. B.S. Rao
    A fuzzy fusion approach for modified contrast enhancement based image forensics against attacks
    Multimedia Tools and Applications, Springer, 2017, pp. 1
    DOI: 10.1007/s11042-017-4426-2
    BibTeX
    @article{Rao2017,
     author = {Rao, B. Subrahmanyeswara},
     title = {A fuzzy fusion approach for modified contrast enhancement based image forensics against attacks},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  54. Q. Rao & J. Wang
    Suppressing Random Artifacts in Reference Sensor Pattern Noise via Decorrelation
    IEEE Signal Processing Letters, Institute of Electrical and Electronics Engineers (IEEE), 2017, pp. 1-1
    DOI: 10.1109/lsp.2017.2681426
    BibTeX
    @article{Rao_2017,
     author = {Rao, Qiang and Wang, Jianjun},
     title = {Suppressing Random Artifacts in Reference Sensor Pattern Noise via Decorrelation},
     journal = {IEEE Signal Processing Letters},
     publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
     year = {2017},
     pages = {1--1}}
    
  55. H.K. Rhee
    Median filtering detection based on variations and residual in image forensics
    2017
    BibTeX
    @unpublished{Rhee2017,
     author = {Rhee, Hyeon Kang},
     title = {Median filtering detection based on variations and residual in image forensics},
     year = {2017}}
    
  56. C. Riess, M. Unberath, F. Naderi, S. Pfaller, M. Stamminger & E. Angelopoulou
    Handling multiple materials for exposure of digital forgeries using 2-D lighting environments
    Multimedia Tools and Applications, Springer, 2017, Vol. 76(4), pp. 4747
    DOI: 10.1007/s11042-016-3655-0
    BibTeX
    @article{Riess2017,
     author = {Riess, Christian and Unberath, Mathias and Naderi, Farzad and Pfaller, Sven and Stamminger, Marc and Angelopoulou, Elli},
     title = {Handling multiple materials for exposure of digital forgeries using 2-D lighting environments},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2017},
     volume = {76},
     number = {4},
     pages = {4747}}
    
  57. K. Sachdev, M. Kaur & S. Gupta
    A Robust and Fast Technique to Detect Copy Move Forgery in Digital Images Using SLIC Segmentation and SURF Keypoints
    Proceeding of International Conference on Intelligent Communication, Control and Devices, Springer, 2017
    DOI: 10.1007/978-981-10-1708-7_91
    BibTeX
    @article{Sachdev2017,
     author = {Sachdev, Kanica and Kaur, Mandeep and Gupta, Savita},
     title = {A Robust and Fast Technique to Detect Copy Move Forgery in Digital Images Using SLIC Segmentation and SURF Keypoints},
     journal = {Proceeding of International Conference on Intelligent Communication, Control and Devices},
     publisher = {Springer},
     year = {2017}}
    
  58. S. Saito, Y. Tomioka & H. Kitazawa
    A Theoretical Framework for Estimating False Acceptance Rate of PRNU-based Camera Identification
    IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers (IEEE), 2017, pp. 1-1
    DOI: 10.1109/tifs.2017.2692683
    BibTeX
    @article{Saito_2017,
     author = {Saito, Shota and Tomioka, Yoichi and Kitazawa, Hitoshi},
     title = {A Theoretical Framework for Estimating False Acceptance Rate of PRNU-based Camera Identification},
     journal = {IEEE Transactions on Information Forensics and Security},
     publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
     year = {2017},
     pages = {1--1}}
    
  59. R.N. Salimi
    Deteksi Copy-move Untuk Forensik Citra Dengan Modifikasi Algoritma Duplication Detection Dan Robust Detection
    Jurusan Teknik Informatika Fakultas Teknologi Informasi Institut Teknologi Sepuluh Nopember Surabaya, Jurusan Teknik Informatika Fakultas Teknologi Informasi Institut Teknologi Sepuluh Nopember Surabaya, 2017
    BibTeX
    @thesis{Salimi2017,
     author = {Salimi, Rahmat Nazali},
     title = {Deteksi Copy-move Untuk Forensik Citra Dengan Modifikasi Algoritma Duplication Detection Dan Robust Detection},
     school = {Jurusan Teknik Informatika Fakultas Teknologi Informasi Institut Teknologi Sepuluh Nopember Surabaya},
     year = {2017}}
    
  60. P.M. Shelke & R.S. Prasad
    Tradeoffs Between Forensics and Anti-Forensics of Digital Images
    International Journal of Rough Sets and Data Analysis, IGI Global, 2017, Vol. 4(2), pp. 92-105
    DOI: 10.4018/ijrsda.2017040107
    BibTeX
    @article{Shelke_2017,
     author = {Shelke, Priya Makarand and Prasad, Rajesh Shardanand},
     title = {Tradeoffs Between Forensics and Anti-Forensics of Digital Images},
     journal = {International Journal of Rough Sets and Data Analysis},
     publisher = {IGI Global},
     year = {2017},
     volume = {4},
     number = {2},
     pages = {92--105}}
    
  61. H.J. Shin, J.J. Jeon & I.K. Eom
    Bayer CFA pattern identification using color difference model
    Proc of the ICEIC 2017 International Conference on Electronics, Information, and Communication
    2017, pp. 187-188
    BibTeX
    @inproceedings{Shin2017,
     author = {Shin, Hyun Jun and Jeon, Jong Ju and Eom, Il Kyu},
     title = {Bayer CFA pattern identification using color difference model},
     booktitle = {Proc of the ICEIC 2017 International Conference on Electronics, Information, and Communication},
     year = {2017},
     pages = {187--188}}
    
  62. A.R. Soobhany, A.S. Akbari & Z.C. Schreuders
    Source Camera Identification Using Non-decimated Wavelet Transform
    11th International Conference on Global Security, Safety & Sustainability
    2017
    BibTeX
    @inproceedings{Soobhany2017,
     author = {Soobhany, A. Ryad and Akbari, A. Sheikh and Schreuders, Z. C.},
     title = {Source Camera Identification Using Non-decimated Wavelet Transform},
     booktitle = {11th International Conference on Global Security, Safety & Sustainability},
     year = {2017}}
    
  63. A.R. Soobhany, A. Sheikh Akbari & Z.C. Schreuders
    Reinforced source camera identification using non-decimated wavelet transform
    IET International Conference on Biomedical Image and Signal Processing, 2017
    BibTeX
    @article{Soobhany2017a,
     author = {Soobhany, A. R. and Sheikh Akbari, A. and Schreuders, Z. C.},
     title = {Reinforced source camera identification using non-decimated wavelet transform},
     journal = {IET International Conference on Biomedical Image and Signal Processing},
     year = {2017}}
    
  64. Y. Su, X. Jin, C. Zhang & Y. Chen
    Hierarchical Image Resampling Detection Based on Blind Deconvolution
    Journal of Visual Communication and Image Representation, Elsevier BV, 2017
    DOI: 10.1016/j.jvcir.2017.01.009
    BibTeX
    @article{Su_2017,
     author = {Su, Yuting and Jin, Xiao and Zhang, Chengqian and Chen, Yawei},
     title = {Hierarchical Image Resampling Detection Based on Blind Deconvolution},
     journal = {Journal of Visual Communication and Image Representation},
     publisher = {Elsevier BV},
     year = {2017}}
    
  65. B. Subrahmanyeswara Rao
    A fuzzy fusion approach for modified contrast enhancement based image forensics against attacks
    Multimedia Tools and Applications, Springer, 2017, pp. 1
    DOI: 10.1007/s11042-017-4426-2
    BibTeX
    @article{SubrahmanyeswaraRao2017,
     author = {Subrahmanyeswara Rao, B.},
     title = {A fuzzy fusion approach for modified contrast enhancement based image forensics against attacks},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  66. K. Taya, N. Takeda, T. Kobayashi, Y. Ozaki & N. Kuroki
    Detecting Doctored JPEG Image Based on Block Noise Analysis and Double JPEG Analysis
    IEEJ Transactions on Electronics, Information and Systems, Institute of Electrical Engineers of Japan (IEE Japan), 2017, Vol. 137(5), pp. 742-749
    DOI: 10.1541/ieejeiss.137.742
    BibTeX
    @article{Taya2017,
     author = {Taya, Kunihiko and Takeda, Naoto and Kobayashi, Tadashi and Ozaki, Yoshiaki and Kuroki, Nobutaka},
     title = {Detecting Doctored JPEG Image Based on Block Noise Analysis and Double JPEG Analysis},
     journal = {IEEJ Transactions on Electronics, Information and Systems},
     publisher = {Institute of Electrical Engineers of Japan (IEE Japan)},
     year = {2017},
     volume = {137},
     number = {5},
     pages = {742--749}}
    
  67. T.H. Thai, R. Cogranne, F. Retraint & T.N.C. Doan
    JPEG Quantization Step Estimation and Its Applications to Digital Image Forensics
    IEEE Transactions on Information Forensics and Security, 2017, Vol. 12(1), pp. 123-133
    DOI: 10.1109/TIFS.2016.2604208
    BibTeX
    @article{Thai2017,
     author = {Thai, T. H. and Cogranne, R. and Retraint, F. and Doan, T. N. C.},
     title = {JPEG Quantization Step Estimation and Its Applications to Digital Image Forensics},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2017},
     volume = {12},
     number = {1},
     pages = {123--133}}
    
  68. V. Thirunavukkarasu, J. Satheesh Kumar, G.S. Chae & J. Kishorkumar
    Non-intrusive Forensic Detection Method Using DSWT with Reduced Feature Set for Copy-Move Image Tampering
    Wireless Personal Communications, Springer, 2017, pp. 1
    DOI: 10.1007/s11277-016-3941-1
    BibTeX
    @article{Thirunavukkarasu2017,
     author = {Thirunavukkarasu, V. and Satheesh Kumar, J. and Chae, Gyoo Soo and Kishorkumar, J.},
     title = {Non-intrusive Forensic Detection Method Using DSWT with Reduced Feature Set for Copy-Move Image Tampering},
     journal = {Wireless Personal Communications},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  69. V. Tuba, R. Jovanovic & M. Tuba
    Digital image forgery detection based on shadow HSV inconsistency
    2017 5th International Symposium on Digital Forensic and Security (ISDFS)
    IEEE, 2017
    DOI: 10.1109/isdfs.2017.7916505
    BibTeX
    @inproceedings{Tuba2017,
     author = {Tuba, Viktor and Jovanovic, Raka and Tuba, Milan},
     title = {Digital image forgery detection based on shadow HSV inconsistency},
     booktitle = {2017 5th International Symposium on Digital Forensic and Security (ISDFS)},
     publisher = {IEEE},
     year = {2017}}
    
  70. D. Valsesia, G. Coluccia, T. Bianchi & E. MagliValsesia
    User Authentication via PRNU-based Physical Unclonable Functions
    IEEE Transactions on Information, 2017
    BibTeX
    @article{Valsesia2017,
     author = {Valsesia, D. and Coluccia, G. and Bianchi, T. and MagliValsesia, E.},
     title = {User Authentication via PRNU-based Physical Unclonable Functions},
     journal = {IEEE Transactions on Information},
     year = {2017}}
    
  71. D. Vazquez-Padin, F. Perez-Gonzalez & P. Comesana-Alfaro
    A Random Matrix Approach to the Forensic Analysis of Upscaled Images
    IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers (IEEE), 2017, pp. 1-1
    DOI: 10.1109/tifs.2017.2699638
    BibTeX
    @article{Vazquez_Padin_2017,
     author = {Vazquez-Padin, David and Perez-Gonzalez, Fernando and Comesana-Alfaro, Pedro},
     title = {A Random Matrix Approach to the Forensic Analysis of Upscaled Images},
     journal = {IEEE Transactions on Information Forensics and Security},
     publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
     year = {2017},
     pages = {1--1}}
    
  72. D. Vázquez-Padín, F. Pérez-González & P. Comesaña-Alfaro
    Derivation of the Asymptotic Eigenvalue Distribution for Causal 2D-AR Models under Upscaling
    arXiv, 2017
    BibTeX
    @article{Vazquez-Padin2017,
     author = {Vázquez-Padín, David and Pérez-González, Fernando and Comesaña-Alfaro, Pedro},
     title = {Derivation of the Asymptotic Eigenvalue Distribution for Causal 2D-AR Models under Upscaling},
     journal = {arXiv},
     year = {2017}}
    
  73. K. Wang
    A Simple and Effective Image-Statistics-Based Approach to Detecting Recaptured Images from LCD Screens
    2017
    BibTeX
    @unpublished{Wang2017,
     author = {Wang, Kai},
     title = {A Simple and Effective Image-Statistics-Based Approach to Detecting Recaptured Images from LCD Screens},
     year = {2017}}
    
  74. W.T. Weldtsadik, H.J. Kim, Y. Choi & C. Kim
    Circle Block Based Copy-Move Forgery Detection
    Yoon, K. & Kim, C. G. (ed.)
    Proceedings of the 3rd EEECS 2017
    Okinawa Jichikaikan
    Okinawa Pref. Municipal Center, Japan
    January 9-11, 2017
    2017
    BibTeX
    @inproceedings{Weldtsadik2017,
     author = {Weldtsadik, Wendimagegn Tariku and Kim, Hyoung Joog and Choi, Yongsoo and Kim, Cheongghil},
     title = {Circle Block Based Copy-Move Forgery Detection},
     booktitle = {Proceedings of the 3rd EEECS 2017
    Okinawa Jichikaikan
    Okinawa Pref. Municipal Center, Japan
    January 9-11, 2017}, year = {2017}}
  75. W. Wen & S. Khatibi
    Estimation of Image Sensor Fill Factor Using a Single Arbitrary Image
    Sensors, MDPI AG, 2017, Vol. 17(3), pp. 620
    DOI: 10.3390/s17030620
    BibTeX
    @article{Wen2017,
     author = {Wen, Wei and Khatibi, Siamak},
     title = {Estimation of Image Sensor Fill Factor Using a Single Arbitrary Image},
     journal = {Sensors},
     publisher = {MDPI AG},
     year = {2017},
     volume = {17},
     number = {3},
     pages = {620}}
    
  76. M.-L. Wu, C.-S. Fahn & Y.-F. Chen
    Image-format-independent tampered image detection based on overlapping concurrent directional patterns and neural networks
    Applied Intelligence, Springer, 2017, pp. 1
    DOI: 10.1007/s10489-017-0893-4
    BibTeX
    @article{Wu2017,
     author = {Wu, Meng-Luen and Fahn, Chin-Shyurng and Chen, Yi-Fan},
     title = {Image-format-independent tampered image detection based on overlapping concurrent directional patterns and neural networks},
     journal = {Applied Intelligence},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  77. J. Yaduwanshi & P. Bansal
    A Novel Approach for Copy Move Forgery Detection Using Template Matching
    Proceedings of International Conference on Communication and Networks, Springer, 2017
    DOI: 10.1007/978-981-10-2750-5_72
    BibTeX
    @article{Yaduwanshi2017,
     author = {Yaduwanshi, Jyoti and Bansal, Pratosh},
     title = {A Novel Approach for Copy Move Forgery Detection Using Template Matching},
     journal = {Proceedings of International Conference on Communication and Networks},
     publisher = {Springer},
     year = {2017}}
    
  78. B. Yang, X. Qiu, W. Hu, H. Guo & C. Song
    Exposing Copy-move Forgery Based on Improved Sift Descriptor
    Journal of Internet Technology, 2017, Vol. 18(2), pp. 417-425
    BibTeX
    @article{Yang2017c,
     author = {Yang, Bin and Qiu, Xiaolin and Hu, Weifeng and Guo, Honglei and Song, Chunlin},
     title = {Exposing Copy-move Forgery Based on Improved Sift Descriptor},
     journal = {Journal of Internet Technology},
     year = {2017},
     volume = {18},
     number = {2},
     pages = {417--425}}
    
  79. B. Yang, X. Sun, H. Guo, Z. Xia & X. Chen
    A copy-move forgery detection method based on CMFD-SIFT
    Multimedia Tools and Applications, Springer, 2017, pp. 1
    DOI: 10.1007/s11042-016-4289-y
    BibTeX
    @article{Yang2017,
     author = {Yang, Bin and Sun, Xingming and Guo, Honglei and Xia, Zhihua and Chen, Xianyi},
     title = {A copy-move forgery detection method based on CMFD-SIFT},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  80. F. Yang, J. Li, W. Lu & J. Weng
    Copy-move forgery detection based on hybrid features
    Engineering Applications of Artificial Intelligence, Elsevier BV, 2017, Vol. 59, pp. 73-83
    DOI: 10.1016/j.engappai.2016.12.022
    BibTeX
    @article{Yang2017a,
     author = {Yang, Fan and Li, Jingwei and Lu, Wei and Weng, Jian},
     title = {Copy-move forgery detection based on hybrid features},
     journal = {Engineering Applications of Artificial Intelligence},
     publisher = {Elsevier BV},
     year = {2017},
     volume = {59},
     pages = {73--83}}
    
  81. J. Yang, H. Ren, G. Zhu, J. Huang & Y.-Q. Shi
    Detecting median filtering via two-dimensional AR models of multiple filtered residuals
    Multimedia Tools and Applications, Springer, 2017, pp. 1
    DOI: 10.1007/s11042-017-4691-0
    BibTeX
    @article{Yang2017,
     author = {Yang, Jianquan and Ren, Honglei and Zhu, Guopu and Huang, Jiwu and Shi, Yun-Qing},
     title = {Detecting median filtering via two-dimensional AR models of multiple filtered residuals},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  82. P. Yang, W. Zhao, R. Ni & Y. Zhao
    Source Camera Identification Based On Content-Adaptive Fusion Network
    arXiv, 2017
    BibTeX
    @article{Yang2017b,
     author = {Yang, Pengpeng and Zhao, Wei and Ni, Rongrong and Zhao, Yao},
     title = {Source Camera Identification Based On Content-Adaptive Fusion Network},
     journal = {arXiv},
     year = {2017}}
    
  83. M. Zakariah, M.K. Khan & H. Malik
    Digital multimedia audio forensics: past, present and future
    Multimedia Tools and Applications, Springer, 2017, pp. 1
    DOI: 10.1007/s11042-016-4277-2
    BibTeX
    @article{Zakariah2017,
     author = {Zakariah, Mohammed and Khan, Muhammad Khurram and Malik, Hafiz},
     title = {Digital multimedia audio forensics: past, present and future},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2017},
     pages = {1}}
    
  84. F. Zeng, W. Wang, J. Chen & M. Tang
    Detecting blurred image splicing using blur type inconsistency
    International Journal of Innovative Computing and Applications, Inderscience Publishers, 2017, Vol. 8(1), pp. 31
    DOI: 10.1504/ijica.2017.082495
    BibTeX
    @article{Zeng2017,
     author = {Zeng, Feng and Wang, Wei and Chen, Junjie and Tang, Min},
     title = {Detecting blurred image splicing using blur type inconsistency},
     journal = {International Journal of Innovative Computing and Applications},
     publisher = {Inderscience Publishers},
     year = {2017},
     volume = {8},
     number = {1},
     pages = {31}}
    
  85. L.-B. Zhang, F. Peng & M. Long
    Source Camera Identification Based on Guided Image Estimation and Block Weighted Average
    Digital Forensics and Watermarking, Springer, 2017
    DOI: 10.1007/978-3-319-53465-7_8
    BibTeX
    @article{Zhang2017,
     author = {Zhang, Le-Bing and Peng, Fei and Long, Min},
     title = {Source Camera Identification Based on Guided Image Estimation and Block Weighted Average},
     journal = {Digital Forensics and Watermarking},
     publisher = {Springer},
     year = {2017}}
    
  86. W. Zhang, Z. Yang, S. Niu & J. Wang
    Detection of Copy-Move Forgery in Flat Region Based on Feature Enhancement
    Digital Forensics and Watermarking, Springer, 2017
    DOI: 10.1007/978-3-319-53465-7_12
    BibTeX
    @article{Zhang2017a,
     author = {Zhang, Weiwei and Yang, Zhenghong and Niu, Shaozhang and Wang, Junbin},
     title = {Detection of Copy-Move Forgery in Flat Region Based on Feature Enhancement},
     journal = {Digital Forensics and Watermarking},
     publisher = {Springer},
     year = {2017}}
    
  87. F. Zhao, W. Shi, B. Qin & B. Liang
    Image forgery detection using segmentation and swarm intelligent algorithm
    Wuhan University Journal of Natural Sciences, Springer, 2017, Vol. 22(2), pp. 141
    DOI: 10.1007/s11859-017-1227-4
    BibTeX
    @article{Zhao2017,
     author = {Zhao, Fei and Shi, Wenchang and Qin, Bo and Liang, Bin},
     title = {Image forgery detection using segmentation and swarm intelligent algorithm},
     journal = {Wuhan University Journal of Natural Sciences},
     publisher = {Springer},
     year = {2017},
     volume = {22},
     number = {2},
     pages = {141}}
    
  88. Digital Forensics and Watermarking: 15th International Workshop, IWDW 2016, Beijing, China, September 17-19, 2016, Revised Selected Papers (Lecture Notes in Computer Science)
    Shi, Y. Q., Kim, H. J., Perez-Gonzalez & F., Liu, F. (ed.)
    Springer, 2017
    BibTeX
    @book{Shi2017,,
     title = {Digital Forensics and Watermarking: 15th International Workshop, IWDW 2016, Beijing, China, September 17-19, 2016, Revised Selected Papers (Lecture Notes in Computer Science)},
     publisher = {Springer},
     year = {2017}}
    


2016

  1. O.M. Al-Qershi & B.E. Khoo
    Information Science and Applications (ICIsa) 2016
    Kim, J. K. & Joukov, N. (ed.)
    Lecture Notes in Electrical Engineering
    Chapter Copy-Move Forgery Detection Using on Locality Sensitive Hashing and k-means Clustering
    Springer Singapore, 2016, pp. 663-672
    DOI: 10.1007/978-981-10-0557-2_65
    BibTeX
    @inbook{Al-Qershi2016,
     author = {Al-Qershi, Osamah M. and Khoo, Bee Ee},
     title = {Information Science and Applications (ICIsa) 2016},
     booktitle = {Lecture Notes in Electrical Engineering},
     publisher = {Springer Singapore},
     year = {2016},
     pages = {663--672}}
    
  2. J. Abbasi Aghamaleki & A. Behrad
    Malicious Inter-frame Video Tampering Detection in Mpeg Videos Using Time and Spatial Domain Analysis of Quantization Effects
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-016-4004-z
    BibTeX
    @article{AbbasiAghamaleki2016,
     author = {Abbasi Aghamaleki, Javad and Behrad, Alireza},
     title = {Malicious Inter-frame Video Tampering Detection in Mpeg Videos Using Time and Spatial Domain Analysis of Quantization Effects},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  3. S. Abramova & R. Böhme
    Detecting Copy--move Forgeries in Scanned Text Documents
    Digital-Forensics and Watermarking
    Springer Science + Business Media, 2016, pp. 3-18
    DOI: 10.1007/978-3-662-43886-2_1
    BibTeX
    @incollection{Abramova2016,
     author = {Abramova, Svetlana and Böhme, Rainer},
     title = {Detecting Copy--move Forgeries in Scanned Text Documents},
     booktitle = {Digital-Forensics and Watermarking},
     publisher = {Springer Science + Business Media},
     year = {2016},
     pages = {3--18}}
    
  4. N. Afshin, F. Razzazi & M.S. Moin
    A Dictionary Based Approach to JPEG Anti-forensics
    Proc. IEEE 8th Int. Conf. Intelligent Systems (IS)
    2016, pp. 778-783
    DOI: 10.1109/IS.2016.7737401
    BibTeX
    @inproceedings{Afshin2016,
     author = {Afshin, N. and Razzazi, F. and Moin, M. S.},
     title = {A Dictionary Based Approach to JPEG Anti-forensics},
     booktitle = {Proc. IEEE 8th Int. Conf. Intelligent Systems (IS)},
     year = {2016},
     pages = {778--783}}
    
  5. S. Agarwal & S. Chand
    Texture Operator Based Image Splicing Detection Hybrid Technique
    Proc. Second Int. Conf. Computational Intelligence Communication Technology (CICT)
    2016, pp. 116-120
    DOI: 10.1109/CICT.2016.31
    BibTeX
    @inproceedings{Agarwal2016,
     author = {Agarwal, Saurabh and Chand, Satish},
     title = {Texture Operator Based Image Splicing Detection Hybrid Technique},
     booktitle = {Proc. Second Int. Conf. Computational Intelligence Communication Technology (CICT)},
     year = {2016},
     pages = {116--120}}
    
  6. S. Agarwal & S. Chand
    Image tampering detection using local phase based operator
    Proc. Int. Conf. Emerging Trends in Electrical Electronics Sustainable Energy Systems (ICETEESES)
    2016, pp. 355-360
    DOI: 10.1109/ICETEESES.2016.7581409
    BibTeX
    @inproceedings{Agarwal2016a,
     author = {Agarwal, Saurabh and Chand, Satish},
     title = {Image tampering detection using local phase based operator},
     booktitle = {Proc. Int. Conf. Emerging Trends in Electrical Electronics Sustainable Energy Systems (ICETEESES)},
     year = {2016},
     pages = {355--360}}
    
  7. Z. Akhtar & E. Khan
    Identifying High Quality JPEG Compressed Images through Exhaustive Recompression Technique
    Proc. Communications and Informatics (ICACCI) 2016 Int. Conf. Advances in Computing
    2016, pp. 652-656
    DOI: 10.1109/ICACCI.2016.7732120
    BibTeX
    @inproceedings{Akhtar2016,
     author = {Akhtar, Z. and Khan, E.},
     title = {Identifying High Quality JPEG Compressed Images through Exhaustive Recompression Technique},
     booktitle = {Proc. Communications and Informatics (ICACCI) 2016 Int. Conf. Advances in Computing},
     year = {2016},
     pages = {652--656}}
    
  8. K.R. Akshatha, H. Anitha, A.K. Karunakar, U. Raghavendra & D. Shetty
    Source Camera Identification Using Noise Residual
    Proc. of the International conference on Recent Trends in Electronics, Information & Communication Technology, 20/05/2016, SVCE Bangalore
    2016
    BibTeX
    @inproceedings{Akshatha2016,
     author = {Akshatha, K. R. and Anitha, H. and Karunakar, A. K. and Raghavendra, U. and Shetty, Dinesh},
     title = {Source Camera Identification Using Noise Residual},
     booktitle = {Proc. of the International conference on Recent Trends in Electronics, Information & Communication Technology, 20/05/2016, SVCE Bangalore},
     year = {2016}}
    
  9. K.R. Akshatha, A.K. Karunakar, H. Anitha, U. Raghavendra & D. Shetty
    Digital Camera Identification Using PRNU: A Feature Based Approach
    Digital Investigation, Elsevier BV, 2016
    DOI: 10.1016/j.diin.2016.10.002
    BibTeX
    @article{Akshatha_2016,
     author = {Akshatha, K. R. and Karunakar, A. K. and Anitha, H. and Raghavendra, U. and Shetty, Dinesh},
     title = {Digital Camera Identification Using PRNU: A Feature Based Approach},
     journal = {Digital Investigation},
     publisher = {Elsevier BV},
     year = {2016}}
    
  10. A. Alahmadi, M. Hussain, H. Aboalsamh, G. Muhammad, G. Bebis & H. Mathkour
    Passive Detection of Image Forgery Using DCT and Local Binary Pattern
    Signal, Image and Video Processing, 2016, pp. 1-8
    DOI: 10.1007/s11760-016-0899-0
    BibTeX
    @article{Alahmadi2016,
     author = {Alahmadi, Amani and Hussain, Muhammad and Aboalsamh, Hatim and Muhammad, Ghulam and Bebis, George and Mathkour, Hassan},
     title = {Passive Detection of Image Forgery Using DCT and Local Binary Pattern},
     journal = {Signal, Image and Video Processing},
     year = {2016},
     pages = {1--8}}
    
  11. L. Alamro & N. Yusoff
    Copy-move Forgery Detection in Digital Image
    AIP Conference Proceedings, 2016, Vol. 1761(1)
    DOI: 10.1063/1.4960855
    BibTeX
    @article{Alamro2016,
     author = {Alamro, Loai and Yusoff, Nooraini},
     title = {Copy-move Forgery Detection in Digital Image},
     journal = {AIP Conference Proceedings},
     year = {2016},
     volume = {1761},
     number = {1}}
    
  12. M. Al-Ani & F. Khelifi
    On the Sensor Pattern Noise Estimation in Image Forensics: A Systematic Empirical Evaluation
    #IEEE_J_IFS#, 2016, Vol. PP(99), pp. 1
    DOI: 10.1109/TIFS.2016.2640938
    BibTeX
    @article{Al-Ani2016,
     author = {Al-Ani, M. and Khelifi, F.},
     title = {On the Sensor Pattern Noise Estimation in Image Forensics: A Systematic Empirical Evaluation},
     journal = {#IEEE_J_IFS#},
     year = {2016},
     volume = {PP},
     number = {99},
     pages = {1}}
    
  13. M.M. Al-Hammadi & S. Emmanuel
    Improving SURF Based Copy-Move Forgery Detection Using Super Resolution
    Proc. IEEE Int. Symp. Multimedia (ISM)
    2016, pp. 341-344
    DOI: 10.1109/ISM.2016.0075
    BibTeX
    @inproceedings{Al-Hammadi2016,
     author = {Al-Hammadi, M. M. and Emmanuel, S.},
     title = {Improving SURF Based Copy-Move Forgery Detection Using Super Resolution},
     booktitle = {Proc. IEEE Int. Symp. Multimedia (ISM)},
     year = {2016},
     pages = {341--344}}
    
  14. M. Alhussein
    Image Tampering Detection Based on Local Texture Descriptor and Extreme Learning Machine
    Proc. UKSim-AMSS 18th Int. Conf. Computer Modelling and Simulation (UKSim)
    2016, pp. 196-199
    DOI: 10.1109/UKSim.2016.39
    BibTeX
    @inproceedings{Alhussein2016,
     author = {Alhussein, M.},
     title = {Image Tampering Detection Based on Local Texture Descriptor and Extreme Learning Machine},
     booktitle = {Proc. UKSim-AMSS 18th Int. Conf. Computer Modelling and Simulation (UKSim)},
     year = {2016},
     pages = {196--199}}
    
  15. M.H. Alkawaz, G. Sulong, T. Saba & A. Rehman
    Detection of copy-move image forgery based on discrete cosine transform
    Neural Computing and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s00521-016-2663-3
    BibTeX
    @article{Alkawaz2016,
     author = {Alkawaz, Mohammed Hazim and Sulong, Ghazali and Saba, Tanzila and Rehman, Amjad},
     title = {Detection of copy-move image forgery based on discrete cosine transform},
     journal = {Neural Computing and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  16. M. Almeida, P.L. Correia & P.K. Larsen
    Biofov -- an Open Platform for Forensic Video Analysis and Biometric Data Extraction
    Proc. 4th Int. Conf. Biometrics and Forensics (IWBF)
    2016, pp. 1-6
    DOI: 10.1109/IWBF.2016.7449693
    BibTeX
    @inproceedings{Almeida2016,
     author = {Almeida, M. and Correia, P. L. and Larsen, P. K.},
     title = {Biofov -- an Open Platform for Forensic Video Analysis and Biometric Data Extraction},
     booktitle = {Proc. 4th Int. Conf. Biometrics and Forensics (IWBF)},
     year = {2016},
     pages = {1--6}}
    
  17. O.M. Al-Qershi & B.E. Khoo
    Copy-move Forgery Detection Using on Locality Sensitive Hashing and K-means Clustering
    Information Science and Applications (ICISA) 2016
    Springer, 2016
    DOI: 10.1007/978-981-10-0557-2_65
    BibTeX
    @incollection{Al-Qershi2016b,
     author = {Al-Qershi, Osamah M. and Khoo, Bee Ee},
     title = {Copy-move Forgery Detection Using on Locality Sensitive Hashing and K-means Clustering},
     booktitle = {Information Science and Applications (ICISA) 2016},
     publisher = {Springer},
     year = {2016}}
    
  18. I. Amerini, R. Becarelli, F. Brancati, R. Caldelli, G. Giunta & M.L. Itria
    Media Trustworthiness Verification and Event Assessment through an Integrated Framework: A Case-study
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-016-3303-8
    BibTeX
    @article{Amerini2016,
     author = {Amerini, Irene and Becarelli, Rudy and Brancati, Francesco and Caldelli, Roberto and Giunta, Gabriele and Itria, Massimiliano L.},
     title = {Media Trustworthiness Verification and Event Assessment through an Integrated Framework: A Case-study},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  19. S. Amneet
    Feature Development Based on CFA Artifacts for Image Forgery Detection
    Thapar University, Thapar University, 2016
    BibTeX
    @mastersthesis{Amneet2016,
     author = {Amneet, Singh},
     title = {Feature Development Based on CFA Artifacts for Image Forgery Detection},
     school = {Thapar University},
     year = {2016}}
    
  20. B. Anderson-Sackaney & A. Abdel-Dayem
    Evaluation of Sensor Pattern Noise Estimators for Source Camera Identification
    International Journal of Computer, Electrical, Automation, Control and Information Engineering, 2016, Vol. 10(12)
    BibTeX
    @article{Anderson-Sackaney2016,
     author = {Anderson-Sackaney, Benjamin and Abdel-Dayem, Amr},
     title = {Evaluation of Sensor Pattern Noise Estimators for Source Camera Identification},
     journal = {International Journal of Computer, Electrical, Automation, Control and Information Engineering},
     year = {2016},
     volume = {10},
     number = {12}}
    
  21. K. Asghar, Z. Habib & M. Hussain
    Copy-move and Splicing Image Forgery Detection and Localization Techniques: A Review
    Australian Journal of Forensic Sciences, 2016, Vol. 0(0), pp. 1-27
    DOI: 10.1080/00450618.2016.1153711
    BibTeX
    @article{Asghar2016,
     author = {Asghar, Khurshid and Habib, Zulfiqar and Hussain, Muhammad},
     title = {Copy-move and Splicing Image Forgery Detection and Localization Techniques: A Review},
     journal = {Australian Journal of Forensic Sciences},
     year = {2016},
     volume = {0},
     number = {0},
     pages = {1--27}}
    
  22. S. Aymaz, Ş. Aymaz & G. Ulutaş
    Detection of copy move forgery using Legendre Moments
    Proc. 24th Signal Processing and Communication Application Conf. (SIU)
    2016, pp. 1125-1128
    DOI: 10.1109/SIU.2016.7495942
    BibTeX
    @inproceedings{Aymaz2016,
     author = {Aymaz, S. and Aymaz, Ş. and Ulutaş, G.},
     title = {Detection of copy move forgery using Legendre Moments},
     booktitle = {Proc. 24th Signal Processing and Communication Application Conf. (SIU)},
     year = {2016},
     pages = {1125--1128}}
    
  23. S. Azarian-Pour, M. Babaie-Zadeh & A.R. Sadri
    An automatic JPEG ghost detection approach for digital image forensics
    Proc. 24th Iranian Conf. Electrical Engineering (ICEE)
    2016, pp. 1645-1649
    DOI: 10.1109/IranianCEE.2016.7585785
    BibTeX
    @inproceedings{Azarian-Pour2016,
     author = {Azarian-Pour, S. and Babaie-Zadeh, M. and Sadri, A. R.},
     title = {An automatic JPEG ghost detection approach for digital image forensics},
     booktitle = {Proc. 24th Iranian Conf. Electrical Engineering (ICEE)},
     year = {2016},
     pages = {1645--1649}}
    
  24. M.A. Bagiwa, A.W.A. Wahab, M.Y.I. Idris, S. Khan & K.-K.R. Choo
    Chroma Key Background Detection for Digital Video Using Statistical Correlation of Blurring Artifact
    Digital Investigation, Elsevier BV, 2016, Vol. 19, pp. 29-43
    DOI: 10.1016/j.diin.2016.09.001
    BibTeX
    @article{Bagiwa_2016,
     author = {Bagiwa, Mustapha Aminu and Wahab, Ainuddin Wahid Abdul and Idris, Mohd Yamani Idna and Khan, Suleman and Choo, Kim-Kwang Raymond},
     title = {Chroma Key Background Detection for Digital Video Using Statistical Correlation of Blurring Artifact},
     journal = {Digital Investigation},
     publisher = {Elsevier BV},
     year = {2016},
     volume = {19},
     pages = {29--43}}
    
  25. Bansal
    A novel Analysis of Image Forgery Detection Using
    SVM

    2016
    BibTeX
    @article{Bansal2016,
     author = {Bansal},
     title = {A novel Analysis of Image Forgery Detection Using
    SVM}, year = {2016}}
  26. M. Barni, Z. Chen & B. Tondi
    Adversary-aware, data-driven detection of double JPEG compression: How to make counter-forensics harder
    Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)
    2016, pp. 1-6
    DOI: 10.1109/WIFS.2016.7823902
    BibTeX
    @inproceedings{Barni2016,
     author = {Barni, M. and Chen, Z. and Tondi, B.},
     title = {Adversary-aware, data-driven detection of double JPEG compression: How to make counter-forensics harder},
     booktitle = {Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)},
     year = {2016},
     pages = {1--6}}
    
  27. L. Baroffio, L. Bondi, P. Bestagini & S. Tubaro
    Camera Identification with Deep Convolutional Networks
    arXiv preprint arXiv:1603.01068, 2016
    DOI: 10.1016/j.image.2016.05.007
    BibTeX
    @article{Baroffio2016,
     author = {Baroffio, Luca and Bondi, Luca and Bestagini, Paolo and Tubaro, Stefano},
     title = {Camera Identification with Deep Convolutional Networks},
     journal = {arXiv preprint arXiv:1603.01068},
     year = {2016}}
    
  28. A. Baumy, N.F. Soiliman, M. Abdalla & F.A. El-Samie
    A Discriminative Statistical Model for Digital Image Forgery Detection
    I.J. Engineering and Manufacturing, 2016
    DOI: 10.5815/ijem.
    BibTeX
    @article{Baumy2016,
     author = {Baumy, Amira and Soiliman, Naglaa. F. and Abdalla, Mahmoud and El-Samie, Fathi Abd},
     title = {A Discriminative Statistical Model for Digital Image Forgery Detection},
     journal = {I.J. Engineering and Manufacturing},
     year = {2016}}
    
  29. B. Bayar & M.C. Stamm
    A Deep Learning Approach to Universal Image Manipulation Detection Using a New Convolutional Layer
    Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security
    ACM, 2016, pp. 5-10
    DOI: 10.1145/2909827.2930786
    BibTeX
    @inproceedings{Bayar2016,
     author = {Bayar, Belhassen and Stamm, Matthew C.},
     title = {A Deep Learning Approach to Universal Image Manipulation Detection Using a New Convolutional Layer},
     booktitle = {Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security},
     publisher = {ACM},
     year = {2016},
     pages = {5--10}}
    
  30. E. Baykal, B. Ustubioglu & G. Ulutas
    Image forgery detection based on SIFT and k-means++
    Proc. 39th Int. Conf. Telecommunications and Signal Processing (TSP)
    2016, pp. 474-477
    DOI: 10.1109/TSP.2016.7760924
    BibTeX
    @inproceedings{Baykal2016,
     author = {Baykal, E. and Ustubioglu, B. and Ulutas, G.},
     title = {Image forgery detection based on SIFT and k-means++},
     booktitle = {Proc. 39th Int. Conf. Telecommunications and Signal Processing (TSP)},
     year = {2016},
     pages = {474--477}}
    
  31. F. Bertini, R. Sharma, A. Iannı, D. Montesi & M.A. Zamboni
    Social Media Investigations Using Shared Photos
    2016
    DOI: 10.1145/2790755.2790765
    BibTeX
    @electronic{Bertini2016,
     author = {Bertini, Flavio and Sharma, Rajesh and Iannı, Andrea and Montesi, Danilo and Zamboni, Mura Anteo},
     title = {Social Media Investigations Using Shared Photos},
     year = {2016}}
    
  32. P. Bestagini, S. Milani, M. Tagliasacchi & S. Tubaro
    Codec and Gop Identification in Double Compressed Videos
    IEEE Transactions on Image Processing, 2016, Vol. 25(5), pp. 2298-2310
    DOI: 10.1109/TIP.2016.2541960
    BibTeX
    @article{Bestagini2016,
     author = {Bestagini, P. and Milani, S. and Tagliasacchi, M. and Tubaro, S.},
     title = {Codec and Gop Identification in Double Compressed Videos},
     journal = {IEEE Transactions on Image Processing},
     year = {2016},
     volume = {25},
     number = {5},
     pages = {2298--2310}}
    
  33. P. Bestagini, M. Tagliasacchi & S. Tubaro
    Image Phylogeny Tree Reconstruction Based on Region Selection
    Proc. Speech and Signal Processing (ICASSP) 2016 IEEE Int. Conf. Acoustics
    2016, pp. 2059-2063
    DOI: 10.1109/ICASSP.2016.7472039
    BibTeX
    @inproceedings{Bestagini2016a,
     author = {Bestagini, P. and Tagliasacchi, M. and Tubaro, S.},
     title = {Image Phylogeny Tree Reconstruction Based on Region Selection},
     booktitle = {Proc. Speech and Signal Processing (ICASSP) 2016 IEEE Int. Conf. Acoustics},
     year = {2016},
     pages = {2059--2063}}
    
  34. A. Bharati, R. Singh, M. Vatsa & K. Bowyer
    Detecting Facial Retouching Using Supervised Deep Learning
    IEEE Transactions on Information Forensics and Security, 2016, Vol. PP(99), pp. 1-1
    DOI: 10.1109/TIFS.2016.2561898
    BibTeX
    @article{Bharati2016,
     author = {Bharati, A. and Singh, R. and Vatsa, M. and Bowyer, K.},
     title = {Detecting Facial Retouching Using Supervised Deep Learning},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2016},
     volume = {PP},
     number = {99},
     pages = {1--1}}
    
  35. C.N. Bharti & P. Tandel
    A Survey of Image Forgery Detection Techniques
    Proc. Signal Processing and Networking (WiSPNET) 2016 Int. Conf. Wireless Communications
    2016, pp. 877-881
    DOI: 10.1109/WiSPNET.2016.7566257
    BibTeX
    @inproceedings{Bharti2016,
     author = {Bharti, C. N. and Tandel, P.},
     title = {A Survey of Image Forgery Detection Techniques},
     booktitle = {Proc. Signal Processing and Networking (WiSPNET) 2016 Int. Conf. Wireless Communications},
     year = {2016},
     pages = {877--881}}
    
  36. G. Bhartiya & A.S. Jalal
    Forgery Detection Using Feature-clustering in Recompressed JPEG Images
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-016-3964-3
    BibTeX
    @article{Bhartiya2016,
     author = {Bhartiya, Gunjan and Jalal, Anand Singh},
     title = {Forgery Detection Using Feature-clustering in Recompressed JPEG Images},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  37. X. Bi, C.-M. Pun & X.-C. Yuan
    Multi-scale feature extraction and adaptive matching for copy-move forgery detection
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-016-4276-3
    BibTeX
    @article{Bi2016,
     author = {Bi, XiuLi and Pun, Chi-Man and Yuan, Xiao-Chen},
     title = {Multi-scale feature extraction and adaptive matching for copy-move forgery detection},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  38. G.K. Birajdar & V.H. Mankar
    Passive Image Manipulation Detection Using Wavelet Transform and Support Vector Machine Classifier
    Satapathy, C. S., Joshi, A., Modi, N. & Pathak, N. (ed.)
    Proceedings of International Conference on ICT for Sustainable Development
    Chapter Passive Image Manipulation Detection Using Wavelet Transform and Support Vector Machine Classifier
    Springer Singapore, 2016, pp. 447-455
    DOI: 10.1007/978-981-10-0129-1_47
    BibTeX
    @inbook{Birajdar2016,
     author = {Birajdar, Gajanan K. and Mankar, Vijay H.},
     title = {Passive Image Manipulation Detection Using Wavelet Transform and Support Vector Machine Classifier},
     booktitle = {Proceedings of International Conference on ICT for Sustainable Development},
     publisher = {Springer Singapore},
     year = {2016},
     pages = {447--455}}
    
  39. P.M. Birajdar & N.G. Dharashive
    Digital Image Forgery Identification Using Motion Blur Variations as Clue
    KHOJ – Journal of Indian Management Research and Practices, 2016
    BibTeX
    @article{Birajdar2016a,
     author = {Birajdar, P. M. and Dharashive, N. G.},
     title = {Digital Image Forgery Identification Using Motion Blur Variations as Clue},
     journal = {KHOJ – Journal of Indian Management Research and Practices},
     year = {2016}}
    
  40. R. Böhme & M. Kirchner
    Media Forensics
    Information Hiding
    Chapter Chapter 9
    Artech House - Boston, 2016, pp. 231259
    BibTeX
    @inbook{Boehme2016,
     author = {Böhme, Rainer and Kirchner, Matthias},
     title = {Media Forensics},
     booktitle = {Information Hiding},
     publisher = {Artech House - Boston},
     year = {2016},
     pages = {231259}}
    
  41. A. Boz & H.Ş. Bilge
    Copy-move image forgery detection based on LBP and DCT
    Proc. 24th Signal Processing and Communication Application Conf. (SIU)
    2016, pp. 561-564
    DOI: 10.1109/SIU.2016.7495802
    BibTeX
    @inproceedings{Boz2016,
     author = {Boz, A. and Bilge, H. Ş.},
     title = {Copy-move image forgery detection based on LBP and DCT},
     booktitle = {Proc. 24th Signal Processing and Communication Application Conf. (SIU)},
     year = {2016},
     pages = {561--564}}
    
  42. M. Bürker & H.P.A. Lensch
    Scene-based Non-uniformity Correction with Readout Noise Compensation
    Image and Video Technology, Springer, 2016
    DOI: 10.1007/978-3-319-29451-3_26
    BibTeX
    @article{Buerker2016,
     author = {Bürker, Martin and Lensch, Hendrik P. A.},
     title = {Scene-based Non-uniformity Correction with Readout Noise Compensation},
     journal = {Image and Video Technology},
     publisher = {Springer},
     year = {2016}}
    
  43. T. Carvalho, F.A. Faria, H. Pedrini, R. da S. Torres & A. Rocha
    Illuminant-based Transformed Spaces for Image Forensics
    IEEE Transactions on Information Forensics and Security, 2016, Vol. 11(4), pp. 720-733
    DOI: 10.1109/TIFS.2015.2506548
    BibTeX
    @article{Carvalho2016,
     author = {Carvalho, T. and Faria, F. A. and Pedrini, H. and da S. Torres, R. and Rocha, A.},
     title = {Illuminant-based Transformed Spaces for Image Forensics},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2016},
     volume = {11},
     number = {4},
     pages = {720--733}}
    
  44. G. Cattaneo, G. Roscigno & A. Bruno
    Using Pnu-based Techniques to Detect Alien Frames in Videos
    Advanced Concepts for Intelligent Vision Systems, Springer, 2016
    DOI: 10.1007/978-3-319-48680-2_64
    BibTeX
    @article{Cattaneo2016,
     author = {Cattaneo, Giuseppe and Roscigno, Gianluca and Bruno, Andrea},
     title = {Using Pnu-based Techniques to Detect Alien Frames in Videos},
     journal = {Advanced Concepts for Intelligent Vision Systems},
     publisher = {Springer},
     year = {2016}}
    
  45. S. Chakraborty & M. Kirchner
    Compression Forensics beyond the First Significant Digit
    2016
    DOI: 10.1109/wifs.2015.7368578
    BibTeX
    @electronic{Chakraborty2016,
     author = {Chakraborty, Sujoy and Kirchner, Matthias},
     title = {Compression Forensics beyond the First Significant Digit},
     year = {2016}}
    
  46. H.-p. Chen, X.-J. Shen & J.-W. Long
    Histogram-based Colour Image Fuzzy Clustering Algorithm
    Multimedia Tools and Applications, Springer, 2016, Vol. 75(18), pp. 11417
    DOI: 10.1007/s11042-015-2860-6
    BibTeX
    @article{Chen2016a,
     author = {Chen, Hai-peng and Shen, Xuan-Jing and Long, Jian-Wu},
     title = {Histogram-based Colour Image Fuzzy Clustering Algorithm},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     volume = {75},
     number = {18},
     pages = {11417}}
    
  47. J. Chen, X. Jiang, T. Sun, P. He & S. Wang
    Detecting Double MPEG Compression with the Same Quantiser Scale Based on Mbm Feature
    Proc. Speech and Signal Processing (ICASSP) 2016 IEEE Int. Conf. Acoustics
    2016, pp. 2064-2068
    DOI: 10.1109/ICASSP.2016.7472040
    BibTeX
    @inproceedings{Chen2016,
     author = {Chen, J. and Jiang, X. and Sun, T. and He, P. and Wang, S.},
     title = {Detecting Double MPEG Compression with the Same Quantiser Scale Based on Mbm Feature},
     booktitle = {Proc. Speech and Signal Processing (ICASSP) 2016 IEEE Int. Conf. Acoustics},
     year = {2016},
     pages = {2064--2068}}
    
  48. S. Chen, S. Tan, B. Li & J. Huang
    Automatic Detection of Object-Based Forgery in Advanced Video
    #IEEE_J_CASVT#, 2016, Vol. 26(11), pp. 2138-2151
    DOI: 10.1109/TCSVT.2015.2473436
    BibTeX
    @article{Chen2016b,
     author = {Chen, S. and Tan, S. and Li, B. and Huang, J.},
     title = {Automatic Detection of Object-Based Forgery in Advanced Video},
     journal = {#IEEE_J_CASVT#},
     year = {2016},
     volume = {26},
     number = {11},
     pages = {2138--2151}}
    
  49. X. Chu, Y. Chen & K.J.R. Liu
    An information theoretic framework for order of operations forensics
    Proc. Speech and Signal Processing (ICASSP) 2016 IEEE Int. Conf. Acoustics
    2016, pp. 2049-2053
    DOI: 10.1109/ICASSP.2016.7472037
    BibTeX
    @inproceedings{Chu2016,
     author = {Chu, X. and Chen, Y. and Liu, K. J. R.},
     title = {An information theoretic framework for order of operations forensics},
     booktitle = {Proc. Speech and Signal Processing (ICASSP) 2016 IEEE Int. Conf. Acoustics},
     year = {2016},
     pages = {2049--2053}}
    
  50. X. Chu, Y. Chen & K.J.R. Liu
    Detectability of the Order of Operations: An Information Theoretic Approach
    #IEEE_J_IFS#, 2016, Vol. 11(4), pp. 823-836
    DOI: 10.1109/TIFS.2015.2510958
    BibTeX
    @article{Chu2016a,
     author = {Chu, X. and Chen, Y. and Liu, K. J. R.},
     title = {Detectability of the Order of Operations: An Information Theoretic Approach},
     journal = {#IEEE_J_IFS#},
     year = {2016},
     volume = {11},
     number = {4},
     pages = {823--836}}
    
  51. D. Cozzolino & L. Verdoliva
    Single-image splicing localization through autoencoder-based anomaly detection
    Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)
    2016, pp. 1-6
    DOI: 10.1109/WIFS.2016.7823921
    BibTeX
    @inproceedings{Cozzolino2016,
     author = {Cozzolino, D. and Verdoliva, L.},
     title = {Single-image splicing localization through autoencoder-based anomaly detection},
     booktitle = {Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)},
     year = {2016},
     pages = {1--6}}
    
  52. N. Dalmia & M. Okade
    First Quantization Matrix Estimation for Double Compressed JPEG Images Utilizing Novel DCT Histogram Selection Strategy
    Proceedings of the Tenth Indian Conference on Computer Vision, Graphics and Image Processing - ICVGIP textquotesingle16
    ACM, 2016, pp. 271-278
    DOI: 10.1145/3009977.3010067
    BibTeX
    @inproceedings{Dalmia2016,
     author = {Dalmia, Nandita and Okade, Manish},
     title = {First Quantization Matrix Estimation for Double Compressed JPEG Images Utilizing Novel DCT Histogram Selection Strategy},
     booktitle = {Proceedings of the Tenth Indian Conference on Computer Vision, Graphics and Image Processing - ICVGIP textquotesingle16},
     publisher = {ACM},
     year = {2016},
     pages = {271--278}}
    
  53. A. Das, A. Medhi, R.K. Karsh & R.H. Laskar
    Image splicing detection using Gaussian or defocus blur
    Proc. Int. Conf. Communication and Signal Processing (ICCSP)
    2016, pp. 1237-1241
    DOI: 10.1109/ICCSP.2016.7754350
    BibTeX
    @inproceedings{Das2016,
     author = {Das, A. and Medhi, A. and Karsh, R. K. and Laskar, R. H.},
     title = {Image splicing detection using Gaussian or defocus blur},
     booktitle = {Proc. Int. Conf. Communication and Signal Processing (ICCSP)},
     year = {2016},
     pages = {1237--1241}}
    
  54. R. Davarzani, S. Mozaffari & K. Yaghmaie
    Perceptual Image Hashing Using Center-symmetric Local Binary Patterns
    Multimedia Tools and Applications, Springer, 2016, Vol. 75(8), pp. 4639
    DOI: 10.1007/s11042-015-2496-6
    BibTeX
    @article{Davarzani2016,
     author = {Davarzani, Reza and Mozaffari, Saeed and Yaghmaie, Khashayar},
     title = {Perceptual Image Hashing Using Center-symmetric Local Binary Patterns},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     volume = {75},
     number = {8},
     pages = {4639}}
    
  55. J. De Bock & P. De Smet
    Jpgcarve: An Advanced Tool for Automated Recovery of Fragmented JPEG Files
    IEEE Transactions on Information Forensics and Security, 2016, Vol. 11(1), pp. 19-34
    DOI: 10.1109/TIFS.2015.2475238
    BibTeX
    @article{DeBock2016,
     author = {De Bock, J. and De Smet, P.},
     title = {Jpgcarve: An Advanced Tool for Automated Recovery of Fragmented JPEG Files},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2016},
     volume = {11},
     number = {1},
     pages = {19--34}}
    
  56. L. Debiasi & A. Uhl
    Comparison of PRNU Enhancement Techniques to Generate PRNU Fingerprints for Biometric Source Sensor Attribution
    2016 4th International Conference on Biometrics and Forensics (IWBF)
    2016, pp. 1-6
    DOI: 10.1109/IWBF.2016.7449674
    BibTeX
    @inproceedings{Debiasi2016,
     author = {Debiasi, L. and Uhl, A.},
     title = {Comparison of PRNU Enhancement Techniques to Generate PRNU Fingerprints for Biometric Source Sensor Attribution},
     booktitle = {2016 4th International Conference on Biometrics and Forensics (IWBF)},
     year = {2016},
     pages = {1--6}}
    
  57. F. Ding, W. Dong, G. Zhu & Y.-Q. Shi
    An Advanced Texture Analysis Method for Image Sharpening Detection
    Digital-Forensics and Watermarking, Springer, 2016
    DOI: 10.1007/978-3-319-31960-5_7
    BibTeX
    @article{Ding2016,
     author = {Ding, Feng and Dong, Weiqiang and Zhu, Guopu and Shi, Yun-Qing},
     title = {An Advanced Texture Analysis Method for Image Sharpening Detection},
     journal = {Digital-Forensics and Watermarking},
     publisher = {Springer},
     year = {2016}}
    
  58. A. Dixit & R.K. Gupta
    Copy-move Image Forgery Detection Using Frequency-based Techniques: A Review
    International Journal of Signal Processing, Image Processing and Pattern Recognition, Science and Engineering Research Support Society, 2016, Vol. 9(3), pp. 71-88
    DOI: 10.14257/ijsip.2016.9.3.07
    BibTeX
    @article{Dixit2016,
     author = {Dixit, Anuja and Gupta, R. K.},
     title = {Copy-move Image Forgery Detection Using Frequency-based Techniques: A Review},
     journal = {International Journal of Signal Processing, Image Processing and Pattern Recognition},
     publisher = {Science and Engineering Research Support Society},
     year = {2016},
     volume = {9},
     number = {3},
     pages = {71--88}}
    
  59. R. Dixit & R. Naskar
    Dywt Based Copy-move Forgery Detection with Improved Detection Accuracy
    Proc. 3rd Int. Conf. Signal Processing and Integrated Networks (SPIN)
    2016, pp. 133-138
    DOI: 10.1109/SPIN.2016.7566676
    BibTeX
    @inproceedings{Dixit2016a,
     author = {Dixit, R. and Naskar, R.},
     title = {Dywt Based Copy-move Forgery Detection with Improved Detection Accuracy},
     booktitle = {Proc. 3rd Int. Conf. Signal Processing and Integrated Networks (SPIN)},
     year = {2016},
     pages = {133--138}}
    
  60. J. Dong, L. Chen, J. Tian & X. Xu
    A Novel Image Splicing Detection Method Based on the Inconsistency of Image Noise
    Proc. IEEE 11th Conf. Industrial Electronics and Applications (ICIEA)
    2016, pp. 560-563
    DOI: 10.1109/ICIEA.2016.7603647
    BibTeX
    @inproceedings{Dong2016,
     author = {Dong, J. and Chen, L. and Tian, J. and Xu, X.},
     title = {A Novel Image Splicing Detection Method Based on the Inconsistency of Image Noise},
     booktitle = {Proc. IEEE 11th Conf. Industrial Electronics and Applications (ICIEA)},
     year = {2016},
     pages = {560--563}}
    
  61. S. Dua, J. Singh & H. Parthasarathy
    Rotation angle estimation of an image using least square method
    Proc. 3rd Int. Conf. Signal Processing and Integrated Networks (SPIN)
    2016, pp. 296-300
    DOI: 10.1109/SPIN.2016.7566707
    BibTeX
    @inproceedings{Dua2016,
     author = {Dua, S. and Singh, J. and Parthasarathy, H.},
     title = {Rotation angle estimation of an image using least square method},
     booktitle = {Proc. 3rd Int. Conf. Signal Processing and Integrated Networks (SPIN)},
     year = {2016},
     pages = {296--300}}
    
  62. Y. Duan, D. Bouslimi, G. Yang, H. Shu & G. Coatrieux
    Computed Tomography Image Origin Identification Based on Original Sensor Pattern Noise and 3D Image Reconstruction Algorithm Footprints
    IEEE Journal of Biomedical and Health Informatics, 2016, Vol. PP(99), pp. 1
    DOI: 10.1109/JBHI.2016.2575398
    BibTeX
    @article{Duan2016,
     author = {Duan, Y. and Bouslimi, D. and Yang, G. and Shu, H. and Coatrieux, G.},
     title = {Computed Tomography Image Origin Identification Based on Original Sensor Pattern Noise and 3D Image Reconstruction Algorithm Footprints},
     journal = {IEEE Journal of Biomedical and Health Informatics},
     year = {2016},
     volume = {PP},
     number = {99},
     pages = {1}}
    
  63. E.-S.M. El-Alfy & M.A. Qureshi
    Robust Content Authentication of Gray and Color Images Using LBP-dct Markov-based Features
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-016-3855-7
    BibTeX
    @article{El-Alfy2016,
     author = {El-Alfy, El-Sayed M. and Qureshi, Muhammad A.},
     title = {Robust Content Authentication of Gray and Color Images Using LBP-dct Markov-based Features},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  64. A. Elliethy & G. Sharma
    Image Anonymization for PRNU Forensics: A Set Theoretic Framework Addressing Compression Resilience
    Proc. IEEE Int. Conf. Image Processing (ICIP)
    2016, pp. 3907-3911
    DOI: 10.1109/ICIP.2016.7533092
    BibTeX
    @inproceedings{Elliethy2016,
     author = {Elliethy, A. and Sharma, G.},
     title = {Image Anonymization for PRNU Forensics: A Set Theoretic Framework Addressing Compression Resilience},
     booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)},
     year = {2016},
     pages = {3907--3911}}
    
  65. M. Emam, Q. Han & H. Zhang
    A Keypoint-based Region Duplication Forgery Detection Algorithm
    IEICE TRANSACTIONS on Information and Systems, 2016, Vol. 99-(9), pp. 2413-2416
    DOI: 10.1587/transinf.2016edl8024
    BibTeX
    @article{Emam2016,
     author = {Emam, Mahmoud and Han, Qi and Zhang, Hongli},
     title = {A Keypoint-based Region Duplication Forgery Detection Algorithm},
     journal = {IEICE TRANSACTIONS on Information and Systems},
     year = {2016},
     volume = {99-},
     number = {9},
     pages = {2413--2416}}
    
  66. M. Emam, Q. Han & H. Zhang
    Detection of Copy-scale-move Forgery in Digital Images Using Sfop and MROGH
    Social Computing
    Springer, 2016
    DOI: 10.1007/978-981-10-2053-7_29
    BibTeX
    @incollection{Emam2016a,
     author = {Emam, Mahmoud and Han, Qi and Zhang, Hongli},
     title = {Detection of Copy-scale-move Forgery in Digital Images Using Sfop and MROGH},
     booktitle = {Social Computing},
     publisher = {Springer},
     year = {2016}}
    
  67. N.I. Evdokimova & A.V. Kuznetsov
    Copy - Move Detection Algorithm Based on Local Derivative Pattern S
    Information Technology and Nanotechnolog, 2016
    DOI: 10.18287/1613-0073-2016-1638-304-312
    BibTeX
    @article{Evdokimova2016,
     author = {Evdokimova, N. I. and Kuznetsov, A. V.},
     title = {Copy - Move Detection Algorithm Based on Local Derivative Pattern S},
     journal = {Information Technology and Nanotechnolog},
     year = {2016}}
    
  68. S. Fahd, M.M.W. Iqbal, M. Arif & M.I. Javed
    Integrated Model: Statistical Features, Memory Analysis for Scanner and Printer Forensics
    Proc. 4th Int. Symp. Digital Forensic and Security (ISDFS)
    2016, pp. 74-77
    DOI: 10.1109/ISDFS.2016.7473521
    BibTeX
    @inproceedings{Fahd2016,
     author = {Fahd, S. and Iqbal, M. M. W. and Arif, M. and Javed, M. I.},
     title = {Integrated Model: Statistical Features, Memory Analysis for Scanner and Printer Forensics},
     booktitle = {Proc. 4th Int. Symp. Digital Forensic and Security (ISDFS)},
     year = {2016},
     pages = {74--77}}
    
  69. M.F. Fahmy & O.M. Fahmy
    A New Morphological Based Forgery Detection Scheme
    2016 33rd National Radio Science Conference (NRSC)
    2016, pp. 212-216
    DOI: 10.1109/NRSC.2016.7450830
    BibTeX
    @inproceedings{Fahmy2016,
     author = {Fahmy, M. F. and Fahmy, O. M.},
     title = {A New Morphological Based Forgery Detection Scheme},
     booktitle = {2016 33rd National Radio Science Conference (NRSC)},
     year = {2016},
     pages = {212--216}}
    
  70. O.M. Fahmy
    A new Zernike moments based technique for camera identification and forgery detection
    Signal, Image and Video Processing, Springer, 2016, pp. 1
    DOI: 10.1007/s11760-016-1023-1
    BibTeX
    @article{Fahmy2016a,
     author = {Fahmy, O. M.},
     title = {A new Zernike moments based technique for camera identification and forgery detection},
     journal = {Signal, Image and Video Processing},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  71. J. Fan, T. Chen & A.C. Kot
    EXIF-white Balance Recognition for Image Forensic Analysis
    Multidimensional Systems and Signal Processing, Springer, 2016, pp. 1
    DOI: 10.1007/s11045-015-0377-9
    BibTeX
    @article{Fan2016,
     author = {Fan, Jiayuan and Chen, Tao and Kot, Alex ChiChung},
     title = {EXIF-white Balance Recognition for Image Forensic Analysis},
     journal = {Multidimensional Systems and Signal Processing},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  72. W. Fan, G. Valenzise, F. Banterle & F. Dufaux
    Forensic Detection of Inverse Tone Mapping in Hdr Images
    Proc. IEEE Int. Conf. Image Processing (ICIP)
    2016, pp. 166-170
    DOI: 10.1109/ICIP.2016.7532340
    BibTeX
    @inproceedings{Fan2016a,
     author = {Fan, W. and Valenzise, G. and Banterle, F. and Dufaux, F.},
     title = {Forensic Detection of Inverse Tone Mapping in Hdr Images},
     booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)},
     year = {2016},
     pages = {166--170}}
    
  73. A. Ferreira, S.C. Felipussi, C. Alfaro, P. Fonseca, J.E. Vargas-Muñoz, J.A. dos Santos & A. Rocha
    Behavior Knowledge Space-based Fusion for Copy --move Forgery Detection
    IEEE_J_IP, 2016, Vol. 25(10), pp. 4729-4742
    DOI: 10.1109/TIP.2016.2593583
    BibTeX
    @article{Ferreira2016,
     author = {Ferreira, A. and Felipussi, S. C. and Alfaro, C. and Fonseca, P. and Vargas-Muñoz, J. E. and dos Santos, J. A. and Rocha, A.},
     title = {Behavior Knowledge Space-based Fusion for Copy --move Forgery Detection},
     journal = {IEEE_J_IP},
     year = {2016},
     volume = {25},
     number = {10},
     pages = {4729--4742}}
    
  74. A. Ferreira, J.A.D. Santos & A. Rocha
    Multi-directional and Multi-scale Perturbation Approaches for Blind Forensic Median Filtering Detection
    Intelligent Data Analysis, IOS Press, 2016, Vol. 20(s1), pp. S17-S36
    DOI: 10.3233/IDA-160843
    BibTeX
    @article{AnselmoFerreira_JeferssonA.DosSantos_AndersonRocha_2016,
     author = {Ferreira, Anselmo and Santos, Jefersson A. Dos and Rocha, Anderson},
     title = {Multi-directional and Multi-scale Perturbation Approaches for Blind Forensic Median Filtering Detection},
     journal = {Intelligent Data Analysis},
     publisher = {IOS Press},
     year = {2016},
     volume = {20},
     number = {s1},
     pages = {S17-S36}}
    
  75. F. Galvan
    First Quantization Table Detection in Double Compressed JPEG Images
    Università degli Studi di Udine, Dottorato di ricerca in Dottorato di ricerca in Informatica, 27, Università degli Studi di Udine, Dottorato di ricerca in Dottorato di ricerca in Informatica, 27, 2016
    BibTeX
    @phdthesis{Galvan2016,
     author = {Galvan, Fausto},
     title = {First Quantization Table Detection in Double Compressed JPEG Images},
     school = {Università degli Studi di Udine, Dottorato di ricerca in Dottorato di ricerca in Informatica, 27},
     year = {2016}}
    
  76. Y. Gan & J. Zhong
    Application of Afmt Method for Composite Forgery Detection
    Nonlinear Dynamics, Springer, 2016, Vol. 84(1), pp. 341
    DOI: 10.1007/s11071-015-2524-0
    BibTeX
    @article{Gan2016,
     author = {Gan, Yanfen and Zhong, Junliu},
     title = {Application of Afmt Method for Composite Forgery Detection},
     journal = {Nonlinear Dynamics},
     publisher = {Springer},
     year = {2016},
     volume = {84},
     number = {1},
     pages = {341}}
    
  77. J. Gong & J. Guo
    Image Copy-move Forgery Detection Using SURF in Opponent Color Space
    Transactions of Tianjin University, Springer, 2016, Vol. 22(2), pp. 151
    DOI: 10.1007/s12209-016-2705-z
    BibTeX
    @article{Gong2016,
     author = {Gong, Jiachang and Guo, Jichang},
     title = {Image Copy-move Forgery Detection Using SURF in Opponent Color Space},
     journal = {Transactions of Tianjin University},
     publisher = {Springer},
     year = {2016},
     volume = {22},
     number = {2},
     pages = {151}}
    
  78. R.E.J. Granty & G. Kousalya
    Spectral-hashing-based Image Retrieval and Copy-move Forgery Detection
    Australian Journal of Forensic Sciences, Taylor & Francis, 2016, pp. 1-16
    DOI: 10.1080/00450618.2015.1128966
    BibTeX
    @article{Granty2016,
     author = {Granty, Regina Elwin J. and Kousalya, G.},
     title = {Spectral-hashing-based Image Retrieval and Copy-move Forgery Detection},
     journal = {Australian Journal of Forensic Sciences},
     publisher = {Taylor & Francis},
     year = {2016},
     pages = {1--16}}
    
  79. Y. Gu, S. Wang, X. Lin & T. Sun
    USM Sharpening Detection Based on Sparse Coding
    Proc. Int. Conf. Digital Image Computing: Techniques and Applications (DICTA)
    2016, pp. 1-5
    DOI: 10.1109/DICTA.2016.7797092
    BibTeX
    @inproceedings{Gu2016,
     author = {Gu, Y. and Wang, S. and Lin, X. and Sun, T.},
     title = {USM Sharpening Detection Based on Sparse Coding},
     booktitle = {Proc. Int. Conf. Digital Image Computing: Techniques and Applications (DICTA)},
     year = {2016},
     pages = {1--5}}
    
  80. S. Gupta & P.S. Sandhu
    Highlighting Image Tampering by Feature Extraction Based on Image Quality Deterioration
    Proc. 3rd Int. Conf. Computing for Sustainable Global Development (INDIACom)
    2016, pp. 2362-2367
    BibTeX
    @inproceedings{Gupta2016,
     author = {Gupta, S. and Sandhu, P. S.},
     title = {Highlighting Image Tampering by Feature Extraction Based on Image Quality Deterioration},
     booktitle = {Proc. 3rd Int. Conf. Computing for Sustainable Global Development (INDIACom)},
     year = {2016},
     pages = {2362--2367}}
    
  81. J.G. Han, T.H. Park, Y.H. Moon & I.K. Eom
    Efficient Markov Feature Extraction Method for Image Splicing Detection Using Maximization and Threshold Expansion
    Journal of Electronic Imaging, 2016, Vol. 25(2), pp. 023031
    DOI: 10.1117/1.JEI.25.2.023031
    BibTeX
    @article{Han2016,
     author = {Han, Jong Goo and Park, Tae Hee and Moon, Yong Ho and Eom, Il Kyu},
     title = {Efficient Markov Feature Extraction Method for Image Splicing Detection Using Maximization and Threshold Expansion},
     journal = {Journal of Electronic Imaging},
     year = {2016},
     volume = {25},
     number = {2},
     pages = {023031}}
    
  82. J.-G. Han, I.-K. Eom, Y.-H. Moon & S.-W. Ha
    Selective Feature Extraction Method between Markov Transition Probability and Co-occurrence Probability for Image Splicing Detection
    Journal of the Korea Institute of Information and Communication Engineering, The Korean Institute of Information and Communication Sciences, 2016, Vol. 20(4), pp. 833-839
    DOI: 10.6109/jkiice.2016.20.4.833
    BibTeX
    @article{Han2016a,
     author = {Han, Jong-Goo and Eom, Il-Kyu and Moon, Yong-Ho and Ha, Seok-Wun},
     title = {Selective Feature Extraction Method between Markov Transition Probability and Co-occurrence Probability for Image Splicing Detection},
     journal = {Journal of the Korea Institute of Information and Communication Engineering},
     publisher = {The Korean Institute of Information and Communication Sciences},
     year = {2016},
     volume = {20},
     number = {4},
     pages = {833--839}}
    
  83. M.F. Hashmi, A.G. Keskara & V. Yadav
    Fuzzy Based Image Forensic Tool for Detection and Classification of Image Cloning
    International Journal of Computational Intelligence Systems, 2016, Vol. 9(2), pp. 351-375
    DOI: 10.1080/18756891.2016.1161364
    BibTeX
    @article{Hashmi2016,
     author = {Hashmi, Mohammad Farukh and Keskara, Avinash G. and Yadav, Vikas},
     title = {Fuzzy Based Image Forensic Tool for Detection and Classification of Image Cloning},
     journal = {International Journal of Computational Intelligence Systems},
     year = {2016},
     volume = {9},
     number = {2},
     pages = {351--375}}
    
  84. K. Henry
    Digital Photography Analysis: Analytical Framework for Measuring the Effects of Saturation on Photo Response Non-uniformity
    University of Central Florida, University of Central Florida, 2016
    BibTeX
    @mastersthesis{Henry2016,
     author = {Henry, Kris},
     title = {Digital Photography Analysis: Analytical Framework for Measuring the Effects of Saturation on Photo Response Non-uniformity},
     school = {University of Central Florida},
     year = {2016}}
    
  85. O. Holmes, M.S. Banks & H. Farid
    Assessing and Improving the Identification of Computer-generated Portraits
    ACM Trans. Appl. Percept., ACM, 2016, Vol. 13(2), pp. 71-712
    DOI: 10.1145/2871714
    BibTeX
    @article{Holmes2016,
     author = {Holmes, Olivia and Banks, Martin S. and Farid, Hany},
     title = {Assessing and Improving the Identification of Computer-generated Portraits},
     journal = {ACM Trans. Appl. Percept.},
     publisher = {ACM},
     year = {2016},
     volume = {13},
     number = {2},
     pages = {71--712}}
    
  86. J.U. Hou & H.K. Lee
    Detection of Hue Modification Using Photo Response Non-uniformity
    IEEE Transactions on Circuits and Systems for Video Technology, 2016, Vol. PP(99), pp. 1-1
    DOI: 10.1109/TCSVT.2016.2539828
    BibTeX
    @article{Hou2016,
     author = {Hou, J. U. and Lee, H. K.},
     title = {Detection of Hue Modification Using Photo Response Non-uniformity},
     journal = {IEEE Transactions on Circuits and Systems for Video Technology},
     year = {2016},
     volume = {PP},
     number = {99},
     pages = {1--1}}
    
  87. D. Hu, X. Zhang, Y. Fan, Z.-Q. Zhao, L. Wang, X. Wu & X. Wu
    On Digital Image Trustworthiness
    Applied Soft Computing, Elsevier BV, 2016, Vol. 48, pp. 240-253
    DOI: 10.1016/j.asoc.2016.07.010
    BibTeX
    @article{Hu2016c,
     author = {Hu, Donghui and Zhang, Xiaotian and Fan, Yuqi and Zhao, Zhong-Qiu and Wang, Lina and Wu, Xintao and Wu, Xindong},
     title = {On Digital Image Trustworthiness},
     journal = {Applied Soft Computing},
     publisher = {Elsevier BV},
     year = {2016},
     volume = {48},
     pages = {240--253}}
    
  88. W.-C. Hu, W.-H. Chen, D.-Y. Huang & C.-Y. Yang
    Effective Image Forgery Detection of Tampered Foreground or Background Image Based on Image Watermarking and Alpha Mattes
    Multimedia Tools and Applications, Springer, 2016, Vol. 75(6), pp. 3495
    DOI: 10.1007/s11042-015-2449-0
    BibTeX
    @article{Hu2016,
     author = {Hu, Wu-Chih and Chen, Wei-Hao and Huang, Deng-Yuan and Yang, Ching-Yu},
     title = {Effective Image Forgery Detection of Tampered Foreground or Background Image Based on Image Watermarking and Alpha Mattes},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     volume = {75},
     number = {6},
     pages = {3495}}
    
  89. X. Hu, J. Ni & R. Pan
    Detecting Video Forgery by Estimating Extrinsic Camera Parameters
    Digital-Forensics and Watermarking, Springer, 2016
    DOI: 10.1007/978-3-319-31960-5_3
    BibTeX
    @article{Hu2016a,
     author = {Hu, Xianglei and Ni, Jiangqun and Pan, Runbiao},
     title = {Detecting Video Forgery by Estimating Extrinsic Camera Parameters},
     journal = {Digital-Forensics and Watermarking},
     publisher = {Springer},
     year = {2016}}
    
  90. Y.-C. Hu, C.-C. Lo & W.-L. Chen
    Probability-based Reversible Image Authentication Scheme for Image Demosaicking
    Future Generation Computer Systems, Elsevier BV, 2016, Vol. 62, pp. 92-103
    DOI: 10.1016/j.future.2016.04.001
    BibTeX
    @article{Hu2016b,
     author = {Hu, Yu-Chen and Lo, Chun-Chi and Chen, Wu-Lin},
     title = {Probability-based Reversible Image Authentication Scheme for Image Demosaicking},
     journal = {Future Generation Computer Systems},
     publisher = {Elsevier BV},
     year = {2016},
     volume = {62},
     pages = {92--103}}
    
  91. Y. Huang, J. Zhang & X. Lan
    Source Camera Identification with Imbalanced Training Dataset
    IJDTA, Science and Engineering Research Support Society, 2016, Vol. 9(1), pp. 205-214
    DOI: 10.14257/ijdta.2016.9.2.22
    BibTeX
    @article{Huang2016,
     author = {Huang, Yonggang and Zhang, Jun and Lan, Xinkai},
     title = {Source Camera Identification with Imbalanced Training Dataset},
     journal = {IJDTA},
     publisher = {Science and Engineering Research Support Society},
     year = {2016},
     volume = {9},
     number = {1},
     pages = {205--214}}
    
  92. T. Huynh-Kha, T. Le-Tien, S. Ha & K. Huynh-Van
    Improving the Computational Cost for Copied Region Detection in Forensic Images
    JOURNAL OF SCIENCE AND TECHNOLOGY: ISSUE ON INFORMATION AND COMMUNICATIONS TECHNOLOGY, 2016, Vol. 2(1), pp. 55-63
    BibTeX
    @article{Huynh-Kha2016,
     author = {Huynh-Kha, Tu and Le-Tien, Thuong and Ha, Synh and Huynh-Van, Khoa},
     title = {Improving the Computational Cost for Copied Region Detection in Forensic Images},
     journal = {JOURNAL OF SCIENCE AND TECHNOLOGY: ISSUE ON INFORMATION AND COMMUNICATIONS TECHNOLOGY},
     year = {2016},
     volume = {2},
     number = {1},
     pages = {55--63}}
    
  93. M. gu Hwang, S. m.K. & D. hwan Har
    A Method of Identifying Digital Images with Geometric Distortion
    Australian Journal of Forensic Sciences, 2016
    DOI: 10.1080/00450618.2015.1128970
    BibTeX
    @article{Hwang2016,
     author = {gu Hwang, Min and , Sung min Kim and hwan Har, Dong},
     title = {A Method of Identifying Digital Images with Geometric Distortion},
     journal = {Australian Journal of Forensic Sciences},
     year = {2016}}
    
  94. M.M. Isaac & M. Wilscy
    A key point based copy-move forgery detection using HOG features
    Proc. Power and Computing Technologies (ICCPCT) 2016 Int. Conf. Circuit
    2016, pp. 1-6
    DOI: 10.1109/ICCPCT.2016.7530253
    BibTeX
    @inproceedings{Isaac2016,
     author = {Isaac, M. M. and Wilscy, M.},
     title = {A key point based copy-move forgery detection using HOG features},
     booktitle = {Proc. Power and Computing Technologies (ICCPCT) 2016 Int. Conf. Circuit},
     year = {2016},
     pages = {1--6}}
    
  95. M. Iuliani, M. Fanfani, C. Colombo & A. Piva
    Reliability Assessment of Principal Point Estimates for Forensic Applications
    Journal of Visual Communication and Image Representation, Elsevier BV, 2016
    DOI: 10.1016/j.jvcir.2016.11.010
    BibTeX
    @article{Iuliani2016,
     author = {Iuliani, Massimo and Fanfani, Marco and Colombo, Carlo and Piva, Alessandro},
     title = {Reliability Assessment of Principal Point Estimates for Forensic Applications},
     journal = {Journal of Visual Communication and Image Representation},
     publisher = {Elsevier BV},
     year = {2016}}
    
  96. M. Jahanirad, A.W.A. Wahab & N.B. Anuar
    An Evolution of Image Source Camera Attribution Approaches
    Forensic Sci Int, Elsevier BV, 2016, Vol. 262, pp. 242275
    DOI: 10.1016/j.forsciint.2016.03.035
    BibTeX
    @article{Jahanirad2016,
     author = {Jahanirad, Mehdi and Wahab, Ainuddin Wahid Abdul and Anuar, Nor Badrul},
     title = {An Evolution of Image Source Camera Attribution Approaches},
     journal = {Forensic Sci Int},
     publisher = {Elsevier BV},
     year = {2016},
     volume = {262},
     pages = {242275}}
    
  97. D.C. Jeronymo
    Semi-automatic wavelet soft-thresholding applied to digital image error level analysis
    PeerJ Preprints, 2016
    DOI: 10.7287/peerj.preprints.2619v1
    BibTeX
    @electronic{Jeronymo2016,
     author = {Jeronymo, Daniel C.},
     title = {Semi-automatic wavelet soft-thresholding applied to digital image error level analysis},
     publisher = {PeerJ Preprints},
     year = {2016}}
    
  98. X. Jiang, S. Wei, R. Zhao, Y. Zhao & X. Wu
    Camera Fingerprint: A New Perspective for Identifying User's Identity
    Arxiv, 2016
    BibTeX
    @article{Jiang2016,
     author = {Jiang, Xiang and Wei, Shikui and Zhao, Ruizhen and Zhao, Yao and Wu, Xindong},
     title = {Camera Fingerprint: A New Perspective for Identifying User's Identity},
     journal = {Arxiv},
     year = {2016}}
    
  99. X. Jinke
    Image Forgery Detection Algorithm Based on Non Sampling Wavelet Transform and Zernike Moments
    International Journal of Security and Its Applications, 2016, Vol. 10(2), pp. 27-38
    DOI: 10.14257/ijsia.2016.10.2.03
    BibTeX
    @article{Jinke2016,
     author = {Jinke, Xiao},
     title = {Image Forgery Detection Algorithm Based on Non Sampling Wavelet Transform and Zernike Moments},
     journal = {International Journal of Security and Its Applications},
     year = {2016},
     volume = {10},
     number = {2},
     pages = {27--38}}
    
  100. T. Julliand, V. Nozick & H. Talbot
    Automatic Image Splicing Detection Based on Noise Density Analysis in Raw Images
    2016
    DOI: 10.1049/ic.2015.0111
    BibTeX
    @unpublished{Julliand2016,
     author = {Julliand, Thibault and Nozick, Vincent and Talbot, Hugues},
     title = {Automatic Image Splicing Detection Based on Noise Density Analysis in Raw Images},
     year = {2016}}
    
  101. T. Julliand, V. Nozick & H. Talbot
    Image Noise and Digital Image Forensics
    Digital-Forensics and Watermarking, Springer, 2016
    DOI: 10.1007/978-3-319-31960-5_1
    BibTeX
    @article{Julliand2016a,
     author = {Julliand, Thibaut and Nozick, Vincent and Talbot, Hugues},
     title = {Image Noise and Digital Image Forensics},
     journal = {Digital-Forensics and Watermarking},
     publisher = {Springer},
     year = {2016}}
    
  102. T. Julliand, V. Nozick & H. Talbot
    Automatic Image Splicing Detection Based on Noise Density Analysis in Raw Images
    Advanced Concepts for Intelligent Vision Systems, Springer, 2016
    DOI: 10.1007/978-3-319-48680-2_12
    BibTeX
    @article{Julliand2016b,
     author = {Julliand, Thibault and Nozick, Vincent and Talbot, Hugues},
     title = {Automatic Image Splicing Detection Based on Noise Density Analysis in Raw Images},
     journal = {Advanced Concepts for Intelligent Vision Systems},
     publisher = {Springer},
     year = {2016}}
    
  103. J. Kamenicky, M. Bartos, J. Flusser, B. Mahdian, J. Kotera, A. Novozamsky, S. Saic, F. Sroubek, M. Sorel, A. Zita, B. Zitova, Z. Sima, P. Svarc & J. Horinek
    Pizzaro: Forensic Analysis and Restoration of Image and Video Data
    Forensic Science International, 2016, Vol. 264, pp. 153-166
    DOI: 10.1016/j.forsciint.2016.04.027
    BibTeX
    @article{Kamenicky2016,
     author = {Kamenicky, Jan and Bartos, Michal and Flusser, Jan and Mahdian, Babak and Kotera, Jan and Novozamsky, Adam and Saic, Stanislav and Sroubek, Filip and Sorel, Michal and Zita, Ales and Zitova, Barbara and Sima, Zdenek and Svarc, Petr and Horinek, Jan},
     title = {Pizzaro: Forensic Analysis and Restoration of Image and Video Data},
     journal = {Forensic Science International},
     year = {2016},
     volume = {264},
     pages = {153--166}}
    
  104. A.M. Kandepu & R. Naskar
    Classification based time-efficient, blind source camera identification for videos
    Proc. Int. Conf. Communication and Signal Processing (ICCSP)
    2016, pp. 0871-0875
    DOI: 10.1109/ICCSP.2016.7754271
    BibTeX
    @inproceedings{Kandepu2016,
     author = {Kandepu, A. M. and Naskar, R.},
     title = {Classification based time-efficient, blind source camera identification for videos},
     booktitle = {Proc. Int. Conf. Communication and Signal Processing (ICCSP)},
     year = {2016},
     pages = {0871--0875}}
    
  105. C. Kauba & A. Uhl
    PRNU-based Image Alignment for Defective Pixel Detection
    2016
    BibTeX
    @electronic{Kauba2016,
     author = {Kauba, Christof and Uhl, Andreas},
     title = {PRNU-based Image Alignment for Defective Pixel Detection},
     year = {2016}}
    
  106. M. Kaur & S. Gupta
    A Passive Blind Approach for Image Splicing Detection Based on Dwt and LBP Histograms
    Security in Computing and Communications
    Springer, 2016
    DOI: 10.1007/978-981-10-2738-3_27
    BibTeX
    @incollection{Kaur2016,
     author = {Kaur, Mandeep and Gupta, Savita},
     title = {A Passive Blind Approach for Image Splicing Detection Based on Dwt and LBP Histograms},
     booktitle = {Security in Computing and Communications},
     publisher = {Springer},
     year = {2016}}
    
  107. M. Kaur & S. Gupta
    A Passive Blind Approach for Image Splicing Detection Based on Dwt and LBP Histograms
    Security in Computing and Communications, Springer, 2016
    DOI: 10.1007/978-981-10-2738-3_27
    BibTeX
    @article{Kaur2016a,
     author = {Kaur, Mandeep and Gupta, Savita},
     title = {A Passive Blind Approach for Image Splicing Detection Based on Dwt and LBP Histograms},
     journal = {Security in Computing and Communications},
     publisher = {Springer},
     year = {2016}}
    
  108. Y. Ke, Q. Shan, F. Qin, W. Min & J. Guo
    Detection of Seam Carved Image Based on Additional Seam Carving Behavior
    International Journal of Signal Processing, Image Processing and Pattern Recognition, 2016, Vol. 9(2), pp. 167-178
    DOI: 10.14257/ijsip.2016.9.2.15
    BibTeX
    @article{Ke2016,
     author = {Ke, Yongzhen and Shan, Qingqing and Qin, Fan and Min, Weidong and Guo, Jing},
     title = {Detection of Seam Carved Image Based on Additional Seam Carving Behavior},
     journal = {International Journal of Signal Processing, Image Processing and Pattern Recognition},
     year = {2016},
     volume = {9},
     number = {2},
     pages = {167--178}}
    
  109. A.R.H. Khayeat, X. Sun & P.L. Rosin
    Improved DSIFT Descriptor Based Copy-rotate-move Forgery Detection
    Image and Video Technology, Springer, 2016
    DOI: 10.1007/978-3-319-29451-3_51
    BibTeX
    @article{Khayeat2016,
     author = {Khayeat, Ali Retha Hasoon and Sun, Xianfang and Rosin, Paul L.},
     title = {Improved DSIFT Descriptor Based Copy-rotate-move Forgery Detection},
     journal = {Image and Video Technology},
     publisher = {Springer},
     year = {2016}}
    
  110. Kim
    Building a Database of Dqt Information to Identify a Source of the Smartphone JPEG Image File
    Journal of the Korea Institute of Information Security and Cryptology, Korea Institute of Information Security and Cryptology, 2016, Vol. 26(2), pp. 359-367
    DOI: 10.13089/JKIISC.2016.26.2.359
    BibTeX
    @article{Kim2016,
     author = {Kim},
     title = {Building a Database of Dqt Information to Identify a Source of the Smartphone JPEG Image File},
     journal = {Journal of the Korea Institute of Information Security and Cryptology},
     publisher = {Korea Institute of Information Security and Cryptology},
     year = {2016},
     volume = {26},
     number = {2},
     pages = {359--367}}
    
  111. X. Kong, B. Wang, M. Yang & Y. Feng
    Multiple Heterogeneous JPEG Image Hierarchical Forensic
    Advanced Multimedia and Ubiquitous Engineering
    Springer, 2016
    DOI: 10.1007/978-981-10-1536-6_66
    BibTeX
    @incollection{Kong2016,
     author = {Kong, Xiangwei and Wang, Bo and Yang, Mingliang and Feng, Yue},
     title = {Multiple Heterogeneous JPEG Image Hierarchical Forensic},
     booktitle = {Advanced Multimedia and Ubiquitous Engineering},
     publisher = {Springer},
     year = {2016}}
    
  112. P. Korus & J. Huang
    Improved Tampering Localization in Digital Image Forensics Based on Maximal Entropy Random Walk
    IEEE Signal Processing Letters, 2016, Vol. 23(1), pp. 169-173
    DOI: 10.1109/LSP.2015.2507598
    BibTeX
    @article{Korus2016,
     author = {Korus, P. and Huang, J.},
     title = {Improved Tampering Localization in Digital Image Forensics Based on Maximal Entropy Random Walk},
     journal = {IEEE Signal Processing Letters},
     year = {2016},
     volume = {23},
     number = {1},
     pages = {169--173}}
    
  113. P. Korus & J. Huang
    Multi-scale Fusion for Improved Localization of Malicious Tampering in Digital Images
    IEEE Transactions on Image Processing, 2016, Vol. 25(3), pp. 1312-1326
    DOI: 10.1109/TIP.2016.2518870
    BibTeX
    @article{Korus2016a,
     author = {Korus, P. and Huang, J.},
     title = {Multi-scale Fusion for Improved Localization of Malicious Tampering in Digital Images},
     journal = {IEEE Transactions on Image Processing},
     year = {2016},
     volume = {25},
     number = {3},
     pages = {1312--1326}}
    
  114. P. Korus & J. Huang
    Multi-scale Analysis Strategies in PRNU-based Tampering Localization
    IEEE Transactions on Information Forensics and Security, 2016, Vol. PP(99), pp. 1
    DOI: 10.1109/TIFS.2016.2636089
    BibTeX
    @article{Korus2016b,
     author = {Korus, P. and Huang, J.},
     title = {Multi-scale Analysis Strategies in PRNU-based Tampering Localization},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2016},
     volume = {PP},
     number = {99},
     pages = {1}}
    
  115. P. Korus & J. Huang
    Evaluation of random field models in multi-modal unsupervised tampering localization
    Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)
    2016, pp. 1-6
    DOI: 10.1109/WIFS.2016.7823898
    BibTeX
    @inproceedings{Korus2016c,
     author = {Korus, P. and Huang, J.},
     title = {Evaluation of random field models in multi-modal unsupervised tampering localization},
     booktitle = {Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)},
     year = {2016},
     pages = {1--6}}
    
  116. M. Kumar & S. Srivastava
    Identifying Photo Forgery using Lighting Elements
    Indian Journal of Science and Technology, Indian Society for Education and Environment, 2016, Vol. 9(48)
    DOI: 10.17485/ijst/2016/v9i48/105748
    BibTeX
    @article{Kumar2016,
     author = {Kumar, Manoj and Srivastava, Sangeet},
     title = {Identifying Photo Forgery using Lighting Elements},
     journal = {Indian Journal of Science and Technology},
     publisher = {Indian Society for Education and Environment},
     year = {2016},
     volume = {9},
     number = {48}}
    
  117. R. Kushol, M.S. Salekin, M.H. Kabir & A.A. Khan
    Copy-Move Forgery Detection Using Color Space and Moment Invariants-Based Features
    Proc. Int. Conf. Digital Image Computing: Techniques and Applications (DICTA)
    2016, pp. 1-6
    DOI: 10.1109/DICTA.2016.7797027
    BibTeX
    @inproceedings{Kushol2016,
     author = {Kushol, R. and Salekin, M. S. and Kabir, M. H. and Khan, A. A.},
     title = {Copy-Move Forgery Detection Using Color Space and Moment Invariants-Based Features},
     booktitle = {Proc. Int. Conf. Digital Image Computing: Techniques and Applications (DICTA)},
     year = {2016},
     pages = {1--6}}
    
  118. A. Kuznetsov
    Remote Sensing Data Copy-move Forgery Protection Algorithm
    Computer Vision and Graphics, Springer, 2016
    DOI: 10.1007/978-3-319-46418-3_48
    BibTeX
    @article{Kuznetsov2016,
     author = {Kuznetsov, Andrey},
     title = {Remote Sensing Data Copy-move Forgery Protection Algorithm},
     journal = {Computer Vision and Graphics},
     publisher = {Springer},
     year = {2016}}
    
  119. A. Kuznetsov & E. Myasnikov
    Copy - Move Detection Algorithm Efficiency Increase Using Binary Space Partitioning Trees
    Information Technology and Nanotechnolog, 2016
    DOI: 10.18287/1613-0073-2016-1638-373-378
    BibTeX
    @article{Kuznetsov2016b,
     author = {Kuznetsov, A. and Myasnikov, E.},
     title = {Copy - Move Detection Algorithm Efficiency Increase Using Binary Space Partitioning Trees},
     journal = {Information Technology and Nanotechnolog},
     year = {2016}}
    
  120. A. Kuznetsov & V. Myasnikov
    A Copy-move Detection Algorithm Using Binary Gradient Contours
    Image Analysis and Recognition, Springer, 2016
    DOI: 10.1007/978-3-319-41501-7_40
    BibTeX
    @article{Kuznetsov2016c,
     author = {Kuznetsov, Andrey and Myasnikov, Vladislav},
     title = {A Copy-move Detection Algorithm Using Binary Gradient Contours},
     journal = {Image Analysis and Recognition},
     publisher = {Springer},
     year = {2016}}
    
  121. A.V. Kuznetsov & V.V. Myasnikov
    New Algorithms for Verifying the Consistency between Satellite Images and Survey Conditions
    Pattern Recognition and Image Analysis, Springer, 2016, Vol. 26(3), pp. 593
    DOI: 10.1134/S1054661816030135
    BibTeX
    @article{Kuznetsov2016a,
     author = {Kuznetsov, A. V. and Myasnikov, V. V.},
     title = {New Algorithms for Verifying the Consistency between Satellite Images and Survey Conditions},
     journal = {Pattern Recognition and Image Analysis},
     publisher = {Springer},
     year = {2016},
     volume = {26},
     number = {3},
     pages = {593}}
    
  122. A. Lawgely & F. Khelifi
    Sensor Pattern Noise Estimation Based on Improved Locally Adaptive DCT Filtering and Weighted Averaging for Source Camera Identification and Verification
    IEEE Transactions on Information Forensics and Security, 2016, Vol. PP(99), pp. 1
    DOI: 10.1109/TIFS.2016.2620280
    BibTeX
    @article{Lawgely2016,
     author = {Lawgely, A. and Khelifi, F.},
     title = {Sensor Pattern Noise Estimation Based on Improved Locally Adaptive DCT Filtering and Weighted Averaging for Source Camera Identification and Verification},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2016},
     volume = {PP},
     number = {99},
     pages = {1}}
    
  123. H.-Y. Lee
    Imaging Device Identification using Sensor Pattern Noise Based on Wiener Filtering
    2016
    BibTeX
    @article{Lee2016c,
     author = {Lee, Hae-Yeoun},
     title = {Imaging Device Identification using Sensor Pattern Noise Based on Wiener Filtering},
     year = {2016}}
    
  124. J.-H. Lee
    Camera Identification of Dibr-based Stereoscopic Image Using Sensor Pattern Noise
    Journal of the Korea Institute of Military Science and Technology, The Korea Institute of Military Science and Technology, 2016, Vol. 19(1), pp. 66-75
    DOI: 10.9766/KIMST.2016.19.1.066
    BibTeX
    @article{Lee2016,
     author = {Lee, Jun-Hee},
     title = {Camera Identification of Dibr-based Stereoscopic Image Using Sensor Pattern Noise},
     journal = {Journal of the Korea Institute of Military Science and Technology},
     publisher = {The Korea Institute of Military Science and Technology},
     year = {2016},
     volume = {19},
     number = {1},
     pages = {66--75}}
    
  125. S. Lee, Y. Lee & S. Lee
    A Study on the Evidence Investigation of Forged/modulated Time-stamp at iOS(iPhone, iPad)
    KIPS Transactions on Computer and Communication Systems, Korea Information Processing Society, 2016, Vol. 5(7), pp. 173-180
    DOI: 10.3745/KTCCS.2016.5.7.173
    BibTeX
    @article{Lee2016a,
     author = {Lee, Sanghyun and Lee, Yunho and Lee, Sangjin},
     title = {A Study on the Evidence Investigation of Forged/modulated Time-stamp at iOS(iPhone, iPad)},
     journal = {KIPS Transactions on Computer and Communication Systems},
     publisher = {Korea Information Processing Society},
     year = {2016},
     volume = {5},
     number = {7},
     pages = {173--180}}
    
  126. S.-H. Lee, D.-H. Kim & H.Y. Lee
    Video Acquisition Device Identification using Sensor Pattern Noise
    International Journal of Applied Engineering Research, 2016
    BibTeX
    @article{Lee2016b,
     author = {Lee, Sang-Hyeong and Kim, Dong-Hyun and Lee, Hae Yeoun},
     title = {Video Acquisition Device Identification using Sensor Pattern Noise},
     journal = {International Journal of Applied Engineering Research},
     year = {2016}}
    
  127. H. Li, A.C. Kot & L. Li
    Color Space Identification from Single Images
    Proc. IEEE Int. Symp. Circuits and Systems (ISCAS)
    2016, pp. 1774-1777
    DOI: 10.1109/ISCAS.2016.7538912
    BibTeX
    @inproceedings{Li2016c,
     author = {Li, H. and Kot, A. C. and Li, L.},
     title = {Color Space Identification from Single Images},
     booktitle = {Proc. IEEE Int. Symp. Circuits and Systems (ISCAS)},
     year = {2016},
     pages = {1774--1777}}
    
  128. H. Li, W. Luo, X. Qiu & J. Huang
    Identification of Various Image Operations Using Residual-based Features
    IEEE_J_CASVT, 2016, Vol. PP(99), pp. 1
    DOI: 10.1109/TCSVT.2016.2599849
    BibTeX
    @article{Li2016d,
     author = {Li, H. and Luo, W. and Qiu, X. and Huang, J.},
     title = {Identification of Various Image Operations Using Residual-based Features},
     journal = {IEEE_J_CASVT},
     year = {2016},
     volume = {PP},
     number = {99},
     pages = {1}}
    
  129. J. Li, Q. Lin, C. Yu, X. Ren & P. Li
    A Qdct- and Svd-based Color Image Watermarking Scheme Using an Optimized Encrypted Binary Computer-generated Hologram
    Soft Computing, Springer, 2016, pp. 1
    DOI: 10.1007/s00500-016-2320-x
    BibTeX
    @article{Li2016b,
     author = {Li, Jianzhong and Lin, Qun and Yu, Chuying and Ren, Xuechang and Li, Ping},
     title = {A Qdct- and Svd-based Color Image Watermarking Scheme Using an Optimized Encrypted Binary Computer-generated Hologram},
     journal = {Soft Computing},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  130. J. Li, F. Yang, W. Lu & W. Sun
    Keypoint-based Copy-move Detection Scheme by Adopting Mscrs and Improved Feature Matching
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-016-3967-0
    BibTeX
    @article{Li2016a,
     author = {Li, Jingwei and Yang, Fan and Lu, Wei and Sun, Wei},
     title = {Keypoint-based Copy-move Detection Scheme by Adopting Mscrs and Improved Feature Matching},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  131. R. Li, R. Ni & Y. Zhao
    An Effective Detection Method Based on Physical Traits of Recaptured Images on LCD Screens
    Digital-Forensics and Watermarking, Springer, 2016
    DOI: 10.1007/978-3-319-31960-5_10
    BibTeX
    @article{Li2016f,
     author = {Li, Ruihan and Ni, Rongrong and Zhao, Yao},
     title = {An Effective Detection Method Based on Physical Traits of Recaptured Images on LCD Screens},
     journal = {Digital-Forensics and Watermarking},
     publisher = {Springer},
     year = {2016}}
    
  132. Y. Li, J. Zhou, A. Cheng, X. Liu & Y.Y. Tang
    SIFT Keypoint Removal and Injection Via Convex Relaxation
    IEEE Transactions on Information Forensics and Security, 2016, Vol. 11(8), pp. 1722-1735
    DOI: 10.1109/TIFS.2016.2553645
    BibTeX
    @article{Li2016,
     author = {Li, Y. and Zhou, J. and Cheng, A. and Liu, X. and Tang, Y. Y.},
     title = {SIFT Keypoint Removal and Injection Via Convex Relaxation},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2016},
     volume = {11},
     number = {8},
     pages = {1722--1735}}
    
  133. P. Lin, Y. Gan, J. Young, J. Zhao & H. Lian
    Applying Polar Sine Transform for Detecting Copy-move Forgery
    Energy Science and Applied Technology ESAT 2016, 2016
    BibTeX
    @article{Lin2016d,
     author = {Lin, P. and Gan, Y. and Young, J. and Zhao, J. and Lian, H.},
     title = {Applying Polar Sine Transform for Detecting Copy-move Forgery},
     journal = {Energy Science and Applied Technology ESAT 2016},
     year = {2016}}
    
  134. X. Lin & C. Li
    Preprocessing Reference Sensor Pattern Noise Via Spectrum Equalization
    IEEE Transactions on Information Forensics and Security, 2016, Vol. 11(1), pp. 126-140
    DOI: 10.1109/TIFS.2015.2478748
    BibTeX
    @article{Lin2016,
     author = {Lin, X. and Li, C.},
     title = {Preprocessing Reference Sensor Pattern Noise Via Spectrum Equalization},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2016},
     volume = {11},
     number = {1},
     pages = {126--140}}
    
  135. X. Lin & C.T. Li
    Enhancing Sensor Pattern Noise Via Filtering Distortion Removal
    IEEE Signal Processing Letters, 2016, Vol. 23(3), pp. 381-385
    DOI: 10.1109/LSP.2016.2521349
    BibTeX
    @article{Lin2016a,
     author = {Lin, X. and Li, C. T.},
     title = {Enhancing Sensor Pattern Noise Via Filtering Distortion Removal},
     journal = {IEEE Signal Processing Letters},
     year = {2016},
     volume = {23},
     number = {3},
     pages = {381--385}}
    
  136. X. Lin & C.T. Li
    Refining PRNU-based Detection of Image Forgeries
    Proc. Digital Media Industry Academic Forum (DMIAF)
    2016, pp. 222-226
    DOI: 10.1109/DMIAF.2016.7574937
    BibTeX
    @inproceedings{Lin2016b,
     author = {Lin, X. and Li, C. T.},
     title = {Refining PRNU-based Detection of Image Forgeries},
     booktitle = {Proc. Digital Media Industry Academic Forum (DMIAF)},
     year = {2016},
     pages = {222--226}}
    
  137. X. Lin & C.T. Li
    Preprocessing Reference Sensor Pattern Noise Via Spectrum Equalization
    IEEE_J_IFS, 2016, Vol. 11(1), pp. 126-140
    DOI: 10.1109/TIFS.2015.2478748
    BibTeX
    @article{Lin2016c,
     author = {Lin, X. and Li, C. T.},
     title = {Preprocessing Reference Sensor Pattern Noise Via Spectrum Equalization},
     journal = {IEEE_J_IFS},
     year = {2016},
     volume = {11},
     number = {1},
     pages = {126--140}}
    
  138. X. Lin & C.-T. Li
    Image provenance inference through content-based device fingerprint analysis
    Chapter 9
    2016
    BibTeX
    @electronic{Lin2016e,
     author = {Lin, Xufeng and Li, Chang-Tsun},
     title = {Image provenance inference through content-based device fingerprint analysis},
     year = {2016}}
    
  139. A. Liu, Z. Zhao, C. Zhang & Y. Su
    Smooth filtering identification based on convolutional neural networks
    Multimedia Tools and Applications, Springer Nature, 2016
    DOI: 10.1007/s11042-016-4251-z
    BibTeX
    @article{Liu_2016,
     author = {Liu, Anan and Zhao, Zhengyu and Zhang, Chengqian and Su, Yuting},
     title = {Smooth filtering identification based on convolutional neural networks},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer Nature},
     year = {2016}}
    
  140. Q. Liu
    Exposing Seam Carving Forgery under Recompression Attacks by Hybrid Large Feature Mining
    International Conference on Pattern Recognition, At Cancun
    2016
    BibTeX
    @conference{Liu2016,
     author = {Liu, Qingzhong},
     title = {Exposing Seam Carving Forgery under Recompression Attacks by Hybrid Large Feature Mining},
     booktitle = {International Conference on Pattern Recognition, At Cancun},
     year = {2016}}
    
  141. T. Mahmood, T. Nawaz, A. Irtaza, R. Ashraf, M. Shah & M.T. Mahmood
    Copy-move Forgery Detection Technique for Forensic Analysis in Digital Images
    Mathematical Problems in Engineering, 2016
    DOI: 10.1109/icet.2015.7389169
    BibTeX
    @article{Mahmood2016,
     author = {Mahmood, Toqeer and Nawaz, Tabassam and Irtaza, Aun and Ashraf, Rehan and Shah, Mohsin and Mahmood, Muhammad Tariq},
     title = {Copy-move Forgery Detection Technique for Forensic Analysis in Digital Images},
     journal = {Mathematical Problems in Engineering},
     year = {2016}}
    
  142. K.W. Mahmoud & A.H.A. Al-Rukab
    Moment Based Copy Move Forgery Detection Methods
    International Journal of Computer Science and Information Security (IJCSIS), 2016
    BibTeX
    @article{Mahmoud2016,
     author = {Mahmoud, Khaled W. and Al-Rukab, Arwa Husien Abu},
     title = {Moment Based Copy Move Forgery Detection Methods},
     journal = {International Journal of Computer Science and Information Security (IJCSIS)},
     year = {2016}}
    
  143. A. Malviya & S. Ladhake
    An Image Forensic Technique for Detection of Copy-move Forgery in Digital Image
    Security in Computing and Communications
    Springer, 2016
    DOI: 10.1007/978-981-10-2738-3_28
    BibTeX
    @incollection{Malviya2016a,
     author = {Malviya, Ashwini and Ladhake, Siddharth},
     title = {An Image Forensic Technique for Detection of Copy-move Forgery in Digital Image},
     booktitle = {Security in Computing and Communications},
     publisher = {Springer},
     year = {2016}}
    
  144. A.V. Malviya & S.A. Ladhake
    Pixel Based Image Forensic Technique for Copy-move Forgery Detection Using Auto Color Correlogram
    Procedia Computer Science, 2016, Vol. 79, pp. 383-390
    DOI: 10.1016/j.procs.2016.03.050
    BibTeX
    @article{Malviya2016,
     author = {Malviya, Ashwini V. and Ladhake, Siddharth A.},
     title = {Pixel Based Image Forensic Technique for Copy-move Forgery Detection Using Auto Color Correlogram},
     journal = {Procedia Computer Science},
     year = {2016},
     volume = {79},
     pages = {383--390}}
    
  145. V.M. Manikandan & V. Masilamani
    A Context Dependent Fragile Watermarking Scheme for Tamper Detection from Demosaicked Color Images
    Proceedings of the Tenth Indian Conference on Computer Vision, Graphics and Image Processing
    ACM, 2016, pp. 611-618
    DOI: 10.1145/3009977.3009987
    BibTeX
    @inproceedings{Manikandan2016,
     author = {Manikandan, V. M. and Masilamani, V.},
     title = {A Context Dependent Fragile Watermarking Scheme for Tamper Detection from Demosaicked Color Images},
     booktitle = {Proceedings of the Tenth Indian Conference on Computer Vision, Graphics and Image Processing},
     publisher = {ACM},
     year = {2016},
     pages = {611--618}}
    
  146. V.T. Manu & B.M. Mehtre
    Detection of Copy-move Forgery in Images Using Segmentation and SURF
    Advances in Signal Processing and Intelligent Recognition Systems, Springer, 2016
    DOI: 10.1007/978-3-319-28658-7_55
    BibTeX
    @article{Manu2016,
     author = {Manu, V. T. and Mehtre, B. M.},
     title = {Detection of Copy-move Forgery in Images Using Segmentation and SURF},
     journal = {Advances in Signal Processing and Intelligent Recognition Systems},
     publisher = {Springer},
     year = {2016}}
    
  147. F. Marra, G. Poggi, C. Sansone & L. Verdoliva
    A Study of Co-occurrence Based Local Features for Camera Model Identification
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-016-3663-0
    BibTeX
    @article{Marra2016,
     author = {Marra, Francesco and Poggi, Giovanni and Sansone, Carlo and Verdoliva, Luisa},
     title = {A Study of Co-occurrence Based Local Features for Camera Model Identification},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  148. F. Marra, G. Poggi, C. Sansone & L. Verdoliva
    Correlation clustering for PRNU-based blind image source identification
    Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)
    2016, pp. 1-6
    DOI: 10.1109/WIFS.2016.7823910
    BibTeX
    @inproceedings{Marra2016a,
     author = {Marra, F. and Poggi, G. and Sansone, C. and Verdoliva, L.},
     title = {Correlation clustering for PRNU-based blind image source identification},
     booktitle = {Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)},
     year = {2016},
     pages = {1--6}}
    
  149. M. Mathai, D. Rajan & S. Emmanuel
    Video Forgery Detection and Localization Using Normalized Cross-correlation of Moment Features
    2016 IEEE Southwest Symposium on Image Analysis and Interpretation (SSIAI)
    2016, pp. 149-152
    DOI: 10.1109/SSIAI.2016.7459197
    BibTeX
    @inproceedings{Mathai2016,
     author = {Mathai, M. and Rajan, D. and Emmanuel, S.},
     title = {Video Forgery Detection and Localization Using Normalized Cross-correlation of Moment Features},
     booktitle = {2016 IEEE Southwest Symposium on Image Analysis and Interpretation (SSIAI)},
     year = {2016},
     pages = {149--152}}
    
  150. O. Mayer & M. Stamm
    Improved Forgery Detection with Lateral Chromatic Aberration
    Proc. Speech and Signal Processing (ICASSP) 2016 IEEE Int. Conf. Acoustics
    2016, pp. 2024-2028
    DOI: 10.1109/ICASSP.2016.7472032
    BibTeX
    @inproceedings{Mayer2016,
     author = {Mayer, O. and Stamm, M.},
     title = {Improved Forgery Detection with Lateral Chromatic Aberration},
     booktitle = {Proc. Speech and Signal Processing (ICASSP) 2016 IEEE Int. Conf. Acoustics},
     year = {2016},
     pages = {2024--2028}}
    
  151. A. Mazumdar & P.K. Bora
    Exposing Splicing Forgeries in Digital Images Through Dichromatic Plane Histogram Discrepancies
    Proceedings of the Tenth Indian Conference on Computer Vision, Graphics and Image Processing
    ACM, 2016, pp. 621-628
    DOI: 10.1145/3009977.3010032
    BibTeX
    @inproceedings{Mazumdar2016,
     author = {Mazumdar, Aniruddha and Bora, Prabin Kumar},
     title = {Exposing Splicing Forgeries in Digital Images Through Dichromatic Plane Histogram Discrepancies},
     booktitle = {Proceedings of the Tenth Indian Conference on Computer Vision, Graphics and Image Processing},
     publisher = {ACM},
     year = {2016},
     pages = {621--628}}
    
  152. A. Mehrish, A.V. Subramanyam & S. Emmanuel
    Sensor Pattern Noise Estimation Using Probabilistically Estimated Raw Values
    IEEE Signal Processing Letters, 2016, Vol. 23(5), pp. 693-697
    DOI: 10.1109/LSP.2016.2549059
    BibTeX
    @article{Mehrish2016,
     author = {Mehrish, A. and Subramanyam, A. V. and Emmanuel, S.},
     title = {Sensor Pattern Noise Estimation Using Probabilistically Estimated Raw Values},
     journal = {IEEE Signal Processing Letters},
     year = {2016},
     volume = {23},
     number = {5},
     pages = {693--697}}
    
  153. S. Milani, M. Fontana, P. Bestagini & S. Tubaro
    Phylogenetic Analysis of Near-duplicate Images Using Processing Age Metrics
    Proc. Speech and Signal Processing (ICASSP) 2016 IEEE Int. Conf. Acoustics
    2016, pp. 2054-2058
    DOI: 10.1109/ICASSP.2016.7472038
    BibTeX
    @inproceedings{Milani2016,
     author = {Milani, S. and Fontana, M. and Bestagini, P. and Tubaro, S.},
     title = {Phylogenetic Analysis of Near-duplicate Images Using Processing Age Metrics},
     booktitle = {Proc. Speech and Signal Processing (ICASSP) 2016 IEEE Int. Conf. Acoustics},
     year = {2016},
     pages = {2054--2058}}
    
  154. S. Milani & E. Tronca
    Improving Three-dimensional Reconstruction of Buildings from Web-harvested Images Using Forensic Clues
    Journal of Electronic Imaging, SPIE-Intl Soc Optical Eng, 2016, Vol. 26(1), pp. 011009
    DOI: 10.1117/1.jei.26.1.011009
    BibTeX
    @article{Milani_2016,
     author = {Milani, Simone and Tronca, Enrico},
     title = {Improving Three-dimensional Reconstruction of Buildings from Web-harvested Images Using Forensic Clues},
     journal = {Journal of Electronic Imaging},
     publisher = {SPIE-Intl Soc Optical Eng},
     year = {2016},
     volume = {26},
     number = {1},
     pages = {011009}}
    
  155. S. Milani & E. Tronca
    Improving three-dimensional reconstruction of buildings from web-harvested images using forensic clues
    Journal of Electronic Imaging, SPIE-Intl Soc Optical Eng, 2016, Vol. 26(1), pp. 011009
    DOI: 10.1117/1.jei.26.1.011009
    BibTeX
    @article{Milani2016a,
     author = {Milani, Simone and Tronca, Enrico},
     title = {Improving three-dimensional reconstruction of buildings from web-harvested images using forensic clues},
     journal = {Journal of Electronic Imaging},
     publisher = {SPIE-Intl Soc Optical Eng},
     year = {2016},
     volume = {26},
     number = {1},
     pages = {011009}}
    
  156. A.V. Mire, S.B. Dhok, N.J. Mistry & P.D. Porey
    Tampering Localization in Digital Image Using First Two Digit Probability Features
    Satapathy, C. S., Mandal, K. J., Udgata, K. S. & Bhateja, V. (ed.)
    Information Systems Design and Intelligent Applications: Proceedings of Third International Conference INDIA 2016, Volume 3
    Chapter Tampering Localization in Digital Image Using First Two Digit Probability Features
    Springer India, 2016, pp. 133-141
    DOI: 10.1007/978-81-322-2757-1_15
    BibTeX
    @inbook{Mire2016,
     author = {Mire, Archana V. and Dhok, Sanjay B. and Mistry, Narendra J. and Porey, Prakash D.},
     title = {Tampering Localization in Digital Image Using First Two Digit Probability Features},
     booktitle = {Information Systems Design and Intelligent Applications: Proceedings of Third International Conference INDIA 2016, Volume 3},
     publisher = {Springer India},
     year = {2016},
     pages = {133--141}}
    
  157. H. Moradi-Gharghani & M. Nasri
    A new block-based copy-move forgery detection method in digital images
    Proc. Int. Conf. Communication and Signal Processing (ICCSP)
    2016, pp. 1208-1212
    DOI: 10.1109/ICCSP.2016.7754344
    BibTeX
    @inproceedings{Moradi-Gharghani2016,
     author = {Moradi-Gharghani, H. and Nasri, M.},
     title = {A new block-based copy-move forgery detection method in digital images},
     booktitle = {Proc. Int. Conf. Communication and Signal Processing (ICCSP)},
     year = {2016},
     pages = {1208--1212}}
    
  158. G. Muzaffer, O. Makul, B. Ustubioglu & G. Ulutas
    Copy Move Forgery Detection Using Gabor Filter and Orb
    Proceedings of 2016International Conference on Image Processing, Production and Computer Science (ICIPCS'2016)
    2016
    BibTeX
    @conference{Muzaffer2016,
     author = {Muzaffer, Gul and Makul, Ozge and Ustubioglu, Beste and Ulutas, Guzin},
     title = {Copy Move Forgery Detection Using Gabor Filter and Orb},
     booktitle = {Proceedings of 2016International Conference on Image Processing, Production and Computer Science (ICIPCS'2016)},
     year = {2016}}
    
  159. V.P. Nampoothiri & N. Sugitha
    Digital Image Forgery --- A Threaten to Digital Forensics
    Proc. Power and Computing Technologies (ICCPCT) 2016 Int. Conf. Circuit
    2016, pp. 1-6
    DOI: 10.1109/ICCPCT.2016.7530370
    BibTeX
    @inproceedings{Nampoothiri2016,
     author = {Nampoothiri, V. P. and Sugitha, N.},
     title = {Digital Image Forgery --- A Threaten to Digital Forensics},
     booktitle = {Proc. Power and Computing Technologies (ICCPCT) 2016 Int. Conf. Circuit},
     year = {2016},
     pages = {1--6}}
    
  160. H.C. Nguyen
    A Machine Learning Based Technique for Detecting Digital Image Resampling
    Nguyen, T. N., Trawiʼnski, B., Fujita, H. & Hong, T.-P. (ed.)
    Intelligent Information and Database Systems: 8th Asian Conference, ACIIDS 2016, Da Nang, Vietnam, March 14-16, 2016, Proceedings, Part II
    Chapter A Machine Learning Based Technique for Detecting Digital Image Resampling
    Springer Berlin Heidelberg, 2016, pp. 75-84
    DOI: 10.1007/978-3-662-49390-8_7
    BibTeX
    @inbook{Nguyen2016,
     author = {Nguyen, Hieu Cuong},
     title = {A Machine Learning Based Technique for Detecting Digital Image Resampling},
     booktitle = {Intelligent Information and Database Systems: 8th Asian Conference, ACIIDS 2016, Da Nang, Vietnam, March 14-16, 2016, Proceedings, Part II},
     publisher = {Springer Berlin Heidelberg},
     year = {2016},
     pages = {75--84}}
    
  161. H.H. Nguyen, H.-Q. Nguyen-Son, T.D. Nguyen & I. Echizen
    Discriminating between Computer-generated Facial Images and Natural Ones Using Smoothness Property and Local Entropy
    Digital-Forensics and Watermarking
    Digital-Forensics and Watermarking, Springer, 2016, pp. 39-50
    DOI: 10.1007/978-3-319-31960-5_4
    BibTeX
    @article{Nguyen2016a,
     author = {Nguyen, Huy H. and Nguyen-Son, Hoang-Quoc and Nguyen, Thuc D. and Echizen, Isao},
     title = {Discriminating between Computer-generated Facial Images and Natural Ones Using Smoothness Property and Local Entropy},
     booktitle = {Digital-Forensics and Watermarking},
     journal = {Digital-Forensics and Watermarking},
     publisher = {Springer},
     year = {2016},
     pages = {39--50}}
    
  162. R. Nithiya & S. Veluchamy
    Key point descriptor based copy and move image forgery detection system
    Proc. Second Int. Conf. Science Technology Engineering and Management (ICONSTEM)
    2016, pp. 577-581
    DOI: 10.1109/ICONSTEM.2016.7560959
    BibTeX
    @inproceedings{Nithiya2016,
     author = {Nithiya, R. and Veluchamy, S.},
     title = {Key point descriptor based copy and move image forgery detection system},
     booktitle = {Proc. Second Int. Conf. Science Technology Engineering and Management (ICONSTEM)},
     year = {2016},
     pages = {577--581}}
    
  163. M.S.Y. Nuchu
    Compressed Fragile Sensor Noise Fingerprint for Smartphone Identification
    Binghamton University State University of New York, Binghamton University State University of New York, 2016
    BibTeX
    @mastersthesis{Nuchu2016,
     author = {Nuchu, Madhu Sudhan Yadav},
     title = {Compressed Fragile Sensor Noise Fingerprint for Smartphone Identification},
     school = {Binghamton University State University of New York},
     year = {2016}}
    
  164. A.A. de Oliveira, P. Ferrara, A.D. Rosa, A. Piva, M. Barni, S. Goldenstein, Z. Dias & A. Rocha
    Multiple Parenting Phylogeny Relationships in Digital Images
    #IEEE_J_IFS#, 2016, Vol. 11(2), pp. 328-343
    DOI: 10.1109/TIFS.2015.2493989
    BibTeX
    @article{Oliveira2016,
     author = {de Oliveira, A. A. and Ferrara, P. and Rosa, A. De and Piva, A. and Barni, Mauro and Goldenstein, S. and Dias, Z. and Rocha, A.},
     title = {Multiple Parenting Phylogeny Relationships in Digital Images},
     journal = {#IEEE_J_IFS#},
     year = {2016},
     volume = {11},
     number = {2},
     pages = {328--343}}
    
  165. R.S. Oommen, M. Jayamohan & S. Sruthy
    Scale Invariant Detection of Copy-move Forgery Using Fractal Dimension and Singular Values
    Advances in Signal Processing and Intelligent Recognition Systems, Springer, 2016
    DOI: 10.1007/978-3-319-28658-7_47
    BibTeX
    @article{Oommen2016,
     author = {Oommen, Rani Susan and Jayamohan, M. and Sruthy, S.},
     title = {Scale Invariant Detection of Copy-move Forgery Using Fractal Dimension and Singular Values},
     journal = {Advances in Signal Processing and Intelligent Recognition Systems},
     publisher = {Springer},
     year = {2016}}
    
  166. A.L.S. Orozco, J.R. Corripio, D.M.A. González, L.J.G. Villalba & J. Hernandez-Castro
    Theia: A Tool for the Forensic Analysis of Mobile Devices Pictures
    Computing, Springer Science mathplus Business Media, 2016, pp. 1-36
    DOI: 10.1007/s00607-015-0482-5
    BibTeX
    @article{Orozco2016,
     author = {Orozco, Ana Lucila Sandoval and Corripio, Jocelin Rosales and González, David Manuel Arenas and Villalba, Luis Javier Garc\ia and Hernandez-Castro, Julio},
     title = {Theia: A Tool for the Forensic Analysis of Mobile Devices Pictures},
     journal = {Computing},
     publisher = {Springer Science mathplus Business Media},
     year = {2016},
     pages = {1--36}}
    
  167. J. Ouyang, Y. Liu & H. Shu
    Robust Hashing for Image Authentication Using SIFT Feature and Quaternion Zernike Moments
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-015-3225-x
    BibTeX
    @article{Ouyang2016,
     author = {Ouyang, Junlin and Liu, Yizhi and Shu, Huazhong},
     title = {Robust Hashing for Image Authentication Using SIFT Feature and Quaternion Zernike Moments},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  168. R.C. Pandey, S. Prasad, S.K. Singh & K.K. Shukla
    Image Splicing Detection Using HMRF-GMM Based Segmentation Technique and Local Noise Variances
    INROADS- An International Journal of Jaipur National University, Diva Enterprises Private Limited, 2016, Vol. 5(1s), pp. 223
    DOI: 10.5958/2277-4912.2016.00043.6
    BibTeX
    @article{Pandey2016a,
     author = {Pandey, Ramesh Chand and Prasad, Shiv and Singh, Sanjay Kumar and Shukla, K. K.},
     title = {Image Splicing Detection Using HMRF-GMM Based Segmentation Technique and Local Noise Variances},
     journal = {INROADS- An International Journal of Jaipur National University},
     publisher = {Diva Enterprises Private Limited},
     year = {2016},
     volume = {5},
     number = {1s},
     pages = {223}}
    
  169. R.C. Pandey, S.K. Singh & K.K. Shukla
    Passive Forensics in Image and Video Using Noise Features: A Review
    Digital Investigation, Elsevier BV, 2016, Vol. 19, pp. 1-28
    DOI: 10.1016/j.diin.2016.08.002
    BibTeX
    @article{Pandey2016,
     author = {Pandey, Ramesh C. and Singh, Sanjay K. and Shukla, Kaushal K.},
     title = {Passive Forensics in Image and Video Using Noise Features: A Review},
     journal = {Digital Investigation},
     publisher = {Elsevier BV},
     year = {2016},
     volume = {19},
     pages = {1--28}}
    
  170. C.-S. Park, C. Kim, J. Lee & G.-R. Kwon
    Rotation and Scale Invariant Upsampled Log-polar Fourier Descriptor for Copy-move Forgery Detection
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-016-3575-z
    BibTeX
    @article{Park2016,
     author = {Park, Chun-Su and Kim, Changjae and Lee, Jihoon and Kwon, Goo-Rak},
     title = {Rotation and Scale Invariant Upsampled Log-polar Fourier Descriptor for Copy-move Forgery Detection},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  171. J.-S. Park, D.-K. Hyun, J.-U. Hou, D.-G. Kim & H.-K. Lee
    Detecting Digital Image Forgery in Near-infrared Image of Cctv
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-016-3871-7
    BibTeX
    @article{Park2016b,
     author = {Park, Jin-Seok and Hyun, Dai-Kyung and Hou, Jong-Uk and Kim, Do-Guk and Lee, Heung-Kyu},
     title = {Detecting Digital Image Forgery in Near-infrared Image of Cctv},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  172. T.H. Park, J.G. Han, Y.H. Moon & I.K. Eom
    Image Splicing Detection Based on Inter-scale 2d Joint Characteristic Function Moments in Wavelet Domain
    EURASIP Journal on Image and Video Processing, 2016, Vol. 2016(1), pp. 1-10
    DOI: 10.1186/s13640-016-0136-3
    BibTeX
    @article{Park2016a,
     author = {Park, Tae Hee and Han, Jong Goo and Moon, Yong Ho and Eom, Il Kyu},
     title = {Image Splicing Detection Based on Inter-scale 2d Joint Characteristic Function Moments in Wavelet Domain},
     journal = {EURASIP Journal on Image and Video Processing},
     year = {2016},
     volume = {2016},
     number = {1},
     pages = {1--10}}
    
  173. A. Parveen & A. Tayal
    An algorithm to detect the forged part in an image
    Proc. Int. Conf. Communication and Signal Processing (ICCSP)
    2016, pp. 1486-1490
    DOI: 10.1109/ICCSP.2016.7754405
    BibTeX
    @inproceedings{Parveen2016,
     author = {Parveen, A. and Tayal, A.},
     title = {An algorithm to detect the forged part in an image},
     booktitle = {Proc. Int. Conf. Communication and Signal Processing (ICCSP)},
     year = {2016},
     pages = {1486--1490}}
    
  174. C. Pasquini, G. Boato, N. Alajlan & F.G.B.D. Natale
    A Deterministic Approach to Detect Median Filtering in 1D Data
    IEEE_J_IFS, 2016, Vol. 11(7), pp. 1425-1437
    DOI: 10.1109/TIFS.2016.2530636
    BibTeX
    @article{Pasquini2016,
     author = {Pasquini, C. and Boato, G. and Alajlan, N. and Natale, F. G. B. De},
     title = {A Deterministic Approach to Detect Median Filtering in 1D Data},
     journal = {IEEE_J_IFS},
     year = {2016},
     volume = {11},
     number = {7},
     pages = {1425--1437}}
    
  175. B. Peng, W. Wang, J. Dong & T. Tan
    Automatic Detection of 3D Lighting Inconsistencies Via a Facial Landmark Based Morphable Model
    Proc. IEEE Int. Conf. Image Processing (ICIP)
    2016, pp. 3932-3936
    DOI: 10.1109/ICIP.2016.7533097
    BibTeX
    @inproceedings{Peng2016,
     author = {Peng, B. and Wang, W. and Dong, J. and Tan, T.},
     title = {Automatic Detection of 3D Lighting Inconsistencies Via a Facial Landmark Based Morphable Model},
     booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)},
     year = {2016},
     pages = {3932--3936}}
    
  176. B. Peng, W. Wang, J. Dong & T. Tan
    Optimized 3D Lighting Environment Estimation for Image Forgery Detection
    IEEE_J_IFS, 2016, Vol. PP(99), pp. 1
    DOI: 10.1109/TIFS.2016.2623589
    BibTeX
    @article{Peng2016a,
     author = {Peng, B. and Wang, W. and Dong, J. and Tan, T.},
     title = {Optimized 3D Lighting Environment Estimation for Image Forgery Detection},
     journal = {IEEE_J_IFS},
     year = {2016},
     volume = {PP},
     number = {99},
     pages = {1}}
    
  177. F. Pérez-González, M. Masciopinto, I. González-Iglesias & P. Comesaña
    Fast Sequential Forensic Detection of Camera Fingerprint
    Proc. IEEE Int. Conf. Image Processing (ICIP)
    2016, pp. 3902-3906
    DOI: 10.1109/ICIP.2016.7533091
    BibTeX
    @inproceedings{Perez-Gonzalez2016,
     author = {Pérez-González, F. and Masciopinto, M. and González-Iglesias, I. and Comesaña, P.},
     title = {Fast Sequential Forensic Detection of Camera Fingerprint},
     booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)},
     year = {2016},
     pages = {3902--3906}}
    
  178. C.-M. Pun, B. Liu & X.-C. Yuan
    Multi-scale Noise Estimation for Image Splicing Forgery Detection
    Journal of Visual Communication and Image Representation, 2016, Vol. 38, pp. 195-206
    DOI: 10.1016/j.jvcir.2016.03.005
    BibTeX
    @article{Pun2016,
     author = {Pun, Chi-Man and Liu, Bo and Yuan, Xiao-Chen},
     title = {Multi-scale Noise Estimation for Image Splicing Forgery Detection},
     journal = {Journal of Visual Communication and Image Representation},
     year = {2016},
     volume = {38},
     pages = {195--206}}
    
  179. K. Purohit & A.N. Rajagopalan
    Splicing Localization in Motion Blurred 3D Scenes
    Proc. IEEE Int. Conf. Image Processing (ICIP)
    2016, pp. 3922-3926
    DOI: 10.1109/ICIP.2016.7533095
    BibTeX
    @inproceedings{Purohit2016,
     author = {Purohit, K. and Rajagopalan, A. N.},
     title = {Splicing Localization in Motion Blurred 3D Scenes},
     booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)},
     year = {2016},
     pages = {3922--3926}}
    
  180. T. Qiao
    Statistical Detection for Digital Image Forensics
    University of technology of troyes, University of technology of troyes, 2016
    BibTeX
    @phdthesis{Qiao2016,
     author = {Qiao, Tong},
     title = {Statistical Detection for Digital Image Forensics},
     school = {University of technology of troyes},
     year = {2016}}
    
  181. C. Qin, P. Ji, J. Wang & C.-C. Chang
    Fragile image watermarking scheme based on VQ index sharing and self-embedding
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-015-3218-9
    BibTeX
    @article{Qin2016,
     author = {Qin, Chuan and Ji, Ping and Wang, Jinwei and Chang, Chin-Chen},
     title = {Fragile image watermarking scheme based on VQ index sharing and self-embedding},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  182. M. Ramya & P. Sridevi
    Mage Forgery Detection Using Improved SLIC
    International Research Journal of Engineering and Technology (IRJET), 2016, Vol. 3(12), pp. 1350-1356
    BibTeX
    @article{Ramya2016,
     author = {Ramya, M. and Sridevi, P.},
     title = {Mage Forgery Detection Using Improved SLIC},
     journal = {International Research Journal of Engineering and Technology (IRJET)},
     year = {2016},
     volume = {3},
     number = {12},
     pages = {1350--1356}}
    
  183. Y. Rao & J. Ni
    A deep learning approach to detection of splicing and copy-move forgeries in images
    Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)
    2016, pp. 1-6
    DOI: 10.1109/WIFS.2016.7823911
    BibTeX
    @inproceedings{Rao2016,
     author = {Rao, Y. and Ni, J.},
     title = {A deep learning approach to detection of splicing and copy-move forgeries in images},
     booktitle = {Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)},
     year = {2016},
     pages = {1--6}}
    
  184. dos Reis & G.A.A. Costa
    Implementação Do Algoritmo De Detecção De Cópia/clonagem Na Análise Forense De Imagens Digitais
    Acta De Ciências E Saúde, 2016
    BibTeX
    @article{dosReis2016,
     author = {dos Reis and Costa, Gustavo Aranha Araújo},
     title = {Implementação Do Algoritmo De Detecção De Cópia/clonagem Na Análise Forense De Imagens Digitais},
     journal = {Acta De Ciências E Saúde},
     year = {2016}}
    
  185. J. Ren, J. Han & M. Dalla Mura
    Special issue on multimodal data fusion for multidimensional signal processing
    Multidimensional Systems and Signal Processing, Springer, 2016, Vol. 27(4), pp. 801
    DOI: 10.1007/s11045-016-0441-0
    BibTeX
    @article{Ren2016,
     author = {Ren, Jinchang and Han, Junwei and Dalla Mura, Mauro},
     title = {Special issue on multimodal data fusion for multidimensional signal processing},
     journal = {Multidimensional Systems and Signal Processing},
     publisher = {Springer},
     year = {2016},
     volume = {27},
     number = {4},
     pages = {801}}
    
  186. Y. Ren, J. Shen, Y. Zheng, J. Wang & H.-C. Chao
    Efficient data integrity auditing for storage security in mobile health cloud
    Peer-to-Peer Networking and Applications, Springer, 2016, Vol. 9(5), pp. 854
    DOI: 10.1007/s12083-015-0346-y
    BibTeX
    @article{Ren2016a,
     author = {Ren, Yongjun and Shen, Jian and Zheng, Yuhui and Wang, Jin and Chao, Han-Chieh},
     title = {Efficient data integrity auditing for storage security in mobile health cloud},
     journal = {Peer-to-Peer Networking and Applications},
     publisher = {Springer},
     year = {2016},
     volume = {9},
     number = {5},
     pages = {854}}
    
  187. K.H. Rhee
    Downscaling Forgery Detection Using Pixel Value's Gradients of Digital Image
    Journal of the Institute of Electronics and Information Engineers, 2016
    DOI: 10.5573/ieie.2016.53.2.047
    BibTeX
    @article{Rhee2016,
     author = {Rhee, Kang Hyeon},
     title = {Downscaling Forgery Detection Using Pixel Value's Gradients of Digital Image},
     journal = {Journal of the Institute of Electronics and Information Engineers},
     year = {2016}}
    
  188. K.H. Rhee
    Gaussian filtering detection using band pass residual and contrast of forgery image
    Proc. Electronics and Mobile Communication Conf 2016 IEEE 7th Annual Information Technology (IEMCON)
    2016, pp. 1-4
    DOI: 10.1109/IEMCON.2016.7746310
    BibTeX
    @inproceedings{Rhee2016a,
     author = {Rhee, K. H.},
     title = {Gaussian filtering detection using band pass residual and contrast of forgery image},
     booktitle = {Proc. Electronics and Mobile Communication Conf 2016 IEEE 7th Annual Information Technology (IEMCON)},
     year = {2016},
     pages = {1--4}}
    
  189. K.H. Rhee
    Median Filtering Detection Using Variation of Neighboring Line Pairs for Image Forensic
    Proc. IEEE 5th Int Consumer Electronics - Berlin (ICCE-Berlin) Conf
    Journal of Electronic Imaging, SPIE-Intl Soc Optical Eng, 2016, Vol. 25(5), pp. 103-107
    DOI: 10.1117/1.JEI.25.5.053039
    BibTeX
    @inproceedings{Rhee2016b,
     author = {Rhee, K. H.},
     title = {Median Filtering Detection Using Variation of Neighboring Line Pairs for Image Forensic},
     booktitle = {Proc. IEEE 5th Int Consumer Electronics - Berlin (ICCE-Berlin) Conf},
     journal = {Journal of Electronic Imaging},
     publisher = {SPIE-Intl Soc Optical Eng},
     year = {2016},
     volume = {25},
     number = {5},
     pages = {103--107}}
    
  190. G.K. Saini & M. Mahajan
    Improvement in Copy-Move Forgery Detection Using Hybrid Approach
    International Journal of Modern Education & Computer Science, 2016
    BibTeX
    @article{Saini2016,
     author = {Saini, Gurmeet Kaur and Mahajan, Manish},
     title = {Improvement in Copy-Move Forgery Detection Using Hybrid Approach},
     journal = {International Journal of Modern Education & Computer Science},
     year = {2016}}
    
  191. S. Salekin, R. Kushol & H. Kabir
    An Efficient Circular Block Approach for Copy-Move Forgery Detection
    IUT JOURNAL OF ENGINEERING AND TECHNOLOGY (JET), 2016, Vol. 12(2), pp. 9-20
    BibTeX
    @article{Salekin2016,
     author = {Salekin, Sirajus and Kushol, Rafsanjany and Kabir, Hasanul},
     title = {An Efficient Circular Block Approach for Copy-Move Forgery Detection},
     journal = {IUT JOURNAL OF ENGINEERING AND TECHNOLOGY (JET)},
     year = {2016},
     volume = {12},
     number = {2},
     pages = {9--20}}
    
  192. V.U. Sameer, S. Sugumaran & R. Naskar
    Digital Forensic Source Camera Identification with Efficient Feature Selection Using Filter, Wrapper and Hybrid Approaches
    Information Systems Security, Springer, 2016
    DOI: 10.1007/978-3-319-49806-5_22
    BibTeX
    @article{Sameer2016,
     author = {Sameer, Venkata Udaya and Sugumaran, S. and Naskar, Ruchira},
     title = {Digital Forensic Source Camera Identification with Efficient Feature Selection Using Filter, Wrapper and Hybrid Approaches},
     journal = {Information Systems Security},
     publisher = {Springer},
     year = {2016}}
    
  193. A.L. Sandoval Orozco, J.R. Corripio, L.J. García Villalba & J.C. Hernández Castro
    Image Source Acquisition Identification of Mobile Devices Based on the Use of Features
    Multimedia Tools and Applications, Springer, 2016, Vol. 75(12), pp. 7087
    DOI: 10.1007/s11042-015-2633-2
    BibTeX
    @article{SandovalOrozco2016,
     author = {Sandoval Orozco, Ana Lucila and Corripio, Jocelin Rosales and García Villalba, Luis Javier and Hernández Castro, Julio César},
     title = {Image Source Acquisition Identification of Mobile Devices Based on the Use of Features},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     volume = {75},
     number = {12},
     pages = {7087}}
    
  194. O. Saurer, G. Baatz, K. Köser, L. Ladický & M. Pollefeys
    Image Based Geo-localization in the Alps
    International Journal of Computer Vision, Springer, 2016, Vol. 116(3), pp. 213
    DOI: 10.1007/s11263-015-0830-0
    BibTeX
    @article{Saurer2016,
     author = {Saurer, Olivier and Baatz, Georges and Köser, Kevin and Ladický, L’ubor and Pollefeys, Marc},
     title = {Image Based Geo-localization in the Alps},
     journal = {International Journal of Computer Vision},
     publisher = {Springer},
     year = {2016},
     volume = {116},
     number = {3},
     pages = {213}}
    
  195. O. Saurer, G. Baatz, K. Köser, L. Ladický & M. Pollefeys
    Image-based Large-scale Geo-localization in Mountainous Regions
    Large-Scale Visual Geo-Localization, Springer, 2016
    DOI: 10.1007/978-3-319-25781-5_11
    BibTeX
    @article{Saurer2016a,
     author = {Saurer, Olivier and Baatz, Georges and Köser, Kevin and Ladický, L’ubor and Pollefeys, Marc},
     title = {Image-based Large-scale Geo-localization in Mountainous Regions},
     journal = {Large-Scale Visual Geo-Localization},
     publisher = {Springer},
     year = {2016}}
    
  196. V. Schetinger, M. Iuliani, A. Piva & M.M. Oliveira
    Digital Image Forensics Vs. Image Composition: An Indirect Arms Race
    arXiv preprint arXiv:1601.03239, 2016
    DOI: 10.1109/wifs.2015.7368598
    BibTeX
    @article{Schetinger2016,
     author = {Schetinger, Victor and Iuliani, Massimo and Piva, Alessandro and Oliveira, Manuel M.},
     title = {Digital Image Forensics Vs. Image Composition: An Indirect Arms Race},
     journal = {arXiv preprint arXiv:1601.03239},
     year = {2016}}
    
  197. V. Schetinger, M. Iuliani, A. Piva & M.M. Oliveira
    Digital Image Forensics vs. Image Composition: An Indirect Arms Race
    arxiv, 2016
    BibTeX
    @article{Schetinger2016a,
     author = {Schetinger, Victor and Iuliani, Massimo and Piva, Alessandro and Oliveira, Manuel M.},
     title = {Digital Image Forensics vs. Image Composition: An Indirect Arms Race},
     journal = {arxiv},
     year = {2016}}
    
  198. R. Sekhar & R.S. Shaji
    A Study on Segmentation-based Copy-move Forgery Detection Using DAISY Descriptor
    Suresh, P. L. & Panigrahi, K. B. (ed.)
    Proceedings of the International Conference on Soft Computing Systems: ICSCS 2015, Volume 2
    Chapter A Study on Segmentation-Based Copy-Move Forgery Detection Using DAISY Descriptor
    Springer India, 2016, pp. 223-233
    DOI: 10.1007/978-81-322-2674-1_23
    BibTeX
    @inbook{Sekhar2016b,
     author = {Sekhar, Resmi and Shaji, R. S.},
     title = {A Study on Segmentation-based Copy-move Forgery Detection Using DAISY Descriptor},
     booktitle = {Proceedings of the International Conference on Soft Computing Systems: ICSCS 2015, Volume 2},
     publisher = {Springer India},
     year = {2016},
     pages = {223--233}}
    
  199. S. Sharma & S.V. Dhavale
    A review of passive forensic techniques for detection of copy-move attacks on digital videos
    Proc. 3rd Int. Conf. Advanced Computing and Communication Systems (ICACCS)
    2016, Vol. 01, pp. 1-6
    DOI: 10.1109/ICACCS.2016.7586396
    BibTeX
    @inproceedings{Sharma2016,
     author = {Sharma, S. and Dhavale, S. V.},
     title = {A review of passive forensic techniques for detection of copy-move attacks on digital videos},
     booktitle = {Proc. 3rd Int. Conf. Advanced Computing and Communication Systems (ICACCS)},
     year = {2016},
     volume = {01},
     pages = {1--6}}
    
  200. P.M. Shelke & R.S. Prasad
    Improved JPEG Anti-forensics Using Non Local Means De-noising
    Advances in Innovative Engineering and Technologies, 2016
    BibTeX
    @article{Shelke2016,
     author = {Shelke, P. M. and Prasad, Rajesh S.},
     title = {Improved JPEG Anti-forensics Using Non Local Means De-noising},
     journal = {Advances in Innovative Engineering and Technologies},
     year = {2016}}
    
  201. G. Sheng & T. Gao
    Detection of Seam-carving Image Based on Benford}s Law for Forensic Applications
    International Journal of Digital Crime and Forensics (IJDCF), 2016, Vol. 8(1)
    DOI: 10.4018/IJDCF.2016010104
    BibTeX
    @article{Sheng2016a,
     author = {Sheng, Guorui and Gao, Tiegang},
     title = {Detection of Seam-carving Image Based on Benford}s Law for Forensic Applications},
     journal = {International Journal of Digital Crime and Forensics (IJDCF)},
     year = {2016},
     volume = {8},
     number = {1}}
    
  202. G. Sheng, T. Li, Q. Su, B. Chen & Y. Tang
    Detection of Content-aware Image Resizing Based on Benford}s Law
    Soft Computing, 2016, pp. 1-9
    DOI: 10.1007/s00500-016-2146-6
    BibTeX
    @article{Sheng2016,
     author = {Sheng, Guorui and Li, Tao and Su, Qingtang and Chen, Beijing and Tang, Yi},
     title = {Detection of Content-aware Image Resizing Based on Benford}s Law},
     journal = {Soft Computing},
     year = {2016},
     pages = {1--9}}
    
  203. Y.D. Shin
    Fast Detection of Copy-Move Forgery Image using Two Step Search Algorithm
    IJSIA, Science and Engineering Research Support Society, 2016, Vol. 10(5), pp. 203-214
    DOI: 10.14257/ijsia.2016.10.5.19
    BibTeX
    @article{Shin2016a,
     author = {Shin, Y. D.},
     title = {Fast Detection of Copy-Move Forgery Image using Two Step Search Algorithm},
     journal = {IJSIA},
     publisher = {Science and Engineering Research Support Society},
     year = {2016},
     volume = {10},
     number = {5},
     pages = {203--214}}
    
  204. Y.-D. Shin
    Fast Exploration of Copy-move Forgery Image
    Advanced Science and Technology Letters, 2016
    DOI: 10.9717/kmms.2013.16.4.411
    BibTeX
    @article{Shin2016,
     author = {Shin, Yong-Dal},
     title = {Fast Exploration of Copy-move Forgery Image},
     journal = {Advanced Science and Technology Letters},
     year = {2016}}
    
  205. G. Singh & K. Singh
    Forensics for partially double compressed doctored JPEG images
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-016-4290-5
    BibTeX
    @article{Singh2016b,
     author = {Singh, Gurinder and Singh, Kulbir},
     title = {Forensics for partially double compressed doctored JPEG images},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  206. N. Singh & S. Joshi
    Digital Image Forensics and Counter Anti-forensics
    Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing, Springer, 2016
    DOI: 10.1007/978-81-322-2638-3_90
    BibTeX
    @article{Singh2016,
     author = {Singh, Neha and Joshi, Sandeep},
     title = {Digital Image Forensics and Counter Anti-forensics},
     journal = {Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing},
     publisher = {Springer},
     year = {2016}}
    
  207. N. Singh & S. Joshi
    Digital Image Forensics and Counter Anti-forensics
    Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing
    Springer, 2016
    DOI: 10.1007/978-81-322-2638-3_90
    BibTeX
    @incollection{Singh2016a,
     author = {Singh, Neha and Joshi, Sandeep},
     title = {Digital Image Forensics and Counter Anti-forensics},
     booktitle = {Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing},
     publisher = {Springer},
     year = {2016}}
    
  208. G. Soman & J.K. John
    Block-based Forgery Detection Using Global and Local Features
    Proceedings of the International Conference on Soft Computing Systems, Springer, 2016
    DOI: 10.1007/978-81-322-2671-0_14
    BibTeX
    @article{Soman2016,
     author = {Soman, Gayathri and John, Jyothish K.},
     title = {Block-based Forgery Detection Using Global and Local Features},
     journal = {Proceedings of the International Conference on Soft Computing Systems},
     publisher = {Springer},
     year = {2016}}
    
  209. C. Srinivasa Rao & S.B.G. Tilak Babu
    Image Authentication Using Local Binary Pattern on the Low Frequency Components
    Microelectronics, Electromagnetics and Telecommunications, Springer, 2016
    DOI: 10.1007/978-81-322-2728-1_49
    BibTeX
    @article{SrinivasaRao2016,
     author = {Srinivasa Rao, Ch. and Tilak Babu, S. B. G.},
     title = {Image Authentication Using Local Binary Pattern on the Low Frequency Components},
     journal = {Microelectronics, Electromagnetics and Telecommunications},
     publisher = {Springer},
     year = {2016}}
    
  210. C. Srinivasa Rao & S.B.G. Tilak Babu
    Image Authentication Using Local Binary Pattern on the Low Frequency Components
    Microelectronics, Electromagnetics and Telecommunications
    Springer, 2016
    DOI: 10.1007/978-81-322-2728-1_49
    BibTeX
    @incollection{SrinivasaRao2016a,
     author = {Srinivasa Rao, Ch. and Tilak Babu, S. B. G.},
     title = {Image Authentication Using Local Binary Pattern on the Low Frequency Components},
     booktitle = {Microelectronics, Electromagnetics and Telecommunications},
     publisher = {Springer},
     year = {2016}}
    
  211. A. Taimori, F. Razzazi, A. Behrad, A. Ahmadi & M. Babaie-Zadeh
    A Novel Forensic Image Analysis Tool for Discovering Double JPEG Compression Clues
    Multimedia Tools and Applications, 2016, pp. 1-35
    DOI: 10.1007/s11042-016-3409-z
    BibTeX
    @article{Taimori2016,
     author = {Taimori, Ali and Razzazi, Farbod and Behrad, Alireza and Ahmadi, Ali and Babaie-Zadeh, Massoud},
     title = {A Novel Forensic Image Analysis Tool for Discovering Double JPEG Compression Clues},
     journal = {Multimedia Tools and Applications},
     year = {2016},
     pages = {1--35}}
    
  212. Y. Tan, B. Wang, M. Li, Y. Guo, X. Kong & Y. Shi
    Digital-forensics and Watermarking: 14th International Workshop, Iwdw 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers
    Shi, Y.-Q., Kim, J. H., Pérez-González, F. & Echizen, I. (ed.)
    Volume 9569 of the series Lecture Notes in Computer Science
    Chapter Camera Source Identification with Limited Labeled Training Set
    Springer International Publishing, 2016, pp. 18-27
    DOI: 10.1007/978-3-319-31960-5_2
    BibTeX
    @inbook{Tan2016,
     author = {Tan, Yue and Wang, Bo and Li, Ming and Guo, Yanqing and Kong, Xiangwei and Shi, Yunqing},
     title = {Digital-forensics and Watermarking: 14th International Workshop, Iwdw 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers},
     booktitle = {Volume 9569 of the series Lecture Notes in Computer Science},
     publisher = {Springer International Publishing},
     year = {2016},
     pages = {18--27}}
    
  213. S. Taspinar, M. Mohanty & N. Memon
    PRNU Based Source Attribution with a Collection of Seam-carved Images
    Proc. IEEE Int. Conf. Image Processing (ICIP)
    2016, pp. 156-160
    DOI: 10.1109/ICIP.2016.7532338
    BibTeX
    @inproceedings{Taspinar2016,
     author = {Taspinar, S. and Mohanty, M. and Memon, N.},
     title = {PRNU Based Source Attribution with a Collection of Seam-carved Images},
     booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)},
     year = {2016},
     pages = {156--160}}
    
  214. S. Teerakanok & T. Uehara
    Enhancing Image Forgery Detection Using 2-d Cross Products
    Advances in Digital Forensics XII
    Springer, 2016
    DOI: 10.1007/978-3-319-46279-0_15
    BibTeX
    @incollection{Teerakanok2016,
     author = {Teerakanok, Songpon and Uehara, Tetsutaro},
     title = {Enhancing Image Forgery Detection Using 2-d Cross Products},
     booktitle = {Advances in Digital Forensics XII},
     publisher = {Springer},
     year = {2016}}
    
  215. M.K. Thakur, V. Saxena & J.P. Gupta
    Learning Based No Reference Algorithm for Dropped Frame Identification in Uncompressed Video
    Satapathy, C. S., Mandal, K. J., Udgata, K. S. & Bhateja, V. (ed.)
    Information Systems Design and Intelligent Applications: Proceedings of Third International Conference INDIA 2016, Volume 3
    Chapter Learning Based No Reference Algorithm for Dropped Frame Identification in Uncompressed Video
    Springer India, 2016, pp. 451-459
    DOI: 10.1007/978-81-322-2757-1_45
    BibTeX
    @inbook{Thakur2016,
     author = {Thakur, Manish K. and Saxena, Vikas and Gupta, J. P.},
     title = {Learning Based No Reference Algorithm for Dropped Frame Identification in Uncompressed Video},
     booktitle = {Information Systems Design and Intelligent Applications: Proceedings of Third International Conference INDIA 2016, Volume 3},
     publisher = {Springer India},
     year = {2016},
     pages = {451--459}}
    
  216. V. Thirunavukkarasu & J.S. Kumar
    A Novel Method to Detect Copy-move Tampering in Digital Images
    Indian Journal of Science and Technology, 2016, Vol. 9(8)
    DOI: 10.17485/ijst/2016/v9i8/87900
    BibTeX
    @article{Thirunavukkarasu2016,
     author = {Thirunavukkarasu, V. and Kumar, J. Satheesh},
     title = {A Novel Method to Detect Copy-move Tampering in Digital Images},
     journal = {Indian Journal of Science and Technology},
     year = {2016},
     volume = {9},
     number = {8}}
    
  217. L.-T. Thuong, H.-K. Tu & B.-D. Sinh
    Blind Image Forgeries Detection Using Detail Components from the Wavelet Transform
    Frontiers in Artificial Intelligence and Applications, IOS Press, 2016, Vol. 282(Advances in Digital Technologies), pp. 91-104
    DOI: 10.3233/978-1-61499-637-8-91
    BibTeX
    @article{Le-Tien2016,
     author = {Thuong, Le-Tien and Tu, Huynh-Kha and Sinh, Bui-Duc},
     title = {Blind Image Forgeries Detection Using Detail Components from the Wavelet Transform},
     journal = {Frontiers in Artificial Intelligence and Applications},
     publisher = {IOS Press},
     year = {2016},
     volume = {282},
     number = {Advances in Digital Technologies},
     pages = {91--104}}
    
  218. M.J. Tsai, C.L. Hsu, J.S. Yin & I. Yuadi
    Digital forensics for printed character source identification
    Proc. IEEE Int. Conf. Multimedia and Expo (ICME)
    2016, pp. 1-6
    DOI: 10.1109/ICME.2016.7552892
    BibTeX
    @inproceedings{Tsai2016,
     author = {Tsai, M. J. and Hsu, C. L. and Yin, J. S. and Yuadi, I.},
     title = {Digital forensics for printed character source identification},
     booktitle = {Proc. IEEE Int. Conf. Multimedia and Expo (ICME)},
     year = {2016},
     pages = {1--6}}
    
  219. A. Tuama
    Camera Model Identification Based Machine Learning Approach with High Order Statistics Features
    Poc. of the 24th European Signal Processing Conference (EUSIPCO 2016), 2016
    BibTeX
    @article{Tuama2016a,
     author = {Tuama, A.},
     title = {Camera Model Identification Based Machine Learning Approach with High Order Statistics Features},
     journal = {Poc. of the 24th European Signal Processing Conference (EUSIPCO 2016)},
     year = {2016}}
    
  220. A. Tuama, F. Comby & M. Chaumont
    Source Camera Model Identification Using Features from Contaminated Sensor Noise
    Digital-Forensics and Watermarking, Springer, 2016
    DOI: 10.1007/978-3-319-31960-5_8
    BibTeX
    @article{Tuama2016,
     author = {Tuama, Amel and Comby, Frederic and Chaumont, Marc},
     title = {Source Camera Model Identification Using Features from Contaminated Sensor Noise},
     journal = {Digital-Forensics and Watermarking},
     publisher = {Springer},
     year = {2016}}
    
  221. A. Tuama, F. Comby & M. Chaumont.
    Camera Model Identification with the Use of Deep Convolutional Neural Networks
    IEEE International Workshop on Information Forensics and Security, Dec 201, 2016
    BibTeX
    @article{Tuama2016b,
     author = {Tuama, Amel and Comby, Frederic and Chaumont., Marc},
     title = {Camera Model Identification with the Use of Deep Convolutional Neural Networks},
     journal = {IEEE International Workshop on Information Forensics and Security, Dec 201},
     year = {2016}}
    
  222. I. Tuba, E. Tuba & M. Beko
    Digital image forgery detection based on shadow texture features
    Proc. 24th Telecommunications Forum (TELFOR)
    2016, pp. 1-4
    DOI: 10.1109/TELFOR.2016.7818875
    BibTeX
    @inproceedings{Tuba2016,
     author = {Tuba, I. and Tuba, E. and Beko, M.},
     title = {Digital image forgery detection based on shadow texture features},
     booktitle = {Proc. 24th Telecommunications Forum (TELFOR)},
     year = {2016},
     pages = {1--4}}
    
  223. M.B.E. Tuba & R. Jovanovic
    Overlapping Block Based Algorithm for Copy-move Forgery Detection in Digital Images
    International Journal of Computers, 2016
    BibTeX
    @article{Brajic2016,
     author = {Tuba, Momcilo Brajicand Eva and Jovanovic, Raka},
     title = {Overlapping Block Based Algorithm for Copy-move Forgery Detection in Digital Images},
     journal = {International Journal of Computers},
     year = {2016}}
    
  224. D.M. Uliyan, H.A. Jalab, A.W.A. Wahab & S. Sadeghi
    Image Region Duplication Forgery Detection Based on Angular Radial Partitioning and Harris Key-points
    Symmetry, 2016
    DOI: 10.3390/sym8070062
    BibTeX
    @article{Uliyan2016a,
     author = {Uliyan, Diaa M. and Jalab, Hamid A. and Wahab, Ainuddin W. Abdul and Sadeghi, Somayeh},
     title = {Image Region Duplication Forgery Detection Based on Angular Radial Partitioning and Harris Key-points},
     journal = {Symmetry},
     year = {2016}}
    
  225. D.M. Uliyan, H.A. Jalab, A.W.A. Wahab, P. Shivakumara & S. Sadeghi
    A Novel Forged Blurred Region Detection System for Image Forensic Applications
    Expert Systems with Applications, Elsevier BV, 2016, Vol. 64, pp. 1-10
    DOI: 10.1016/j.eswa.2016.07.026
    BibTeX
    @article{Uliyan2016,
     author = {Uliyan, Diaa M. and Jalab, Hamid A. and Wahab, Ainuddin W. Abdul and Shivakumara, Palaiahnakote and Sadeghi, Somayeh},
     title = {A Novel Forged Blurred Region Detection System for Image Forensic Applications},
     journal = {Expert Systems with Applications},
     publisher = {Elsevier BV},
     year = {2016},
     volume = {64},
     pages = {1--10}}
    
  226. B. Ustubioglu, G. Ulutas, M. Ulutas, V. Nabiyev & A. Ustubioglu
    LBP-DCT Based Copy Move Forgery Detection Algorithm
    Lecture Notes in Electrical Engineering
    Springer, 2016, pp. 127-136
    DOI: 10.1007/978-3-319-22635-4_11
    BibTeX
    @incollection{Ustubioglu2016,
     author = {Ustubioglu, Beste and Ulutas, Guzin and Ulutas, Mustafa and Nabiyev, Vasif and Ustubioglu, Arda},
     title = {LBP-DCT Based Copy Move Forgery Detection Algorithm},
     booktitle = {Lecture Notes in Electrical Engineering},
     publisher = {Springer},
     year = {2016},
     pages = {127--136}}
    
  227. B. Ustubioglu, G. Ulutas, M. Ulutas & V.V. Nabiyev
    Improved Copy-move Forgery Detection Based on the Clds and Colour Moments
    The Imaging Science Journal, 2016, Vol. 64(4), pp. 215-225
    DOI: 10.1080/13682199.2016.1162922
    BibTeX
    @article{Ustubioglu2016a,
     author = {Ustubioglu, B. and Ulutas, G. and Ulutas, M. and Nabiyev, V. V.},
     title = {Improved Copy-move Forgery Detection Based on the Clds and Colour Moments},
     journal = {The Imaging Science Journal},
     year = {2016},
     volume = {64},
     number = {4},
     pages = {215--225}}
    
  228. B. Ustubioglu, G. Ulutas, M. Ulutas & V.V. Nabiyev
    A New Copy Move Forgery Detection Technique with Automatic Threshold Determination
    AEU\ - International Journal of Electronics and Communications, 2016, pp. -
    DOI: 10.1016/j.aeue.2016.05.005
    BibTeX
    @article{Ustubioglu2016b,
     author = {Ustubioglu, Beste and Ulutas, Guzin and Ulutas, Mustafa and Nabiyev, Vasif V.},
     title = {A New Copy Move Forgery Detection Technique with Automatic Threshold Determination},
     journal = {AEU\ - International Journal of Electronics and Communications},
     year = {2016},
     pages = {-}}
    
  229. D. Vaishnavi & T.S. Subashini
    Recognizing Image Splicing Forgeries Using Histogram Features
    2016 3rd MEC International Conference on Big Data and Smart City (ICBDSC)
    2016, pp. 1-4
    DOI: 10.1109/ICBDSC.2016.7460342
    BibTeX
    @inproceedings{Vaishnavi2016,
     author = {Vaishnavi, D. and Subashini, T. S.},
     title = {Recognizing Image Splicing Forgeries Using Histogram Features},
     booktitle = {2016 3rd MEC International Conference on Big Data and Smart City (ICBDSC)},
     year = {2016},
     pages = {1--4}}
    
  230. L.J.G. Villalba, A.L.S. Orozco, J.R. Corripio & J. Hernandez-Castro
    A PRNU-based counter-forensic method to manipulate smartphone image source identification techniques
    Future Generation Computer Systems, Elsevier, 2016
    DOI: 10.1016/j.future.2016.11.007
    BibTeX
    @article{Villalba2016a,
     author = {Villalba, Luis Javier Garc\ia and Orozco, Ana Lucila Sandoval and Corripio, Jocelin Rosales and Hernandez-Castro, Julio},
     title = {A PRNU-based counter-forensic method to manipulate smartphone image source identification techniques},
     journal = {Future Generation Computer Systems},
     publisher = {Elsevier},
     year = {2016}}
    
  231. L.J.G. Villalba, A.L.S. Orozco, R.R. López & J.H. Castro
    Identification of Smartphone Brand and Model Via Forensic Video Analysis
    Expert Systems with Applications, 2016, Vol. 55, pp. 59-69
    DOI: 10.1016/j.eswa.2016.01.025
    BibTeX
    @article{Villalba2016,
     author = {Villalba, Luis Javier García and Orozco, Ana Lucila Sandoval and López, Raquel Ramos and Castro, Julio Hernandez},
     title = {Identification of Smartphone Brand and Model Via Forensic Video Analysis},
     journal = {Expert Systems with Applications},
     year = {2016},
     volume = {55},
     pages = {59--69}}
    
  232. H. Wang, H. Wang & C. Shi
    An Efficient Passive Authentication Scheme for Copy-Move Forgery Based on DCT
    Cloud Computing and Security, Springer, 2016
    DOI: 10.1007/978-3-319-48674-1_37
    BibTeX
    @article{Wang2016o,
     author = {Wang, Huan and Wang, Hongxia and Shi, Canghong},
     title = {An Efficient Passive Authentication Scheme for Copy-Move Forgery Based on DCT},
     journal = {Cloud Computing and Security},
     publisher = {Springer},
     year = {2016}}
    
  233. H. Wang, H.-X. Wang, X.-M. Sun & Q. Qian
    A Passive Authentication Scheme for Copy-move Forgery Based on Package Clustering Algorithm
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-016-3687-5
    BibTeX
    @article{Wang2016a,
     author = {Wang, Huan and Wang, Hong-Xia and Sun, Xing-Ming and Qian, Qing},
     title = {A Passive Authentication Scheme for Copy-move Forgery Based on Package Clustering Algorithm},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  234. J. Wang, T. Li, Y.-Q. Shi, S. Lian & J. Ye
    Forensics feature analysis in quaternion wavelet domain for distinguishing photographic images and computer graphics
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-016-4153-0
    BibTeX
    @article{Wang2016d,
     author = {Wang, Jinwei and Li, Ting and Shi, Yun-Qing and Lian, Shiguo and Ye, Jingyu},
     title = {Forensics feature analysis in quaternion wavelet domain for distinguishing photographic images and computer graphics},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  235. Q. Wang & R. Zhang
    Double JPEG Compression Forensics Based on a Convolutional Neural Network
    EURASIP Journal on Information Security, Springer, 2016, Vol. 2016(1), pp. 1
    DOI: 10.1186/s13635-016-0047-y
    BibTeX
    @article{Wang2016b,
     author = {Wang, Qing and Zhang, Rong},
     title = {Double JPEG Compression Forensics Based on a Convolutional Neural Network},
     journal = {EURASIP Journal on Information Security},
     publisher = {Springer},
     year = {2016},
     volume = {2016},
     number = {1},
     pages = {1}}
    
  236. X.-Y. Wang, S. Li, Y.-N. Liu, Y. Niu, H.-Y. Yang & Z.-l. Zhou
    A new keypoint-based copy-move forgery detection for small smooth regions
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-016-4140-5
    BibTeX
    @article{Wang2016c,
     author = {Wang, Xiang-Yang and Li, Shuo and Liu, Yu-Nan and Niu, Ying and Yang, Hong-Ying and Zhou, Zhi-li},
     title = {A new keypoint-based copy-move forgery detection for small smooth regions},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  237. X.-y. Wang, Y.-n. Liu, H. Xu, P. Wang & H.-y. Yang
    Robust Copy-move Forgery Detection Using Quaternion Exponent Moments
    Pattern Analysis and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s10044-016-0588-1
    BibTeX
    @article{Wang2016,
     author = {Wang, Xiang-yang and Liu, Yu-nan and Xu, Huan and Wang, Pei and Yang, Hong-ying},
     title = {Robust Copy-move Forgery Detection Using Quaternion Exponent Moments},
     journal = {Pattern Analysis and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  238. A.D. Warbhe, R.V. Dharaskar & V.M. Thakare
    A Scaling Robust Copy-paste Tampering Detection for Digital Image Forensics
    Procedia Computer Science, 2016, Vol. 79, pp. 458-465
    DOI: 10.1016/j.procs.2016.03.059
    BibTeX
    @article{Warbhe2016,
     author = {Warbhe, Anil Dada and Dharaskar, R. V. and Thakare, V. M.},
     title = {A Scaling Robust Copy-paste Tampering Detection for Digital Image Forensics},
     journal = {Procedia Computer Science},
     year = {2016},
     volume = {79},
     pages = {458--465}}
    
  239. A.D. Warbhe, R.V. Dharaskar & V.M. Thakare
    Computationally Efficient Digital Image Forensic Method for Image Authentication
    Procedia Computer Science, 2016, Vol. 78, pp. 464-470
    DOI: 10.1016/j.procs.2016.02.089
    BibTeX
    @article{Warbhe2016a,
     author = {Warbhe, Anil Dada and Dharaskar, R. V. and Thakare, V. M.},
     title = {Computationally Efficient Digital Image Forensic Method for Image Authentication},
     journal = {Procedia Computer Science},
     year = {2016},
     volume = {78},
     pages = {464--470}}
    
  240. A.D. Warbhe, R.V. Dharaskar & V.M. Thakare
    Digital Image Forensics: An Affine Transform Robust Copy-paste Tampering Detection
    Proc. 10th Int. Conf. Intelligent Systems and Control (ISCO)
    2016, pp. 1-5
    DOI: 10.1109/ISCO.2016.7727045
    BibTeX
    @inproceedings{Warbhe2016b,
     author = {Warbhe, A. Dada and Dharaskar, R. V. and Thakare, V. M.},
     title = {Digital Image Forensics: An Affine Transform Robust Copy-paste Tampering Detection},
     booktitle = {Proc. 10th Int. Conf. Intelligent Systems and Control (ISCO)},
     year = {2016},
     pages = {1--5}}
    
  241. N.B.A. Warif, A.W.A. Wahab, M.Y.I. Idris, R. Ramli, R. Salleh, S. Shamshirband & K.-K.R. Choo
    Copy-move Forgery Detection: Survey, Challenges and Future Directions
    Journal of Network and Computer Applications, Elsevier BV, 2016, Vol. 75, pp. 259-278
    DOI: 10.1016/j.jnca.2016.09.008
    BibTeX
    @article{Ashraf2016,
     author = {Warif, Nor Bakiah Abd and Wahab, Ainuddin Wahid Abdul and Idris, Mohd Yamani Idna and Ramli, Roziana and Salleh, Rosli and Shamshirband, Shahaboddin and Choo, Kim-Kwang Raymond},
     title = {Copy-move Forgery Detection: Survey, Challenges and Future Directions},
     journal = {Journal of Network and Computer Applications},
     publisher = {Elsevier BV},
     year = {2016},
     volume = {75},
     pages = {259--278}}
    
  242. B. Wen, Y. Zhu, R. Subramanian, T.-T. Ng, X. Shen & S. Winkler
    COVERAGE Novel Database for Copy-move Forgery Detection
    ICASSP(submitted), 2016
    DOI: 10.1109/icip.2016.7532339
    BibTeX
    @article{Wen2016,
     author = {Wen, Bihan and Zhu, Ye and Subramanian, Ramanathan and Ng, Tian-Tsong and Shen, Xuanjing and Winkler, Stefan},
     title = {COVERAGE Novel Database for Copy-move Forgery Detection},
     journal = {ICASSP(submitted)},
     year = {2016}}
    
  243. S. Wenchang, Z. Fei, Q. Bo & L. Bin
    Improving Image Copy-move Forgery Detection with Particle Swarm Optimization Techniques
    China Communications, 2016, Vol. 13(1), pp. 139-149
    DOI: 10.1109/CC.2016.7405711
    BibTeX
    @article{Wenchang2016,
     author = {Wenchang, Shi and Fei, Zhao and Bo, Qin and Bin, Liang},
     title = {Improving Image Copy-move Forgery Detection with Particle Swarm Optimization Techniques},
     journal = {China Communications},
     year = {2016},
     volume = {13},
     number = {1},
     pages = {139--149}}
    
  244. D. Williams, G. Krishnalal & V.P. Jagathy Raj
    Fraudulent Image Recognition Using Stable Inherent Feature
    Advances in Signal Processing and Intelligent Recognition Systems, Springer, 2016
    DOI: 10.1007/978-3-319-28658-7_2
    BibTeX
    @article{Williams2016,
     author = {Williams, Deny and Krishnalal, G. and Jagathy Raj, V. P.},
     title = {Fraudulent Image Recognition Using Stable Inherent Feature},
     journal = {Advances in Signal Processing and Intelligent Recognition Systems},
     publisher = {Springer},
     year = {2016}}
    
  245. D. Williams, G. Krishnalal & V.P. Jagathy Raj
    Fraudulent Image Recognition Using Stable Inherent Feature
    Advances in Signal Processing and Intelligent Recognition Systems
    Springer, 2016
    DOI: 10.1007/978-3-319-28658-7_2
    BibTeX
    @incollection{Williams2016a,
     author = {Williams, Deny and Krishnalal, G. and Jagathy Raj, V. P.},
     title = {Fraudulent Image Recognition Using Stable Inherent Feature},
     booktitle = {Advances in Signal Processing and Intelligent Recognition Systems},
     publisher = {Springer},
     year = {2016}}
    
  246. M. Xia, G. Yang, L. Li, R. Li & X. Sun
    Detecting Video Frame Rate Up-conversion Based on Frame-level Analysis of Average Texture Variation
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-016-3468-1
    BibTeX
    @article{Xia2016,
     author = {Xia, Min and Yang, Gaobo and Li, Leida and Li, Ran and Sun, Xingming},
     title = {Detecting Video Frame Rate Up-conversion Based on Frame-level Analysis of Average Texture Variation},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  247. L. Xicheng & X. Jianzhong
    Blind Identification Algorithm of Photorealistic Computer Grapic Based on Weber Local Features.
    Journal of Digital Information Management, 2016
    BibTeX
    @article{Xicheng2016,
     author = {Xicheng, Liu and Jianzhong, Xi},
     title = {Blind Identification Algorithm of Photorealistic Computer Grapic Based on Weber Local Features.},
     journal = {Journal of Digital Information Management},
     year = {2016}}
    
  248. Y. Xie & Y. Wang
    Blind Authentication for Detecting Multi-image Forgery
    Proc. SPIE, 2016, Vol. 10033, pp. 1003346-1003346-5
    DOI: 10.1117/12.2245319
    BibTeX
    @other{Xie2016,
     author = {Xie, Yi and Wang, Yulin},
     title = {Blind Authentication for Detecting Multi-image Forgery},
     journal = {Proc. SPIE},
     year = {2016},
     volume = {10033},
     pages = {1003346-1003346-5}}
    
  249. B. Xu, X. Wang, X. Zhou, J. Xi & S. Wang
    Source Camera Identification from Image Texture Features
    Neurocomputing, 2016, pp. -
    DOI: 10.1016/j.neucom.2016.05.012
    BibTeX
    @article{Xu2016,
     author = {Xu, Bingchao and Wang, Xiaofeng and Zhou, Xiaorui and Xi, Jianghuan and Wang, Shangping},
     title = {Source Camera Identification from Image Texture Features},
     journal = {Neurocomputing},
     year = {2016},
     pages = {-}}
    
  250. B. Yang & H. Guo
    An Efficient Forensic Method Based on High-speed Corner Detection Technique and SIFT Descriptor
    Cloud Computing and Security, Springer, 2016
    DOI: 10.1007/978-3-319-48674-1_40
    BibTeX
    @article{Yang2016b,
     author = {Yang, Bin and Guo, Honglei},
     title = {An Efficient Forensic Method Based on High-speed Corner Detection Technique and SIFT Descriptor},
     journal = {Cloud Computing and Security},
     publisher = {Springer},
     year = {2016}}
    
  251. L. Yang, T. Gao, Y. Xuan & H. Gao
    Contrast Modification Forensics Algorithm Based on Merged Weight Histogram of Run Length
    International Journal of Digital Crime and Forensics (IJDCF), 2016
    DOI: 10.4018/IJDCF.2016040103
    BibTeX
    @article{Yang2016,
     author = {Yang, Liang and Gao, Tiegang and Xuan, Yan and Gao, Hang},
     title = {Contrast Modification Forensics Algorithm Based on Merged Weight Histogram of Run Length},
     journal = {International Journal of Digital Crime and Forensics (IJDCF)},
     year = {2016}}
    
  252. P. Yang, G. Yang & D. Zhang
    Rotation Invariant Local Binary Pattern for Blind Detection of Copy-move Forgery with Affine Transform
    Cloud Computing and Security, Springer, 2016
    DOI: 10.1007/978-3-319-48674-1_36
    BibTeX
    @article{Yang2016c,
     author = {Yang, Pei and Yang, Gaobo and Zhang, Dengyong},
     title = {Rotation Invariant Local Binary Pattern for Blind Detection of Copy-move Forgery with Affine Transform},
     journal = {Cloud Computing and Security},
     publisher = {Springer},
     year = {2016}}
    
  253. H. Yao
    A Novel Image Noise Level Function Estimation Approach Using Camera Response Function Constraint
    Plapper, P., Guo, M. & Suhag, S. (ed.)
    MATEC Web of Conferences, EDP Sciences, 2016, Vol. 42, pp. 06004
    DOI: 10.1051/matecconf/20164206004
    BibTeX
    @article{Yao2016a,
     author = {Yao, Heng},
     title = {A Novel Image Noise Level Function Estimation Approach Using Camera Response Function Constraint},
     journal = {MATEC Web of Conferences},
     publisher = {EDP Sciences},
     year = {2016},
     volume = {42},
     pages = {06004}}
    
  254. H. Yao, S. Wang, X. Zhang, C. Qin & J. Wang
    Detecting Image Splicing Based on Noise Level Inconsistency
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-016-3660-3
    BibTeX
    @article{Yao2016,
     author = {Yao, Heng and Wang, Shuozhong and Zhang, Xinpeng and Qin, Chuan and Wang, Jinwei},
     title = {Detecting Image Splicing Based on Noise Level Inconsistency},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  255. Y. Yao, Y. Cheng & X. Li
    Video Objects Removal Forgery Detection and Localization
    Proc. Nicograph Int. (NicoInt)
    2016, pp. 137
    DOI: 10.1109/NicoInt.2016.30
    BibTeX
    @inproceedings{Yao2016b,
     author = {Yao, Y. and Cheng, Y. and Li, X.},
     title = {Video Objects Removal Forgery Detection and Localization},
     booktitle = {Proc. Nicograph Int. (NicoInt)},
     year = {2016},
     pages = {137}}
    
  256. A. Yaşar, F. Deniz & M. Doru
    Suspect Camera Determination
    Proc. 24th Signal Processing and Communication Application Conf. (SIU)
    2016, pp. 1837-1840
    DOI: 10.1109/SIU.2016.7496120
    BibTeX
    @inproceedings{Yasar2016,
     author = {Yaşar, A. and Deniz, F. and Doru, M.},
     title = {Suspect Camera Determination},
     booktitle = {Proc. 24th Signal Processing and Communication Application Conf. (SIU)},
     year = {2016},
     pages = {1837--1840}}
    
  257. F. Yavuz, A. Bal & H. Cukur
    An Effective Detection Algorithm for Region Duplication Forgery in Digital Images
    Casasent, D. & Alam, M. S. (ed.)
    Proc. SPIE 9845, Optical Pattern Recognition XXVII, 98450O (April 20, 2016)
    Proc. SPIE, 2016, Vol. 9845, pp. 98450O-98450O-7
    DOI: 10.1117/12.2223732
    BibTeX
    @inproceedings{Yavuz2016,
     author = {Yavuz, Fatih and Bal, Abdullah and Cukur, Huseyin},
     title = {An Effective Detection Algorithm for Region Duplication Forgery in Digital Images},
     booktitle = {Proc. SPIE 9845, Optical Pattern Recognition XXVII, 98450O (April 20, 2016)},
     journal = {Proc. SPIE},
     year = {2016},
     volume = {9845},
     pages = {98450O-98450O-7}}
    
  258. R.P. Yohannan & M. Manuel
    Detection of copy-move forgery based on Gabor filter
    Proc. IEEE Int. Conf. Engineering and Technology (ICETECH)
    2016, pp. 629-634
    DOI: 10.1109/ICETECH.2016.7569326
    BibTeX
    @inproceedings{Yohannan2016,
     author = {Yohannan, R. P. and Manuel, M.},
     title = {Detection of copy-move forgery based on Gabor filter},
     booktitle = {Proc. IEEE Int. Conf. Engineering and Technology (ICETECH)},
     year = {2016},
     pages = {629--634}}
    
  259. B.A.B. Youssef & E.H. Atta
    Image Forgery Detection using FREAK Binary Descriptor and Level Set Segmentation
    International Journal of Scientific & Engineering Research, Volu, 2016, Vol. 7(2)
    BibTeX
    @article{Youssef2016,
     author = {Youssef, Bayumy A. B. and Atta, Essam H.},
     title = {Image Forgery Detection using FREAK Binary Descriptor and Level Set Segmentation},
     journal = {International Journal of Scientific & Engineering Research, Volu},
     year = {2016},
     volume = {7},
     number = {2}}
    
  260. L. Yu, Q. Han & X. Niu
    Feature Point-based Copy-move Forgery Detection: Covering the Non-textured Areas
    Multimedia Tools and Applications, Springer, 2016, Vol. 75(2), pp. 1159
    DOI: 10.1007/s11042-014-2362-y
    BibTeX
    @article{Yu2016,
     author = {Yu, Liyang and Han, Qi and Niu, Xiamu},
     title = {Feature Point-based Copy-move Forgery Detection: Covering the Non-textured Areas},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     volume = {75},
     number = {2},
     pages = {1159}}
    
  261. Y. Yuan, Y. Zhang, S. Chen & H. Wang
    Robust Region Duplication Detection on Log-polar Domain Using Band Limitation
    Arabian Journal for Science and Engineering, Springer, 2016, pp. 1
    DOI: 10.1007/s13369-016-2268-2
    BibTeX
    @article{Yuan2016,
     author = {Yuan, Yue and Zhang, Yun and Chen, Shuang and Wang, Hong},
     title = {Robust Region Duplication Detection on Log-polar Domain Using Band Limitation},
     journal = {Arabian Journal for Science and Engineering},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  262. M. Zampoglou, S. Papadopoulos & Y. Kompatsiaris
    Large-scale Evaluation of Splicing Localization Algorithms for Web Images
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-016-3795-2
    BibTeX
    @article{Zampoglou2016a,
     author = {Zampoglou, Markos and Papadopoulos, Symeon and Kompatsiaris, Yiannis},
     title = {Large-scale Evaluation of Splicing Localization Algorithms for Web Images},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  263. M. Zampoglou, S. Papadopoulos, Y. Kompatsiaris, R. Bouwmeester & J. Spangenberg
    Web and Social Media Image Forensics for News Professionals
    2016
    BibTeX
    @electronic{Zampoglou2016,
     author = {Zampoglou, Markos and Papadopoulos, Symeon and Kompatsiaris, Yiannis and Bouwmeester, Ruben and Spangenberg, Jochen},
     title = {Web and Social Media Image Forensics for News Professionals},
     year = {2016}}
    
  264. M. Zandi, A. Mahmoudi-Aznaveh & A. Talebpour
    Iterative Copy-Move Forgery Detection Based on a New Interest Point Detector
    #IEEE_J_IFS#, 2016, Vol. 11(11), pp. 2499-2512
    DOI: 10.1109/TIFS.2016.2585118
    BibTeX
    @article{Zandi2016,
     author = {Zandi, M. and Mahmoudi-Aznaveh, A. and Talebpour, A.},
     title = {Iterative Copy-Move Forgery Detection Based on a New Interest Point Detector},
     journal = {#IEEE_J_IFS#},
     year = {2016},
     volume = {11},
     number = {11},
     pages = {2499--2512}}
    
  265. H. Zeng, X. Kang & A. Peng
    A Multi-purpose Countermeasure against Image Anti-forensics Using Autoregressive Model
    Neurocomputing, Elsevier BV, 2016, Vol. 189, pp. 117-122
    DOI: 10.1016/j.neucom.2015.12.089
    BibTeX
    @article{Zeng2016,
     author = {Zeng, Hui and Kang, Xiangui and Peng, Anjie},
     title = {A Multi-purpose Countermeasure against Image Anti-forensics Using Autoregressive Model},
     journal = {Neurocomputing},
     publisher = {Elsevier BV},
     year = {2016},
     volume = {189},
     pages = {117--122}}
    
  266. H. Zeng, J. Liu, J. Yu, X. Kang, Y.Q. Shi & Z.J. Wang
    A Framework of Camera Source Identification Bayesian Game
    IEEE Transactions on Cybernetics, 2016, Vol. PP(99), pp. 1-12
    DOI: 10.1109/TCYB.2016.2557802
    BibTeX
    @article{Zeng2016a,
     author = {Zeng, H. and Liu, J. and Yu, J. and Kang, X. and Shi, Y. Q. and Wang, Z. J.},
     title = {A Framework of Camera Source Identification Bayesian Game},
     journal = {IEEE Transactions on Cybernetics},
     year = {2016},
     volume = {PP},
     number = {99},
     pages = {1--12}}
    
  267. H. Zeng, Y. Zhan, X. Kang & X. Lin
    Image Splicing Localization Using PCA-based Noise Level Estimation
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-016-3712-8
    BibTeX
    @article{Zeng2016c,
     author = {Zeng, Hui and Zhan, Yifeng and Kang, Xiangui and Lin, Xiaodan},
     title = {Image Splicing Localization Using PCA-based Noise Level Estimation},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  268. J. Zeng, W. Lu, R. Yang & X. Qiu
    Practical Tools for Digital Image Forensic Authentication
    Advanced Multimedia and Ubiquitous Engineering
    Springer, 2016
    DOI: 10.1007/978-981-10-1536-6_59
    BibTeX
    @incollection{Zeng2016d,
     author = {Zeng, Jinhua and Lu, Wei and Yang, Rui and Qiu, Xiulian},
     title = {Practical Tools for Digital Image Forensic Authentication},
     booktitle = {Advanced Multimedia and Ubiquitous Engineering},
     publisher = {Springer},
     year = {2016}}
    
  269. J. Zeng, S. Shi, Y. Li & Q. Lu
    Practical Inspection Workflow for Digital Image Forensic Authentication
    Proc. 4th Int. Symp. Digital Forensic and Security (ISDFS)
    2016, pp. 172
    DOI: 10.1109/ISDFS.2016.7473540
    BibTeX
    @inproceedings{Zeng2016b,
     author = {Zeng, J. and Shi, S. and Li, Y. and Lu, Q.},
     title = {Practical Inspection Workflow for Digital Image Forensic Authentication},
     booktitle = {Proc. 4th Int. Symp. Digital Forensic and Security (ISDFS)},
     year = {2016},
     pages = {172}}
    
  270. L. Zhan, Y. Zhu & Z. Mo
    An Image Splicing Detection Method Based on PCA Minimum Eigenvalues
    Journal of Information Hiding and Multimedia Signal Processing, 2016
    BibTeX
    @article{Zhan2016,
     author = {Zhan, Lifei and Zhu, Yuesheng and Mo, Zhiwei},
     title = {An Image Splicing Detection Method Based on PCA Minimum Eigenvalues},
     journal = {Journal of Information Hiding and Multimedia Signal Processing},
     year = {2016}}
    
  271. J. Zhang, W. Zhu, B. Li, W. Hu & J. Yang
    Image Copy Detection Based on Convolutional Neural Networks
    Pattern Recognition, Springer, 2016
    DOI: 10.1007/978-981-10-3005-5_10
    BibTeX
    @article{Zhang2016d,
     author = {Zhang, Jing and Zhu, Wenting and Li, Bing and Hu, Weiming and Yang, Jinfeng},
     title = {Image Copy Detection Based on Convolutional Neural Networks},
     journal = {Pattern Recognition},
     publisher = {Springer},
     year = {2016}}
    
  272. L.-B. Zhang, F. Peng & M. Long
    Identifing source camera using guided image estimation and block weighted average
    Journal of Visual Communication and Image Representation, Elsevier BV, 2016
    DOI: 10.1016/j.jvcir.2016.12.013
    BibTeX
    @article{Zhang2016b,
     author = {Zhang, Le-Bing and Peng, Fei and Long, Min},
     title = {Identifing source camera using guided image estimation and block weighted average},
     journal = {Journal of Visual Communication and Image Representation},
     publisher = {Elsevier BV},
     year = {2016}}
    
  273. Q. Zhang, W. Lu & J. Weng
    Joint Image Splicing Detection in DCT and Contourlet Transform Domain
    Journal of Visual Communication and Image Representation, Elsevier BV, 2016, Vol. 40, pp. 449-458
    DOI: 10.1016/j.jvcir.2016.07.013
    BibTeX
    @article{Zhang2016a,
     author = {Zhang, Qingbo and Lu, Wei and Weng, Jian},
     title = {Joint Image Splicing Detection in DCT and Contourlet Transform Domain},
     journal = {Journal of Visual Communication and Image Representation},
     publisher = {Elsevier BV},
     year = {2016},
     volume = {40},
     pages = {449--458}}
    
  274. Z. Zhang, J. Hou, Z. Li & D. Li
    Inter-frame Forgery Detection for Static-background Video Based on Mvp Consistency
    Digital-Forensics and Watermarking, Springer, 2016
    DOI: 10.1007/978-3-319-31960-5_9
    BibTeX
    @article{Zhang2016,
     author = {Zhang, Zhenzhen and Hou, Jianjun and Li, Zhaohong and Li, Dongdong},
     title = {Inter-frame Forgery Detection for Static-background Video Based on Mvp Consistency},
     journal = {Digital-Forensics and Watermarking},
     publisher = {Springer},
     year = {2016}}
    
  275. Y. Zhanga, J. Goha, L.L. Wina & V. Thinga
    Image Region Forgery Detection: A Deep Learning Approach
    Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016: Cyber-Security by Design
    2016, Vol. 14, pp. 1
    DOI: 10.1109/icip.1994.413765
    BibTeX
    @inproceedings{Zhanga2016,
     author = {Zhanga, Ying and Goha, Jonathan and Wina, Lei Lei and Thinga, Vrizlynn},
     title = {Image Region Forgery Detection: A Deep Learning Approach},
     booktitle = {Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016: Cyber-Security by Design},
     year = {2016},
     volume = {14},
     pages = {1}}
    
  276. Zhao
    An Overview on Passive Image Forensics Technology for Automatic Computer Forgery
    International Journal of Digital Crime and Forensics (IJDCF), 2016, Vol. 8(4)
    DOI: 10.4018/IJDCF.2016100102
    BibTeX
    @article{Zhao2016a,
     author = {Zhao},
     title = {An Overview on Passive Image Forensics Technology for Automatic Computer Forgery},
     journal = {International Journal of Digital Crime and Forensics (IJDCF)},
     year = {2016},
     volume = {8},
     number = {4}}
    
  277. F. Zhao, W. Shi, B. Qin & B. Liang
    Analysis of SIFT Method Based on Swarm Intelligent Algorithms for Copy-move Forgery Detection
    Security, Privacy, and Anonymity in Computation, Communication, and Storage, Springer, 2016
    DOI: 10.1007/978-3-319-49148-6_39
    BibTeX
    @article{Zhao2016b,
     author = {Zhao, Fei and Shi, Wenchang and Qin, Bo and Liang, Bin},
     title = {Analysis of SIFT Method Based on Swarm Intelligent Algorithms for Copy-move Forgery Detection},
     journal = {Security, Privacy, and Anonymity in Computation, Communication, and Storage},
     publisher = {Springer},
     year = {2016}}
    
  278. X. Zhao & M.C. Stamm
    Computationally Efficient Demosaicing Filter Estimation for Forensic Camera Model Identification
    Proc. IEEE Int. Conf. Image Processing (ICIP)
    2016, pp. 151-155
    DOI: 10.1109/ICIP.2016.7532337
    BibTeX
    @inproceedings{Zhao2016,
     author = {Zhao, X. and Stamm, M. C.},
     title = {Computationally Efficient Demosaicing Filter Estimation for Forensic Camera Model Identification},
     booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)},
     year = {2016},
     pages = {151--155}}
    
  279. J. Zheng, Y. Liu, J. Ren, T. Zhu, Y. Yan & H. Yang
    Fusion of Block and Keypoints Based Approaches for Effective Copy-move Image Forgery Detection
    Multidimensional Systems and Signal Processing, 2016, pp. 1-17
    DOI: 10.1007/s11045-016-0416-1
    BibTeX
    @article{Zheng2016,
     author = {Zheng, Jiangbin and Liu, Yanan and Ren, Jinchang and Zhu, Tingge and Yan, Yijun and Yang, Heng},
     title = {Fusion of Block and Keypoints Based Approaches for Effective Copy-move Image Forgery Detection},
     journal = {Multidimensional Systems and Signal Processing},
     year = {2016},
     pages = {1--17}}
    
  280. H. Zhou, Y. Shen, X. Zhu, B. Liu, Z. Fu & N. Fan
    Digital Image Modification Detection Using Color Information and Its Histograms
    Forensic Science International, Elsevier BV, 2016, Vol. 266, pp. 379-388
    DOI: 10.1016/j.forsciint.2016.06.005
    BibTeX
    @article{Zhou2016,
     author = {Zhou, Haoyu and Shen, Yue and Zhu, Xinghui and Liu, Bo and Fu, Zigang and Fan, Na},
     title = {Digital Image Modification Detection Using Color Information and Its Histograms},
     journal = {Forensic Science International},
     publisher = {Elsevier BV},
     year = {2016},
     volume = {266},
     pages = {379--388}}
    
  281. Y. Zhou & Y. Xie
    Copy-move Forgery Detection Using Improved SIFT
    Proc. SPIE, 2016, Vol. 10033, pp. 100334S-100334S-6
    DOI: 10.1117/12.2244287
    BibTeX
    @other{Zhou2016a,
     author = {Zhou, Yigang and Xie, Yunfang},
     title = {Copy-move Forgery Detection Using Improved SIFT},
     journal = {Proc. SPIE},
     year = {2016},
     volume = {10033},
     pages = {100334S-100334S-6}}
    
  282. N. Zhu, C. Deng & X. Gao
    A Learning-to-rank Approach for Image Scaling Factor Estimation
    Neurocomputing, 2016, pp. -
    DOI: 10.1016/j.neucom.2015.06.113
    BibTeX
    @article{Zhu2016,
     author = {Zhu, Nan and Deng, Cheng and Gao, Xinbo},
     title = {A Learning-to-rank Approach for Image Scaling Factor Estimation},
     journal = {Neurocomputing},
     year = {2016},
     pages = {-}}
    
  283. N. Zhu, C. Deng & X. Gao
    Image Sharpening Detection Based on Multiresolution Overshoot Artifact Analysis
    Multimedia Tools and Applications, Springer, 2016, pp. 1
    DOI: 10.1007/s11042-016-3938-5
    BibTeX
    @article{Zhu2016c,
     author = {Zhu, Nan and Deng, Cheng and Gao, Xinbo},
     title = {Image Sharpening Detection Based on Multiresolution Overshoot Artifact Analysis},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     pages = {1}}
    
  284. Y. Zhu, T.-T. Ng, X. Shen & B. Wen
    Revisiting Copy-move Forgery Detection by Considering Realistic Image with Similar but Genuine Objects
    arXiv preprint arXiv:1601.07262, 2016
    DOI: 10.1007/s11042-014-2431-2
    BibTeX
    @article{Zhu2016a,
     author = {Zhu, Ye and Ng, Tian-Tsong and Shen, Xuanjing and Wen, Bihan},
     title = {Revisiting Copy-move Forgery Detection by Considering Realistic Image with Similar but Genuine Objects},
     journal = {arXiv preprint arXiv:1601.07262},
     year = {2016}}
    
  285. Y. Zhu, X. Shen & H. Chen
    Copy-move Forgery Detection Based on Scaled ORB
    Multimedia Tools and Applications, Springer, 2016, Vol. 75(6), pp. 3221
    DOI: 10.1007/s11042-014-2431-2
    BibTeX
    @article{Zhu2016b,
     author = {Zhu, Ye and Shen, Xuanjing and Chen, Haipeng},
     title = {Copy-move Forgery Detection Based on Scaled ORB},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2016},
     volume = {75},
     number = {6},
     pages = {3221}}
    
  286. Y. Zhu, R. Subramanian, T.-T. Ng, S. Winkler & R. Ratnam
    Comparison of Human and Machine Performance for Copy-move Image Forgery Detection Involving Similar but Genuine Objects
    Proc. IEEE Region 10 International Conference (TENCON), Singapore, Nov. 22-25, 2016
    2016
    BibTeX
    @conference{Zhu2016d,
     author = {Zhu, Y. and Subramanian, R. and Ng, T.-T. and Winkler, S. and Ratnam, R.},
     title = {Comparison of Human and Machine Performance for Copy-move Image Forgery Detection Involving Similar but Genuine Objects},
     booktitle = {Proc. IEEE Region 10 International Conference (TENCON), Singapore, Nov. 22-25, 2016},
     year = {2016}}
    
  287. V. Zorilo, Y. Lebedeva, M. Kozina & D. Belush
    Method of Photomontage Detection under Conditions of Limitations Absence for Photos Falsification
    Odes'kyi Politechnichnyi Universytet. Pratsi, Odessa National Polytechnic University, 2016(2), pp. 51-55
    DOI: 10.15276/opu.2.49.2016.12
    BibTeX
    @article{Zorilo2016,
     author = {Zorilo, Viktoriya and Lebedeva, Yelena and Kozina, Maria and Belush, Daria},
     title = {Method of Photomontage Detection under Conditions of Limitations Absence for Photos Falsification},
     journal = {Odes'kyi Politechnichnyi Universytet. Pratsi},
     publisher = {Odessa National Polytechnic University},
     year = {2016},
     number = {2},
     pages = {51--55}}
    
  288. Digital-Forensics and Watermarking
    Shi, Y.-Q., Kim, H. J., Pérez-González, F. & Echizen, I. (ed.)
    Springer International Publishing, 2016
    BibTeX
    @book{Shi2016,,
     title = {Digital-Forensics and Watermarking},
     publisher = {Springer International Publishing},
     year = {2016}}
    


2015

  1. W. Zhao & H. Liu
    An Image Forensic Technique Based on 2D Lighting Estimation Using Spherical Harmonic Frames
    Zha, H., Chen, X., Wang, L. & Miao, Q. (ed.)
    Computer Vision
    Springer Berlin Heidelberg, 2015, Vol. 546, pp. 325-334
    DOI: 10.1007/978-3-662-48558-3_33
    BibTeX
    @incollection{Zhao2015b,
     author = {Zhao, Wenyong and Liu, Hong},
     title = {An Image Forensic Technique Based on 2D Lighting Estimation Using Spherical Harmonic Frames},
     booktitle = {Computer Vision},
     publisher = {Springer Berlin Heidelberg},
     year = {2015},
     volume = {546},
     pages = {325--334}}
    
  2. E. Achimescu, R.O. Preda, N. Vizireanu & I. Pirnog
    Multiple Point Android Digital Image Authentication
    Proc. Int Signals, Circuits and Systems (ISSCS) Symp
    2015, pp. 1-4
    DOI: 10.1109/ISSCS.2015.7203945
    BibTeX
    @inproceedings{Achimescu2015,
     author = {Achimescu, E. and Preda, R. O. and Vizireanu, N. and Pirnog, I.},
     title = {Multiple Point Android Digital Image Authentication},
     booktitle = {Proc. Int Signals, Circuits and Systems (ISSCS) Symp},
     year = {2015},
     pages = {1--4}}
    
  3. S. Agarwal & S. Chand
    Image Forgery Detection Using Multi Scale Entropy Filter and Local Phase Quantization
    I.J. Image, Graphics and Signal Processing, 2015
    DOI: 10.5815/ijigsp.2015.10.08
    BibTeX
    @article{Agarwal2015,
     author = {Agarwal, Saurabh and Chand, Satish},
     title = {Image Forgery Detection Using Multi Scale Entropy Filter and Local Phase Quantization},
     journal = {I.J. Image, Graphics and Signal Processing},
     year = {2015}}
    
  4. S. Agarwal & S. Chand
    Anti-forensics of JPEG Images Using Interpolation
    I.J. Image, Graphics and Signal Processing, 2015, Vol. 12, pp. 10-17
    DOI: 10.5815/ijigsp.2015.12.02
    BibTeX
    @article{Agarwal2015a,
     author = {Agarwal, Saurabh and Chand, Satish},
     title = {Anti-forensics of JPEG Images Using Interpolation},
     journal = {I.J. Image, Graphics and Signal Processing},
     year = {2015},
     volume = {12},
     pages = {10--17}}
    
  5. H.M. Ahmed & S.R. Salim
    A Method for Detect Forgery from Images
    Eng.& Tech.Journal, 2015, Vol. 33(2)
    DOI: 10.1109/ceec.2014.6958558
    BibTeX
    @article{Ahmed2015,
     author = {Ahmed, Hanaa Mohsin and Salim, Sabaa Rakan},
     title = {A Method for Detect Forgery from Images},
     journal = {Eng.& Tech.Journal},
     year = {2015},
     volume = {33},
     number = {2}}
    
  6. H.M. Ahmed & S.R. Salim
    Method for Detect and Extract Forgery from Images
    Al - Mansour Journal, 2015
    BibTeX
    @article{Ahmed2015a,
     author = {Ahmed, Hanaa Mohsin and Salim, Sabaa Rakan},
     title = {Method for Detect and Extract Forgery from Images},
     journal = {Al - Mansour Journal},
     year = {2015}}
    
  7. A. Alani & Z. Al-Khanjari
    Detection Techniques of Digital Image Forgery by Using Images Metadata in Digital Investigation
    Proc. of the Int. Academic Conf. on Law, Politics & Management
    Al-Khanjari,, 2015
    BibTeX
    @inproceedings{Alani2015,
     author = {Alani, A. and Al-Khanjari, Z.},
     title = {Detection Techniques of Digital Image Forgery by Using Images Metadata in Digital Investigation},
     booktitle = {Proc. of the Int. Academic Conf. on Law, Politics & Management},
     journal = {Al-Khanjari,},
     year = {2015}}
    
  8. M. Al-Ani, F. Khelifi, A. Lawgaly & A. Bouridane
    A Novel Image Filtering Approach for Sensor Fingerprint Estimation in Source Camera Identification
    Proc. 12th IEEE Int Advanced Video and Signal Based Surveillance (AVSS) Conf
    2015, pp. 1-5
    DOI: 10.1109/AVSS.2015.7301808
    BibTeX
    @inproceedings{Al-Ani2015,
     author = {Al-Ani, Mustafa and Khelifi, Fouad and Lawgaly, Ashref and Bouridane, Ahmed},
     title = {A Novel Image Filtering Approach for Sensor Fingerprint Estimation in Source Camera Identification},
     booktitle = {Proc. 12th IEEE Int Advanced Video and Signal Based Surveillance (AVSS) Conf},
     year = {2015},
     pages = {1--5}}
    
  9. A.S. Alfraih, J.A. Briffa & S. Wesemeyer
    Cloning Localization Approach Using K-means Clustering and Support Vector Machine
    Journal of Electronic Imaging, 2015, Vol. 24(4), pp. 043019
    DOI: 10.1117/1.JEI.24.4.043019
    BibTeX
    @article{Alfraih2015,
     author = {Alfraih, Areej S. and Briffa, Johann A. and Wesemeyer, Stephan},
     title = {Cloning Localization Approach Using K-means Clustering and Support Vector Machine},
     journal = {Journal of Electronic Imaging},
     year = {2015},
     volume = {24},
     number = {4},
     pages = {043019}}
    
  10. A.S. Alfraih, J.A. Briffa & S. Wesemeyer
    Cloning Localization Based on Feature Extraction and K-means Clustering
    Digital-Forensics and Watermarking, Springer, 2015
    DOI: 10.1007/978-3-319-19321-2_31
    BibTeX
    @article{Alfraih2015a,
     author = {Alfraih, Areej S. and Briffa, Johann A. and Wesemeyer, Stephan},
     title = {Cloning Localization Based on Feature Extraction and K-means Clustering},
     journal = {Digital-Forensics and Watermarking},
     publisher = {Springer},
     year = {2015}}
    
  11. O.M. Al-Qershi & B.E. Khoo
    Enhanced Matching Method for Copy-move Forgery Detection by Means of Zernike Moments
    Digital-Forensics and Watermarking, Springer, 2015
    DOI: 10.1007/978-3-319-19321-2_37
    BibTeX
    @article{Al-Qershi2015,
     author = {Al-Qershi, Osamah M. and Khoo, Bee Ee},
     title = {Enhanced Matching Method for Copy-move Forgery Detection by Means of Zernike Moments},
     journal = {Digital-Forensics and Watermarking},
     publisher = {Springer},
     year = {2015}}
    
  12. R.A. Alsanussi, H.E. Shamardan, Mostafa & S.M. Mostafa
    Detection of Copy-move Forgery in Images Containing Flipped and Random-shaped Tampered Regions
    Egyptian Computer Science Journal, ECS, 2015, Vol. 36(6), pp. 80-95
    BibTeX
    @article{Alsanussi2015,
     author = {Alsanussi, Reem A. and Shamardan, Hossam Eldeen and Mostafa and Mostafa, Sami M.},
     title = {Detection of Copy-move Forgery in Images Containing Flipped and Random-shaped Tampered Regions},
     journal = {Egyptian Computer Science Journal, ECS},
     year = {2015},
     volume = {36},
     number = {6},
     pages = {80--95}}
    
  13. I. Amerini
    A Feature-based Forensic Procedure for Splicing Forgeries Detection
    Mathematical Problems in Engineering, 2015, Vol. 2015(653164)
    DOI: 10.1155/2015/653164
    BibTeX
    @article{Amerini2015b,
     author = {Amerini, I.},
     title = {A Feature-based Forensic Procedure for Splicing Forgeries Detection},
     journal = {Mathematical Problems in Engineering},
     year = {2015},
     volume = {2015},
     number = {653164}}
    
  14. I. Amerini, R. Becarelli, B. Bertini & R. Caldelli
    Acquisition Source Identification through a Blind Image Classification
    Image Processing, IET, 2015, Vol. 9(4), pp. 329-337
    DOI: 10.1049/iet-ipr.2014.0316
    BibTeX
    @article{Amerini2015a,
     author = {Amerini, I. and Becarelli, R. and Bertini, B. and Caldelli, R.},
     title = {Acquisition Source Identification through a Blind Image Classification},
     journal = {Image Processing, IET},
     year = {2015},
     volume = {9},
     number = {4},
     pages = {329--337}}
    
  15. I. Amerini, R. Caldelli, A.D. Bimbo, A.D. Fuccia, A.P. Rizzo & L. Saravo
    Detection of Manipulations on Printed Images to Address Crime Scene Analysis: A Case Study
    Forensic Science International, 2015
    DOI: 10.1016/j.forsciint.2015.03.020
    BibTeX
    @article{Amerini2015,
     author = {Amerini, Irene and Caldelli, Roberto and Bimbo, Alberto Del and Fuccia, Andrea Di and Rizzo, Anna Paola and Saravo, Luigi},
     title = {Detection of Manipulations on Printed Images to Address Crime Scene Analysis: A Case Study},
     journal = {Forensic Science International},
     year = {2015}}
    
  16. B. Arbab-Zavar, X. Wei, J.D. Bustard, M.S. Nixon & C.-T. Li
    On Forensic Use of Biometrics
    Ho/Handbook of Digital Forensics of Multimedia Data and Devices
    Wiley-Blackwell, 2015, pp. 270-304
    DOI: 10.1002/9781118705773.ch7
    BibTeX
    @incollection{Arbab-Zavar2015,
     author = {Arbab-Zavar, Banafshe and Wei, Xingjie and Bustard, John D. and Nixon, Mark S. and Li, Chang-Tsun},
     title = {On Forensic Use of Biometrics},
     booktitle = {Ho/Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-Blackwell},
     year = {2015},
     pages = {270--304}}
    
  17. E. Ardizzone, A. Bruno & G. Mazzola
    Copy-move Forgery Detection by Matching Triangles of Keypoints
    IEEE Transactions on Information Forensics and Security, 2015, Vol. 10(10), pp. 2084-2094
    DOI: 10.1109/TIFS.2015.2445742
    BibTeX
    @article{Ardizzone2015a,
     author = {Ardizzone, E. and Bruno, A. and Mazzola, G.},
     title = {Copy-move Forgery Detection by Matching Triangles of Keypoints},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2015},
     volume = {10},
     number = {10},
     pages = {2084--2094}}
    
  18. E. Ardizzone & G. Mazzola
    A Tool to Support the Creation of Datasets of Tampered Videos
    Image Analysis and Processing textemdash ICIAP 2015
    Springer, 2015, pp. 665-675
    DOI: 10.1007/978-3-319-23234-8_61
    BibTeX
    @incollection{Ardizzone2015,
     author = {Ardizzone, Edoardo and Mazzola, Giuseppe},
     title = {A Tool to Support the Creation of Datasets of Tampered Videos},
     booktitle = {Image Analysis and Processing textemdash ICIAP 2015},
     publisher = {Springer},
     year = {2015},
     pages = {665--675}}
    
  19. M. Arun Anoop
    Image Forgery and Its Detection: A Survey
    Proc. Int Innovations in Information, Embedded and Communication Systems (ICIIECS) Conf
    2015, pp. 1-9
    DOI: 10.1109/ICIIECS.2015.7193253
    BibTeX
    @inproceedings{ArunAnoop2015,
     author = {Arun Anoop, M.},
     title = {Image Forgery and Its Detection: A Survey},
     booktitle = {Proc. Int Innovations in Information, Embedded and Communication Systems (ICIIECS) Conf},
     year = {2015},
     pages = {1--9}}
    
  20. A. Arun, A. Vimala, Y.C. Joshya & C.A. Murugan
    Adaptive Neuro Fuzzy Classifier Based Digital Image Forgery Detection Using Color Illumination
    International Journal of Advanced Engineering and Global Technology, 2015, Vol. 3(2)
    BibTeX
    @article{Arun2015,
     author = {Arun, Anusree and Vimala, A. and Joshya, Y. Camy and Murugan, C. Arul},
     title = {Adaptive Neuro Fuzzy Classifier Based Digital Image Forgery Detection Using Color Illumination},
     journal = {International Journal of Advanced Engineering and Global Technology},
     year = {2015},
     volume = {3},
     number = {2}}
    
  21. K. Bahrami, A. Kot, L. Li & H. Li
    Blurred Image Splicing Localization by Exposing Blur Type Inconsistency
    Information Forensics and Security, IEEE Transactions on, 2015, Vol. 10(99), pp. 999-1009
    DOI: 10.1109/TIFS.2015.2394231
    BibTeX
    @article{Bahrami2015,
     author = {Bahrami, K. and Kot, A. and Li, L. and Li, H.},
     title = {Blurred Image Splicing Localization by Exposing Blur Type Inconsistency},
     journal = {Information Forensics and Security, IEEE Transactions on},
     year = {2015},
     volume = {10},
     number = {99},
     pages = {999--1009}}
    
  22. K. Bahrami & A.C. Kot
    Image Splicing Localization Based on Blur Type Inconsistency
    Proc. IEEE Int Circuits and Systems (ISCAS) Symp
    Institute of Electrical & Electronics Engineers (IEEE), 2015, pp. 1042-1045
    DOI: 10.1109/ISCAS.2015.7168815
    BibTeX
    @inproceedings{Bahrami2015a,
     author = {Bahrami, K. and Kot, A. C.},
     title = {Image Splicing Localization Based on Blur Type Inconsistency},
     booktitle = {Proc. IEEE Int Circuits and Systems (ISCAS) Symp},
     publisher = {Institute of Electrical & Electronics Engineers (IEEE)},
     year = {2015},
     pages = {1042--1045}}
    
  23. M. Barni, M. Fontani & B. Tondi
    Universal Counterforensics of Multiple Compressed JPEG Images
    Digital-Forensics and Watermarking, Springer, 2015
    DOI: 10.1007/978-3-319-19321-2_3
    BibTeX
    @article{Barni2015,
     author = {Barni, Mauro and Fontani, Marco and Tondi, Benedetta},
     title = {Universal Counterforensics of Multiple Compressed JPEG Images},
     journal = {Digital-Forensics and Watermarking},
     publisher = {Springer},
     year = {2015}}
    
  24. A. Bartle & A. Langley
    Analysis of Photo Response Non-uniformity (PRNU)
    Journal of Homicide and Major Incident, 2015, Vol. 10(2), pp. 45-57
    DOI: 10.1016/j.forsciint.2012.12.018
    BibTeX
    @article{Bartle2015,
     author = {Bartle, Anna and Langley, Andy},
     title = {Analysis of Photo Response Non-uniformity (PRNU)},
     journal = {Journal of Homicide and Major Incident},
     year = {2015},
     volume = {10},
     number = {2},
     pages = {45--57}}
    
  25. S. Bayram, H.T. Sencar & N. Memon
    Sensor Fingerprint Identification through Composite Fingerprints and Group Testing
    Information Forensics and Security, IEEE Transactions on, 2015, Vol. 10(3), pp. 597-612
    DOI: 10.1109/TIFS.2014.2385634
    BibTeX
    @article{Bayram2015,
     author = {Bayram, S. and Sencar, H. T. and Memon, N.},
     title = {Sensor Fingerprint Identification through Composite Fingerprints and Group Testing},
     journal = {Information Forensics and Security, IEEE Transactions on},
     year = {2015},
     volume = {10},
     number = {3},
     pages = {597--612}}
    
  26. M.A. Bennet, R.K. Krishna, G.S. Babu & B.S. Jayavignesh
    Performance analysis of forgery detection of JPEG image compression
    Proc. Online Int. Conf. Green Engineering and Technologies (IC-GET)
    2015, pp. 1-12
    DOI: 10.1109/GET.2015.7453773
    BibTeX
    @inproceedings{Bennet2015,
     author = {Bennet, M. A. and Krishna, R. K. and Babu, G. S. and Jayavignesh, B. S.},
     title = {Performance analysis of forgery detection of JPEG image compression},
     booktitle = {Proc. Online Int. Conf. Green Engineering and Technologies (IC-GET)},
     year = {2015},
     pages = {1--12}}
    
  27. F. Bertini, R. Sharma, A. Iann\i & D. Montesi
    Profile Resolution across Multilayer Networks through Smartphone Camera Fingerprint
    Proceedings of the 19th International Database Engineering &38, Applications Symposium
    ACM, 2015, pp. 23-32
    DOI: 10.1145/2790755.2790765
    BibTeX
    @inproceedings{Bertini2015a,
     author = {Bertini, Flavio and Sharma, Rajesh and Iann\i, Andrea and Montesi, Danilo},
     title = {Profile Resolution across Multilayer Networks through Smartphone Camera Fingerprint},
     booktitle = {Proceedings of the 19th International Database Engineering &38, Applications Symposium},
     publisher = {ACM},
     year = {2015},
     pages = {23--32}}
    
  28. F. Bertini, R. Sharma, A. Iannì & D. Montesi
    Smartphone Verification and User Profiles Linking across Social Networks by Camera Fingerprinting
    Digital Forensics and Cyber Crime, Springer, 2015
    DOI: 10.1007/978-3-319-25512-5_12
    BibTeX
    @article{Bertini2015b,
     author = {Bertini, Flavio and Sharma, Rajesh and Iannì, Andrea and Montesi, Danilo},
     title = {Smartphone Verification and User Profiles Linking across Social Networks by Camera Fingerprinting},
     journal = {Digital Forensics and Cyber Crime},
     publisher = {Springer},
     year = {2015}}
    
  29. F. Bertini, R. Sharma, A. Iannì & D. Montesi
    Smartphone Verification and User Profiles Linking across Social Networks by Camera Fingerprinting
    James, J. & Breitinger, F. (ed.)
    Digital Forensics and Cyber Crime
    Springer International Publishing, 2015, Vol. 157, pp. 176-186
    DOI: 10.1007/978-3-319-25512-5_12
    BibTeX
    @incollection{Bertini2015,
     author = {Bertini, Flavio and Sharma, Rajesh and Iannì, Andrea and Montesi, Danilo},
     title = {Smartphone Verification and User Profiles Linking across Social Networks by Camera Fingerprinting},
     booktitle = {Digital Forensics and Cyber Crime},
     publisher = {Springer International Publishing},
     year = {2015},
     volume = {157},
     pages = {176--186}}
    
  30. X.-L. Bi, C.-M. Pun & X.-C. Yuan
    Over-segmentation Based Image Forgery Detection
    Proc of the International Conference on Electronic Science and Automation Control (ESAC 2015)
    2015
    DOI: 10.2991/esac-15.2015.7
    BibTeX
    @inproceedings{Bi2015,
     author = {Bi, Xiu-Li and Pun, Chi-Man and Yuan, Xiao-Chen},
     title = {Over-segmentation Based Image Forgery Detection},
     booktitle = {Proc of the International Conference on Electronic Science and Automation Control (ESAC 2015)},
     year = {2015}}
    
  31. T. Bianchi & A. Piva
    Image and Video Processing History Recovery
    Ho/Handbook of Digital Forensics of Multimedia Data and Devices
    Wiley-Blackwell, 2015, pp. 572-611
    DOI: 10.1002/9781118705773.ch15
    BibTeX
    @incollection{Bianchi_2015,
     author = {Bianchi, Tiziano and Piva, Alessandro},
     title = {Image and Video Processing History Recovery},
     booktitle = {Ho/Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-Blackwell},
     year = {2015},
     pages = {572--611}}
    
  32. P. Binnar & V. Mane
    Robust Technique of Localizing Blurred Image Splicing Based on Exposing Blur Type Inconsistency
    Proc. Int. Conf. Applied and Theoretical Computing and Communication Technology (iCATccT)
    2015, pp. 398-402
    DOI: 10.1109/ICATCCT.2015.7456916
    BibTeX
    @inproceedings{Binnar2015,
     author = {Binnar, P. and Mane, V.},
     title = {Robust Technique of Localizing Blurred Image Splicing Based on Exposing Blur Type Inconsistency},
     booktitle = {Proc. Int. Conf. Applied and Theoretical Computing and Communication Technology (iCATccT)},
     year = {2015},
     pages = {398--402}}
    
  33. I.N. Blokhin & S.N. Ilchenko
    Fake As a Format of Modern Journalism: The Information Reliability Problem
    Indian Journal of Science and Technology, 2015, Vol. 8(Special Issue 10)
    DOI: 10.17485/ijst/2015/v8is(10)/84840
    BibTeX
    @article{Blokhin2015,
     author = {Blokhin, Igor Nikolaevich and Ilchenko, Sergey Nikolaevich},
     title = {Fake As a Format of Modern Journalism: The Information Reliability Problem},
     journal = {Indian Journal of Science and Technology},
     year = {2015},
     volume = {8},
     number = {Special Issue 10}}
    
  34. T.K. Boaz & C.J. Prabhakar
    Localization Overlaid Text Based on Noise Inconsistencies
    Advanced Computational Intelligence: An International Journal, 2015
    BibTeX
    @article{Boaz2015,
     author = {Boaz, Too Kipyego and Prabhakar, C. J.},
     title = {Localization Overlaid Text Based on Noise Inconsistencies},
     journal = {Advanced Computational Intelligence: An International Journal},
     year = {2015}}
    
  35. W. Burger & M.J. Burge
    Digital Image Processing: An Algorithmic Introduction Using Java
    Springer, 2015
    DOI: 10.1007/978-1-84800-195-4_1
    BibTeX
    @book{Burger2015,
     author = {Burger, Wilhelm and Burge, Mark J.},
     title = {Digital Image Processing: An Algorithmic Introduction Using Java},
     publisher = {Springer},
     year = {2015},
     edition = {3rd}}
    
  36. R. Caldelli, I. Amerini & A. Costanzo
    SIFT Match Removal and Keypoint Preservation through Dominant Orientation Shift
    Proc. of the 23rd European Signal Processing Conference (EUSIPCO) 2015
    Institute of Electrical & Electronics Engineers (IEEE), 2015
    DOI: 10.1109/eusipco.2015.7362747
    BibTeX
    @inproceedings{Caldelli2015,
     author = {Caldelli, R. and Amerini, I. and Costanzo, A.},
     title = {SIFT Match Removal and Keypoint Preservation through Dominant Orientation Shift},
     booktitle = {Proc. of the 23rd European Signal Processing Conference (EUSIPCO) 2015},
     publisher = {Institute of Electrical & Electronics Engineers (IEEE)},
     year = {2015}}
    
  37. G. Cao, Y. Chen, G. Zong & Y. Chen
    Detection of copy-move forgery in digital image using locality preserving projections
    Proc. 8th Int. Congress Image and Signal Processing (CISP)
    2015, pp. 599-603
    DOI: 10.1109/CISP.2015.7407949
    BibTeX
    @inproceedings{Cao2015c,
     author = {Cao, G. and Chen, Y. and Zong, G. and Chen, Y.},
     title = {Detection of copy-move forgery in digital image using locality preserving projections},
     booktitle = {Proc. 8th Int. Congress Image and Signal Processing (CISP)},
     year = {2015},
     pages = {599--603}}
    
  38. G. Cao, Y. Wang, Y. Zhao, R. Ni & C. Lin
    On the Security of Image Manipulation Forensics
    Ho, Y.-S., Sang, J., Ro, Y., Kim, J. & Wu, F. (ed.)
    Advances in Multimedia Information Processing - PCM 2015
    Advances in Multimedia Information Processing -- PCM 2015, Springer Science + Business Media, 2015, Vol. 9314, pp. 97-105
    DOI: 10.1007/978-3-319-24075-6_10
    BibTeX
    @incollection{Cao2015b,
     author = {Cao, Gang and Wang, Yongbin and Zhao, Yao and Ni, Rongrong and Lin, Chunyu},
     title = {On the Security of Image Manipulation Forensics},
     booktitle = {Advances in Multimedia Information Processing - PCM 2015},
     journal = {Advances in Multimedia Information Processing -- PCM 2015},
     publisher = {Springer Science + Business Media},
     year = {2015},
     volume = {9314},
     pages = {97--105}}
    
  39. X. Cao, H. Zhao, C. Wang & W. Zhang
    Image Composite Authentication Using a Single Shadow Observation
    Science China Information Sciences, Science China Press, 2015, pp. 1-13
    DOI: 10.1007/s11432-015-5296-8
    BibTeX
    @article{Cao2015a,
     author = {Cao, XiaoChun and Zhao, HanDong and Wang, Chuan and Zhang, Wei},
     title = {Image Composite Authentication Using a Single Shadow Observation},
     journal = {Science China Information Sciences},
     publisher = {Science China Press},
     year = {2015},
     pages = {1--13}}
    
  40. Y. Cao, T. Gao, G. Sheng, L. Fan & L. Gao
    A New Anti-forensic Scheme--hiding the Single JPEG Compression Trace for Digital Image.
    J Forensic Sci, College of Information Technical Science, Nankai University, No 94, Weijin Road, Tianjin, Nankai District, 300071, China., College of Information Technical Science, Nankai University, No 94, Weijin Road, Tianjin, Nankai District, 300071, China., 2015, Vol. 60(1), pp. 197-205
    DOI: 10.1111/1556-4029.12618
    BibTeX
    @article{Cao2015,
     author = {Cao, Yanjun and Gao, Tiegang and Sheng, Guorui and Fan, Li and Gao, Lin},
     title = {A New Anti-forensic Scheme--hiding the Single JPEG Compression Trace for Digital Image.},
     journal = {J Forensic Sci},
     school = {College of Information Technical Science, Nankai University, No 94, Weijin Road, Tianjin, Nankai District, 300071, China.},
     year = {2015},
     volume = {60},
     number = {1},
     pages = {197--205}}
    
  41. M. Carnein, P. Schöttle & R. Böhme
    Forensics of High-quality JPEG Images with Color Subsampling
    Information Forensics and Security (WIFS), 2015 IEEE International Workshop on
    Institute of Electrical & Electronics Engineers (IEEE), 2015, pp. 1-6
    DOI: 10.1109/WIFS.2015.7368556
    BibTeX
    @inproceedings{Carnein2015,
     author = {Carnein, M. and Schöttle, P. and Böhme, R.},
     title = {Forensics of High-quality JPEG Images with Color Subsampling},
     booktitle = {Information Forensics and Security (WIFS), 2015 IEEE International Workshop on},
     publisher = {Institute of Electrical & Electronics Engineers (IEEE)},
     year = {2015},
     pages = {1--6}}
    
  42. T. Carvalho, F.A. Faria, H. Pedrini, R.S. Torres & A. Rocha
    Illuminant-based Transformed Spaces for Image Forensics
    IEEE Transactions on Information Forensics and Security, 2015, Vol. PP(99), pp. 1
    DOI: 10.1109/TIFS.2015.2506548
    BibTeX
    @article{Carvalho2015a,
     author = {Carvalho, T. and Faria, F. A. and Pedrini, H. and Torres, R. S. and Rocha, A.},
     title = {Illuminant-based Transformed Spaces for Image Forensics},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2015},
     volume = {PP},
     number = {99},
     pages = {1}}
    
  43. T. Carvalho, H. Farid & E. Kee
    Exposing Photo Manipulation from User-guided 3D Lighting Analysis
    IS&T/SPIE Electronic Imaging
    Proc. SPIE, 2015, Vol. 9409, pp. 940902-940902-10
    DOI: 10.1117/12.2075544
    BibTeX
    @inproceedings{Carvalho2015,
     author = {Carvalho, Tiago and Farid, Hany and Kee, Eric},
     title = {Exposing Photo Manipulation from User-guided 3D Lighting Analysis},
     booktitle = {IS&T/SPIE Electronic Imaging},
     journal = {Proc. SPIE},
     year = {2015},
     volume = {9409},
     pages = {940902-940902-10}}
    
  44. G. Cattaneo, U. Ferraro Petrillo, G. Roscigno & C. Fusco
    A PNu-based Technique to Detect Forged Regions in Digital Images
    Battiato, S., Blanc-Talon, J., Gallo, G., Philips, W., Popescu, D. & Scheunders, P. (ed.)
    Advanced Concepts for Intelligent Vision Systems
    Advanced Concepts for Intelligent Vision Systems, Springer, 2015, Vol. 9386, pp. 486-498
    DOI: 10.1007/978-3-319-25903-1_42
    BibTeX
    @article{Cattaneo2015,
     author = {Cattaneo, Giuseppe and Ferraro Petrillo, Umberto and Roscigno, Gianluca and Fusco, Carmine},
     title = {A PNu-based Technique to Detect Forged Regions in Digital Images},
     booktitle = {Advanced Concepts for Intelligent Vision Systems},
     journal = {Advanced Concepts for Intelligent Vision Systems},
     publisher = {Springer},
     year = {2015},
     volume = {9386},
     pages = {486--498}}
    
  45. J. Charpe & A. Bhattacharya
    Revealing Image Forgery through Image Manipulation Detection
    Proc. Global Conf. Communication Technologies (GCCT)
    2015, pp. 723-727
    DOI: 10.1109/GCCT.2015.7342759
    BibTeX
    @inproceedings{Charpe2015,
     author = {Charpe, J. and Bhattacharya, A.},
     title = {Revealing Image Forgery through Image Manipulation Detection},
     booktitle = {Proc. Global Conf. Communication Technologies (GCCT)},
     year = {2015},
     pages = {723--727}}
    
  46. B. Chen, G. Coatrieux, J. Wu, Z. Dong, J. Coatrieux & H. Shu
    Fast Computation of Sliding Discrete Tchebichef Moments and Its Application in Duplicated Regions Detection
    IEEE Transactions on Signal Processing, Institute of Electrical and Electronics Engineers (IEEE), 2015, Vol. 63(20), pp. 5424-5436
    DOI: 10.1109/TSP.2015.2451107
    BibTeX
    @article{Chen2015b,
     author = {Chen, B. and Coatrieux, G. and Wu, J. and Dong, Z. and Coatrieux, J. and Shu, H.},
     title = {Fast Computation of Sliding Discrete Tchebichef Moments and Its Application in Duplicated Regions Detection},
     journal = {IEEE Transactions on Signal Processing},
     publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
     year = {2015},
     volume = {63},
     number = {20},
     pages = {5424--5436}}
    
  47. C. Chen & M.C. Stamm
    Camera Model Identification Framework Using an Ensemble of Demosaicing Features
    Information Forensics and Security (WIFS), 2015 IEEE International Workshop on
    2015, pp. 1-6
    DOI: 10.1109/WIFS.2015.7368573
    BibTeX
    @inproceedings{Chen2015a,
     author = {Chen, Chen and Stamm, M. C.},
     title = {Camera Model Identification Framework Using an Ensemble of Demosaicing Features},
     booktitle = {Information Forensics and Security (WIFS), 2015 IEEE International Workshop on},
     year = {2015},
     pages = {1--6}}
    
  48. J. Chen, X. Kang, Y. Liu & Z.J. Wang
    Median Filtering Forensics Based on Convolutional Neural Networks
    Signal Processing Letters, IEEE, 2015, Vol. 22(11), pp. 1849-1853
    DOI: 10.1109/LSP.2015.2438008
    BibTeX
    @article{Chen2015,
     author = {Chen, J. and Kang, X. and Liu, Y. and Wang, Z. J.},
     title = {Median Filtering Forensics Based on Convolutional Neural Networks},
     journal = {Signal Processing Letters, IEEE},
     year = {2015},
     volume = {22},
     number = {11},
     pages = {1849--1853}}
    
  49. L.M. Chen
    Images, Videos, and Bigdata
    Mathematical Problems in Data Science
    Springer, 2015
    DOI: 10.1007/978-3-319-25127-1_5
    BibTeX
    @incollection{Chen2015c,
     author = {Chen, Li M.},
     title = {Images, Videos, and Bigdata},
     booktitle = {Mathematical Problems in Data Science},
     publisher = {Springer},
     year = {2015}}
    
  50. S. Chen, S. Tan, B. Li & J. Huang
    Automatic Detection of Object-based Forgery in Advanced Video
    IEEE Transactions on Circuits and Systems for Video Technology, Institute of Electrical and Electronics Engineers (IEEE), 2015, Vol. PP(11), pp. 2138-2151
    DOI: 10.1109/TCSVT.2015.2473436
    BibTeX
    @article{Chen2015d,
     author = {Chen, Shengda and Tan, Shunquan and Li, Bin and Huang, Jiwu},
     title = {Automatic Detection of Object-based Forgery in Advanced Video},
     journal = {IEEE Transactions on Circuits and Systems for Video Technology},
     publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
     year = {2015},
     volume = {PP},
     number = {11},
     pages = {2138--2151}}
    
  51. P.K. Chiluka, S.R. Das, M.H. Assaf, S.N. Biswas, S. Morton, E.M. Petriu & V. Groza
    Digital Wavelet Transform Based Image Forgery Detection Using Post -processing
    Proc of SDPS 2015, 2015
    BibTeX
    @article{Chiluka2015,
     author = {Chiluka, Praveen K. and Das, Sunil R. and Assaf, Mansour H. and Biswas, Satyendra N. and Morton, Scott and Petriu, Emil M. and Groza, Voicu},
     title = {Digital Wavelet Transform Based Image Forgery Detection Using Post -processing},
     journal = {Proc of SDPS 2015},
     year = {2015}}
    
  52. Christopher & T.A. Kovashka
    Who’s behind the Camera? Identifying the Authorship of a Photograph
    Arxiv, 2015
    BibTeX
    @article{Christopher2015,
     author = {Christopher and Kovashka, Thomas Adriana},
     title = {Who’s behind the Camera? Identifying the Authorship of a Photograph},
     journal = {Arxiv},
     year = {2015}}
    
  53. X. Chu
    Fundamental Limits in Multimedia Forensics and Anti-forensics
    Faculty of the Graduate School of the University of Maryland, Department of Electrical and Computer Engineering University of Maryland, 2015
    BibTeX
    @phdthesis{Chu2015a,
     author = {Chu, X.},
     title = {Fundamental Limits in Multimedia Forensics and Anti-forensics},
     school = {Faculty of the Graduate School of the University of Maryland},
     year = {2015}}
    
  54. X. Chu, Y. Chen, M. Stamm & K. Liu
    Information Theoretical Limit of Media Forensics: The Forensicability
    IEEE Transactions on Information Forensics and Security, 2015, Vol. PP(99), pp. 1
    DOI: 10.1109/TIFS.2015.2510820
    BibTeX
    @article{Chu2015e,
     author = {Chu, X. and Chen, Y. and Stamm, M. and Liu, K.},
     title = {Information Theoretical Limit of Media Forensics: The Forensicability},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2015},
     volume = {PP},
     number = {99},
     pages = {1}}
    
  55. X. Chu, M.C. Stamm, Y. Chen & K.J.R. Liu
    On Antiforensic Concealability with Rate-distortion Tradeoff
    Image Processing, IEEE Transactions on, 2015, Vol. 24(3), pp. 1087-1100
    DOI: 10.1109/TIP.2015.2390137
    BibTeX
    @article{Chu2015,
     author = {Chu, X. and Stamm, M. C. and Chen, Y. and Liu, K. J. R.},
     title = {On Antiforensic Concealability with Rate-distortion Tradeoff},
     journal = {Image Processing, IEEE Transactions on},
     year = {2015},
     volume = {24},
     number = {3},
     pages = {1087--1100}}
    
  56. D. Codreanu, A. Peninou & F. Sedes
    Video Spatio-Temporal Filtering Based on Cameras and Target Objects Trajectories -- Videosurveillance Forensic Framework
    Proc. 10th Int Availability, Reliability and Security (ARES) Conf
    2015, pp. 611-617
    DOI: 10.1109/ARES.2015.102
    BibTeX
    @inproceedings{Codreanu2015,
     author = {Codreanu, D. and Peninou, A. and Sedes, F.},
     title = {Video Spatio-Temporal Filtering Based on Cameras and Target Objects Trajectories -- Videosurveillance Forensic Framework},
     booktitle = {Proc. 10th Int Availability, Reliability and Security (ARES) Conf},
     year = {2015},
     pages = {611--617}}
    
  57. V. Conotter, P. Comesana & F. Perez-Gonzalez
    Forensic Detection of Processing Operator Chains: Recovering the History of Filtered JPEG Images
    Information Forensics and Security, IEEE Transactions on, 2015(99)
    DOI: 10.1109/TIFS.2015.2424195
    BibTeX
    @article{Conotter2015,
     author = {Conotter, V. and Comesana, P. and Perez-Gonzalez, F.},
     title = {Forensic Detection of Processing Operator Chains: Recovering the History of Filtered JPEG Images},
     journal = {Information Forensics and Security, IEEE Transactions on},
     year = {2015},
     number = {99}}
    
  58. V. Conotter, P. Comesaña & F. Pérez-González
    Forensic Detection of Processing Operator Chains: Recovering the History of Filtered JPEG Images
    #IEEE_J_IFS#, 2015, Vol. 10(11), pp. 2257-2269
    DOI: 10.1109/TIFS.2015.2424195
    BibTeX
    @article{Conotter2015a,
     author = {Conotter, V. and Comesaña, P. and Pérez-González, F.},
     title = {Forensic Detection of Processing Operator Chains: Recovering the History of Filtered JPEG Images},
     journal = {#IEEE_J_IFS#},
     year = {2015},
     volume = {10},
     number = {11},
     pages = {2257--2269}}
    
  59. suisse de la presse Consiglio svizzero della stampa & S.P. Conseil
    Richtlinien Zur «erklärung Der Pflichten Und Rechte Der Journalistinnen Und Journalisten»
    2015
    BibTeX
    @electronic{SchweizerPresserat2015,
     author = {suisse de la presse Consiglio svizzero della stampa and Conseil, Schweizer Presserat},
     title = {Richtlinien Zur «erklärung Der Pflichten Und Rechte Der Journalistinnen Und Journalisten»},
     year = {2015}}
    
  60. J.R. Corripio, A.L.S. Orozco & L.J.G. Villalba
    Unsupervised Classification of Mobile Device Images
    ICIT 2015 The 7th International Conference on Information Technology
    2015
    DOI: 10.15849/icit.2015.0014
    BibTeX
    @inproceedings{Corripio2015,
     author = {Corripio, Jocelin Rosales and Orozco, Ana Lucila Sandoval and Villalba, Luis Javier García},
     title = {Unsupervised Classification of Mobile Device Images},
     booktitle = {ICIT 2015 The 7th International Conference on Information Technology},
     year = {2015}}
    
  61. J.R. Corripio, A.L.S. Orozco & L.J.G. Villalba
    New Technique of Forensic Analysis for Digital Cameras in Mobile Devices
    Proc of the 7th International Conference on Information Technology ICIT
    2015
    DOI: 10.15849/icit.2015.0105
    BibTeX
    @inproceedings{Corripio2015a,
     author = {Corripio, Jocelin Rosales and Orozco, Ana Lucila Sandoval and Villalba, Luis Javier García},
     title = {New Technique of Forensic Analysis for Digital Cameras in Mobile Devices},
     booktitle = {Proc of the 7th International Conference on Information Technology ICIT},
     year = {2015}}
    
  62. D. Cozzolino, G. Poggi & L. Verdoliva
    Splicebuster: A New Blind Image Splicing Detector
    Information Forensics and Security (WIFS), 2015 IEEE International Workshop on
    2015, pp. 1-6
    DOI: 10.1109/WIFS.2015.7368565
    BibTeX
    @inproceedings{Cozzolino2015,
     author = {Cozzolino, D. and Poggi, G. and Verdoliva, L.},
     title = {Splicebuster: A New Blind Image Splicing Detector},
     booktitle = {Information Forensics and Security (WIFS), 2015 IEEE International Workshop on},
     year = {2015},
     pages = {1--6}}
    
  63. D. Cozzolino, G. Poggi & L. Verdoliva
    Efficient Dense-field Copy-move Forgery Detection
    IEEE Transactions on Information Forensics and Security, 2015
    DOI: 10.1109/TIFS.2015.2455334
    BibTeX
    @article{Cozzolino2015a,
     author = {Cozzolino, D. and Poggi, G. and Verdoliva, L.},
     title = {Efficient Dense-field Copy-move Forgery Detection},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2015}}
    
  64. L. D'Amiano, D. Cozzolino, G. Poggi & L. Verdoliva
    Video Forgery Detection and Localization Based on 3D Patchmatch
    Proc. IEEE Int Multimedia & Expo Workshops (ICMEW) Conf
    2015, pp. 1-6
    DOI: 10.1109/ICMEW.2015.7169805
    BibTeX
    @inproceedings{DAmiano2015,
     author = {D'Amiano, L. and Cozzolino, D. and Poggi, G. and Verdoliva, L.},
     title = {Video Forgery Detection and Localization Based on 3D Patchmatch},
     booktitle = {Proc. IEEE Int Multimedia & Expo Workshops (ICMEW) Conf},
     year = {2015},
     pages = {1--6}}
    
  65. P. Dangale, P. Amage, S. Ubale, D. Jadhav & G.M. Gaikwad
    Image Validation by Demosaicing
    International Journal of Advanced Research in Computer and Communication Engineering, 2015, Vol. 4(4), pp. 118-121
    DOI: 10.17148/ijarcce.2015.4329
    BibTeX
    @article{Dangale2015,
     author = {Dangale, P. and Amage, P. and Ubale, S. and Jadhav, D. and Gaikwad, G. M.},
     title = {Image Validation by Demosaicing},
     journal = {International Journal of Advanced Research in Computer and Communication Engineering},
     year = {2015},
     volume = {4},
     number = {4},
     pages = {118--121}}
    
  66. D.-T. Dang-Nguyen, C. Pasquini, V. Conotter & G. Boato
    Raise: A Raw Images Dataset for Digital Image Forensics
    Proceedings of the 6th ACM Multimedia Systems Conference
    ACM, 2015, pp. 219-224
    DOI: 10.1145/2713168.2713194
    BibTeX
    @inproceedings{Dang-Nguyen2015,
     author = {Dang-Nguyen, Duc-Tien and Pasquini, Cecilia and Conotter, Valentina and Boato, Giulia},
     title = {Raise: A Raw Images Dataset for Digital Image Forensics},
     booktitle = {Proceedings of the 6th ACM Multimedia Systems Conference},
     publisher = {ACM},
     year = {2015},
     pages = {219--224}}
    
  67. R. Davarzani, S. Mozaffari & Kh.Yaghmaie
    Image Authentication Using LBP-based Perceptual Image Hashing
    Journal of AI and Data Mining, 2015
    BibTeX
    @article{Davarzani2015,
     author = {Davarzani, R. and Mozaffari, S. and Kh.Yaghmaie},
     title = {Image Authentication Using LBP-based Perceptual Image Hashing},
     journal = {Journal of AI and Data Mining},
     year = {2015}}
    
  68. A. De Rosa, M. Fontani, M. Massai, A. Piva & M. Barni
    Second-order Statistics Analysis to Cope with Contrast Enhancement Counter-forensics
    Signal Processing Letters, IEEE, 2015, Vol. 22(8), pp. 1132-1136
    DOI: 10.1109/LSP.2015.2389241
    BibTeX
    @article{DeRosa2015,
     author = {De Rosa, A. and Fontani, M. and Massai, M. and Piva, A. and Barni, M.},
     title = {Second-order Statistics Analysis to Cope with Contrast Enhancement Counter-forensics},
     journal = {Signal Processing Letters, IEEE},
     year = {2015},
     volume = {22},
     number = {8},
     pages = {1132--1136}}
    
  69. L. Debiasi
    A Forensic Analysis of the CASIA-iris V4 Database
    Inst f. Angewandte Informatik an der Paris-Lodron-Universität Salzburg, Inst f. Angewandte Informatik an der Paris-Lodron-Universität Salzburg, 2015
    BibTeX
    @mastersthesis{Debiasi2015b,
     author = {Debiasi, Luca},
     title = {A Forensic Analysis of the CASIA-iris V4 Database},
     school = {Inst f. Angewandte Informatik an der Paris-Lodron-Universität Salzburg},
     year = {2015}}
    
  70. L. Debiasi & A. Uhl
    Blind Biometric Source Sensor Recognition Using Advanced PRNU Fingerprints
    Proc. of the 23rd European Signal Processing Conference (EUSIPCO) 2015
    2015
    DOI: 10.1109/eusipco.2015.7362489
    BibTeX
    @inproceedings{Debiasi2015,
     author = {Debiasi, Luca and Uhl, Andreas},
     title = {Blind Biometric Source Sensor Recognition Using Advanced PRNU Fingerprints},
     booktitle = {Proc. of the 23rd European Signal Processing Conference (EUSIPCO) 2015},
     year = {2015}}
    
  71. L. Debiasi & A. Uhl
    Techniques for a Forensic Analysis of the CASia-IRis V4 Database
    Proc. Int Biometrics and Forensics (IWBF) Workshop
    2015, pp. 1-6
    DOI: 10.1109/IWBF.2015.7110236
    BibTeX
    @inproceedings{Debiasi2015a,
     author = {Debiasi, L. and Uhl, A.},
     title = {Techniques for a Forensic Analysis of the CASia-IRis V4 Database},
     booktitle = {Proc. Int Biometrics and Forensics (IWBF) Workshop},
     year = {2015},
     pages = {1--6}}
    
  72. S. Dhevana & C. Jayasri
    A Bayesian Classifier Approach for Glcm Based Image Forgery Detection
    International Journal of Engineering Research & Technology, 2015, Vol. 4(2)
    BibTeX
    @article{Dhevana2015,
     author = {Dhevana, S. and Jayasri, C.},
     title = {A Bayesian Classifier Approach for Glcm Based Image Forgery Detection},
     journal = {International Journal of Engineering Research & Technology},
     year = {2015},
     volume = {4},
     number = {2}}
    
  73. F. Ding, G. Zhu, J. Yang, J. Xie & Y.Q. Shi
    Edge Perpendicular Binary Coding for USM Sharpening Detection
    #IEEE_J_SPL#, 2015, Vol. 22(3), pp. 327-331
    DOI: 10.1109/LSP.2014.2359033
    BibTeX
    @article{Ding2015,
     author = {Ding, F. and Zhu, G. and Yang, J. and Xie, J. and Shi, Y. Q.},
     title = {Edge Perpendicular Binary Coding for USM Sharpening Detection},
     journal = {#IEEE_J_SPL#},
     year = {2015},
     volume = {22},
     number = {3},
     pages = {327--331}}
    
  74. L. D’Amiano, D. Cozzolino, G. Poggi & L. Verdoliva
    Video Forgery Detection and Localization Based on 3D Patchmatch
    Proc. IEEE Int Multimedia & Expo Workshops (ICMEW) Conf, 2015
    DOI: 10.1109/icmew.2015.7169805
    BibTeX
    @article{D’Amiano2015,
     author = {D’Amiano, L. and Cozzolino, D. and Poggi, G. and Verdoliva, L.},
     title = {Video Forgery Detection and Localization Based on 3D Patchmatch},
     journal = {Proc. IEEE Int Multimedia & Expo Workshops (ICMEW) Conf},
     year = {2015}}
    
  75. A. Ebrahimi, S. Ibrahim, E. Ghazizadeh & M. Alizadeh
    Paint-doctored JPEG Image Forensics Based on Blocking Artifacts
    Proc. Int Computing and Communication (IEMCON) Conf. and Workshop
    2015, pp. 1-5
    DOI: 10.1109/IEMCON.2015.7344427
    BibTeX
    @inproceedings{Ebrahimi2015,
     author = {Ebrahimi, Ali and Ibrahim, Subariah and Ghazizadeh, Eghbal and Alizadeh, Mojtaba},
     title = {Paint-doctored JPEG Image Forensics Based on Blocking Artifacts},
     booktitle = {Proc. Int Computing and Communication (IEMCON) Conf. and Workshop},
     year = {2015},
     pages = {1--5}}
    
  76. J.G.R. Elwin & G. Kousalya
    Image Forgery Detection Using Multidimensional Spectral Hashing Based Polar Cosine Transform
    Indian Journal of Science and Technology, 2015, Vol. 8(S9), pp. 128-139
    DOI: 10.17485/ijst/2015/v8is9/54344
    BibTeX
    @article{Elwin2015,
     author = {Elwin, J. Granty Regina and Kousalya, G.},
     title = {Image Forgery Detection Using Multidimensional Spectral Hashing Based Polar Cosine Transform},
     journal = {Indian Journal of Science and Technology},
     year = {2015},
     volume = {8},
     number = {S9},
     pages = {128--139}}
    
  77. M. Emam, Q. Han & X. Niu
    PCET Based Copy-move Forgery Detection in Images under Geometric Transforms
    Multimedia Tools and Applications, Springer US, 2015, pp. 1-15
    DOI: 10.1007/s11042-015-2872-2
    BibTeX
    @article{Emam2015a,
     author = {Emam, Mahmoud and Han, Qi and Niu, Xiamu},
     title = {PCET Based Copy-move Forgery Detection in Images under Geometric Transforms},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer US},
     year = {2015},
     pages = {1--15}}
    
  78. M. Emam, Q. Han, L. Yu, Y. Zhang & X. Niu
    A Passive Technique for Detecting Copy-move Forgery with Rotation Based on Polar Complex Exponential Transform
    Proc. SPIE 9631, Seventh International Conference on Digital Image Processing (ICDIP 2015)
    Proc. SPIE, 2015, Vol. 9631, pp. 963104-963104-6
    DOI: 10.1117/12.2196997
    BibTeX
    @inproceedings{Emam2015,
     author = {Emam, Mahmoud and Han, Qi and Yu, Liyang and Zhang, Ye and Niu, Xiamu},
     title = {A Passive Technique for Detecting Copy-move Forgery with Rotation Based on Polar Complex Exponential Transform},
     booktitle = {Proc. SPIE 9631, Seventh International Conference on Digital Image Processing (ICDIP 2015)},
     journal = {Proc. SPIE},
     year = {2015},
     volume = {9631},
     pages = {963104-963104-6}}
    
  79. G. Fahmy
    Integer DCT Convergence for JPEG-75 Forensics for Images
    Journal of Information Assurance and Security, 2015, Vol. 10, pp. 80-88
    BibTeX
    @article{Fahmy2015a,
     author = {Fahmy, Gamal},
     title = {Integer DCT Convergence for JPEG-75 Forensics for Images},
     journal = {Journal of Information Assurance and Security},
     year = {2015},
     volume = {10},
     pages = {80--88}}
    
  80. G. Fahmy, A. Alqallaf & R. Wurtz
    Phase based detection of JPEG counter forensics
    Proc. and Systems (ICECS) 2015 IEEE Int. Conf. Electronics, Circuits
    2015, pp. 37-40
    DOI: 10.1109/ICECS.2015.7440243
    BibTeX
    @inproceedings{Fahmy2015b,
     author = {Fahmy, G. and Alqallaf, A. and Wurtz, R.},
     title = {Phase based detection of JPEG counter forensics},
     booktitle = {Proc. and Systems (ICECS) 2015 IEEE Int. Conf. Electronics, Circuits},
     year = {2015},
     pages = {37--40}}
    
  81. O.M. Fahmy
    An Efficient Clustering Technique for Cameras Identification Using Sensor Pattern Noise
    Proc. Int Systems, Signals and Image Processing (IWSSIP) Conf
    2015, pp. 249-252
    DOI: 10.1109/IWSSIP.2015.7314223
    BibTeX
    @inproceedings{Fahmy2015,
     author = {Fahmy, O. M.},
     title = {An Efficient Clustering Technique for Cameras Identification Using Sensor Pattern Noise},
     booktitle = {Proc. Int Systems, Signals and Image Processing (IWSSIP) Conf},
     year = {2015},
     pages = {249--252}}
    
  82. J. Fan, T. Chen & J. Cao
    Image Tampering Detection Using Noise Histogram Features
    Proc. IEEE Int Digital Signal Processing (DSP) Conf
    2015, pp. 1044-1048
    DOI: 10.1109/ICDSP.2015.7252037
    BibTeX
    @inproceedings{Fan2015b,
     author = {Fan, Jiayuan and Chen, Tao and Cao, Jiuwen},
     title = {Image Tampering Detection Using Noise Histogram Features},
     booktitle = {Proc. IEEE Int Digital Signal Processing (DSP) Conf},
     year = {2015},
     pages = {1044--1048}}
    
  83. W. Fan
    Towards Digital Image Anti-Forensics via Image RestorationVers l’anti-criminalistique en images numériques via la restauration d’images
    Université Grenoble Alpes, Université Grenoble Alpes, 2015
    BibTeX
    @phdthesis{Fan2015a,
     author = {Fan, Wei},
     title = {Towards Digital Image Anti-Forensics via Image RestorationVers l’anti-criminalistique en images numériques via la restauration d’images},
     school = {Université Grenoble Alpes},
     year = {2015}}
    
  84. W. Fan, K. Wang & F. Cayre
    General-purpose Image Forensics Using Patch Likelihood under Image Statistical Models
    Proc. IEEE Int Information Forensics and Security (WIFS) Workshop
    Institute of Electrical & Electronics Engineers (IEEE), 2015, pp. 1-6
    DOI: 10.1109/WIFS.2015.7368606
    BibTeX
    @inproceedings{Fan2015e,
     author = {Fan, W. and Wang, K. and Cayre, F.},
     title = {General-purpose Image Forensics Using Patch Likelihood under Image Statistical Models},
     booktitle = {Proc. IEEE Int Information Forensics and Security (WIFS) Workshop},
     publisher = {Institute of Electrical & Electronics Engineers (IEEE)},
     year = {2015},
     pages = {1--6}}
    
  85. W. Fan, K. Wang, F. Cayre & Z. Xiong
    Median Filtered Image Quality Enhancement and Anti-forensics Via Variational Deconvolution
    Information Forensics and Security, IEEE Transactions on, 2015, Vol. 10(99), pp. 1076-1091
    DOI: 10.1109/TIFS.2015.2398362
    BibTeX
    @article{Fan2015,
     author = {Fan, W. and Wang, K. and Cayre, F. and Xiong, Z.},
     title = {Median Filtered Image Quality Enhancement and Anti-forensics Via Variational Deconvolution},
     journal = {Information Forensics and Security, IEEE Transactions on},
     year = {2015},
     volume = {10},
     number = {99},
     pages = {1076--1091}}
    
  86. Y. Fan, P. Carre & C. Fernandez-Maloigne
    Image Splicing Detection with Local Illumination Estimation
    Proc. IEEE Int Image Processing (ICIP) Conf
    2015, pp. 2940-2944
    DOI: 10.1109/ICIP.2015.7351341
    BibTeX
    @inproceedings{Fan2015d,
     author = {Fan, Yu and Carre, Philippe and Fernandez-Maloigne, Christine},
     title = {Image Splicing Detection with Local Illumination Estimation},
     booktitle = {Proc. IEEE Int Image Processing (ICIP) Conf},
     year = {2015},
     pages = {2940--2944}}
    
  87. S. ..J. .. Fang & H. ..Y. .. Ge
    Chapter 65. Detecting Image Authenticity Based on Lambert Illumination Model and Shadows
    Network Security and Communication Engineering
    Network Security and Communication Engineering, Informa UK Limited, 2015, pp. 313-316
    DOI: 10.1201/b18660-70
    BibTeX
    @incollection{Fang2015,
     author = {Fang, S. . J. . and Ge, H. . Y. .},
     title = {Chapter 65. Detecting Image Authenticity Based on Lambert Illumination Model and Shadows},
     booktitle = {Network Security and Communication Engineering},
     journal = {Network Security and Communication Engineering},
     publisher = {Informa UK Limited},
     year = {2015},
     pages = {313--316}}
    
  88. G.M. Farinella, M.V. Giuffrida, V. Digiacomo & S. Battiato
    On Blind Source Camera Identification
    Battiato, S., Blanc-Talon, J., Gallo, G., Philips, W., Popescu, D. & Scheunders, P. (ed.)
    Advanced Concepts for Intelligent Vision Systems
    Advanced Concepts for Intelligent Vision Systems, Springer International Publishing, 2015, Vol. 9386, pp. 464-473
    DOI: 10.1007/978-3-319-25903-1_40
    BibTeX
    @incollection{Farinella2015,
     author = {Farinella, G. M. and Giuffrida, M. V. and Digiacomo, V. and Battiato, S.},
     title = {On Blind Source Camera Identification},
     booktitle = {Advanced Concepts for Intelligent Vision Systems},
     journal = {Advanced Concepts for Intelligent Vision Systems},
     publisher = {Springer International Publishing},
     year = {2015},
     volume = {9386},
     pages = {464--473}}
    
  89. P. Ferrara, M. Fontani, T. Bianchi, A. De Rosa, A. Piva & M. Barni
    Unsupervised Fusion for Forgery Localization Exploiting Background Information
    Proc. IEEE Int Multimedia & Expo Workshops (ICMEW) Conf
    2015, pp. 1-6
    DOI: 10.1109/ICMEW.2015.7169770
    BibTeX
    @inproceedings{Ferrara2015,
     author = {Ferrara, P. and Fontani, M. and Bianchi, T. and De Rosa, A. and Piva, A. and Barni, M.},
     title = {Unsupervised Fusion for Forgery Localization Exploiting Background Information},
     booktitle = {Proc. IEEE Int Multimedia & Expo Workshops (ICMEW) Conf},
     year = {2015},
     pages = {1--6}}
    
  90. A. Ferreira, L.C. Navarro, G. Pinheiro, J.A. dos Santos & A. Rocha
    Laser Printer Attribution: Exploring New Features and Beyond
    Forensic Science International, Elsevier BV, 2015, Vol. 247(0), pp. 105-125
    DOI: 10.1016/j.forsciint.2014.11.030
    BibTeX
    @article{Ferreira2015,
     author = {Ferreira, Anselmo and Navarro, Luiz C. and Pinheiro, Giuliano and dos Santos, Jefersson A. and Rocha, Anderson},
     title = {Laser Printer Attribution: Exploring New Features and Beyond},
     journal = {Forensic Science International},
     publisher = {Elsevier BV},
     year = {2015},
     volume = {247},
     number = {0},
     pages = {105--125}}
    
  91. Y. Fusheng & T. Gao
    A Novel Image Splicing Forensic Algorithm Based on Generalized DCT Coefficient-pair Histogram
    Tan, T., Ruan, Q., Wang, S., Ma, H. & Di, K. (ed.)
    Advances in Image and Graphics Technologies
    Springer Berlin Heidelberg, 2015, Vol. 525, pp. 63-71
    DOI: 10.1007/978-3-662-47791-5_8
    BibTeX
    @incollection{Fusheng2015,
     author = {Fusheng, Yang and Gao, Tiegang},
     title = {A Novel Image Splicing Forensic Algorithm Based on Generalized DCT Coefficient-pair Histogram},
     booktitle = {Advances in Image and Graphics Technologies},
     publisher = {Springer Berlin Heidelberg},
     year = {2015},
     volume = {525},
     pages = {63--71}}
    
  92. S. Gao
    A Hybrid Approach for Camera-model Detection
    International Journal of Security and Its Applications, 2015, Vol. 9(8)
    DOI: 10.14257/ijsia.2015.9.8.24
    BibTeX
    @article{Gao2015,
     author = {Gao, Shang},
     title = {A Hybrid Approach for Camera-model Detection},
     journal = {International Journal of Security and Its Applications},
     year = {2015},
     volume = {9},
     number = {8}}
    
  93. H. Ge & S. Fang
    Detecting Image Forgery Using Linear Constraints Based on Shading and Shadows
    Proceedings of the International Conference on Informative and Cybernetics for Computational Social Systems (ICCSS) 2015
    2015, pp. 116-121
    DOI: 10.1109/iccss.2015.7281160
    BibTeX
    @inproceedings{Ge2015,
     author = {Ge, Huayong and Fang, Shujuan},
     title = {Detecting Image Forgery Using Linear Constraints Based on Shading and Shadows},
     booktitle = {Proceedings of the International Conference on Informative and Cybernetics for Computational Social Systems (ICCSS) 2015},
     year = {2015},
     pages = {116--121}}
    
  94. N.I. Glumov, A.V. Kuznetsov & V.V. Myasnikov
    Algorithms for Detection of Plain Copy-move Regions in Digital Images
    Pattern Recognition and Image Analysis, Pleiades Publishing, 2015, Vol. 25(3), pp. 423-429
    DOI: 10.1134/S1054661815030074
    BibTeX
    @article{Glumov2015,
     author = {Glumov, N. I. and Kuznetsov, A. V. and Myasnikov, V. V.},
     title = {Algorithms for Detection of Plain Copy-move Regions in Digital Images},
     journal = {Pattern Recognition and Image Analysis},
     publisher = {Pleiades Publishing},
     year = {2015},
     volume = {25},
     number = {3},
     pages = {423--429}}
    
  95. A. Gubrud
    The Effect of Image Preprocessing Techniques and Varying JPEG Quality on the Identifiability of Digital Image Splicing Forgery
    Arizona State University, Arizona State University, 2015
    BibTeX
    @mastersthesis{Gubrud2015,
     author = {Gubrud, Aaron},
     title = {The Effect of Image Preprocessing Techniques and Varying JPEG Quality on the Identifiability of Digital Image Splicing Forgery},
     school = {Arizona State University},
     year = {2015}}
    
  96. A. Gupta, S. Gupta & A. Mehra
    Video Authentication in Digital Forensic
    Proc. Int Futuristic Trends Computational Analysis and Knowledge Management (ABLAZE) Conf
    2015, pp. 659-663
    DOI: 10.1109/ABLAZE.2015.7154945
    BibTeX
    @inproceedings{Gupta2015,
     author = {Gupta, A. and Gupta, S. and Mehra, A.},
     title = {Video Authentication in Digital Forensic},
     booktitle = {Proc. Int Futuristic Trends Computational Analysis and Knowledge Management (ABLAZE) Conf},
     year = {2015},
     pages = {659--663}}
    
  97. F. Hakimi & M. Hariri
    Image - Splicing Forgery Detection Based on Improved LBP and K-nearest Neighbors Algorithm
    Electronics Information & Planning, 2015
    BibTeX
    @article{Hakimi2015,
     author = {Hakimi, Fahime and Hariri, Mahdi},
     title = {Image - Splicing Forgery Detection Based on Improved LBP and K-nearest Neighbors Algorithm},
     journal = {Electronics Information & Planning},
     year = {2015}}
    
  98. F. Hakimi, M. Hariri & F. GharehBaghi
    Image Splicing Forgery Detection Using Local Binary Pattern and Discrete Wavelet Transform
    Proc. 2nd Int. Conf. Knowledge-Based Engineering and Innovation (KBEI)
    2015, pp. 1074-1077
    DOI: 10.1109/KBEI.2015.7436195
    BibTeX
    @inproceedings{Hakimi2015a,
     author = {Hakimi, F. and Hariri, M. and GharehBaghi, F.},
     title = {Image Splicing Forgery Detection Using Local Binary Pattern and Discrete Wavelet Transform},
     booktitle = {Proc. 2nd Int. Conf. Knowledge-Based Engineering and Innovation (KBEI)},
     year = {2015},
     pages = {1074--1077}}
    
  99. H. Han, Y. Li, S. Niu & Z. Gong
    Tamper detection based on the consistency of quantization error caused by multiple JPEG compression
    Proc. IEEE 16th Int. Conf. Communication Technology (ICCT)
    2015, pp. 314-319
    DOI: 10.1109/ICCT.2015.7399850
    BibTeX
    @inproceedings{Han2015,
     author = {Han, Hongli and Li, Yezhou and Niu, Shaozhang and Gong, Zhenzhen},
     title = {Tamper detection based on the consistency of quantization error caused by multiple JPEG compression},
     booktitle = {Proc. IEEE 16th Int. Conf. Communication Technology (ICCT)},
     year = {2015},
     pages = {314--319}}
    
  100. F.S. Hashem & G. Sulong
    Passive Aproaches for Detecting Image Tampering: A Review
    Jurnal Teknologi, 2015, Vol. 73(2), pp. 31-36
    DOI: 10.11113/jt.v73.4189
    BibTeX
    @article{Hashem2015,
     author = {Hashem, Fatma Salman and Sulong, Ghazali},
     title = {Passive Aproaches for Detecting Image Tampering: A Review},
     journal = {Jurnal Teknologi},
     year = {2015},
     volume = {73},
     number = {2},
     pages = {31--36}}
    
  101. M.F. Hashmi, A. Hambarde & A. Keskar
    Fast and Robust Copy-move Forgery Detection Using SURF and Wavelets
    2015
    BibTeX
    @electronic{Hashmi2015a,
     author = {Hashmi, M. F. and Hambarde, A. and Keskar, A.},
     title = {Fast and Robust Copy-move Forgery Detection Using SURF and Wavelets},
     year = {2015}}
    
  102. M.F. Hashmi & A.G. Keskar
    Block and Fuzzy Techniques Based Forensic Tool for Detection Classification of Image Forgery
    J Electr Eng Technol., 2015, pp. 709-718
    DOI: 10.5370/jeet.2015.10.4.1886
    BibTeX
    @article{Hashmi2015,
     author = {Hashmi, Mohammad Farukh and Keskar, Avinash G.},
     title = {Block and Fuzzy Techniques Based Forensic Tool for Detection Classification of Image Forgery},
     journal = {J Electr Eng Technol.},
     year = {2015},
     pages = {709--718}}
    
  103. H. Hel-Or & I. Yerushalmy
    Camera-based Image Forgery Detection
    Ho, A. T. S. & Li, S. (ed.)
    Handbook of Digital Forensics of Multimedia Data and Devices
    Wiley-IEEE Press, 2015, pp. 704-
    DOI: 10.1002/9781118705773.ch14
    BibTeX
    @inbook{Hel-Or2015,
     author = {Hel-Or, Hagit and Yerushalmy, Ido},
     title = {Camera-based Image Forgery Detection},
     booktitle = {Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-IEEE Press},
     year = {2015},
     pages = {704-}}
    
  104. A.T.S. Ho & S. Li
    Digital Image Forensics with Statistical Analysis
    Handbook of Digital Forensics of Multimedia Data and Devices
    Wiley-IEEE Press, 2015, pp. 704-
    DOI: 10.1002/9781118705773.ch13
    BibTeX
    @inbook{Ho2015,
     author = {Ho, Anthony T. S. and Li, Shujun},
     title = {Digital Image Forensics with Statistical Analysis},
     booktitle = {Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-IEEE Press},
     year = {2015},
     pages = {704-}}
    
  105. A.T.S. Ho & S. Li
    Printer and Scanner Forensics
    Handbook of Digital Forensics of Multimedia Data and Devices
    Wiley-IEEE Press, 2015, pp. 704-
    DOI: 10.1002/9781118705773.ch10
    BibTeX
    @inbook{Ho2015a,
     author = {Ho, Anthony T. S. and Li, Shujun},
     title = {Printer and Scanner Forensics},
     booktitle = {Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-IEEE Press},
     year = {2015},
     pages = {704-}}
    
  106. B. Hoogeboom, I. Alberink & D. Vrijdag
    Photogrammetry in Digital Forensics
    Ho, A. T. S. & Li, S. (ed.)
    Handbook of Digital Forensics of Multimedia Data and Devices
    Wiley-IEEE Press, 2015, pp. 704-
    DOI: 10.1002/9781118705773.ch5
    BibTeX
    @inbook{Hoogeboom2015,
     author = {Hoogeboom, Bart and Alberink, Ivo and Vrijdag, Derk},
     title = {Photogrammetry in Digital Forensics},
     booktitle = {Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-IEEE Press},
     year = {2015},
     pages = {704-}}
    
  107. J. Hou & Y. Cheng
    Expose Spliced Photographic Basing on Boundary and Noise Features
    IEICE TRANSACTIONS on Information and Systems, 2015, Vol. E98-D(7)
    DOI: 10.1587/transinf.2014edl8232
    BibTeX
    @article{Hou2015,
     author = {Hou, Jun and Cheng, Yan},
     title = {Expose Spliced Photographic Basing on Boundary and Noise Features},
     journal = {IEICE TRANSACTIONS on Information and Systems},
     year = {2015},
     volume = {E98-D},
     number = {7}}
    
  108. C.-M. Hsu, J.-C. Lee & W.-K. Chen
    An Efficient Detection Algorithm for Copy-move Forgery
    Proc. 10th Asia Joint Conf. Information Security (AsiaJCIS)
    2015, pp. 33-36
    DOI: 10.1109/AsiaJCIS.2015.16
    BibTeX
    @inproceedings{Hsu2015,
     author = {Hsu, Chen-Ming and Lee, Jen-Chun and Chen, Wei-Kuei},
     title = {An Efficient Detection Algorithm for Copy-move Forgery},
     booktitle = {Proc. 10th Asia Joint Conf. Information Security (AsiaJCIS)},
     year = {2015},
     pages = {33--36}}
    
  109. W.-C. Hu, J.-S. Dai & J.-S. Jian
    Effective Composite Image Detection Method Based on Feature Inconsistency of Image Components
    Digital Signal Processing, 2015, Vol. 39(0), pp. 50-62
    DOI: 10.1016/j.dsp.2015.01.006
    BibTeX
    @article{Hu2015,
     author = {Hu, Wu-Chih and Dai, Jing-Siou and Jian, Jhih-Syuan},
     title = {Effective Composite Image Detection Method Based on Feature Inconsistency of Image Components},
     journal = {Digital Signal Processing},
     year = {2015},
     volume = {39},
     number = {0},
     pages = {50--62}}
    
  110. D.-Y. Huang, C.-N. Huang, W.-C. Hu & C.-H. Chou
    Robustness of Copy-move Forgery Detection under High JPEG Compression Artifacts
    Multimedia Tools and Applications, Springer, 2015, pp. 1
    DOI: 10.1007/s11042-015-3152-x
    BibTeX
    @article{Huang2015a,
     author = {Huang, Deng-Yuan and Huang, Ching-Ning and Hu, Wu-Chih and Chou, Chih-Hung},
     title = {Robustness of Copy-move Forgery Detection under High JPEG Compression Artifacts},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2015},
     pages = {1}}
    
  111. Y. Huang, J. Zhang & H. Huang
    Camera Model Identification with Unknown Models
    IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers (IEEE), 2015, Vol. 10(12), pp. 2692-2704
    DOI: 10.1109/TIFS.2015.2474836
    BibTeX
    @article{Huang2015,
     author = {Huang, Y. and Zhang, J. and Huang, H.},
     title = {Camera Model Identification with Unknown Models},
     journal = {IEEE Transactions on Information Forensics and Security},
     publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
     year = {2015},
     volume = {10},
     number = {12},
     pages = {2692--2704}}
    
  112. T.K. Huynh, K.V. Huynh, T. Le-Tien & S.C. Nguyen
    A Survey on Image Forgery Detection Techniques
    Computing & Communication Technologies - Research, Innovation, and Vision for the Future (RIVF), 2015 IEEE RIVF International Conference on
    2015, pp. 71-76
    DOI: 10.1109/RIVF.2015.7049877
    BibTeX
    @inproceedings{Huynh2015,
     author = {Huynh, Tu K. and Huynh, Khoa V. and Le-Tien, Thuong and Nguyen, Sy C.},
     title = {A Survey on Image Forgery Detection Techniques},
     booktitle = {Computing & Communication Technologies - Research, Innovation, and Vision for the Future (RIVF), 2015 IEEE RIVF International Conference on},
     year = {2015},
     pages = {71--76}}
    
  113. R.W. Ibrahim, Z. Moghaddasi, H.A. Jalab & R.M. Noor
    Fractional Differential Texture Descriptors Based on the Machado Entropy for Image Splicing Detection
    Entropy, 2015, Vol. 17(7), pp. 4775
    DOI: 10.3390/e17074775
    BibTeX
    @article{Ibrahim2015,
     author = {Ibrahim, Rabha W. and Moghaddasi, Zahra and Jalab, Hamid A. and Noor, Rafidah Md},
     title = {Fractional Differential Texture Descriptors Based on the Machado Entropy for Image Splicing Detection},
     journal = {Entropy},
     year = {2015},
     volume = {17},
     number = {7},
     pages = {4775}}
    
  114. M.M. Isaac & M. Wilscy
    Copy-move Forgery Detection Based on Harris Corner Points and Brisk
    Proceedings of the Third International Symposium on Women in Computing and Informatics
    ACM, 2015, pp. 394-399
    DOI: 10.1145/2791405.2791453
    BibTeX
    @inproceedings{Isaac2015,
     author = {Isaac, Meera Mary and Wilscy, M.},
     title = {Copy-move Forgery Detection Based on Harris Corner Points and Brisk},
     booktitle = {Proceedings of the Third International Symposium on Women in Computing and Informatics},
     publisher = {ACM},
     year = {2015},
     pages = {394--399}}
    
  115. M.M. Isaac & M. Wilscy
    Image Forgery Detection Based on Gabor Wavelets and Local Phase Quantization
    Procedia Computer Science, 2015, Vol. 58, pp. 76-83
    DOI: 10.1016/j.procs.2015.08.016
    BibTeX
    @article{Isaac2015a,
     author = {Isaac, Meera Mary and Wilscy, M.},
     title = {Image Forgery Detection Based on Gabor Wavelets and Local Phase Quantization},
     journal = {Procedia Computer Science},
     year = {2015},
     volume = {58},
     pages = {76--83}}
    
  116. M. Iuliani, G. Fabbri & A. Piva
    Image Splicing Detection Based on General Perspective Constraints
    Information Forensics and Security (WIFS), 2015 IEEE International Workshop on
    2015, pp. 1-6
    DOI: 10.1109/WIFS.2015.7368598
    BibTeX
    @inproceedings{Iuliani2015,
     author = {Iuliani, M. and Fabbri, G. and Piva, A.},
     title = {Image Splicing Detection Based on General Perspective Constraints},
     booktitle = {Information Forensics and Security (WIFS), 2015 IEEE International Workshop on},
     year = {2015},
     pages = {1--6}}
    
  117. B.G. Jeong, Y.H. Moon & I.K. Eom
    Blind Identification of Image Manipulation Type Using Mixed Statistical Moments
    Journal of Electronic Imaging, 2015, Vol. 24(1), pp. 013029
    DOI: 10.1117/1.JEI.24.1.013029
    BibTeX
    @article{Jeong2015,
     author = {Jeong, Bo Gyu and Moon, Yong Ho and Eom, Il Kyu},
     title = {Blind Identification of Image Manipulation Type Using Mixed Statistical Moments},
     journal = {Journal of Electronic Imaging},
     year = {2015},
     volume = {24},
     number = {1},
     pages = {013029}}
    
  118. V. Joshi & S. Jain
    Tampering Detection in Digital Video - a Review of Temporal Fingerprints Based Techniques
    Proc. 2nd Int Computing for Sustainable Global Development (INDIACom) Conf
    2015, pp. 1121-1124
    BibTeX
    @inproceedings{Joshi2015,
     author = {Joshi, V. and Jain, S.},
     title = {Tampering Detection in Digital Video - a Review of Temporal Fingerprints Based Techniques},
     booktitle = {Proc. 2nd Int Computing for Sustainable Global Development (INDIACom) Conf},
     year = {2015},
     pages = {1121--1124}}
    
  119. T. Julliand, V. Nozick & H. Talbot
    Automated Image Splicing Detection from Noise Estimation in Raw Images
    Proc. th Int Imaging for Crime Prevention and Detection (ICDP-15) Conf
    2015, pp. 1-6
    DOI: 10.1049/ic.2015.0111
    BibTeX
    @inproceedings{Julliand2015,
     author = {Julliand, T. and Nozick, V. and Talbot, H.},
     title = {Automated Image Splicing Detection from Noise Estimation in Raw Images},
     booktitle = {Proc. th Int Imaging for Crime Prevention and Detection (ICDP-15) Conf},
     year = {2015},
     pages = {1--6}}
    
  120. T. Julliand, V. Nozick & H. Talbot
    Image Noise and Digital Image Forensics
    IWDW
    2015
    DOI: 10.1007/978-3-319-31960-5_1
    BibTeX
    @inproceedings{Julliand2015a,
     author = {Julliand, Thibaut and Nozick, Vincent and Talbot, Hugues},
     title = {Image Noise and Digital Image Forensics},
     booktitle = {IWDW},
     year = {2015}}
    
  121. D.-J. Jung, D.-K. Hyun & H.-K. Lee
    Recaptured Video Detection Based on Sensor Pattern Noise
    EURASIP Journal on Image and Video Processing, Springer, 2015, Vol. 2015(1), pp. 1
    DOI: 10.1186/s13640-015-0096-z
    BibTeX
    @article{Jung2015,
     author = {Jung, Dae-Jin and Hyun, Dai-Kyung and Lee, Heung-Kyu},
     title = {Recaptured Video Detection Based on Sensor Pattern Noise},
     journal = {EURASIP Journal on Image and Video Processing},
     publisher = {Springer},
     year = {2015},
     volume = {2015},
     number = {1},
     pages = {1}}
    
  122. N. Kalka, N. Bartlow, B. Cukic & A. Ross
    A Preliminary Study on Identifying Sensors from Iris Images
    2015 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)
    Institute of Electrical & Electronics Engineers (IEEE), 2015
    DOI: 10.1109/CVPRW.2015.7301319
    BibTeX
    @inproceedings{Kalka2015,
     author = {Kalka, Nathan and Bartlow, Nick and Cukic, Bojan and Ross, Arun},
     title = {A Preliminary Study on Identifying Sensors from Iris Images},
     booktitle = {2015 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)},
     publisher = {Institute of Electrical & Electronics Engineers (IEEE)},
     year = {2015}}
    
  123. X. Kang, J. Liu, H. Liu & Z.J. Wang
    Forensics and Counter Anti-forensics of Video Inter-frame Forgery
    Multimedia Tools and Applications, 2015, pp. 1-21
    DOI: 10.1007/s11042-015-2762-7
    BibTeX
    @article{Kang2015a,
     author = {Kang, Xiangui and Liu, Jingxian and Liu, Hongmei and Wang, Z. Jane},
     title = {Forensics and Counter Anti-forensics of Video Inter-frame Forgery},
     journal = {Multimedia Tools and Applications},
     year = {2015},
     pages = {1--21}}
    
  124. X. Kang, T. Qin & H. Zeng
    Countering Median Filtering Anti-forensics and Performance Evaluation of Forensics against Intentional Attacks
    Proc. IEEE China Summit and Int Signal and Information Processing (ChinaSIP) Conf
    2015, pp. 483-487
    DOI: 10.1109/ChinaSIP.2015.7230449
    BibTeX
    @inproceedings{Kang2015,
     author = {Kang, Xiangui and Qin, Tengfei and Zeng, Hui},
     title = {Countering Median Filtering Anti-forensics and Performance Evaluation of Forensics against Intentional Attacks},
     booktitle = {Proc. IEEE China Summit and Int Signal and Information Processing (ChinaSIP) Conf},
     year = {2015},
     pages = {483--487}}
    
  125. A. Karaküçük & A.E. Dirik
    Adaptive Photo-response Non-uniformity Noise Removal against Image Source Attribution
    Digital Investigation, 2015, Vol. 12(0), pp. 66-76
    DOI: 10.1016/j.diin.2015.01.017
    BibTeX
    @article{Karakuecuek2015,
     author = {Karaküçük, Ahmet and Dirik, Ahmet Emir},
     title = {Adaptive Photo-response Non-uniformity Noise Removal against Image Source Attribution},
     journal = {Digital Investigation},
     year = {2015},
     volume = {12},
     number = {0},
     pages = {66--76}}
    
  126. A. Karaküçük, A.E. Dirik, H.T. Sencar & N.D. Memon
    Recent Advances in Counter PRNU Based Source Attribution and Beyond
    IS&T/SPIE Electronic Imaging
    Proc. SPIE, 2015, Vol. 9409, pp. 94090N-94090N-11
    DOI: 10.1117/12.2182458
    BibTeX
    @inproceedings{Karakuecuek2015a,
     author = {Karaküçük, Ahmet and Dirik, Ahmet E. and Sencar, Hüsrev T. and Memon, Nasir D.},
     title = {Recent Advances in Counter PRNU Based Source Attribution and Beyond},
     booktitle = {IS&T/SPIE Electronic Imaging},
     journal = {Proc. SPIE},
     year = {2015},
     volume = {9409},
     pages = {94090N-94090N-11}}
    
  127. A. Kashyap, B. Suresh, M. Agrawal, H. Gupta & S.D. Joshi
    Detection of Splicing Forgery Using Wavelet Decomposition
    Proc. Int Computing, Communication Automation (ICCCA) Conf
    2015, pp. 843-848
    DOI: 10.1109/CCAA.2015.7148492
    BibTeX
    @inproceedings{Kashyap2015,
     author = {Kashyap, A. and Suresh, B. and Agrawal, M. and Gupta, H. and Joshi, S. D.},
     title = {Detection of Splicing Forgery Using Wavelet Decomposition},
     booktitle = {Proc. Int Computing, Communication Automation (ICCCA) Conf},
     year = {2015},
     pages = {843--848}}
    
  128. C. Kauba & A. Uhl
    Fingerprint Recognition under the Influence of Image Sensor Ageing
    Department of Computer Sciences, University of Salzburg, Department of Computer Sciences, University of Salzburg, 2015
    DOI: 10.1109/iwbf.2016.7449683
    BibTeX
    @techreport{Kauba2015,
     author = {Kauba, Christof and Uhl, Andreas},
     title = {Fingerprint Recognition under the Influence of Image Sensor Ageing},
     school = {Department of Computer Sciences, University of Salzburg},
     year = {2015}}
    
  129. A. Kaur & S. Malhotra
    Passive Image Forensic Method to Detect Resampling Forgery in Digital Images
    IOSR Journal of Computer Engineering (IOSR-JCE), 2015, Vol. 17(3), pp. 47-52
    BibTeX
    @article{Kaur2015,
     author = {Kaur, Amaninder and Malhotra, Sheenam},
     title = {Passive Image Forensic Method to Detect Resampling Forgery in Digital Images},
     journal = {IOSR Journal of Computer Engineering (IOSR-JCE)},
     year = {2015},
     volume = {17},
     number = {3},
     pages = {47--52}}
    
  130. R. Kaushik, R.K. Bajaj & J. Mathew
    On Image Forgery Detection Using Two Dimensional Discrete Cosine Transform and Statistical Moments
    Procedia Computer Science, 2015, Vol. 70, pp. 130-136
    DOI: 10.1016/j.procs.2015.10.058
    BibTeX
    @article{Kaushik2015,
     author = {Kaushik, Rajeev and Bajaj, Rakesh Kumar and Mathew, Jimson},
     title = {On Image Forgery Detection Using Two Dimensional Discrete Cosine Transform and Statistical Moments},
     journal = {Procedia Computer Science},
     year = {2015},
     volume = {70},
     pages = {130--136}}
    
  131. Ke
    An Efficient Blind Detection Algorithm of Median Filtered Image
    International Journal of Hybrid Information Technology, 2015, Vol. 8(1), pp. 181-192
    DOI: 10.14257/ijhit.2015.8.1.16
    BibTeX
    @article{Ke2015,
     author = {Ke},
     title = {An Efficient Blind Detection Algorithm of Median Filtered Image},
     journal = {International Journal of Hybrid Information Technology},
     year = {2015},
     volume = {8},
     number = {1},
     pages = {181--192}}
    
  132. A. Kharboutly, W.P. , G. Subsol & D. Hoa
    Improving Sensor Noise Analysis for CT-scanner Identification
    Proc. of the 23rd European Signal Processing Conference (EUSIPCO) 2015
    2015
    DOI: 10.1109/eusipco.2015.7362817
    BibTeX
    @inproceedings{Kharboutly2015,
     author = {Kharboutly, Anas and , William Puech and Subsol, Gerard and Hoa, Denis},
     title = {Improving Sensor Noise Analysis for CT-scanner Identification},
     booktitle = {Proc. of the 23rd European Signal Processing Conference (EUSIPCO) 2015},
     year = {2015}}
    
  133. A. Kharboutly, W. Puech, G. Subsol & D. Hoa
    Advanced Sensor Noise Analysis for CT-scanner Identification from Its 3D Images
    Image Processing Theory, Tools and Applications (IPTA), 2015 International Conference on
    2015, pp. 325-330
    DOI: 10.1109/IPTA.2015.7367158
    BibTeX
    @inproceedings{Kharboutly2015a,
     author = {Kharboutly, A. and Puech, W. and Subsol, G. and Hoa, D.},
     title = {Advanced Sensor Noise Analysis for CT-scanner Identification from Its 3D Images},
     booktitle = {Image Processing Theory, Tools and Applications (IPTA), 2015 International Conference on},
     year = {2015},
     pages = {325--330}}
    
  134. K. Khuspe & V. Mane
    Robust Image Forgery Localization and Recognition in Copy-move Using Bag of Features and SVM
    Communication, Information & Computing Technology (ICCICT), 2015 International Conference on
    2015, pp. 1-5
    DOI: 10.1109/ICCICT.2015.7045718
    BibTeX
    @inproceedings{Khuspe2015,
     author = {Khuspe, Kalyani and Mane, Vanita},
     title = {Robust Image Forgery Localization and Recognition in Copy-move Using Bag of Features and SVM},
     booktitle = {Communication, Information & Computing Technology (ICCICT), 2015 International Conference on},
     year = {2015},
     pages = {1--5}}
    
  135. M. Kirchner
    Thinking beyond the Block: Block Matching for Copy--move Forgery Detection Revisited
    Alattar, A. M., Memon, N. D. & Heitzenrater, C. D. (ed.)
    IS&T/SPIE Electronic Imaging
    2015, Vol. 9409, pp. 940903-940903-12
    DOI: 10.1117/12.2082789
    BibTeX
    @inproceedings{Kirchner2015,
     author = {Kirchner, Matthias},
     title = {Thinking beyond the Block: Block Matching for Copy--move Forgery Detection Revisited},
     booktitle = {IS&T/SPIE Electronic Imaging},
     year = {2015},
     volume = {9409},
     pages = {940903-940903-12}}
    
  136. T.A. Kohale, S.D. Chede & P.R. Lakhe
    Forgery of Copy Move Image Detection Technique by Integrating Block and Feature Based Method
    International Journal of Advanced Research in Computer and Communication Engineering, 2015, Vol. 4(1)
    DOI: 10.17148/ijarcce.2015.4129
    BibTeX
    @article{Kohale2015,
     author = {Kohale, Tushant A. and Chede, S. D. and Lakhe, P. R.},
     title = {Forgery of Copy Move Image Detection Technique by Integrating Block and Feature Based Method},
     journal = {International Journal of Advanced Research in Computer and Communication Engineering},
     year = {2015},
     volume = {4},
     number = {1}}
    
  137. P. Koniusz & A. Cherian
    Dictionary Learning and Sparse Coding for Third-order Super-symmetric Tensors
    arxiv, 2015
    BibTeX
    @article{Koniuz2015,
     author = {Koniusz, Piotr and Cherian, Anoop},
     title = {Dictionary Learning and Sparse Coding for Third-order Super-symmetric Tensors},
     journal = {arxiv},
     year = {2015}}
    
  138. P.A. Koshy & K.N. Nair
    Exposing Image Forgery through Contrast Enhancement
    International Journal of Science and Research (IJSR), 2015, Vol. 4(12), pp. 1044-1048
    DOI: 10.21275/v4i12.nov152185
    BibTeX
    @article{Koshy2015,
     author = {Koshy, Priya Ann and Nair, Kavitha N.},
     title = {Exposing Image Forgery through Contrast Enhancement},
     journal = {International Journal of Science and Research (IJSR)},
     year = {2015},
     volume = {4},
     number = {12},
     pages = {1044--1048}}
    
  139. P. Kovesi
    Good Colour Maps: How to Design Them
    arXiv:1509.03700, 2015
    BibTeX
    @article{Kovesi2015,
     author = {Kovesi, Peter},
     title = {Good Colour Maps: How to Design Them},
     journal = {arXiv:1509.03700},
     year = {2015}}
    
  140. C. Kraetzer & J. Dittmann
    Microphone Forensics
    Ho/Handbook of Digital Forensics of Multimedia Data and Devices
    Wiley-Blackwell, 2015, pp. 411-441
    DOI: 10.1002/9781118705773.ch11
    BibTeX
    @incollection{Kraetzer_2015,
     author = {Kraetzer, Christian and Dittmann, Jana},
     title = {Microphone Forensics},
     booktitle = {Ho/Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-Blackwell},
     year = {2015},
     pages = {411--441}}
    
  141. C. Kraetzer & J. Dittmann
    Considerations on the Benchmarking of Media Forensics
    Proc. 23rd European Signal Processing Conf. (EUSIPCO)
    2015, pp. 61-65
    DOI: 10.1109/EUSIPCO.2015.7362345
    BibTeX
    @inproceedings{Kraetzer2015,
     author = {Kraetzer, C. and Dittmann, J.},
     title = {Considerations on the Benchmarking of Media Forensics},
     booktitle = {Proc. 23rd European Signal Processing Conf. (EUSIPCO)},
     year = {2015},
     pages = {61--65}}
    
  142. N. Kulkarni & V. Mane
    Source Camera Identification Using GLCM
    Proc. IEEE Int. Advance Computing Conf. (IACC)
    2015, pp. 1242-1246
    DOI: 10.1109/IADCC.2015.7154900
    BibTeX
    @inproceedings{Kulkarni2015,
     author = {Kulkarni, Nilambari and Mane, Vanita},
     title = {Source Camera Identification Using GLCM},
     booktitle = {Proc. IEEE Int. Advance Computing Conf. (IACC)},
     year = {2015},
     pages = {1242--1246}}
    
  143. S. Kumar, J.V. Desai & S. Mukherjee
    Copy Move Forgery Detection in Contrast Variant Environment Using Binary DCT Vectors
    I.J. Image, Graphics and Signal Processing, 2015(6), pp. 38-44
    DOI: 10.5815/ijigsp.2015.06.05
    BibTeX
    @article{Kumar2015,
     author = {Kumar, Sunil and Desai, J. V. and Mukherjee, Shaktidev},
     title = {Copy Move Forgery Detection in Contrast Variant Environment Using Binary DCT Vectors},
     journal = {I.J. Image, Graphics and Signal Processing},
     year = {2015},
     number = {6},
     pages = {38--44}}
    
  144. Y.-N. Lai, T.-G. Gao, J.-X. Li & G.-R. Sheng
    Forensic Detection of Median Filtering in Digital Images Using the Coefficient-pair Histogram of DCT Value and LBP Pattern
    Huang, D.-S., Bevilacqua, V. & Premaratne, P. (ed.)
    Intelligent Computing Theories and Methodologies
    Springer International Publishing, 2015, Vol. 9225, pp. 421-432
    DOI: 10.1007/978-3-319-22180-9_41
    BibTeX
    @incollection{Lai2015,
     author = {Lai, Yun-Ni and Gao, Tie-Gang and Li, Jia-Xin and Sheng, Guo-Rui},
     title = {Forensic Detection of Median Filtering in Digital Images Using the Coefficient-pair Histogram of DCT Value and LBP Pattern},
     booktitle = {Intelligent Computing Theories and Methodologies},
     publisher = {Springer International Publishing},
     year = {2015},
     volume = {9225},
     pages = {421--432}}
    
  145. K.-f. Lau, N.-f. Law & W.-c. Siu
    Use of Sensor Noise for Source Identification
    Proc. Int Noise and Fluctuations (ICNF) Conf
    Institute of Electrical and Electronics Engineers (IEEE), 2015, pp. 1-6
    DOI: 10.1109/ICNF.2015.7288548
    BibTeX
    @inproceedings{Lau2015,
     author = {Lau, Kwun-fung and Law, Ngai-fong and Siu, Wan-chi},
     title = {Use of Sensor Noise for Source Identification},
     booktitle = {Proc. Int Noise and Fluctuations (ICNF) Conf},
     publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
     year = {2015},
     pages = {1--6}}
    
  146. J.-C. Lee
    Copy-move Image Forgery Detection Based on Gabor Magnitude
    Journal of Visual Communication and Image Representation, 2015, Vol. 31, pp. 320-334
    DOI: 10.1016/j.jvcir.2015.07.007
    BibTeX
    @article{Lee2015b,
     author = {Lee, Jen-Chun},
     title = {Copy-move Image Forgery Detection Based on Gabor Magnitude},
     journal = {Journal of Visual Communication and Image Representation},
     year = {2015},
     volume = {31},
     pages = {320--334}}
    
  147. J.-C. Lee, C.-P. Chang & W.-K. Chen
    Detection of Copy--move Image Forgery Using Histogram of Orientated Gradients
    Information Sciences, 2015(0), pp. -
    DOI: 10.1016/j.ins.2015.03.009
    BibTeX
    @article{Lee2015,
     author = {Lee, Jen-Chun and Chang, Chien-Ping and Chen, Wei-Kuei},
     title = {Detection of Copy--move Image Forgery Using Histogram of Orientated Gradients},
     journal = {Information Sciences},
     year = {2015},
     number = {0},
     pages = {-}}
    
  148. S.-H. Lee, T.-W. Oh, K. Kim & H.-Y. Lee
    Digital Camera Identification Using Sensor Pattern Noise
    Proceedings of the Second International Conference on Information Security and Digital Forensics (ISDF2015)
    2015, pp. 30-35
    BibTeX
    @inproceedings{Lee2015a,
     author = {Lee, Sang-Hyeong and Oh, Tae-Woo and Kim, Kibom and Lee, Hae-Yeoun},
     title = {Digital Camera Identification Using Sensor Pattern Noise},
     booktitle = {Proceedings of the Second International Conference on Information Security and Digital Forensics (ISDF2015)},
     year = {2015},
     pages = {30--35}}
    
  149. M.D. Leom, C.J. DOrazio, G. Deegan & K.K.R. Choo
    Forensic Collection and Analysis of Thumbnails in Android
    Proc. IEEE Trustcom/BigDataSE/ISPA
    2015, Vol. 1, pp. 1059-1066
    DOI: 10.1109/Trustcom.2015.483
    BibTeX
    @inproceedings{Leom2015,
     author = {Leom, M. D. and DOrazio, C. J. and Deegan, G. and Choo, K. K. R.},
     title = {Forensic Collection and Analysis of Thumbnails in Android},
     booktitle = {Proc. IEEE Trustcom/BigDataSE/ISPA},
     year = {2015},
     volume = {1},
     pages = {1059--1066}}
    
  150. J. Lepsoy, S. Kim, D. Atnafu & H.J. Kim
    Metadata protection scheme for JPEG privacy security using hierarchical and group-based models
    Proc. 5th Int. Conf. Information Communication Technology and Accessibility (ICTA)
    2015, pp. 1-5
    DOI: 10.1109/ICTA.2015.7426905
    BibTeX
    @inproceedings{Lepsoy2015,
     author = {Lepsoy, J. and Kim, S. and Atnafu, D. and Kim, H. J.},
     title = {Metadata protection scheme for JPEG privacy security using hierarchical and group-based models},
     booktitle = {Proc. 5th Int. Conf. Information Communication Technology and Accessibility (ICTA)},
     year = {2015},
     pages = {1--5}}
    
  151. T. Le-Tien, T. Huynh-Ngoc, T. Huynh-Kha & L. Marie
    Zernike Moment-based Approach for Detecting Duplicated Image Regions by a Modified Method to Reduce Geometrical and Numerical Errors
    Gervasi, O., Murgante, B., Misra, S., Gavrilova, M. L., Rocha, A. M. A. C., Torre, C., Taniar, D. & Apduhan, B. O. (ed.)
    Computational Science and Its Applications -- ICCSA 2015
    Springer International Publishing, 2015, Vol. 9158, pp. 458-475
    DOI: 10.1007/978-3-319-21410-8_36
    BibTeX
    @incollection{Le-Tien2015,
     author = {Le-Tien, Thuong and Huynh-Ngoc, Tan and Huynh-Kha, Tu and Marie, Luong},
     title = {Zernike Moment-based Approach for Detecting Duplicated Image Regions by a Modified Method to Reduce Geometrical and Numerical Errors},
     booktitle = {Computational Science and Its Applications -- ICCSA 2015},
     publisher = {Springer International Publishing},
     year = {2015},
     volume = {9158},
     pages = {458--475}}
    
  152. B. Li, T.T. Ng, X. Li, S. Tan & J. Huang
    Statistical Model of JPEG Noises and Its Application in Quantization Step Estimation
    IEEE Transactions on Image Processing, 2015, Vol. 24(5), pp. 1471-1484
    DOI: 10.1109/TIP.2015.2405477
    BibTeX
    @article{Li2015g,
     author = {Li, B. and Ng, T. T. and Li, X. and Tan, S. and Huang, J.},
     title = {Statistical Model of JPEG Noises and Its Application in Quantization Step Estimation},
     journal = {IEEE Transactions on Image Processing},
     year = {2015},
     volume = {24},
     number = {5},
     pages = {1471--1484}}
    
  153. B. Li, T.-T. Ng, X. Li, S. Tan & J. Huang
    Revealing the Trace of High-quality JPEG Compression through Quantization Noise Analysis
    Information Forensics and Security, IEEE Transactions on, 2015, Vol. 10(3), pp. 558-573
    DOI: 10.1109/TIFS.2015.2389148
    BibTeX
    @article{Li2015a,
     author = {Li, Bin and Ng, Tian-Tsong and Li, Xiaolong and Tan, Shunquan and Huang, Jiwu},
     title = {Revealing the Trace of High-quality JPEG Compression through Quantization Noise Analysis},
     journal = {Information Forensics and Security, IEEE Transactions on},
     year = {2015},
     volume = {10},
     number = {3},
     pages = {558--573}}
    
  154. C. Li, Q. Ma, L. Xiao, M. Li & A. Zhang
    Image Splicing Detection Based on Markov Features in Qdct Domain
    Huang, D.-S., Jo, K.-H. & Hussain, A. (ed.)
    Intelligent Computing Theories and Methodologies
    Advanced Intelligent Computing Theories and Applications, Springer International Publishing, 2015, Vol. 9226, pp. 170-176
    DOI: 10.1007/978-3-319-22186-1_17
    BibTeX
    @incollection{Li2015c,
     author = {Li, Ce and Ma, Qiang and Xiao, Limei and Li, Ming and Zhang, Aihua},
     title = {Image Splicing Detection Based on Markov Features in Qdct Domain},
     booktitle = {Intelligent Computing Theories and Methodologies},
     journal = {Advanced Intelligent Computing Theories and Applications},
     publisher = {Springer International Publishing},
     year = {2015},
     volume = {9226},
     pages = {170--176}}
    
  155. J. Li, X. Li, B. Yang & X. Sun
    Segmentation-based Image Copy-move Forgery Detection Scheme
    Information Forensics and Security, IEEE Transactions on, 2015, Vol. 10(3), pp. 507-518
    DOI: 10.1109/TIFS.2014.2381872
    BibTeX
    @article{Li2015,
     author = {Li, Jian and Li, Xiaolong and Yang, Bin and Sun, Xingming},
     title = {Segmentation-based Image Copy-move Forgery Detection Scheme},
     journal = {Information Forensics and Security, IEEE Transactions on},
     year = {2015},
     volume = {10},
     number = {3},
     pages = {507--518}}
    
  156. J. Li, Y. Zhao & R. Ni
    Detection of Seam Carving and Contrast Enhancement Operation Chain
    Proc. Int. Conf. Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP)
    2015, pp. 235-238
    DOI: 10.1109/IIH-MSP.2015.89
    BibTeX
    @inproceedings{Li2015i,
     author = {Li, J. and Zhao, Y. and Ni, R.},
     title = {Detection of Seam Carving and Contrast Enhancement Operation Chain},
     booktitle = {Proc. Int. Conf. Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP)},
     year = {2015},
     pages = {235--238}}
    
  157. R. Li, C. Kotropoulos, C.T. Li & Y. Guan
    Random Subspace Method for Source Camera Identification
    Proc. IEEE 25th Int. Workshop Machine Learning for Signal Processing (MLSP)
    2015, pp. 1-5
    DOI: 10.1109/MLSP.2015.7324339
    BibTeX
    @inproceedings{Li2015f,
     author = {Li, R. and Kotropoulos, C. and Li, C. T. and Guan, Y.},
     title = {Random Subspace Method for Source Camera Identification},
     booktitle = {Proc. IEEE 25th Int. Workshop Machine Learning for Signal Processing (MLSP)},
     year = {2015},
     pages = {1--5}}
    
  158. R. Li, C.-T. Li & Y. Guan
    A Compact Representation of Sensor Fingerprint for Camera Identification and Fingerprint Matching
    Proc. IEEE Int Acoustics, Speech and Signal Processing (ICASSP) Conf
    2015, pp. 1777-1781
    DOI: 10.1109/ICASSP.2015.7178276
    BibTeX
    @inproceedings{Li2015d,
     author = {Li, Ruizhe and Li, Chang-Tsun and Guan, Yu},
     title = {A Compact Representation of Sensor Fingerprint for Camera Identification and Fingerprint Matching},
     booktitle = {Proc. IEEE Int Acoustics, Speech and Signal Processing (ICASSP) Conf},
     year = {2015},
     pages = {1777--1781}}
    
  159. R. Li, C.-T. Li & Y. Guan
    Incremental Update of Feature Extractor for Camera Identification
    Proc. IEEE Int Image Processing (ICIP) Conf
    2015, pp. 324-328
    DOI: 10.1109/ICIP.2015.7350813
    BibTeX
    @inproceedings{Li2015e,
     author = {Li, Ruizhe and Li, Chang-Tsun and Guan, Yu},
     title = {Incremental Update of Feature Extractor for Camera Identification},
     booktitle = {Proc. IEEE Int Image Processing (ICIP) Conf},
     year = {2015},
     pages = {324--328}}
    
  160. S. Li, M.K. Dhami & A.T.S. Ho
    Standards and Best Practices in Digital and Multimedia Forensics
    Ho, A. T. S. & Li, S. (ed.)
    Ho/Handbook of Digital Forensics of Multimedia Data and Devices
    Chapter 2
    Wiley-IEEE Press, 2015, pp. 38-93
    DOI: 10.1002/9781118705773.ch2
    BibTeX
    @inbook{Li2015j,
     author = {Li, Shujun and Dhami, Mandeep K. and Ho, Anthony T. S.},
     title = {Standards and Best Practices in Digital and Multimedia Forensics},
     booktitle = {Ho/Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-IEEE Press},
     year = {2015},
     pages = {38--93}}
    
  161. S. Li & A.T.S. Ho
    Digital Forensics Laboratories in Operation
    Ho/Handbook of Digital Forensics of Multimedia Data and Devices
    Chapter 1
    Wiley-IEEE Press, 2015, pp. 1-37
    DOI: 10.1002/9781118705773.ch1
    BibTeX
    @inbook{Li2015k,
     author = {Li, Shujun and Ho, Anthony T. S.},
     title = {Digital Forensics Laboratories in Operation},
     booktitle = {Ho/Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-IEEE Press},
     year = {2015},
     pages = {1--37}}
    
  162. Y. Li & J. Zhou
    Anti-forensics of Lossy Predictive Image Compression
    Signal Processing Letters, IEEE, 2015, Vol. 22(12), pp. 2219-2223
    DOI: 10.1109/LSP.2015.2472561
    BibTeX
    @article{Li2015b,
     author = {Li, Yuanman and Zhou, Jiantao},
     title = {Anti-forensics of Lossy Predictive Image Compression},
     journal = {Signal Processing Letters, IEEE},
     year = {2015},
     volume = {22},
     number = {12},
     pages = {2219--2223}}
    
  163. Z. Liang, G. Yang, X. Ding & L. Li
    An Efficient Forgery Detection Algorithm for Object Removal by Exemplar-based Image Inpainting
    Journal of Visual Communication and Image Representation, 2015(0), pp. -
    DOI: 10.1016/j.jvcir.2015.03.004
    BibTeX
    @article{Liang2015,
     author = {Liang, Zaoshan and Yang, Gaobo and Ding, Xiangling and Li, Leida},
     title = {An Efficient Forgery Detection Algorithm for Object Removal by Exemplar-based Image Inpainting},
     journal = {Journal of Visual Communication and Image Representation},
     year = {2015},
     number = {0},
     pages = {-}}
    
  164. C.S. Lin, C.C. Chen & Y.C. Chang
    An Efficiency Enhanced Cluster Expanding Block Algorithm for Copy-move Forgery Detection
    Proc. Int Intelligent Networking and Collaborative Systems (INCOS) Conf
    2015, pp. 228-231
    DOI: 10.1109/INCoS.2015.90
    BibTeX
    @inproceedings{Lin2015,
     author = {Lin, C. S. and Chen, C. C. and Chang, Y. C.},
     title = {An Efficiency Enhanced Cluster Expanding Block Algorithm for Copy-move Forgery Detection},
     booktitle = {Proc. Int Intelligent Networking and Collaborative Systems (INCOS) Conf},
     year = {2015},
     pages = {228--231}}
    
  165. B. Liu & C.-M. Pun
    Splicing Forgery Exposure in Digital Image by Detecting Noise Discrepancies
    International Journal of Computer and Communication Engineering, 2015, Vol. 4(1), pp. 33-38
    DOI: 10.7763/IJCCE.2015.V4.378
    BibTeX
    @article{Liu2015,
     author = {Liu, Bo and Pun, Chi-Man},
     title = {Splicing Forgery Exposure in Digital Image by Detecting Noise Discrepancies},
     journal = {International Journal of Computer and Communication Engineering},
     year = {2015},
     volume = {4},
     number = {1},
     pages = {33--38}}
    
  166. B.-b. Liu, X. Wei & J. Yan
    Enhancing Sensor Pattern Noise for Source Camera Identification: An Empirical Evaluation
    Proc. of the The 3rd ACM Workshop on Information Hiding and Multimedia Security, 2015
    DOI: 10.1145/2756601.2756614
    BibTeX
    @article{Liu2015b,
     author = {Liu, Bei-bei and Wei, Xingjie and Yan, Jeff},
     title = {Enhancing Sensor Pattern Noise for Source Camera Identification: An Empirical Evaluation},
     journal = {Proc. of the The 3rd ACM Workshop on Information Hiding and Multimedia Security},
     year = {2015}}
    
  167. Q. Liu, A. Sung, Z. Chen & L. Chen
    Exposing Image Tampering with the Same Quantization Matrix
    Baughman, A. K., Gao, J., Pan, J.-Y. & Petrushin, V. A. (ed.)
    Multimedia Data Mining and Analytics
    Springer International Publishing, 2015, pp. 327-343
    DOI: 10.1007/978-3-319-14998-1_15
    BibTeX
    @incollection{Liu2015a,
     author = {Liu, Qingzhong and Sung, AndrewH. and Chen, Zhongxue and Chen, Lei},
     title = {Exposing Image Tampering with the Same Quantization Matrix},
     booktitle = {Multimedia Data Mining and Analytics},
     publisher = {Springer International Publishing},
     year = {2015},
     pages = {327--343}}
    
  168. Y. Liu & T. Huang
    Exposing Video Inter-frame Forgery by Zernike Opponent Chromaticity Moments and Coarseness Analysis
    Multimedia Systems, Springer Berlin Heidelberg, 2015, pp. 1-16
    DOI: 10.1007/s00530-015-0478-1
    BibTeX
    @article{Liu2015c,
     author = {Liu, Yuqing and Huang, Tianqiang},
     title = {Exposing Video Inter-frame Forgery by Zernike Opponent Chromaticity Moments and Coarseness Analysis},
     journal = {Multimedia Systems},
     publisher = {Springer Berlin Heidelberg},
     year = {2015},
     pages = {1--16}}
    
  169. B. Mahdian, A. Novozamsky & S. Saic
    Detecting Cyclostationarity in Re-captured LCD Screens
    Forensic Research, 2015
    DOI: 10.1109/icip.2015.7350872
    BibTeX
    @article{Mahdian2015a,
     author = {Mahdian, Babak and Novozamsky, Adam and Saic, Stanislav},
     title = {Detecting Cyclostationarity in Re-captured LCD Screens},
     journal = {Forensic Research},
     year = {2015}}
    
  170. B. Mahdian, A. Novozámský & S. Saic
    Determination of Stop-criterion for Incremental Methods Constructing Camera Sensor Fingerprint
    Shi, Y.-Q., Kim, H. J., Pérez-González, F. & Yang, C.-N. (ed.)
    Digital-Forensics and Watermarking
    Springer International Publishing, 2015, Vol. 9023, pp. 47-59
    DOI: 10.1007/978-3-319-19321-2_4
    BibTeX
    @incollection{Mahdian2015,
     author = {Mahdian, Babak and Novozámský, Adam and Saic, Stanislav},
     title = {Determination of Stop-criterion for Incremental Methods Constructing Camera Sensor Fingerprint},
     booktitle = {Digital-Forensics and Watermarking},
     publisher = {Springer International Publishing},
     year = {2015},
     volume = {9023},
     pages = {47--59}}
    
  171. B. Mahdian, A. Novozámský & S. Saic
    Identification of Aliasing-based Patterns in Re-captured LCD Screens
    ICIP
    2015
    BibTeX
    @inproceedings{Mahdian2015b,
     author = {Mahdian, Babak and Novozámský, Adam and Saic, Stanislav},
     title = {Identification of Aliasing-based Patterns in Re-captured LCD Screens},
     booktitle = {ICIP},
     year = {2015}}
    
  172. B. Mahdian, A. Novozámský & S. Saic
    Determination of Stop-criterion for Incremental Methods Constructing Camera Sensor Fingerprint
    Digital-Forensics and Watermarking
    Digital-Forensics and Watermarking, Springer, 2015, pp. 47-59
    DOI: 10.1007/978-3-319-19321-2_4
    BibTeX
    @article{Mahdian2015c,
     author = {Mahdian, Babak and Novozámský, Adam and Saic, Stanislav},
     title = {Determination of Stop-criterion for Incremental Methods Constructing Camera Sensor Fingerprint},
     booktitle = {Digital-Forensics and Watermarking},
     journal = {Digital-Forensics and Watermarking},
     publisher = {Springer},
     year = {2015},
     pages = {47--59}}
    
  173. T. Mahmood, T. Nawaz, R. Ashraf, M. Shah, Z. Khan, A. Irtaza & Z. Mehmood
    A Survey on Block Based Copy Move Image Forgery Detection Techniques
    Emerging Technologies (ICET), 2015 International Conference on
    2015, pp. 1-6
    DOI: 10.1109/ICET.2015.7389169
    BibTeX
    @inproceedings{Mahmood2015,
     author = {Mahmood, T. and Nawaz, T. and Ashraf, R. and Shah, M. and Khan, Z. and Irtaza, A. and Mehmood, Z.},
     title = {A Survey on Block Based Copy Move Image Forgery Detection Techniques},
     booktitle = {Emerging Technologies (ICET), 2015 International Conference on},
     year = {2015},
     pages = {1--6}}
    
  174. P. Malik & K. Karthik
    Detection of Purple Fringing Aberration Patterns and Its Application to Forensic Analysis of Spliced Images
    Proc. Int Advances in Computing, Communications and Informatics (ICACCI) Conf
    2015, pp. 1421-1427
    DOI: 10.1109/ICACCI.2015.7275812
    BibTeX
    @inproceedings{Malik2015,
     author = {Malik, Parveen and Karthik, Kannan},
     title = {Detection of Purple Fringing Aberration Patterns and Its Application to Forensic Analysis of Spliced Images},
     booktitle = {Proc. Int Advances in Computing, Communications and Informatics (ICACCI) Conf},
     year = {2015},
     pages = {1421--1427}}
    
  175. V.T. Manu & B.M. Mehtre
    Visual Artifacts Based Image Splicing Detection in Uncompressed Images
    Proc. Vision and Information Security (CGVIS) 2015 IEEE Int. Conf. Computer Graphics
    2015, Vol. 11/16, pp. 145-150
    DOI: 10.1109/CGVIS.2015.7449911
    BibTeX
    @inproceedings{Manu2015,
     author = {Manu, V. T. and Mehtre, B. M.},
     title = {Visual Artifacts Based Image Splicing Detection in Uncompressed Images},
     booktitle = {Proc. Vision and Information Security (CGVIS) 2015 IEEE Int. Conf. Computer Graphics},
     year = {2015},
     volume = {11/16},
     pages = {145--150}}
    
  176. F. Marra, G. Poggi, F. Roli, C. Sansone & L. Verdoliva
    Counter-forensics in Machine Learning Based Forgery Detection
    Alattar, A. M., Memon, N. D. & Heitzenrater, C. D. (ed.)
    IS&T/SPIE Electronic Imaging
    Proc. SPIE, 2015, Vol. 9409, pp. 94090L-94090L-11
    DOI: 10.1117/12.2182173
    BibTeX
    @inproceedings{Marra2015,
     author = {Marra, Francesco and Poggi, Giovanni and Roli, Fabio and Sansone, Carlo and Verdoliva, Luisa},
     title = {Counter-forensics in Machine Learning Based Forgery Detection},
     booktitle = {IS&T/SPIE Electronic Imaging},
     journal = {Proc. SPIE},
     year = {2015},
     volume = {9409},
     pages = {94090L-94090L-11}}
    
  177. F. Marra, G. Poggi, C. Sansone & L. Verdoliva
    Evaluation of Residual-based Local Features for Camera Model Identification
    New Trends in Image Analysis and Processing -- ICIAP 2015 Workshops
    New Trends in Image Analysis and Processing, Springer Science + Business Media, 2015, pp. 11-18
    DOI: 10.1007/978-3-319-23222-5_2
    BibTeX
    @incollection{Marra2015a,
     author = {Marra, Francesco and Poggi, Giovanni and Sansone, Carlo and Verdoliva, Luisa},
     title = {Evaluation of Residual-based Local Features for Camera Model Identification},
     booktitle = {New Trends in Image Analysis and Processing -- ICIAP 2015 Workshops},
     journal = {New Trends in Image Analysis and Processing},
     publisher = {Springer Science + Business Media},
     year = {2015},
     pages = {11--18}}
    
  178. F. Marra, G. Poggi, C. Sansone & L. Verdoliva
    Evaluation of Residual-based Local Features for Camera Model Identification
    New Trends in Image Analysis and Processing -- ICIAP 2015 Workshops, Springer, 2015
    DOI: 10.1007/978-3-319-23222-5_2
    BibTeX
    @article{Marra2015b,
     author = {Marra, Francesco and Poggi, Giovanni and Sansone, Carlo and Verdoliva, Luisa},
     title = {Evaluation of Residual-based Local Features for Camera Model Identification},
     journal = {New Trends in Image Analysis and Processing -- ICIAP 2015 Workshops},
     publisher = {Springer},
     year = {2015}}
    
  179. F. Marturana, S. Tacconi & G.F. Italiano
    A Machine Learning-Based Approach to Digital Triage
    Ho/Handbook of Digital Forensics of Multimedia Data and Devices
    Wiley-IEEE Press, 2015, pp. 94-132
    DOI: 10.1002/9781118705773.ch3
    BibTeX
    @inbook{Marturana2015,
     author = {Marturana, Fabio and Tacconi, Simone and Italiano, Giuseppe F.},
     title = {A Machine Learning-Based Approach to Digital Triage},
     booktitle = {Ho/Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-IEEE Press},
     year = {2015},
     pages = {94--132}}
    
  180. O. Mayer & M.C. Stamm
    Anti-forensics of Chromatic Aberration
    IS&T/SPIE Electronic Imaging
    Proc. SPIE, 2015, Vol. 9409, pp. 94090M-94090M-9
    DOI: 10.1117/12.2182457
    BibTeX
    @inproceedings{Mayer2015,
     author = {Mayer, Owen and Stamm, Matthew C.},
     title = {Anti-forensics of Chromatic Aberration},
     booktitle = {IS&T/SPIE Electronic Imaging},
     journal = {Proc. SPIE},
     year = {2015},
     volume = {9409},
     pages = {94090M-94090M-9}}
    
  181. A. Meenakshi Sundaram & C. Nandini
    CBFD: Coherence Based Forgery Detection technique in image forensics analysis
    Proc. Computer Science and Technology (ICERECT) 2015 Int. Conf. Emerging Research in Electronics
    2015, pp. 192-197
    DOI: 10.1109/ERECT.2015.7499011
    BibTeX
    @inproceedings{MeenakshiSundaram2015,
     author = {Meenakshi Sundaram, A. and Nandini, C.},
     title = {CBFD: Coherence Based Forgery Detection technique in image forensics analysis},
     booktitle = {Proc. Computer Science and Technology (ICERECT) 2015 Int. Conf. Emerging Research in Electronics},
     year = {2015},
     pages = {192--197}}
    
  182. A.V. Mire, S.B. Dhok, N.J. Mistry & P.D. Porey
    Factor Histogram Based Forgery Localization in Double Compressed JPEG\ Images
    Procedia Computer Science, 2015, Vol. 54, pp. 690-696
    DOI: 10.1016/j.procs.2015.06.081
    BibTeX
    @article{Mire2015,
     author = {Mire, Archana V. and Dhok, S. B. and Mistry, N. J. and Porey, P. D.},
     title = {Factor Histogram Based Forgery Localization in Double Compressed JPEG\ Images},
     journal = {Procedia Computer Science},
     year = {2015},
     volume = {54},
     pages = {690--696}}
    
  183. Z. Moghaddasi, H.A. Jalab & R.M. Noor
    A Comparison Study on SVD-based Features in Different Transforms for Image Splicing Detection
    Proc. IEEE Int Consumer Electronics - Taiwan (ICCE-TW) Conf
    2015, pp. 13-14
    DOI: 10.1109/ICCE-TW.2015.7216815
    BibTeX
    @inproceedings{Moghaddasi2015,
     author = {Moghaddasi, Z. and Jalab, H. A. and Noor, R. M.},
     title = {A Comparison Study on SVD-based Features in Different Transforms for Image Splicing Detection},
     booktitle = {Proc. IEEE Int Consumer Electronics - Taiwan (ICCE-TW) Conf},
     year = {2015},
     pages = {13--14}}
    
  184. M. Moltisanti, A. Paratore, S. Battiato & L. Saravo
    Image Manipulation on Facebook for Forensics Evidence
    Image Processing Laboratory Dipartimento di Matematica e Informatica Universita degli Studi di Catania, Image Processing Laboratory Dipartimento di Matematica e Informatica Universita degli Studi di Catania, 2015
    BibTeX
    @techreport{Moltisanti2015,
     author = {Moltisanti, Marco and Paratore, Antonino and Battiato, Sebastiano and Saravo, Luigi},
     title = {Image Manipulation on Facebook for Forensics Evidence},
     school = {Image Processing Laboratory Dipartimento di Matematica e Informatica Universita degli Studi di Catania},
     year = {2015}}
    
  185. M. Moltisanti, A. Paratore, S. Battiato & L. Saravo
    Image Manipulation on Facebook for Forensics Evidence
    Image Analysis and Processing textemdash ICIAP 2015
    Springer, 2015, pp. 506-517
    DOI: 10.1007/978-3-319-23234-8_47
    BibTeX
    @incollection{Moltisanti2015a,
     author = {Moltisanti, Marco and Paratore, Antonino and Battiato, Sebastiano and Saravo, Luigi},
     title = {Image Manipulation on Facebook for Forensics Evidence},
     booktitle = {Image Analysis and Processing textemdash ICIAP 2015},
     publisher = {Springer},
     year = {2015},
     pages = {506--517}}
    
  186. P. Mookdarsanit, L. Soimart, M. Ketcham & N. Hnoohom
    Detecting Image Forgery Using XOR and Determinant of Pixels for Image Forensics
    Proc. 11th Int. Conf. Signal-Image Technology Internet-Based Systems (SITIS)
    2015, pp. 613-616
    DOI: 10.1109/SITIS.2015.78
    BibTeX
    @inproceedings{Mookdarsanit2015,
     author = {Mookdarsanit, P. and Soimart, L. and Ketcham, M. and Hnoohom, N.},
     title = {Detecting Image Forgery Using XOR and Determinant of Pixels for Image Forensics},
     booktitle = {Proc. 11th Int. Conf. Signal-Image Technology Internet-Based Systems (SITIS)},
     year = {2015},
     pages = {613--616}}
    
  187. A.M. Moussa
    A Fast and Accurate Algorithm for Copy-move Forgery Detection
    Computer Engineering Systems (ICCES), 2015 Tenth International Conference on
    2015, pp. 281-285
    DOI: 10.1109/ICCES.2015.7393060
    BibTeX
    @inproceedings{Moussa2015,
     author = {Moussa, A. M.},
     title = {A Fast and Accurate Algorithm for Copy-move Forgery Detection},
     booktitle = {Computer Engineering Systems (ICCES), 2015 Tenth International Conference on},
     year = {2015},
     pages = {281--285}}
    
  188. R. Ni, Y. Zhao & X. Zhai
    Recaptured Images Forensics Based on Color Moments and DCT Coefficients Features
    Journal of Information Hiding and Multimedia Signal Processing, 2015, Vol. 6(2), pp. 323-333
    BibTeX
    @article{Ni2015,
     author = {Ni, Rongrong and Zhao, Yao and Zhai, Xiaobo},
     title = {Recaptured Images Forensics Based on Color Moments and DCT Coefficients Features},
     journal = {Journal of Information Hiding and Multimedia Signal Processing},
     year = {2015},
     volume = {6},
     number = {2},
     pages = {323--333}}
    
  189. N. Nirmalkar, S. Kamble & S. Kakde
    A Review of Image Forgery Techniques and Their Detection
    Proc. Int Innovations in Information, Embedded and Communication Systems (ICIIECS) Conf
    2015, pp. 1-5
    DOI: 10.1109/ICIIECS.2015.7193177
    BibTeX
    @inproceedings{Nirmalkar2015,
     author = {Nirmalkar, N. and Kamble, S. and Kakde, S.},
     title = {A Review of Image Forgery Techniques and Their Detection},
     booktitle = {Proc. Int Innovations in Information, Embedded and Communication Systems (ICIIECS) Conf},
     year = {2015},
     pages = {1--5}}
    
  190. E. Nowroozi & A. Zakerolhosseini
    Double JPEG Compression Detection Using Statistical Analysis
    dvances in Computer Science: an International Journal, 2015, Vol. 4(15), pp. 70-76
    BibTeX
    @article{Nowroozi2015,
     author = {Nowroozi, Ehsan and Zakerolhosseini, Ali},
     title = {Double JPEG Compression Detection Using Statistical Analysis},
     journal = {dvances in Computer Science: an International Journal},
     year = {2015},
     volume = {4},
     number = {15},
     pages = {70--76}}
    
  191. P.A. Nugraha, R.W. Ciptasari & B. Pudjoatmojo
    A photo composite detection based on eye specular highlights using pixel-based approach
    Proc. 3rd Int Information and Communication Technology (ICoICT ) Conf
    2015, pp. 195-200
    DOI: 10.1109/ICoICT.2015.7231421
    BibTeX
    @inproceedings{Nugraha2015,
     author = {Nugraha, P. A. and Ciptasari, R. W. and Pudjoatmojo, B.},
     title = {A photo composite detection based on eye specular highlights using pixel-based approach},
     booktitle = {Proc. 3rd Int Information and Communication Technology (ICoICT ) Conf},
     year = {2015},
     pages = {195--200}}
    
  192. A.L.S. Orozco, L.J.G. Villalba, D.M.A. González, J.R. Corripio, J. Hernandez-Castro & S.J. Gibson
    Smartphone Image Acquisition Forensics Using Sensor Fingerprint
    IET Computer Vision, 2015
    DOI: 10.1049/iet-cvi.2014.0243
    BibTeX
    @article{Orozco2015,
     author = {Orozco, Ana Lucila Sandoval and Villalba, Luis Javier García and González, David Manuel Arenas and Corripio, Jocelin Rosales and Hernandez-Castro, Julio and Gibson, Stuart James},
     title = {Smartphone Image Acquisition Forensics Using Sensor Fingerprint},
     journal = {IET Computer Vision},
     year = {2015}}
    
  193. J. Ou & J. Ni
    Blind Estimation of Affine Transformation Using 2D Cyclostationarity of Resampled Images
    Proc. SPIE, 2015, Vol. 9811, pp. 98110L-98110L-9
    DOI: 10.1117/12.2205468
    BibTeX
    @article{Ou2015,
     author = {Ou, Junhai and Ni, Jiangqun},
     title = {Blind Estimation of Affine Transformation Using 2D Cyclostationarity of Resampled Images},
     journal = {Proc. SPIE},
     year = {2015},
     volume = {9811},
     pages = {98110L-98110L-9}}
    
  194. X. Pan
    Digital Image Forensics with Statistical Analysis
    Ho, A. T. S. & Li, S. (ed.)
    Handbook of Digital Forensics of Multimedia Data and Devices
    Wiley-IEEE Press, 2015, pp. 704-
    DOI: 10.1002/9781118705773.ch13
    BibTeX
    @inbook{Pan2015,
     author = {Pan, Xunyu},
     title = {Digital Image Forensics with Statistical Analysis},
     booktitle = {Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-IEEE Press},
     year = {2015},
     pages = {704-}}
    
  195. R.C. Pandey, R. Agrawal, S.K. Singh & K.K. Shukla
    Passive Copy Move Forgery Detection Using SURF, HOG and SIFT Features
    Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014
    Springer, 2015
    DOI: 10.1007/978-3-319-11933-5_74
    BibTeX
    @incollection{Pandey2015,
     author = {Pandey, Ramesh Chand and Agrawal, Rishabh and Singh, Sanjay Kumar and Shukla, K. K.},
     title = {Passive Copy Move Forgery Detection Using SURF, HOG and SIFT Features},
     booktitle = {Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014},
     publisher = {Springer},
     year = {2015}}
    
  196. Peng
    Towards an Image Blurring Detection Approach Based on Color Filter Array
    Proc. of the International Conference on Mechatronics, Electronic, Industrial and Control Engineering (MEIC 2015)
    2015
    DOI: 10.2991/meic-15.2015.55
    BibTeX
    @inproceedings{Peng2015,
     author = {Peng},
     title = {Towards an Image Blurring Detection Approach Based on Color Filter Array},
     booktitle = {Proc. of the International Conference on Mechatronics, Electronic, Industrial and Control Engineering (MEIC 2015)},
     year = {2015}}
    
  197. A. Peng, H. Zeng, X. Lin & X. Kang
    Countering Anti-forensics of Image Resampling
    Proc. IEEE Int Image Processing (ICIP) Conf
    2015, pp. 3595-3599
    DOI: 10.1109/ICIP.2015.7351474
    BibTeX
    @inproceedings{Peng2015b,
     author = {Peng, Anjie and Zeng, Hui and Lin, Xiaodan and Kang, Xiangui},
     title = {Countering Anti-forensics of Image Resampling},
     booktitle = {Proc. IEEE Int Image Processing (ICIP) Conf},
     year = {2015},
     pages = {3595--3599}}
    
  198. B. Peng, W. Wang, J. Dong & T. Tan
    Detection of Computer Generated Faces in Videos Based on Pulse Signal
    Proc. IEEE China Summit and Int Signal and Information Processing (ChinaSIP) Conf
    2015, pp. 841-845
    DOI: 10.1109/ChinaSIP.2015.7230523
    BibTeX
    @inproceedings{Peng2015a,
     author = {Peng, Bo and Wang, Wei and Dong, Jing and Tan, Tieniu},
     title = {Detection of Computer Generated Faces in Videos Based on Pulse Signal},
     booktitle = {Proc. IEEE China Summit and Int Signal and Information Processing (ChinaSIP) Conf},
     year = {2015},
     pages = {841--845}}
    
  199. B. Peng, W. Wang, J. Dong & T. Tan
    Improved 3D Lighting Environment Estimation for Image Forgery Detection
    Information Forensics and Security (WIFS), 2015 IEEE International Workshop on
    2015, pp. 1-6
    DOI: 10.1109/WIFS.2015.7368587
    BibTeX
    @inproceedings{Peng2015d,
     author = {Peng, Bo and Wang, Wei and Dong, Jing and Tan, Tieniu},
     title = {Improved 3D Lighting Environment Estimation for Image Forgery Detection},
     booktitle = {Information Forensics and Security (WIFS), 2015 IEEE International Workshop on},
     year = {2015},
     pages = {1--6}}
    
  200. F. Peng, Y. Zhu & M. Long
    Identification of Natural Images and Computer Generated Graphics Using Multi-fractal Differences of PRNU
    Algorithms and Architectures for Parallel Processing, Springer, 2015
    DOI: 10.1007/978-3-319-27122-4_15
    BibTeX
    @article{Peng2015c,
     author = {Peng, Fei and Zhu, Yin and Long, Min},
     title = {Identification of Natural Images and Computer Generated Graphics Using Multi-fractal Differences of PRNU},
     journal = {Algorithms and Architectures for Parallel Processing},
     publisher = {Springer},
     year = {2015}}
    
  201. F. Perez-Gonzalez, I. Gonzalez-Iglesias, M. Masciopinto & P. Comesana
    Fast Sequential Forensic Camera Identification
    arxiv, 2015
    BibTeX
    @article{Perez-Gonzalez2015,
     author = {Perez-Gonzalez, F. and Gonzalez-Iglesias, I. and Masciopinto, M. and Comesana, P.},
     title = {Fast Sequential Forensic Camera Identification},
     journal = {arxiv},
     year = {2015}}
    
  202. S. Pittala, E. Whiting & H. Farid
    A 3-D Stability Analysis of Lee Harvey Oswald in the Backyard Photo
    JDFSL, 2015, Vol. 10(3), pp. 87-98
    BibTeX
    @article{Pittala2015,
     author = {Pittala, Srivamshi and Whiting, Emily and Farid, Hany},
     title = {A 3-D Stability Analysis of Lee Harvey Oswald in the Backyard Photo},
     journal = {JDFSL},
     year = {2015},
     volume = {10},
     number = {3},
     pages = {87--98}}
    
  203. S. Pollard, G. Adams & S. Simske
    Forensic Identification of Printed Documents
    Ho/Handbook of Digital Forensics of Multimedia Data and Devices
    Wiley-Blackwell, 2015, pp. 442-479
    DOI: 10.1002/9781118705773.ch12
    BibTeX
    @incollection{Pollard2015,
     author = {Pollard, Stephen and Adams, Guy and Simske, Steven},
     title = {Forensic Identification of Printed Documents},
     booktitle = {Ho/Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-Blackwell},
     year = {2015},
     pages = {442--479}}
    
  204. D. Prakash, P. Kalwad, V. Peddigari & P. Srinivasa
    Automatic Reflection Removal Using Reflective Layer Image Information
    Consumer Electronics (ICCE), 2015 IEEE International Conference on
    2015, pp. 548-551
    DOI: 10.1109/ICCE.2015.7066520
    BibTeX
    @inproceedings{Prakash2015,
     author = {Prakash, Divya and Kalwad, Pramati and Peddigari, Venkat and Srinivasa, Phanish},
     title = {Automatic Reflection Removal Using Reflective Layer Image Information},
     booktitle = {Consumer Electronics (ICCE), 2015 IEEE International Conference on},
     year = {2015},
     pages = {548--551}}
    
  205. S.V. Priyan & S.K. Srivatsa
    Detection of Duplicate Region and Hybrid Non-local Means Filtering for Denoising with Quantization Matrix Estimation for JPEG Error Analysis
    Indian Journal of Science and Technology, 2015, Vol. 8(28)
    DOI: 10.17485/ijst/2015/v8i28/70923
    BibTeX
    @article{Priyan2015,
     author = {Priyan, S. Vishnu and Srivatsa, S. K.},
     title = {Detection of Duplicate Region and Hybrid Non-local Means Filtering for Denoising with Quantization Matrix Estimation for JPEG Error Analysis},
     journal = {Indian Journal of Science and Technology},
     year = {2015},
     volume = {8},
     number = {28}}
    
  206. C.-M. Pun, X.-C. Yuan & X.-L. Bi
    Image Forgery Detection Using Adaptive Over-segmentation and Feature Points Matching
    Information Forensics and Security, IEEE Transactions on, 2015(99)
    DOI: 10.1109/TIFS.2015.2423261
    BibTeX
    @article{Pun2015,
     author = {Pun, Chi-Man and Yuan, Xiao-Chen and Bi, Xiu-Li},
     title = {Image Forgery Detection Using Adaptive Over-segmentation and Feature Points Matching},
     journal = {Information Forensics and Security, IEEE Transactions on},
     year = {2015},
     number = {99}}
    
  207. E.P. Purwandari
    Image Splicing Detection Based on Demosaicking and Wavelet Transformation
    Jurnal Ilmu Komputer dan Informasi, 2015
    BibTeX
    @article{Purwandari2015,
     author = {Purwandari, Endina Putri},
     title = {Image Splicing Detection Based on Demosaicking and Wavelet Transformation},
     journal = {Jurnal Ilmu Komputer dan Informasi},
     year = {2015}}
    
  208. T. Qiao, F. Retraint, R. Cogranne & T.H. Thai
    Source Camera Device Identification Based on Raw Images
    2015
    DOI: 10.1109/icip.2015.7351518
    BibTeX
    @electronic{Qiao2015,
     author = {Qiao, Tong and Retraint, Florent and Cogranne, Rémi and Thai, Thanh Hai},
     title = {Source Camera Device Identification Based on Raw Images},
     year = {2015}}
    
  209. E. Quiring & M. Kirchner
    Fragile Sensor Fingerprint Camera Identification
    Proc. of the 7th IEEE International Workshop on Information Forensics and Security 2015 (WIFS)
    2015
    DOI: 10.1109/wifs.2015.7368580
    BibTeX
    @inproceedings{Quiring2015,
     author = {Quiring, Erwin and Kirchner, Matthias},
     title = {Fragile Sensor Fingerprint Camera Identification},
     booktitle = {Proc. of the 7th IEEE International Workshop on Information Forensics and Security 2015 (WIFS)},
     year = {2015}}
    
  210. M.A. Qureshi & M. Deriche
    A Bibliography of Pixel-based Blind Image Forgery Detection Techniques
    Signal Processing: Image Communication, 2015, Vol. 39, Part A, pp. 46-74
    DOI: 10.1016/j.image.2015.08.008
    BibTeX
    @article{Qureshi2015,
     author = {Qureshi, Muhammad Ali and Deriche, Mohamed},
     title = {A Bibliography of Pixel-based Blind Image Forgery Detection Techniques},
     journal = {Signal Processing: Image Communication},
     year = {2015},
     volume = {39, Part A},
     pages = {46--74}}
    
  211. R.M. Rad & K. Wong
    Digital Image Forgery Detection by Edge Analysis
    Proc. IEEE Int Consumer Electronics - Taiwan (ICCE-TW) Conf
    2015, pp. 19-20
    DOI: 10.1109/ICCE-TW.2015.7216848
    BibTeX
    @inproceedings{Rad2015,
     author = {Rad, R. M. and Wong, Koksheik},
     title = {Digital Image Forgery Detection by Edge Analysis},
     booktitle = {Proc. IEEE Int Consumer Electronics - Taiwan (ICCE-TW) Conf},
     year = {2015},
     pages = {19--20}}
    
  212. R. Rajkumar & K.M. Singh
    Digital Image Forgery Detection Using SIFT Feature
    Proc. Int Advanced Computing and Communication (ISACC) Symp
    2015, pp. 186-191
    DOI: 10.1109/ISACC.2015.7377340
    BibTeX
    @inproceedings{Rajkumar2015,
     author = {Rajkumar, R. and Singh, K. M.},
     title = {Digital Image Forgery Detection Using SIFT Feature},
     booktitle = {Proc. Int Advanced Computing and Communication (ISACC) Symp},
     year = {2015},
     pages = {186--191}}
    
  213. H. Ravi, A.V. Subramanyam & S. Emmanuel
    Forensic Analysis of Linear and Non Linear Image Filtering Using Quantization Noise
    2015 IEEE International Conference on Image Processing (ICIP)
    Institute of Electrical & Electronics Engineers (IEEE), 2015
    DOI: 10.1109/icip.2015.7350986
    BibTeX
    @inproceedings{Ravi2015,
     author = {Ravi, Hareesh and Subramanyam, A. V. and Emmanuel, Sabu},
     title = {Forensic Analysis of Linear and Non Linear Image Filtering Using Quantization Noise},
     booktitle = {2015 IEEE International Conference on Image Processing (ICIP)},
     publisher = {Institute of Electrical & Electronics Engineers (IEEE)},
     year = {2015}}
    
  214. R.S. Remya & A.B. Beevi
    Novel Video Camera Authentication Based on Peak to Correlation Energy of Clustered Sensor Pattern Noise
    Proc. IEEE Int Engineering and Technology (ICETECH) Conf
    2015, pp. 1-5
    DOI: 10.1109/ICETECH.2015.7274998
    BibTeX
    @inproceedings{Remya2015,
     author = {Remya, R. S. and Beevi, A. B.},
     title = {Novel Video Camera Authentication Based on Peak to Correlation Energy of Clustered Sensor Pattern Noise},
     booktitle = {Proc. IEEE Int Engineering and Technology (ICETECH) Conf},
     year = {2015},
     pages = {1--5}}
    
  215. P.D. Reshma & C. Arunvinodh
    Image Forgery Detection Using SVM Classifier
    Proc. Int Innovations in Information, Embedded and Communication Systems (ICIIECS) Conf
    2015, pp. 1-5
    DOI: 10.1109/ICIIECS.2015.7193202
    BibTeX
    @inproceedings{Reshma2015,
     author = {Reshma, P. D. and Arunvinodh, C.},
     title = {Image Forgery Detection Using SVM Classifier},
     booktitle = {Proc. Int Innovations in Information, Embedded and Communication Systems (ICIIECS) Conf},
     year = {2015},
     pages = {1--5}}
    
  216. K.H. Rhee
    Median Filtering Detection Using Latent Growth Modeling
    Journal of the Institute of Electrolnic Engineers of Korea, 2015(1), pp. 61-68
    BibTeX
    @article{Rhee2015,
     author = {Rhee, Kang Hyeon},
     title = {Median Filtering Detection Using Latent Growth Modeling},
     journal = {Journal of the Institute of Electrolnic Engineers of Korea},
     year = {2015},
     number = {1},
     pages = {61--68}}
    
  217. K.H. Rhee
    Median Filtering Detection of Digital Images Using Pixel Gradients
    IEIE Transactions on Smart Processing & Computing, 2015, Vol. 4(4), pp. 195-201
    DOI: 10.5573/ieiespc.2015.4.4.195
    BibTeX
    @article{Rhee2015a,
     author = {Rhee, Kang Hyeon},
     title = {Median Filtering Detection of Digital Images Using Pixel Gradients},
     journal = {IEIE Transactions on Smart Processing & Computing},
     year = {2015},
     volume = {4},
     number = {4},
     pages = {195--201}}
    
  218. C. Riess, S. Pfaller & E. Angelopoulou
    Reflectance Normalization in Illumination-based Image Manipulation Detection
    New Trends in Image Analysis and Processing, 2015
    BibTeX
    @article{Riess2015,
     author = {Riess, Christian and Pfaller, Sven and Angelopoulou, Elli},
     title = {Reflectance Normalization in Illumination-based Image Manipulation Detection},
     journal = {New Trends in Image Analysis and Processing},
     year = {2015}}
    
  219. S. Rocchi, R. Simlinger, M. Moeslinger, J. Murray, G. Hadfi & M. John
    Use of Specialized Security Techniques to Enhance the Authenticity of Surveillance
    Book of Abstracts, Presentations and Papers of the 12 th Symposium on International Safeguards: Linking Strategy, Implementation and People, Vienna (Austria), 20-24 Oct 2014
    2015, pp. 491
    BibTeX
    @inproceedings{Rocchi2015,
     author = {Rocchi, S. and Simlinger, R. and Moeslinger, M. and Murray, J. and Hadfi, G. and John, M.},
     title = {Use of Specialized Security Techniques to Enhance the Authenticity of Surveillance},
     booktitle = {Book of Abstracts, Presentations and Papers of the 12 th Symposium on International Safeguards: Linking Strategy, Implementation and People, Vienna (Austria), 20-24 Oct 2014},
     year = {2015},
     pages = {491}}
    
  220. F. Rodríguez-Santos, G. Delgado-Gutierréz, L. Palacios-Luengas & R. Vazquéz-Medina
    Practical implementation of a methodology for digital images authentication using forensics techniques
    CSIJ Advances in Computer Science: an International Journal, 2015, Vol. 4(18)
    BibTeX
    @article{Rodriguez-Santos2015,
     author = {Rodríguez-Santos, Francisco and Delgado-Gutierréz, Guillermo and Palacios-Luengas, Leonardo and Vazquéz-Medina, Rubén},
     title = {Practical implementation of a methodology for digital images authentication using forensics techniques},
     journal = {CSIJ Advances in Computer Science: an International Journal},
     year = {2015},
     volume = {4},
     number = {18}}
    
  221. C. Ruiz, S. Arroyo, I. Krsteski, P. Dago, J. Sanchez, L. Perez-Freire, A. De Rosa, M. Fontani, A. Costanzo, A. Piva, D. Ariu, L. Piras, R. Ahumada & M. Jerian
    The MAVEN Project: Management and Authenticity Verification of Multimedia Contents
    Proc. IEEE Int Multimedia Expo Workshops (ICMEW) Conf
    Institute of Electrical & Electronics Engineers (IEEE), 2015, pp. 1-4
    DOI: 10.1109/icmew.2015.7169825
    BibTeX
    @inproceedings{Ruiz2015,
     author = {Ruiz, C. and Arroyo, S. and Krsteski, I. and Dago, P. and Sanchez, J. and Perez-Freire, L. and De Rosa, A. and Fontani, M. and Costanzo, A. and Piva, A. and Ariu, D. and Piras, L. and Ahumada, R. and Jerian, M.},
     title = {The MAVEN Project: Management and Authenticity Verification of Multimedia Contents},
     booktitle = {Proc. IEEE Int Multimedia Expo Workshops (ICMEW) Conf},
     publisher = {Institute of Electrical & Electronics Engineers (IEEE)},
     year = {2015},
     pages = {1--4}}
    
  222. K. Saini & I. p.C. m. d.A. o. d. Shabnampreet Kaur, Forensic document examination
    Forensic Examination of Computer-manipulated Documents Using Image Processing Techniques
    Egyptian Journal of Forensic Sciences, 2015(0), pp. -
    DOI: 10.1016/j.ejfs.2015.03.001
    BibTeX
    @article{Saini2015,
     author = {Saini, Komal and Shabnampreet Kaur, Forensic document examination, Image processing Computer manipulated documents Alterations of documents},
     title = {Forensic Examination of Computer-manipulated Documents Using Image Processing Techniques},
     journal = {Egyptian Journal of Forensic Sciences},
     year = {2015},
     number = {0},
     pages = {-}}
    
  223. V.K. Sanap & V.M. Mane
    Region Duplication Forgery Detection in Digital Images Using 2D-DWT and SVD
    Proc. Int. Conf. Applied and Theoretical Computing and Communication Technology (iCATccT)
    2015, pp. 599-604
    DOI: 10.1109/ICATCCT.2015.7456955
    BibTeX
    @inproceedings{Sanap2015,
     author = {Sanap, V. K. and Mane, V. M.},
     title = {Region Duplication Forgery Detection in Digital Images Using 2D-DWT and SVD},
     booktitle = {Proc. Int. Conf. Applied and Theoretical Computing and Communication Technology (iCATccT)},
     year = {2015},
     pages = {599--604}}
    
  224. P. Sanas & P. Gupta
    Image Recapture Discovery Algorithms: A Survey
    IJSR, International Journal of Science and Research, 2015, Vol. 4(11), pp. 926-929
    DOI: 10.21275/v4i11.nov151302
    BibTeX
    @article{Sanas2015,
     author = {Sanas, P. and Gupta, P.},
     title = {Image Recapture Discovery Algorithms: A Survey},
     journal = {IJSR},
     publisher = {International Journal of Science and Research},
     year = {2015},
     volume = {4},
     number = {11},
     pages = {926--929}}
    
  225. A. Sandoval Orozco, J. Corripio, L. García Villalba & J. Hernández Castro
    Image Source Acquisition Identification of Mobile Devices Based on the Use of Features
    Multimedia Tools and Applications, Springer US, 2015, pp. 1-25
    DOI: 10.1007/s11042-015-2633-2
    BibTeX
    @article{SandovalOrozco2015,
     author = {Sandoval Orozco, AnaLucila and Corripio, JocelinRosales and García Villalba, LuisJavier and Hernández Castro, JulioCésar},
     title = {Image Source Acquisition Identification of Mobile Devices Based on the Use of Features},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer US},
     year = {2015},
     pages = {1--25}}
    
  226. A.L. Sandoval Orozco, D.M. Arenas González, L.J. García Villalba & J. Hernández-Castro
    Analysis of Errors in EXIF Metadata on Mobile Devices
    Multimedia Tools and Applications, Springer, 2015, Vol. 74(13), pp. 4735
    DOI: 10.1007/s11042-013-1837-6
    BibTeX
    @article{SandovalOrozco2015a,
     author = {Sandoval Orozco, Ana Lucila and Arenas González, David Manuel and García Villalba, Luis Javier and Hernández-Castro, Julio},
     title = {Analysis of Errors in EXIF Metadata on Mobile Devices},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2015},
     volume = {74},
     number = {13},
     pages = {4735}}
    
  227. R. Satta
    Sensor Pattern Noise Matching Based on Reliability Map for Source Camera Identification
    electronic, 2015
    BibTeX
    @misc{Satta2015,
     author = {Satta, Riccardo},
     title = {Sensor Pattern Noise Matching Based on Reliability Map for Source Camera Identification},
     year = {2015}}
    
  228. R. Satta & A. Ciardulli
    Sensor Pattern Noise and Image Similarity for Picture-to-identity Linking
    IET Comput Vision, 2015, Vol. 9(5), pp. 711-722
    DOI: 10.1049/iet-cvi.2014.0320
    BibTeX
    @article{Satta2015a,
     author = {Satta, R. and Ciardulli, A.},
     title = {Sensor Pattern Noise and Image Similarity for Picture-to-identity Linking},
     journal = {IET Comput Vision},
     year = {2015},
     volume = {9},
     number = {5},
     pages = {711--722}}
    
  229. S. Saxena
    Video Inpainting Detection Using Inconsistencies in Optical Flow
    Indraprastha Institute of Information Technology, Delhi (IIIT-D), India, Indraprastha Institute of Information Technology, Delhi (IIIT-D), India, 2015
    BibTeX
    @mastersthesis{Saxena2015,
     author = {Saxena, Shobhita},
     title = {Video Inpainting Detection Using Inconsistencies in Optical Flow},
     school = {Indraprastha Institute of Information Technology, Delhi (IIIT-D), India},
     year = {2015}}
    
  230. V. Schetinger & T.J.C. MM Oliveira, R da Silva
    Humans Are Easily Fooled by Digital Images
    arxiv, 2015
    BibTeX
    @article{Schetinger2015,
     author = {Schetinger, Victor and MM Oliveira, R da Silva, T. J. Carvalho},
     title = {Humans Are Easily Fooled by Digital Images},
     journal = {arxiv},
     year = {2015}}
    
  231. J. Schindelin, C.T. Rueden, M.C. Hiner & K.W. Eliceiri
    The Imagej Ecosystem: An Open Platform for Biomedical Image Analysis.
    Mol Reprod Dev, Laboratory for Optical and Computational Instrumentation, University of Wisconsin at Madison, Madison, Wisconsin., Laboratory for Optical and Computational Instrumentation, University of Wisconsin at Madison, Madison, Wisconsin., 2015, Vol. 82(7-8), pp. 518-529
    DOI: 10.1002/mrd.22489
    BibTeX
    @article{Schindelin2015,
     author = {Schindelin, Johannes and Rueden, Curtis T. and Hiner, Mark C. and Eliceiri, Kevin W.},
     title = {The Imagej Ecosystem: An Open Platform for Biomedical Image Analysis.},
     journal = {Mol Reprod Dev},
     school = {Laboratory for Optical and Computational Instrumentation, University of Wisconsin at Madison, Madison, Wisconsin.},
     year = {2015},
     volume = {82},
     number = {7-8},
     pages = {518--529}}
    
  232. R. Sekhar & R.S. Shaji
    A Study on Segmentation-based Copy-move Forgery Detection Using DAISY Descriptor
    Proceedings of the International Conference on Soft Computing Systems
    Springer Science mathplus Business Media, 2015, pp. 223-233
    DOI: 10.1007/978-81-322-2674-1_23
    BibTeX
    @incollection{Sekhar2015,
     author = {Sekhar, Resmi and Shaji, R. S.},
     title = {A Study on Segmentation-based Copy-move Forgery Detection Using DAISY Descriptor},
     booktitle = {Proceedings of the International Conference on Soft Computing Systems},
     publisher = {Springer Science mathplus Business Media},
     year = {2015},
     pages = {223--233}}
    
  233. M. Shandilya, R. Naskar & R. Dixit
    Detection of Geometric Transformations in Copy-move Forgery of Digital Images
    Proc. Annual IEEE India Conf. (INDICON)
    2015, pp. 1-6
    DOI: 10.1109/INDICON.2015.7443141
    BibTeX
    @inproceedings{Shandilya2015,
     author = {Shandilya, M. and Naskar, R. and Dixit, R.},
     title = {Detection of Geometric Transformations in Copy-move Forgery of Digital Images},
     booktitle = {Proc. Annual IEEE India Conf. (INDICON)},
     year = {2015},
     pages = {1--6}}
    
  234. S. Shang & X. Kong
    Printer and Scanner Forensics
    Ho, A. T. S. & Li, S. (ed.)
    Handbook of Digital Forensics of Multimedia Data and Devices
    Chapter 10
    Wiley-IEEE Press, 2015, pp. 704-
    DOI: 10.1002/9781118705773.ch10
    BibTeX
    @inbook{Shang2015,
     author = {Shang, Shize and Kong, Xiangwei},
     title = {Printer and Scanner Forensics},
     booktitle = {Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-IEEE Press},
     year = {2015},
     pages = {704-}}
    
  235. A. Sharma & P. Singh
    A Comparative Study of Frequency Domain Based Approaches for Image Tamper Detection
    Proc. TENCON 2015 - 2015 IEEE Region 10 Conf
    2015, pp. 1-4
    DOI: 10.1109/TENCON.2015.7372903
    BibTeX
    @inproceedings{Sharma2015a,
     author = {Sharma, A. and Singh, P.},
     title = {A Comparative Study of Frequency Domain Based Approaches for Image Tamper Detection},
     booktitle = {Proc. TENCON 2015 - 2015 IEEE Region 10 Conf},
     year = {2015},
     pages = {1--4}}
    
  236. S. Sharma & U. Ghanekar
    A Rotationally Invariant Texture Descriptor to Detect Copy Move Forgery in Medical Images
    Computational Intelligence & Communication Technology (CICT), 2015 IEEE International Conference on
    2015, pp. 795-798
    DOI: 10.1109/CICT.2015.88
    BibTeX
    @inproceedings{Sharma2015,
     author = {Sharma, Surbhi and Ghanekar, Umesh},
     title = {A Rotationally Invariant Texture Descriptor to Detect Copy Move Forgery in Medical Images},
     booktitle = {Computational Intelligence & Communication Technology (CICT), 2015 IEEE International Conference on},
     year = {2015},
     pages = {795--798}}
    
  237. Z. Shi, X. Shen, H. Chen & X. Li
    Blind Detection of Image Splicing Based on Fuzzy Run-length
    Proc. IEEE Int Computer and Information Technology, Ubiquitous Computing and Communications, Dependable, Autonomic and Secure Computing, Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM) Conf
    2015, pp. 915-920
    DOI: 10.1109/CIT/IUCC/DASC/PICOM.2015.137
    BibTeX
    @inproceedings{Shi2015,
     author = {Shi, Z. and Shen, X. and Chen, H. and Li, X.},
     title = {Blind Detection of Image Splicing Based on Fuzzy Run-length},
     booktitle = {Proc. IEEE Int Computer and Information Technology, Ubiquitous Computing and Communications, Dependable, Autonomic and Secure Computing, Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM) Conf},
     year = {2015},
     pages = {915--920}}
    
  238. F.Y. Shih & J.K. Jackson
    Copy-cover Image Forgery Detection in Parallel Processing
    Int. J. Patt. Recogn. Artif. Intell., 2015
    BibTeX
    @article{Shih2015a,
     author = {Shih, Frank Y. and Jackson, Jason K.},
     title = {Copy-cover Image Forgery Detection in Parallel Processing},
     journal = {Int. J. Patt. Recogn. Artif. Intell.},
     year = {2015}}
    
  239. Y. Shih, D. Krishnan, F. Durand & W.T. Freeman
    Reflection Removal Using Ghosting Cues
    Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2015
    The IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2015
    BibTeX
    @inproceedings{Shih2015,
     author = {Shih, YiChang and Krishnan, Dilip and Durand, Fredo and Freeman, William T.},
     title = {Reflection Removal Using Ghosting Cues},
     booktitle = {Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2015},
     journal = {The IEEE Conference on Computer Vision and Pattern Recognition (CVPR)},
     year = {2015}}
    
  240. M.V.K. Shingote & A. Kumar
    Survey on Recapture Detection Algorithms
    International Journal of Advanced Research in Computer and Communication Engineering, 2015, Vol. 4(12)
    BibTeX
    @article{Shingote2015a,
     author = {Shingote, Mr Vinayak K. and Kumar, Ashish},
     title = {Survey on Recapture Detection Algorithms},
     journal = {International Journal of Advanced Research in Computer and Communication Engineering},
     year = {2015},
     volume = {4},
     number = {12}}
    
  241. V.K. Shingote & R. Kabara
    Image Authentication by Detecting Demosaicing
    International Journal of Advanced Research in Computer and Communication Engineering, 2015, Vol. 4(5), pp. 256-259
    BibTeX
    @article{Shingote2015,
     author = {Shingote, Vinayak K. and Kabara, Ruhi},
     title = {Image Authentication by Detecting Demosaicing},
     journal = {International Journal of Advanced Research in Computer and Communication Engineering},
     year = {2015},
     volume = {4},
     number = {5},
     pages = {256--259}}
    
  242. E. Silva, T. Carvalho, A. Ferreira & A. Rocha
    Going Deeper into Copy-move Forgery Detection: Exploring Image Telltales Via Multi-scale Analysis and Voting Processes
    Journal of Visual Communication and Image Representation, Elsevier BV, 2015, Vol. 29(0), pp. 16-32
    DOI: 10.1016/j.jvcir.2015.01.016
    BibTeX
    @article{Silva2015,
     author = {Silva, Ewerton and Carvalho, Tiago and Ferreira, Anselmo and Rocha, Anderson},
     title = {Going Deeper into Copy-move Forgery Detection: Exploring Image Telltales Via Multi-scale Analysis and Voting Processes},
     journal = {Journal of Visual Communication and Image Representation},
     publisher = {Elsevier BV},
     year = {2015},
     volume = {29},
     number = {0},
     pages = {16--32}}
    
  243. N. Singh & R. Bansal
    Analysis of Benford´s Law in Digital Image Forensics
    Proc. Int Signal Processing and Communication (ICSC) Conf
    2015, pp. 413-418
    DOI: 10.1109/ICSPCom.2015.7150688
    BibTeX
    @inproceedings{Singh2015b,
     author = {Singh, N. and Bansal, R.},
     title = {Analysis of Benford´s Law in Digital Image Forensics},
     booktitle = {Proc. Int Signal Processing and Communication (ICSC) Conf},
     year = {2015},
     pages = {413--418}}
    
  244. V. Singh, P. Pant & R. Tripathi
    Detection of Frame Duplication Type of Forgery in Digital Video Using Sub-block Based Features
    James, J. & Breitinger, F. (ed.)
    Digital Forensics and Cyber Crime
    Springer International Publishing, 2015, Vol. 157, pp. 29-38
    DOI: 10.1007/978-3-319-25512-5_3
    BibTeX
    @incollection{Singh2015,
     author = {Singh, VivekKumar and Pant, Pallav and Tripathi, RameshChandra},
     title = {Detection of Frame Duplication Type of Forgery in Digital Video Using Sub-block Based Features},
     booktitle = {Digital Forensics and Cyber Crime},
     publisher = {Springer International Publishing},
     year = {2015},
     volume = {157},
     pages = {29--38}}
    
  245. V.K. Singh & R.C. Tripathi
    Fast Rotation Invariant Detection of Region Duplication Attacks Even on Uniform Background Containing Digital Images
    Procedia Computer Science, 2015, Vol. 54, pp. 772-780
    DOI: 10.1016/j.procs.2015.06.091
    BibTeX
    @article{Singh2015a,
     author = {Singh, Vivek Kumar and Tripathi, R. C.},
     title = {Fast Rotation Invariant Detection of Region Duplication Attacks Even on Uniform Background Containing Digital Images},
     journal = {Procedia Computer Science},
     year = {2015},
     volume = {54},
     pages = {772--780}}
    
  246. J.J. Sonu, G. Krishnalal & R.V.P. Jagathy
    Revealing Image Forgery on Digital Images by a Pplying Contrast Enhancement
    International Journal of Computer Applications, 2015
    BibTeX
    @article{Sonu2015,
     author = {Sonu, John Jacob and Krishnalal, G. and Jagathy, Raj V. P.},
     title = {Revealing Image Forgery on Digital Images by a Pplying Contrast Enhancement},
     journal = {International Journal of Computer Applications},
     year = {2015}}
    
  247. A.R. Soobhany, K.P. Lam, P. Fletcher & D.J. Collins
    Mobile Camera Source Identification with SVD
    Innovations and Advances in Computing, Informatics, Systems Sciences, Networking and Engineering
    Springer, 2015
    DOI: 10.1007/978-3-319-06773-5_18
    BibTeX
    @incollection{Soobhany2015,
     author = {Soobhany, A. R. and Lam, K. P. and Fletcher, P. and Collins, D. J.},
     title = {Mobile Camera Source Identification with SVD},
     booktitle = {Innovations and Advances in Computing, Informatics, Systems Sciences, Networking and Engineering},
     publisher = {Springer},
     year = {2015}}
    
  248. S.T.S. Sornalatha, S.D. Mahalakshmi & K. Vijayalakshmi
    Detecting Contrast Enhancement Based Image Forgeries by Parallel Approach
    Proc. 2nd Int Electronics and Communication Systems (ICECS) Conf
    2015, pp. 1162-1167
    DOI: 10.1109/ECS.2015.7124767
    BibTeX
    @inproceedings{Sornalatha2015,
     author = {Sornalatha, S. T. S. and Mahalakshmi, S. D. and Vijayalakshmi, K.},
     title = {Detecting Contrast Enhancement Based Image Forgeries by Parallel Approach},
     booktitle = {Proc. 2nd Int Electronics and Communication Systems (ICECS) Conf},
     year = {2015},
     pages = {1162--1167}}
    
  249. J. Spangenberg
    Soziale Medien Und Journalistische Berichterstattung
    Digitale Politikvermittlung, Springer, 2015
    DOI: 10.1007/978-3-658-06571-3_8
    BibTeX
    @article{Spangenberg2015,
     author = {Spangenberg, Jochen},
     title = {Soziale Medien Und Journalistische Berichterstattung},
     journal = {Digitale Politikvermittlung},
     publisher = {Springer},
     year = {2015}}
    
  250. M. Steinebach, Y. Yannikos, S. Zmudzinski & C. Winter
    Advanced Multimedia File Carving
    Ho/Handbook of Digital Forensics of Multimedia Data and Devices
    Wiley-Blackwell, 2015, pp. 219-269
    DOI: 10.1002/9781118705773.ch6
    BibTeX
    @incollection{Steinebach2015,
     author = {Steinebach, Martin and Yannikos, York and Zmudzinski, Sascha and Winter, Christian},
     title = {Advanced Multimedia File Carving},
     booktitle = {Ho/Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-Blackwell},
     year = {2015},
     pages = {219--269}}
    
  251. P.-C. Su, P.-L. Suei, M.-K. Chang & J. Lain
    Forensic and Anti-forensic Techniques for Video Shot Editing in H.264/AVC
    Journal of Visual Communication and Image Representation, 2015(0), pp. -
    DOI: 10.1016/j.jvcir.2015.02.006
    BibTeX
    @article{Su2015,
     author = {Su, Po-Chyi and Suei, Pei-Lun and Chang, Min-Kuan and Lain, Jie},
     title = {Forensic and Anti-forensic Techniques for Video Shot Editing in H.264/AVC},
     journal = {Journal of Visual Communication and Image Representation},
     year = {2015},
     number = {0},
     pages = {-}}
    
  252. X. Sun, Y. Li, S. Niu & Y. Huang
    The Detecting System of Image Forgeries with Noise Features and EXIF Information
    Journal of Systems Science and Complexity, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, 2015, Vol. 28(5), pp. 1164-1176
    DOI: 10.1007/s11424-015-4023-2
    BibTeX
    @article{Sun2015,
     author = {Sun, Xiaoting and Li, Yezhou and Niu, Shaozhang and Huang, Yanli},
     title = {The Detecting System of Image Forgeries with Noise Features and EXIF Information},
     journal = {Journal of Systems Science and Complexity},
     publisher = {Academy of Mathematics and Systems Science, Chinese Academy of Sciences},
     year = {2015},
     volume = {28},
     number = {5},
     pages = {1164--1176}}
    
  253. F. Sur & M. Grédiac
    Measuring the Noise of Digital Imaging Sensors by Stacking Raw Images Affected by Vibrations and Illumination Flickering
    SIAM Journal on Imaging Sciences, 2015, Vol. 8(1), pp. 611-643
    DOI: 10.1137/140977035
    BibTeX
    @article{Sur2015,
     author = {Sur, Frédéric and Grédiac, Michel},
     title = {Measuring the Noise of Digital Imaging Sensors by Stacking Raw Images Affected by Vibrations and Illumination Flickering},
     journal = {SIAM Journal on Imaging Sciences},
     year = {2015},
     volume = {8},
     number = {1},
     pages = {611--643}}
    
  254. A. Sutardja, O. Ramadan & Y. Zhao
    Forensic Methods for Detecting Image Manipulation - Copy Move
    Electrical Engineering and Computer Sciences University of California at Berkeley, Electrical Engineering and Computer Sciences University of California at Berkeley, 2015
    BibTeX
    @techreport{Sutardja2015,
     author = {Sutardja, Anthony and Ramadan, Omar and Zhao, Yan},
     title = {Forensic Methods for Detecting Image Manipulation - Copy Move},
     school = {Electrical Engineering and Computer Sciences University of California at Berkeley},
     year = {2015}}
    
  255. A. Sutardja & Y. Zhao
    Digital Image Manipulation Forensics
    Electrical Engineering and Computer Sciences University of California at Berkeley, Electrical Engineering and Computer Sciences University of California at Berkeley, 2015
    BibTeX
    @techreport{Sutardja2015a,
     author = {Sutardja, Anthony and Zhao, Yan},
     title = {Digital Image Manipulation Forensics},
     school = {Electrical Engineering and Computer Sciences University of California at Berkeley},
     year = {2015}}
    
  256. A. Taimori, F. Razzazi, A. Behrad, A. Ahmadi & M. Babaie-Zadeh
    Quantization-unaware Double JPEG Compression Detection
    Journal of Mathematical Imaging and Vision, Springer US, 2015, pp. 1-18
    DOI: 10.1007/s10851-015-0602-z
    BibTeX
    @article{Taimori2015,
     author = {Taimori, Ali and Razzazi, Farbod and Behrad, Alireza and Ahmadi, Ali and Babaie-Zadeh, Massoud},
     title = {Quantization-unaware Double JPEG Compression Detection},
     journal = {Journal of Mathematical Imaging and Vision},
     publisher = {Springer US},
     year = {2015},
     pages = {1--18}}
    
  257. Y. Tan, B. Wang, M. Zhao, X. Kong & M. Li
    Patch-based Sensor Pattern Noise for Camera Source Identification
    School of Information and Communication Engineering Dalian University of Technology Dalian, Liaoning, 116024, P. R. China, School of Information and Communication Engineering Dalian University of Technology Dalian, Liaoning, 116024, P. R. China, 2015
    DOI: 10.1109/chinasip.2015.7230528
    BibTeX
    @techreport{Tan2015,
     author = {Tan, Yue and Wang, Bo and Zhao, Meijuan and Kong, Xiangwei and Li, Ming},
     title = {Patch-based Sensor Pattern Noise for Camera Source Identification},
     school = {School of Information and Communication Engineering Dalian University of Technology Dalian, Liaoning, 116024, P. R. China},
     year = {2015}}
    
  258. K.A. Tatkare & V. Mane
    Fusion of SIFT and Hue Moments Features for Cloning Tamper Detection
    Proc. Int. Conf. Applied and Theoretical Computing and Communication Technology (iCATccT)
    2015, pp. 409-414
    DOI: 10.1109/ICATCCT.2015.7456918
    BibTeX
    @inproceedings{Tatkare2015,
     author = {Tatkare, K. A. and Mane, V.},
     title = {Fusion of SIFT and Hue Moments Features for Cloning Tamper Detection},
     booktitle = {Proc. Int. Conf. Applied and Theoretical Computing and Communication Technology (iCATccT)},
     year = {2015},
     pages = {409--414}}
    
  259. S. Teerakanok & U. Tetsutaro
    Enhancment of Image Tampering Detection Using JPEG's Quantization and Re-interpolation Processes
    Proc. IEEE 39th Annual Computer Software and Applications Conf. (COMPSAC)
    2015, Vol. 3, pp. 35-39
    DOI: 10.1109/COMPSAC.2015.167
    BibTeX
    @inproceedings{Teerakanok2015,
     author = {Teerakanok, S. and Tetsutaro, U.},
     title = {Enhancment of Image Tampering Detection Using JPEG's Quantization and Re-interpolation Processes},
     booktitle = {Proc. IEEE 39th Annual Computer Software and Applications Conf. (COMPSAC)},
     year = {2015},
     volume = {3},
     pages = {35--39}}
    
  260. T.H. Thai, F. Retraint & R. Cogranne
    Generalized Signal-dependent Noise Model and Parameter Estimation for Natural Images
    Signal Processing, 2015(0), pp. -
    DOI: 10.1016/j.sigpro.2015.02.020
    BibTeX
    @article{Thai2015,
     author = {Thai, Thanh Hai and Retraint, Florent and Cogranne, Rémi},
     title = {Generalized Signal-dependent Noise Model and Parameter Estimation for Natural Images},
     journal = {Signal Processing},
     year = {2015},
     number = {0},
     pages = {-}}
    
  261. T.H. Thai, F. Retraint & R. Cogranne
    Camera Model Identification Based on DCT\ Coefficient Statistics
    Digital Signal Processing, 2015(0), pp. -
    DOI: 10.1016/j.dsp.2015.01.002
    BibTeX
    @article{Thai2015a,
     author = {Thai, Thanh Hai and Retraint, Florent and Cogranne, Rémi},
     title = {Camera Model Identification Based on DCT\ Coefficient Statistics},
     journal = {Digital Signal Processing},
     year = {2015},
     number = {0},
     pages = {-}}
    
  262. T. Thongkamwitoon, H. Muammar & P.L. Dragotti
    An Image Recapture Detection Algorithm Based on Learning Dictionaries of Edge Profiles
    IEEE Transactions on Information Forensics and Security, 2015, Vol. 10(5), pp. 953-968
    DOI: 10.1109/TIFS.2015.2392566
    BibTeX
    @article{Thongkamwitoon2015,
     author = {Thongkamwitoon, T. and Muammar, H. and Dragotti, P. L.},
     title = {An Image Recapture Detection Algorithm Based on Learning Dictionaries of Edge Profiles},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2015},
     volume = {10},
     number = {5},
     pages = {953--968}}
    
  263. N. Tiwari, D. Dubey & A. Goyal
    Reducing Forged Features Using Tampered and Inconsistent Image Detection Techniques in Digital Image Processing
    Proc. Fifth Int Communication Systems and Network Technologies (CSNT) Conf
    2015, pp. 564-567
    DOI: 10.1109/CSNT.2015.286
    BibTeX
    @inproceedings{Tiwari2015,
     author = {Tiwari, N. and Dubey, D. and Goyal, A.},
     title = {Reducing Forged Features Using Tampered and Inconsistent Image Detection Techniques in Digital Image Processing},
     booktitle = {Proc. Fifth Int Communication Systems and Network Technologies (CSNT) Conf},
     year = {2015},
     pages = {564--567}}
    
  264. D. Tralic, S. Grgic, X. Sun & P.L. Rosin
    Combining Cellular Automata and Local Binary Patterns for Copy-move Forgery Detection
    Multimedia Tools and Applications, Springer, 2015, pp. 1
    DOI: 10.1007/s11042-015-2961-2
    BibTeX
    @article{Tralic2015,
     author = {Tralic, Dijana and Grgic, Sonja and Sun, Xianfang and Rosin, Paul L.},
     title = {Combining Cellular Automata and Local Binary Patterns for Copy-move Forgery Detection},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2015},
     pages = {1}}
    
  265. A. Tuama, F. Comby & M. Chaumont
    Source Camera Model Identification Using Features from Contaminated Sensor Noise
    The 14th International Workshop on Digital-forensics and Watermarking IWDW 2015, 2015
    BibTeX
    @article{Tuama2015,
     author = {Tuama, Amel and Comby, Frederic and Chaumont, Marc},
     title = {Source Camera Model Identification Using Features from Contaminated Sensor Noise},
     journal = {The 14th International Workshop on Digital-forensics and Watermarking IWDW 2015},
     year = {2015}}
    
  266. S. Turk, O. Bingol & G. Ulutas
    Detection of Copy-move Forgery Using Dogcode
    Proc. 23th Signal Processing and Communications Applications Conf. (SIU)
    2015, pp. 2366-2369
    DOI: 10.1109/SIU.2015.7130356
    BibTeX
    @inproceedings{Turk2015,
     author = {Turk, Salih and Bingol, Ozkan and Ulutas, Guzin},
     title = {Detection of Copy-move Forgery Using Dogcode},
     booktitle = {Proc. 23th Signal Processing and Communications Applications Conf. (SIU)},
     year = {2015},
     pages = {2366--2369}}
    
  267. D.M. Uliyan, H.A. Jalab & A.W.A. Wahab
    Copy Move Image Forgery Detection Using Hessian and Center Symmetric Local Binary Pattern
    Proc. IEEE Confernece Open Systems (ICOS)
    2015, pp. 7-11
    DOI: 10.1109/ICOS.2015.7377269
    BibTeX
    @inproceedings{Uliyan2015,
     author = {Uliyan, D. M. and Jalab, H. A. and Wahab, A. W. A.},
     title = {Copy Move Image Forgery Detection Using Hessian and Center Symmetric Local Binary Pattern},
     booktitle = {Proc. IEEE Confernece Open Systems (ICOS)},
     year = {2015},
     pages = {7--11}}
    
  268. B. Ustubioglu, S. Ayas, H. Dogan & G. Ulutas
    Image Forgery Detection Based on Colour SIFT
    Proc. 23th Signal Processing and Communications Applications Conf. (SIU)
    2015, pp. 1741-1744
    DOI: 10.1109/SIU.2015.7130189
    BibTeX
    @inproceedings{Ustubioglu2015,
     author = {Ustubioglu, Beste and Ayas, Selen and Dogan, Hulya and Ulutas, Guzin},
     title = {Image Forgery Detection Based on Colour SIFT},
     booktitle = {Proc. 23th Signal Processing and Communications Applications Conf. (SIU)},
     year = {2015},
     pages = {1741--1744}}
    
  269. B. Ustubioglu, V. Nabiyev, G. Ulutas & M. Ulutas
    Image Forgery Detection Using Colour Moments
    Proc. 38th Int Telecommunications and Signal Processing (TSP) Conf
    2015, pp. 540-544
    DOI: 10.1109/TSP.2015.7296321
    BibTeX
    @inproceedings{Ustubioglu2015b,
     author = {Ustubioglu, B. and Nabiyev, V. and Ulutas, G. and Ulutas, M.},
     title = {Image Forgery Detection Using Colour Moments},
     booktitle = {Proc. 38th Int Telecommunications and Signal Processing (TSP) Conf},
     year = {2015},
     pages = {540--544}}
    
  270. B. Ustubioglu, G. Ulutas, V. Nabiyev & M. Ulutas
    Image Forgery Detection Based on Energy Probability
    Proc. 23th Signal Processing and Communications Applications Conf. (SIU)
    2015, pp. 919-922
    DOI: 10.1109/SIU.2015.7129980
    BibTeX
    @inproceedings{Ustubioglu2015a,
     author = {Ustubioglu, Beste and Ulutas, Guzin and Nabiyev, Vasif and Ulutas, Mustafa},
     title = {Image Forgery Detection Based on Energy Probability},
     booktitle = {Proc. 23th Signal Processing and Communications Applications Conf. (SIU)},
     year = {2015},
     pages = {919--922}}
    
  271. G. Valenzise, S. Tubaro & M. Tagliasacchi
    Anti-Forensics of Multimedia Data and Countermeasures
    Ho/Handbook of Digital Forensics of Multimedia Data and Devices
    Wiley-Blackwell, 2015, pp. 612-651
    DOI: 10.1002/9781118705773.ch16
    BibTeX
    @incollection{Valenzise_2015,
     author = {Valenzise, Giuseppe and Tubaro, Stefano and Tagliasacchi, Marco},
     title = {Anti-Forensics of Multimedia Data and Countermeasures},
     booktitle = {Ho/Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-Blackwell},
     year = {2015},
     pages = {612--651}}
    
  272. D. Valsesia, G. Coluccia, T. Bianchi & E. Magli
    Compressed Fingerprint Matching and Camera Identification Via Random Projections
    IEEE Transactions on Information Forensics and Security, 2015, Vol. 10(7), pp. 1472-1485
    DOI: 10.1109/TIFS.2015.2415461
    BibTeX
    @article{Valsesia2015,
     author = {Valsesia, D. and Coluccia, G. and Bianchi, T. and Magli, E.},
     title = {Compressed Fingerprint Matching and Camera Identification Via Random Projections},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2015},
     volume = {10},
     number = {7},
     pages = {1472--1485}}
    
  273. D. Valsesia, G. Coluccia, T. Bianchi & E. Magli
    Image Retrieval Based on Compressed Camera Sensor Fingerprints
    Proc. IEEE Int Multimedia and Expo (ICME) Conf
    2015, pp. 1-6
    DOI: 10.1109/ICME.2015.7177454
    BibTeX
    @inproceedings{Valsesia2015a,
     author = {Valsesia, D. and Coluccia, G. and Bianchi, T. and Magli, E.},
     title = {Image Retrieval Based on Compressed Camera Sensor Fingerprints},
     booktitle = {Proc. IEEE Int Multimedia and Expo (ICME) Conf},
     year = {2015},
     pages = {1--6}}
    
  274. D. Valsesia, G. Coluccia, T. Bianchi & E. Magli
    Large-scale Image Retrieval Based on Compressed Camera Identification
    IEEE Transactions on Multimedia, 2015, Vol. 17(9), pp. 1439-1449
    DOI: 10.1109/TMM.2015.2455417
    BibTeX
    @article{Valsesia2015b,
     author = {Valsesia, D. and Coluccia, G. and Bianchi, T. and Magli, E.},
     title = {Large-scale Image Retrieval Based on Compressed Camera Identification},
     journal = {IEEE Transactions on Multimedia},
     year = {2015},
     volume = {17},
     number = {9},
     pages = {1439--1449}}
    
  275. D. Valsesia, G. Coluccia, T. Bianchi & E. Magli
    Scale-robust Compressive Camera Fingerprint Matching with Random Projections
    Proc. IEEE Int Acoustics, Speech and Signal Processing (ICASSP) Conf
    2015, pp. 1697-1701
    DOI: 10.1109/ICASSP.2015.7178260
    BibTeX
    @inproceedings{Valsesia2015c,
     author = {Valsesia, D. and Coluccia, G. and Bianchi, T. and Magli, E.},
     title = {Scale-robust Compressive Camera Fingerprint Matching with Random Projections},
     booktitle = {Proc. IEEE Int Acoustics, Speech and Signal Processing (ICASSP) Conf},
     year = {2015},
     pages = {1697--1701}}
    
  276. D. Vázquez-Padín
    Detection of Image Resampling and Video Encoding Footprints for Forensic Applications
    University of Vigo, Universida de Vigo, 2015
    BibTeX
    @phdthesis{Vazquez-Padin2015a,
     author = {Vázquez-Padín, David},
     title = {Detection of Image Resampling and Video Encoding Footprints for Forensic Applications},
     school = {University of Vigo},
     year = {2015}}
    
  277. D. Vazquez-Padın, P. Comesana & F. Perez-Gonzalez
    An SVD Approach to Forensic Image Resampling Detection
    Proceedings of the 23th European Signal Processing Conference (EUSIPCO 2015)
    Proceedings of the 16th European Signal Processing Conference (EUSIPCO 2008), 2015
    DOI: 10.1109/eusipco.2015.7362748
    BibTeX
    @inproceedings{Vazquez-Padin2015,
     author = {Vazquez-Padın, David and Comesana, Pedro and Perez-Gonzalez, Fernando},
     title = {An SVD Approach to Forensic Image Resampling Detection},
     booktitle = {Proceedings of the 23th European Signal Processing Conference (EUSIPCO 2015)},
     journal = {Proceedings of the 16th European Signal Processing Conference (EUSIPCO 2008)},
     year = {2015}}
    
  278. D.S. Vidyadharan & S.M. Thampi
    Brightness Distribution Based Image Tampering Detection
    Signal Processing, Informatics, Communication and Energy Systems (SPICES), 2015 IEEE International Conference on
    2015, pp. 1-5
    DOI: 10.1109/SPICES.2015.7091555
    BibTeX
    @inproceedings{Vidyadharan2015,
     author = {Vidyadharan, D. S. and Thampi, S. M.},
     title = {Brightness Distribution Based Image Tampering Detection},
     booktitle = {Signal Processing, Informatics, Communication and Energy Systems (SPICES), 2015 IEEE International Conference on},
     year = {2015},
     pages = {1--5}}
    
  279. B. Wang, Y. Tan, M. Zhao, Y. Guo & X. Kong
    Classifier Combination Based Source Identification for Cell Phone Images
    KSII Transactions on Internet and Information Systems (TIIS), 2015, Vol. 9(12), pp. 5087-5102
    DOI: 10.1109/chinasip.2015.7230528
    BibTeX
    @article{Wang2015b,
     author = {Wang, Bo and Tan, Yue and Zhao, Meijuan and Guo, Yanqing and Kong, Xiangwei},
     title = {Classifier Combination Based Source Identification for Cell Phone Images},
     journal = {KSII Transactions on Internet and Information Systems (TIIS)},
     year = {2015},
     volume = {9},
     number = {12},
     pages = {5087--5102}}
    
  280. C. Wang & T. Zhu
    A Survey of Digital Image Blind Detection Based on Tampering Trace
    Electronic Science and Technology, 2015
    BibTeX
    @article{Wang2015,
     author = {Wang, Chenlu and Zhu, Tingge},
     title = {A Survey of Digital Image Blind Detection Based on Tampering Trace},
     journal = {Electronic Science and Technology},
     year = {2015}}
    
  281. Z.H. Wang
    Blind Detection of JPEG Composite Images Based on Quantization Noise Analysis
    Information, Computer and Application Engineering, 2015
    BibTeX
    @article{Wang2015a,
     author = {Wang, Zhi Hong},
     title = {Blind Detection of JPEG Composite Images Based on Quantization Noise Analysis},
     journal = {Information, Computer and Application Engineering},
     year = {2015}}
    
  282. N.B.A. Warif, M.Y.I. Idris, A.W.A. Wahab & R. Salleh
    An Evaluation of Error Level Analysis in Image Forensics
    Proc. 5th IEEE Int. Conf. System Engineering and Technology (ICSET)
    2015, pp. 23-28
    DOI: 10.1109/ICSEngT.2015.7412439
    BibTeX
    @inproceedings{Warif2015,
     author = {Warif, N. B. A. and Idris, M. Y. I. and Wahab, A. W. A. and Salleh, R.},
     title = {An Evaluation of Error Level Analysis in Image Forensics},
     booktitle = {Proc. 5th IEEE Int. Conf. System Engineering and Technology (ICSET)},
     year = {2015},
     pages = {23--28}}
    
  283. M. Worring
    Multimedia Analytics for Image Collection Forensics
    Ho/Handbook of Digital Forensics of Multimedia Data and Devices
    Wiley-Blackwell, 2015, pp. 305-327
    DOI: 10.1002/9781118705773.ch8
    BibTeX
    @incollection{Worring2015,
     author = {Worring, Marcel},
     title = {Multimedia Analytics for Image Collection Forensics},
     booktitle = {Ho/Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-Blackwell},
     year = {2015},
     pages = {305--327}}
    
  284. H. Wu, X. Kong & S. Shang
    A Printer Forensics Method Using Halftone Dot Arrangement Model
    Proc. IEEE China Summit and Int Signal and Information Processing (ChinaSIP) Conf
    2015, pp. 861-865
    DOI: 10.1109/ChinaSIP.2015.7230527
    BibTeX
    @inproceedings{Wu2015,
     author = {Wu, Han and Kong, Xiangwei and Shang, Shize},
     title = {A Printer Forensics Method Using Halftone Dot Arrangement Model},
     booktitle = {Proc. IEEE China Summit and Int Signal and Information Processing (ChinaSIP) Conf},
     year = {2015},
     pages = {861--865}}
    
  285. W.C. Wu, H.F. Hsu & P.Y. Lin
    Active tamper detection of digital images using VQ compression
    Proc. IEEE Int Consumer Electronics - Taiwan (ICCE-TW) Conf
    2015, pp. 508-509
    DOI: 10.1109/ICCE-TW.2015.7217025
    BibTeX
    @inproceedings{Wu2015b,
     author = {Wu, W. C. and Hsu, H. F. and Lin, P. Y.},
     title = {Active tamper detection of digital images using VQ compression},
     booktitle = {Proc. IEEE Int Consumer Electronics - Taiwan (ICCE-TW) Conf},
     year = {2015},
     pages = {508--509}}
    
  286. G. Xu, J. Ye & Y.-Q. Shi
    New Developments in Image Tampering Detection
    Digital-Forensics and Watermarking, Springer, 2015
    DOI: 10.1007/978-3-319-19321-2_1
    BibTeX
    @article{Xu2015,
     author = {Xu, Guanshuo and Ye, Jingyu and Shi, Yun-Qing},
     title = {New Developments in Image Tampering Detection},
     journal = {Digital-Forensics and Watermarking},
     publisher = {Springer},
     year = {2015}}
    
  287. J. Xu, Y. Ling & X. Zheng
    Forensic Detection of Gaussian Low-pass Filtering in Digital Images
    Proc. 8th Int. Congress Image and Signal Processing (CISP)
    2015, pp. 819-823
    DOI: 10.1109/CISP.2015.7407990
    BibTeX
    @inproceedings{Xu2015a,
     author = {Xu, J. and Ling, Y. and Zheng, X.},
     title = {Forensic Detection of Gaussian Low-pass Filtering in Digital Images},
     booktitle = {Proc. 8th Int. Congress Image and Signal Processing (CISP)},
     year = {2015},
     pages = {819--823}}
    
  288. N. Yadav & R. Kapdi
    Copy move forgery detection using SIFT and GMM
    Proc. 5th Nirma University Int. Conf. Engineering (NUiCONE)
    2015, pp. 1-4
    DOI: 10.1109/NUICONE.2015.7449647
    BibTeX
    @inproceedings{Yadav2015,
     author = {Yadav, N. and Kapdi, R.},
     title = {Copy move forgery detection using SIFT and GMM},
     booktitle = {Proc. 5th Nirma University Int. Conf. Engineering (NUiCONE)},
     year = {2015},
     pages = {1--4}}
    
  289. B. Yang, X. Sun, X. Xin, W. Hu & Y. Wu
    Image Copy-move Forgery Detection Based on Sped-up Robust Features Descriptor and Adaptive Minimal-maximal Suppression
    Journal of Electronic Imaging, 2015, Vol. 24(6), pp. 063016
    DOI: 10.1117/1.JEI.24.6.063016
    BibTeX
    @article{Yang2015d,
     author = {Yang, Bin and Sun, Xingming and Xin, Xiangyang and Hu, Weifeng and Wu, Youxin},
     title = {Image Copy-move Forgery Detection Based on Sped-up Robust Features Descriptor and Adaptive Minimal-maximal Suppression},
     journal = {Journal of Electronic Imaging},
     year = {2015},
     volume = {24},
     number = {6},
     pages = {063016}}
    
  290. F. Yang & T. Gao
    Erratum to: A Novel Image Splicing Forensic Algorithm Based on Generalized Dct Coefficient-pair Histogram
    Advances in Image and Graphics Technologies
    Springer, 2015
    DOI: 10.1007/978-3-662-47791-5_51
    BibTeX
    @incollection{Yang2015c,
     author = {Yang, Fusheng and Gao, Tiegang},
     title = {Erratum to: A Novel Image Splicing Forensic Algorithm Based on Generalized Dct Coefficient-pair Histogram},
     booktitle = {Advances in Image and Graphics Technologies},
     publisher = {Springer},
     year = {2015}}
    
  291. J. Yang, G. Zhu, J. Huang & X. Zhao
    Estimating JPEG Compression History of Bitmaps Based on Factor Histogram
    Digital Signal Processing, 2015, Vol. 41, pp. 90-97
    DOI: 10.1016/j.dsp.2015.03.014
    BibTeX
    @article{Yang2015b,
     author = {Yang, Jianquan and Zhu, Guopu and Huang, Jiwu and Zhao, Xi},
     title = {Estimating JPEG Compression History of Bitmaps Based on Factor Histogram},
     journal = {Digital Signal Processing},
     year = {2015},
     volume = {41},
     pages = {90--97}}
    
  292. Q. Yang, F. Peng, J.-T. Li & M. Long
    Image Tamper Detection Based on Noise Estimation and Lacunarity Texture
    Multimedia Tools and Applications, Springer, 2015, pp. 1
    DOI: 10.1007/s11042-015-3079-2
    BibTeX
    @article{Yang2015a,
     author = {Yang, Qiuwei and Peng, Fei and Li, Jiao-Ting and Long, Min},
     title = {Image Tamper Detection Based on Noise Estimation and Lacunarity Texture},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2015},
     pages = {1}}
    
  293. R. Yang, Z. Bai, L. Yin & H. Gao
    Detecting of Copy-move Forgery in Digital Images Using Fractional Fourier Transform
    Falco, C. M. & Jiang, X. (ed.)
    Proc. of the Seventh International Conference on Digital Image Processing: ICDIP 2015
    Proc. SPIE, SPIE-Intl Soc Optical Eng, 2015, Vol. 9631, pp. 96310B-96310B-6
    DOI: 10.1117/12.2197146
    BibTeX
    @inproceedings{Yang2015,
     author = {Yang, Renqing and Bai, Zhengyao and Yin, Liguo and Gao, Hao},
     title = {Detecting of Copy-move Forgery in Digital Images Using Fractional Fourier Transform},
     booktitle = {Proc. of the Seventh International Conference on Digital Image Processing: ICDIP 2015},
     journal = {Proc. SPIE},
     publisher = {SPIE-Intl Soc Optical Eng},
     year = {2015},
     volume = {9631},
     pages = {96310B-96310B-6}}
    
  294. T. Yin, G. Yang, L. Li, D. Zhang & X. Sun
    Detecting Seam Carving Based Image Resizing Using Local Binary Patterns
    Computers & Security, Elsevier BV, 2015, Vol. 55, pp. 130-141
    DOI: 10.1016/j.cose.2015.09.003
    BibTeX
    @article{Yin2015,
     author = {Yin, Ting and Yang, Gaobo and Li, Leida and Zhang, Dengyong and Sun, Xingming},
     title = {Detecting Seam Carving Based Image Resizing Using Local Binary Patterns},
     journal = {Computers & Security},
     publisher = {Elsevier BV},
     year = {2015},
     volume = {55},
     pages = {130--141}}
    
  295. S.N. Youseph & R.R. Cherian
    Pixel and Edge Based Illuminant Color Estimation for Image Forgery Detection
    Procedia Computer Science, 2015, Vol. 46(0), pp. 1635-1642
    DOI: 10.1016/j.procs.2015.02.099
    BibTeX
    @article{Youseph2015,
     author = {Youseph, Shahana N. and Cherian, Rajesh Roy},
     title = {Pixel and Edge Based Illuminant Color Estimation for Image Forgery Detection},
     journal = {Procedia Computer Science},
     year = {2015},
     volume = {46},
     number = {0},
     pages = {1635--1642}}
    
  296. L. Yu, Q. Han, S.M. Yao & J. Fang
    An Improved Parameter Estimation Scheme for Image Modification Detection Based on DCT Coefficient Analysis
    Forensic Science International, 2015
    DOI: 10.1016/j.forsciint.2015.10.024
    BibTeX
    @article{Yu2015,
     author = {Yu, Liyang and Han, Qi and Yao, S. M. and Fang, Junbin},
     title = {An Improved Parameter Estimation Scheme for Image Modification Detection Based on DCT Coefficient Analysis},
     journal = {Forensic Science International},
     year = {2015}}
    
  297. M. Zampoglou, S. Papadopoulos & Y. Kompatsiaris
    Detecting Image Splicing in the Wild (web)
    Proc. IEEE Int Multimedia & Expo Workshops (ICMEW) Conf
    2015, pp. 1-6
    DOI: 10.1109/ICMEW.2015.7169839
    BibTeX
    @inproceedings{Zampoglou2015,
     author = {Zampoglou, M. and Papadopoulos, S. and Kompatsiaris, Y.},
     title = {Detecting Image Splicing in the Wild (web)},
     booktitle = {Proc. IEEE Int Multimedia & Expo Workshops (ICMEW) Conf},
     year = {2015},
     pages = {1--6}}
    
  298. F. Zeng, W. Wang, M. Tang & Z. Cao
    Exposing Blurred Image Forgeries through Blind Image Restoration
    Proc. Cloud and Internet Computing (3PGCIC) 2015 10th Int. Conf. P2P, Parallel, Grid
    2015, pp. 466-469
    DOI: 10.1109/3PGCIC.2015.50
    BibTeX
    @inproceedings{Zeng2015b,
     author = {Zeng, F. and Wang, W. and Tang, M. and Cao, Z.},
     title = {Exposing Blurred Image Forgeries through Blind Image Restoration},
     booktitle = {Proc. Cloud and Internet Computing (3PGCIC) 2015 10th Int. Conf. P2P, Parallel, Grid},
     year = {2015},
     pages = {466--469}}
    
  299. H. Zeng
    Rebuilding the Credibility of Sensor-based Camera Source Identification
    Multimedia Tools and Applications, Springer, 2015, pp. 1
    DOI: 10.1007/s11042-015-3072-9
    BibTeX
    @article{Zeng2015a,
     author = {Zeng, Hui},
     title = {Rebuilding the Credibility of Sensor-based Camera Source Identification},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2015},
     pages = {1}}
    
  300. H. Zeng, J. Chen, X. Kang & W. Zeng
    Removing Camera Fingerprint to Disguise Photograph Source
    Proc. IEEE Int Image Processing (ICIP) Conf
    2015, pp. 1687-1691
    DOI: 10.1109/ICIP.2015.7351088
    BibTeX
    @inproceedings{Zeng2015,
     author = {Zeng, Hui and Chen, Jiansheng and Kang, Xiangui and Zeng, Wenjun},
     title = {Removing Camera Fingerprint to Disguise Photograph Source},
     booktitle = {Proc. IEEE Int Image Processing (ICIP) Conf},
     year = {2015},
     pages = {1687--1691}}
    
  301. L. Zhan & Y. Zhu
    Passive Forensics for Image Splicing Based on PCA Noise Estimation
    Proc. 10th Int. Conf. for Internet Technology and Secured Transactions (ICITST)
    2015, pp. 78-83
    DOI: 10.1109/ICITST.2015.7412062
    BibTeX
    @inproceedings{Zhan2015,
     author = {Zhan, L. and Zhu, Y.},
     title = {Passive Forensics for Image Splicing Based on PCA Noise Estimation},
     booktitle = {Proc. 10th Int. Conf. for Internet Technology and Secured Transactions (ICITST)},
     year = {2015},
     pages = {78--83}}
    
  302. Y. Zhang, S. Li, S. Wang & X. Zhao
    Identifying Image Splicing Based on Local Statistical Features in DCT and DWT Domain
    Mu, J., Liang, Q., Wang, W., Zhang, B. & Pi, Y. (ed.)
    The Proceedings of the Third International Conference on Communications, Signal Processing, and Systems
    Springer International Publishing, 2015, Vol. 322, pp. 723-731
    DOI: 10.1007/978-3-319-08991-1_75
    BibTeX
    @incollection{Zhang2015,
     author = {Zhang, Yujin and Li, Shenghong and Wang, Shilin and Zhao, Xudong},
     title = {Identifying Image Splicing Based on Local Statistical Features in DCT and DWT Domain},
     booktitle = {The Proceedings of the Third International Conference on Communications, Signal Processing, and Systems},
     publisher = {Springer International Publishing},
     year = {2015},
     volume = {322},
     pages = {723--731}}
    
  303. F. Zhao, R. Zhang, H. Guo & Y. Zhang
    Effective Digital Image Copy-move Location Algorithm Robust to Geometric Transformations
    Proc. IEEE Int Signal Processing, Communications and Computing (ICSPCC) Conf
    2015, pp. 1-5
    DOI: 10.1109/ICSPCC.2015.7338958
    BibTeX
    @inproceedings{Zhao2015c,
     author = {Zhao, Fuxing and Zhang, Rong and Guo, Haolong and Zhang, Yanhua},
     title = {Effective Digital Image Copy-move Location Algorithm Robust to Geometric Transformations},
     booktitle = {Proc. IEEE Int Signal Processing, Communications and Computing (ICSPCC) Conf},
     year = {2015},
     pages = {1--5}}
    
  304. J.-H. Zhao
    Research on Image Passive Forensics Based on ASIFT and Circle Projection Features
    JSCUT(Natural Science Edition), 2015, Vol. 42(3)
    BibTeX
    @article{Zhao2015,
     author = {Zhao, Jun-Hong},
     title = {Research on Image Passive Forensics Based on ASIFT and Circle Projection Features},
     journal = {JSCUT(Natural Science Edition)},
     year = {2015},
     volume = {42},
     number = {3}}
    
  305. X. Zhao, S. Wang, S. Li & J. Li
    Passive Image-splicing Detection by a 2-D Noncausal Markov Model
    Circuits and Systems for Video Technology, IEEE Transactions on, 2015, Vol. 25(2), pp. 185-199
    DOI: 10.1109/TCSVT.2014.2347513
    BibTeX
    @article{Zhao2015a,
     author = {Zhao, Xudong and Wang, Shilin and Li, Shenghong and Li, Jianhua},
     title = {Passive Image-splicing Detection by a 2-D Noncausal Markov Model},
     journal = {Circuits and Systems for Video Technology, IEEE Transactions on},
     year = {2015},
     volume = {25},
     number = {2},
     pages = {185--199}}
    
  306. H. Zhen & L. Jinjiang
    Exposing Image Sharpen Forgeries Based on Dyadic Contrast Contourlet
    nternational Journal of Multimedia and Ubiquitous Engineering, 2015, Vol. 10(7)
    DOI: 10.14257/ijmue.2015.10.7.25
    BibTeX
    @article{Zhen2015,
     author = {Zhen, Hua and Jinjiang, Li},
     title = {Exposing Image Sharpen Forgeries Based on Dyadic Contrast Contourlet},
     journal = {nternational Journal of Multimedia and Ubiquitous Engineering},
     year = {2015},
     volume = {10},
     number = {7}}
    
  307. J. Zheng, T. Zhu, Z. Li, W. Xing & J. Ren
    Exposing Image Forgery by Detecting Traces of Feather Operation
    Journal of Visual Languages & Computing, 2015, Vol. 27, pp. 9-18
    DOI: 10.1016/j.jvlc.2015.02.002
    BibTeX
    @article{Zheng2015,
     author = {Zheng, Jiangbin and Zhu, Tingge and Li, Zhe and Xing, Weiwei and Ren, JinChang},
     title = {Exposing Image Forgery by Detecting Traces of Feather Operation},
     journal = {Journal of Visual Languages & Computing},
     year = {2015},
     volume = {27},
     pages = {9--18}}
    
  308. J. Zhong & Y. Gan
    Detection of Copy--move Forgery Using Discrete Analytical Fourier--mellin Transform
    Nonlinear Dynamics, Springer Netherlands, 2015, pp. 1-14
    DOI: 10.1007/s11071-015-2374-9
    BibTeX
    @article{Zhong2015a,
     author = {Zhong, Junliu and Gan, Yanfen},
     title = {Detection of Copy--move Forgery Using Discrete Analytical Fourier--mellin Transform},
     journal = {Nonlinear Dynamics},
     publisher = {Springer Netherlands},
     year = {2015},
     pages = {1--14}}
    
  309. J. Zhong & Y. Gan
    Discrete Polar Complex Exponential Transform for Image Rotation Duplication Detection
    Advanced Science and Technology Letters, 2015
    DOI: 10.14257/astl.2015.81.05
    BibTeX
    @article{Zhong2015b,
     author = {Zhong, Junliu and Gan, Yanfen},
     title = {Discrete Polar Complex Exponential Transform for Image Rotation Duplication Detection},
     journal = {Advanced Science and Technology Letters},
     year = {2015}}
    
  310. J. Zhong, Y. Gan & S. Xie
    Radon Odd Radial Harmonic Fourier Moments in Detecting Cloned Forgery Image
    Chaos, Solitons & Fractals, 2015, pp. -
    DOI: 10.1016/j.chaos.2015.10.010
    BibTeX
    @article{Zhong2015,
     author = {Zhong, Junliu and Gan, Yanfen and Xie, Shuai},
     title = {Radon Odd Radial Harmonic Fourier Moments in Detecting Cloned Forgery Image},
     journal = {Chaos, Solitons & Fractals},
     year = {2015},
     pages = {-}}
    
  311. Z. ..P. .. Zhou, C. ..Y. .. Hu & C. ..J. .. Zhou
    Mobile Camera Source Identification Based on CFA Interpolation and Large Components of Sensor Pattern Noise
    Zheng, D. (ed.)
    Proceedings of the International Conference on Control, Mechatronics and Automation Technology (ICCMAT 2014)
    Control, Mechatronics and Automation Technology, 2015, pp. 239243
    BibTeX
    @inproceedings{Zhou2015,
     author = {Zhou, Z. . P. . and Hu, C. . Y. . and Zhou, C. . J. .},
     title = {Mobile Camera Source Identification Based on CFA Interpolation and Large Components of Sensor Pattern Noise},
     booktitle = {Proceedings of the International Conference on Control, Mechatronics and Automation Technology (ICCMAT 2014)},
     journal = {Control, Mechatronics and Automation Technology},
     year = {2015},
     pages = {239243}}
    


2014

  1. A. Ahmadi & A. Amani
    Image Forgery Detection Exploiting Image Randomness
    King Saud University College of Computer & Information Sciences Department of Computer Science, King Saud University College of Computer & Information Sciences Department of Computer Science, 2014
    DOI: 10.1109/cisp.2014.7003901
    BibTeX
    @mastersthesis{AlAhmadi2014,
     author = {Al Ahmadi, Amani A.},
     title = {Image Forgery Detection Exploiting Image Randomness},
     school = {King Saud University College of Computer & Information Sciences Department of Computer Science},
     year = {2014}}
    
  2. M. Ali Qureshi & M. Deriche
    A review on copy move image forgery detection techniques
    Multi-Conference on Systems, Signals & Devices (SSD), 2014 11th International
    2014, pp. 1-5
    DOI: 10.1109/SSD.2014.6808907
    BibTeX
    @inproceedings{AliQureshi2014,
     author = {Ali Qureshi, M. and Deriche, M.},
     title = {A review on copy move image forgery detection techniques},
     booktitle = {Multi-Conference on Systems, Signals & Devices (SSD), 2014 11th International},
     year = {2014},
     pages = {1--5}}
    
  3. NG Allan, L. Pan & Y. Xiang
    A Novel Method for Detecting Double Compressed Facebook JPEG Images
    Batten, L., Li, G., Niu, W. & Warren, M. (ed.)
    Applications and Techniques in Information Security
    Springer Berlin Heidelberg, 2014, Vol. 490, pp. 191-198
    DOI: 10.1007/978-3-662-45670-5_18
    BibTeX
    @incollection{NG2014,
     author = {NG, Allan and Pan, Lei and Xiang, Yang},
     title = {A Novel Method for Detecting Double Compressed Facebook JPEG Images},
     booktitle = {Applications and Techniques in Information Security},
     publisher = {Springer Berlin Heidelberg},
     year = {2014},
     volume = {490},
     pages = {191--198}}
    
  4. I. Amerini, F. Battisti, R. Caldelli, M. Carli & A. Costanzo
    Exploiting perceptual quality issues in countering SIFT-based Forensic methods
    Acoustics, Speech and Signal Processing (ICASSP), 2014 IEEE International Conference on
    2014, pp. 2664-2668
    DOI: 10.1109/ICASSP.2014.6854083
    BibTeX
    @inproceedings{Amerini2014b,
     author = {Amerini, I. and Battisti, F. and Caldelli, R. and Carli, M. and Costanzo, A.},
     title = {Exploiting perceptual quality issues in countering SIFT-based Forensic methods},
     booktitle = {Acoustics, Speech and Signal Processing (ICASSP), 2014 IEEE International Conference on},
     year = {2014},
     pages = {2664--2668}}
    
  5. I. Amerini, R. Becarelli, R. Caldelli & A.D. Mastio
    Splicing forgeries localization through the use of first digit features
    2014 IEEE International Workshop on Information Forensics and Security (WIFS)
    Institute of Electrical & Electronics Engineers (IEEE), 2014, pp. 143-148
    DOI: 10.1109/WIFS.2014.7084318
    BibTeX
    @inproceedings{Amerini2014c,
     author = {Irene Amerini and Rudy Becarelli and Roberto Caldelli and Andrea Del Mastio},
     title = {Splicing forgeries localization through the use of first digit features},
     booktitle = {2014 IEEE International Workshop on Information Forensics and Security (WIFS)},
     publisher = {Institute of Electrical & Electronics Engineers (IEEE)},
     year = {2014},
     pages = {143--148}}
    
  6. I. Amerini, R. Caldelli, P. Crescenzi, A.D. Mastio & A. Marino
    Blind Image Clustering Based on the Normalized Cuts Criterion for Camera Identification
    Signal Processing: Image Communication, 2014(0), pp. -
    DOI: 10.1016/j.image.2014.07.003
    BibTeX
    @article{Amerini2014a,
     author = {I. Amerini and R. Caldelli and P. Crescenzi and A. Del Mastio and A. Marino},
     title = {Blind Image Clustering Based on the Normalized Cuts Criterion for Camera Identification},
     journal = {Signal Processing: Image Communication},
     year = {2014},
     number = {0},
     pages = {-}}
    
  7. I. Amerini, R. Caldelli, A. Del Bimbo, A. Di Fuccia, L. Saravo & A.P. Rizzo
    Copy-move forgery detection from printed images
    Alattar, A. M., Memon, N. D. & Heitzenrater, C. D. (ed.)
    Proc. SPIE 9028, Media Watermarking, Security, and Forensics 2014
    Proc. SPIE, 2014, Vol. 9028, pp. 90280Y-90280Y-10
    DOI: 10.1117/12.2039509
    BibTeX
    @inproceedings{Amerini2014,
     author = {Amerini, Irene and Caldelli, Roberto and Del Bimbo, Alberto and Di Fuccia, Andrea and Saravo, Luigi and Rizzo, Anna Paola},
     title = {Copy-move forgery detection from printed images},
     booktitle = {Proc. SPIE 9028, Media Watermarking, Security, and Forensics 2014},
     journal = {Proc. SPIE},
     year = {2014},
     volume = {9028},
     pages = {90280Y-90280Y-10}}
    
  8. S. Amtullah & A. Koul
    Passive Image Forensic Method to Detect Copy Move Forgery in Digital Images
    IOSR Journal of Computer Engineering (IOSR-JCE), 2014, Vol. 16(2), pp. 96-104
    DOI: 10.9790/0661-1621296104
    BibTeX
    @article{Amtullah2014,
     author = {Salma Amtullah and Ajay Koul},
     title = {Passive Image Forensic Method to Detect Copy Move Forgery in Digital Images},
     journal = {IOSR Journal of Computer Engineering (IOSR-JCE)},
     year = {2014},
     volume = {16},
     number = {2},
     pages = {96--104}}
    
  9. V. Anand, M.F. Hashmi & A.G. Keskar
    A Copy Move Forgery Detection to Overcome Sustained Attacks Using Dyadic Wavelet Transform and SIFT Methods
    Nguyen, N., Attachoo, B., Trawiński, B. & Somboonviwat, K. (ed.)
    Intelligent Information and Database Systems
    Springer International Publishing, 2014, Vol. 8397, pp. 530-542
    DOI: 10.1007/978-3-319-05476-6_54
    BibTeX
    @incollection{Anand2014,
     author = {Vijay Anand and Mohammad Farukh Hashmi and Avinash G. Keskar},
     title = {A Copy Move Forgery Detection to Overcome Sustained Attacks Using Dyadic Wavelet Transform and SIFT Methods},
     booktitle = {Intelligent Information and Database Systems},
     publisher = {Springer International Publishing},
     year = {2014},
     volume = {8397},
     pages = {530--542}}
    
  10. M.S.R. Asati & M.P.R.Pardhi
    Exposing Digital Image Forgeries by Illumination Color Classification
    International Journal of Engineering Trends and Technology, 2014, Vol. 18(6), pp. 269-271
    DOI: 10.14445/22315381/IJETT-V18P255
    BibTeX
    @article{Asati2014,
     author = {Ms. Shraddha R Asati and Mr. P.R.Pardhi},
     title = {Exposing Digital Image Forgeries by Illumination Color Classification},
     journal = {International Journal of Engineering Trends and Technology},
     year = {2014},
     volume = {18},
     number = {6},
     pages = {269--271}}
    
  11. D.A. Ayalneh, H.J. Kim & Y.S. Choi
    JPEG copy paste forgery detection using BAG optimized for complex images
    Advanced Communication Technology (ICACT), 2014 16th International Conference on
    2014, pp. 181-185
    DOI: 10.1109/ICACT.2014.6778945
    BibTeX
    @inproceedings{Ayalneh2014,
     author = {Ayalneh, Dessalegn Atnafu and Kim, Hyoung Joong and Choi, Yong Soo},
     title = {JPEG copy paste forgery detection using BAG optimized for complex images},
     booktitle = {Advanced Communication Technology (ICACT), 2014 16th International Conference on},
     year = {2014},
     pages = {181--185}}
    
  12. K. Bahrami & A. Kot
    Image tampering detection by exposing blur type inconsistency
    Acoustics, Speech and Signal Processing (ICASSP), 2014 IEEE International Conference on
    Institute of Electrical & Electronics Engineers (IEEE), 2014, pp. 2654-2658
    DOI: 10.1109/ICASSP.2014.6854081
    BibTeX
    @inproceedings{Bahrami2014,
     author = {Bahrami, K. and Kot, A.C.},
     title = {Image tampering detection by exposing blur type inconsistency},
     booktitle = {Acoustics, Speech and Signal Processing (ICASSP), 2014 IEEE International Conference on},
     publisher = {Institute of Electrical & Electronics Engineers (IEEE)},
     year = {2014},
     pages = {2654--2658}}
    
  13. G. Bhartiya & A.S. Jalal
    Image forgery detection using feature based clustering in JPEG images
    Industrial and Information Systems (ICIIS), 2014 9th International Conference on
    2014, pp. 1-5
    DOI: 10.1109/ICIINFS.2014.7036583
    BibTeX
    @inproceedings{Bhartiya2014,
     author = {Bhartiya, Gunjan and Jalal, Anand Singh},
     title = {Image forgery detection using feature based clustering in JPEG images},
     booktitle = {Industrial and Information Systems (ICIIS), 2014 9th International Conference on},
     year = {2014},
     pages = {1--5}}
    
  14. G.K. Birajdar & V.H. Mankar
    Blind method for rescaling detection and rescale factor estimation in digital images using periodic properties of interpolation
    AEU - International Journal of Electronics and Communications, 2014(0), pp. -
    DOI: 10.1016/j.aeue.2014.01.013
    BibTeX
    @article{Birajdar2014,
     author = {Gajanan K. Birajdar and Vijay H. Mankar},
     title = {Blind method for rescaling detection and rescale factor estimation in digital images using periodic properties of interpolation},
     journal = {AEU - International Journal of Electronics and Communications},
     year = {2014},
     number = {0},
     pages = {-}}
    
  15. S. Bo, Y. Quan-qiao, W. Shi-lin, Z. Cheng-lin & L. Shen-ghong
    Image Splicing Detection Based on Improved Markov Model
    Zhang, B., Mu, J., Wang, W., Liang, Q. & Pi, Y. (ed.)
    The Proceedings of the Second International Conference on Communications, Signal Processing, and Systems
    Springer International Publishing, 2014, Vol. 246, pp. 127-135
    DOI: 10.1007/978-3-319-00536-2_15
    BibTeX
    @incollection{Bo2014,
     author = {Bo, Su and Quan-qiao, Yuan and Shi-lin, Wang and Cheng-lin, Zhao and Shen-ghong, Li},
     title = {Image Splicing Detection Based on Improved Markov Model},
     booktitle = {The Proceedings of the Second International Conference on Communications, Signal Processing, and Systems},
     publisher = {Springer International Publishing},
     year = {2014},
     volume = {246},
     pages = {127--135}}
    
  16. H. Bojinov, D. Boneh, Y. Michakevsky & G. Nakibly
    Mobile Device Identification via Sensor Fingerprinting
    2014
    BibTeX
    @electronic{Bojinov2014,
     author = {Hristo Bojinov and Dan Boneh and Yan Michakevsky and Gabi Nakibly},
     title = {Mobile Device Identification via Sensor Fingerprinting},
     year = {2014}}
    
  17. G. Cao, Y. Zhao, R. Ni & X. Li
    Contrast Enhancement Based Forensics in Digital Images
    Information Forensics and Security, IEEE Transactions on, Institute of Electrical & Electronics Engineers (IEEE), 2014, Vol. 9(99), pp. 515-525
    DOI: 10.1109/TIFS.2014.2300937
    BibTeX
    @article{Cao2014a,
     author = {Cao, G. and Zhao, Y. and Ni, R. and Li, X.},
     title = {Contrast Enhancement Based Forensics in Digital Images},
     journal = {Information Forensics and Security, IEEE Transactions on},
     publisher = {Institute of Electrical & Electronics Engineers (IEEE)},
     year = {2014},
     volume = {9},
     number = {99},
     pages = {515--525}}
    
  18. G. Cao, Y. Zhao, R. Ni, B. Ou & Y. Wang
    Forensic detection of noise addition in digital images
    Journal of Electronic Imaging, SPIE-Intl Soc Optical Eng, 2014, Vol. 23(2), pp. 023004
    DOI: 10.1117/1.JEI.23.2.023004
    BibTeX
    @article{Cao2014b,
     author = {Cao, Gang and Zhao, Yao and Ni, Rongrong and Ou, Bo and Wang, Yongbin},
     title = {Forensic detection of noise addition in digital images},
     journal = {Journal of Electronic Imaging},
     publisher = {SPIE-Intl Soc Optical Eng},
     year = {2014},
     volume = {23},
     number = {2},
     pages = {023004}}
    
  19. G. Cao, Y. Zhao, R. Ni, H. Tian & L. Yu
    Attacking contrast enhancement forensics in digital images
    Science China Information Sciences, Springer Berlin Heidelberg, 2014, Vol. 57(5), pp. 1-13
    DOI: 10.1007/s11432-013-4928-0
    BibTeX
    @article{Cao2014,
     author = {Cao, Gang and Zhao, Yao and Ni, RongRong and Tian, HuaWei and Yu, LiFang},
     title = {Attacking contrast enhancement forensics in digital images},
     journal = {Science China Information Sciences},
     publisher = {Springer Berlin Heidelberg},
     year = {2014},
     volume = {57},
     number = {5},
     pages = {1--13}}
    
  20. G. Cattaneo & G. Roscigno
    A Possible Pitfall in the Experimental Analysis of Tampering Detection Algorithms
    Network-Based Information Systems (NBiS), 2014 17th International Conference on
    2014, pp. 279-286
    DOI: 10.1109/NBiS.2014.82
    BibTeX
    @inproceedings{Cattaneo2014a,
     author = {Cattaneo, G. and Roscigno, G.},
     title = {A Possible Pitfall in the Experimental Analysis of Tampering Detection Algorithms},
     booktitle = {Network-Based Information Systems (NBiS), 2014 17th International Conference on},
     year = {2014},
     pages = {279--286}}
    
  21. G. Cattaneo, G. Roscigno & U. Petrillo
    A Scalable Approach to Source Camera Identification over Hadoop
    Advanced Information Networking and Applications (AINA), 2014 IEEE 28th International Conference on
    2014, pp. 366-373
    DOI: 10.1109/AINA.2014.47
    BibTeX
    @inproceedings{Cattaneo2014,
     author = {Cattaneo, G. and Roscigno, G. and Petrillo, U.F.},
     title = {A Scalable Approach to Source Camera Identification over Hadoop},
     booktitle = {Advanced Information Networking and Applications (AINA), 2014 IEEE 28th International Conference on},
     year = {2014},
     pages = {366--373}}
    
  22. T.-Y. Chang, S.-C. Tai & G.-S. Lin
    A Passive Multi-Purpose Scheme Based on Periodicity Analysis of CFA\ Artifacts For Image Forensics
    Journal of Visual Communication and Image Representation, 2014(0), pp. -
    DOI: 10.1016/j.jvcir.2014.04.010
    BibTeX
    @article{Chang2014,
     author = {Tang-You Chang and Shen-Chuan Tai and Guo-Shiang Lin},
     title = {A Passive Multi-Purpose Scheme Based on Periodicity Analysis of CFA\ Artifacts For Image Forensics},
     journal = {Journal of Visual Communication and Image Representation},
     year = {2014},
     number = {0},
     pages = {-}}
    
  23. A. Cheddad
    Digital Forgery
    The Encyclopedia of Criminology and Criminal Justice
    Blackwell Publishing Ltd, 2014
    DOI: 10.1002/9781118517383.wbeccj132
    BibTeX
    @inbook{Cheddad2014,
     author = {Cheddad, Abbas},
     title = {Digital Forgery},
     booktitle = {The Encyclopedia of Criminology and Criminal Justice},
     publisher = {Blackwell Publishing Ltd},
     year = {2014}}
    
  24. C. Chen, H. Li, W. Luo, R. Yang & J. Huang
    Anti-forensics of JPEG Detectors via Adaptive Quantization Table Replacement
    Proc. 22nd Int Pattern Recognition (ICPR) Conf
    2014, pp. 672-677
    DOI: 10.1109/ICPR.2014.126
    BibTeX
    @inproceedings{Chen2014a,
     author = {C. Chen and H. Li and W. Luo and R. Yang and J. Huang},
     title = {Anti-forensics of JPEG Detectors via Adaptive Quantization Table Replacement},
     booktitle = {Proc. 22nd Int Pattern Recognition (ICPR) Conf},
     year = {2014},
     pages = {672--677}}
    
  25. G. Chierchia, D. Cozzolino, G. Poggi, C. Sansone & L. Verdoliva
    Guided filtering for PRNU-based localization of small-size image forgeries
    2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
    International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Institute of Electrical & Electronics Engineers (IEEE), 2014
    DOI: 10.1109/icassp.2014.6854802
    BibTeX
    @article{Chierchia2014a,
     author = {G. Chierchia and D. Cozzolino and G. Poggi and C. Sansone and L. Verdoliva},
     title = {Guided filtering for PRNU-based localization of small-size image forgeries},
     booktitle = {2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)},
     journal = {International Conference on Acoustics, Speech, and Signal Processing (ICASSP)},
     publisher = {Institute of Electrical & Electronics Engineers (IEEE)},
     year = {2014}}
    
  26. G. Chierchia, D. Cozzolino, G. Poggi, C. Sansone & L. Verdoliva
    Guided filtering for PRNU-based localization of small-size image forgeries
    Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics
    2014, pp. 6231-6235
    DOI: 10.1109/ICASSP.2014.6854802
    BibTeX
    @inproceedings{Chierchia2014b,
     author = {G. Chierchia and D. Cozzolino and G. Poggi and C. Sansone and L. Verdoliva},
     title = {Guided filtering for PRNU-based localization of small-size image forgeries},
     booktitle = {Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics},
     year = {2014},
     pages = {6231--6235}}
    
  27. G. Chierchia, G. Poggi, C. Sansone & L. Verdoliva
    A Bayesian-MRF Approach for PRNU-based Image Forgery Detection
    IEEE Trans.Inform.Forensic Secur., Institute of Electrical & Electronics Engineers (IEEE), 2014, Vol. 9(4), pp. 554-567
    DOI: 10.1109/TIFS.2014.2302078
    BibTeX
    @article{Chierchia2014,
     author = {Giovanni Chierchia and Giovanni Poggi and Carlo Sansone and Luisa Verdoliva},
     title = {A Bayesian-MRF Approach for PRNU-based Image Forgery Detection},
     journal = {IEEE Trans.Inform.Forensic Secur.},
     publisher = {Institute of Electrical & Electronics Engineers (IEEE)},
     year = {2014},
     volume = {9},
     number = {4},
     pages = {554--567}}
    
  28. T. Chihaoui, S. Bourouis & K. Hamrouni
    Copy-move image forgery detection based on SIFT descriptors and SVD-matching
    Advanced Technologies for Signal and Image Processing (ATSIP), 2014 1st International Conference on
    2014, pp. 125-129
    DOI: 10.1109/ATSIP.2014.6834590
    BibTeX
    @inproceedings{Chihaoui2014,
     author = {Chihaoui, T. and Bourouis, S. and Hamrouni, K.},
     title = {Copy-move image forgery detection based on SIFT descriptors and SVD-matching},
     booktitle = {Advanced Technologies for Signal and Image Processing (ATSIP), 2014 1st International Conference on},
     year = {2014},
     pages = {125--129}}
    
  29. V. Conotter, E. Bodnari, G. Boato & H. Farid
    Physiologically-based detection of computer generated faces in video
    Proc. IEEE Int Image Processing (ICIP) Conf
    2014, pp. 248-252
    DOI: 10.1109/ICIP.2014.7025049
    BibTeX
    @inproceedings{Conotter2014,
     author = {Conotter, V. and Bodnari, E. and Boato, G. and Farid, H.},
     title = {Physiologically-based detection of computer generated faces in video},
     booktitle = {Proc. IEEE Int Image Processing (ICIP) Conf},
     year = {2014},
     pages = {248--252}}
    
  30. A. Costanzo, I. Amerini, R. Caldelli & M. Barni
    Forensic Analysis of SIFT Keypoint Removal and Injection
    Information Forensics and Security, IEEE Transactions on, 2014, Vol. 9(9), pp. 1450-1464
    DOI: 10.1109/TIFS.2014.2337654
    BibTeX
    @article{Costanzo2014,
     author = {Costanzo, A. and Amerini, I. and Caldelli, R. and Barni, M.},
     title = {Forensic Analysis of SIFT Keypoint Removal and Injection},
     journal = {Information Forensics and Security, IEEE Transactions on},
     year = {2014},
     volume = {9},
     number = {9},
     pages = {1450--1464}}
    
  31. D. Cozzolino, D. Gragnaniello & L. Verdoliva
    Image forgery detection through residual-based local descriptors and block-matching
    Image Processing (ICIP), 2014 IEEE International Conference on
    2014, pp. 5297-5301
    DOI: 10.1109/ICIP.2014.7026072
    BibTeX
    @inproceedings{Cozzolino2014a,
     author = {Cozzolino, D. and Gragnaniello, D. and Verdoliva, L.},
     title = {Image forgery detection through residual-based local descriptors and block-matching},
     booktitle = {Image Processing (ICIP), 2014 IEEE International Conference on},
     year = {2014},
     pages = {5297--5301}}
    
  32. D. Cozzolino, D. Gragnaniello & L. Verdoliva
    Image forgery localization through the fusion of camera-based, feature-based and pixel-based techniques
    Image Processing (ICIP), 2014 IEEE International Conference on
    2014, pp. 5302-5306
    DOI: 10.1109/ICIP.2014.7026073
    BibTeX
    @inproceedings{Cozzolino2014b,
     author = {Cozzolino, D. and Gragnaniello, D. and Verdoliva, L.},
     title = {Image forgery localization through the fusion of camera-based, feature-based and pixel-based techniques},
     booktitle = {Image Processing (ICIP), 2014 IEEE International Conference on},
     year = {2014},
     pages = {5302--5306}}
    
  33. D. Cozzolino, G. Poggi & L. Verdoliva
    Copy-move forgery detection based on PatchMatch
    Image Processing (ICIP), 2014 IEEE International Conference on
    2014, pp. 5312-5316
    DOI: 10.1109/ICIP.2014.7026075
    BibTeX
    @inproceedings{Cozzolino2014,
     author = {Cozzolino, D. and Poggi, G. and Verdoliva, L.},
     title = {Copy-move forgery detection based on PatchMatch},
     booktitle = {Image Processing (ICIP), 2014 IEEE International Conference on},
     year = {2014},
     pages = {5312--5316}}
    
  34. S. Dadkhah, A.A. Manaf & S. Sadeghi
    Efficient Image Authentication and Tamper Localization Algorithm Using Active Watermarking
    Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations
    Springer, 2014
    DOI: 10.1007/978-3-662-43616-5_5
    BibTeX
    @incollection{Dadkhah2014,
     author = {Dadkhah, Sajjad and Manaf, Azizah Abd and Sadeghi, Somayeh},
     title = {Efficient Image Authentication and Tamper Localization Algorithm Using Active Watermarking},
     booktitle = {Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations},
     publisher = {Springer},
     year = {2014}}
    
  35. D.-T. Dang-Nguyen
    Discrimination of Computer Generated versus Natural Human Faces
    University of Trento, UNITN, University of Trento, UNITN, 2014
    BibTeX
    @phdthesis{Dang-Nguyen2014,
     author = {Duc-Tien Dang-Nguyen},
     title = {Discrimination of Computer Generated versus Natural Human Faces},
     school = {University of Trento, UNITN},
     year = {2014}}
    
  36. A. De Rosa, A. Piva, M. Fontani & M. Iuliani
    Investigating multimedia contents
    Security Technology (ICCST), 2014 International Carnahan Conference on
    2014, pp. 1-6
    DOI: 10.1109/CCST.2014.6986976
    BibTeX
    @inproceedings{DeRosa2014,
     author = {De Rosa, A. and Piva, A. and Fontani, M. and Iuliani, M.},
     title = {Investigating multimedia contents},
     booktitle = {Security Technology (ICCST), 2014 International Carnahan Conference on},
     year = {2014},
     pages = {1--6}}
    
  37. S. Debbarma, A.B. Singh & K.M. Singh
    Keypoints based copy-move forgery detection of digital images
    Proc. Int Informatics, Electronics Vision (ICIEV) Conf
    2014, pp. 1-5
    DOI: 10.1109/ICIEV.2014.7135994
    BibTeX
    @inproceedings{Debbarma2014,
     author = {S. Debbarma and A. B. Singh and K. M. Singh},
     title = {Keypoints based copy-move forgery detection of digital images},
     booktitle = {Proc. Int Informatics, Electronics Vision (ICIEV) Conf},
     year = {2014},
     pages = {1--5}}
    
  38. L. Debiasi, A. Uhl & Z. Sun
    Generation of iris sensor PRNU fingerprints from uncorrelated data
    Biometrics and Forensics (IWBF), 2014 International Workshop on
    2014, pp. 1-6
    DOI: 10.1109/IWBF.2014.6914262
    BibTeX
    @inproceedings{Debiasi2014,
     author = {Debiasi, Luca and Uhl, Andreas and Sun, Zhenan},
     title = {Generation of iris sensor PRNU fingerprints from uncorrelated data},
     booktitle = {Biometrics and Forensics (IWBF), 2014 International Workshop on},
     year = {2014},
     pages = {1--6}}
    
  39. W.N.N. Diane, S. Xingming & F. KueMoise
    A Survey of Partition-Based Techniques for Copy-Move Forgery Detection
    The Scientific World Journal, 2014
    DOI: 10.1155/2014/975456
    BibTeX
    @article{Diane2014,
     author = {Wandji Nanda Nathalie Diane and Sun Xingming and Fah KueMoise},
     title = {A Survey of Partition-Based Techniques for Copy-Move Forgery Detection},
     journal = {The Scientific World Journal},
     year = {2014}}
    
  40. H.G. Dietz
    Out-of-focus point spread functions
    Proc. SPIE 9023, Digital Photography X, 90230J (March 7, 2014)
    Proc. SPIE, 2014, Vol. 9023, pp. 90230J-90230J-11
    DOI: 10.1117/12.2040490
    BibTeX
    @inproceedings{Dietz2014,
     author = {Dietz, Henry Gordon},
     title = {Out-of-focus point spread functions},
     booktitle = {Proc. SPIE 9023, Digital Photography X, 90230J (March 7, 2014)},
     journal = {Proc. SPIE},
     year = {2014},
     volume = {9023},
     pages = {90230J-90230J-11}}
    
  41. F. Ding, G. Zhu & Y.Q. Shi
    A Novel Method for Detecting Image Sharpening Based on Local Binary Pattern
    Digital-Forensics and Watermarking, Springer, 2014
    DOI: 10.1007/978-3-662-43886-2_13
    BibTeX
    @article{Ding2014,
     author = {Ding, Feng and Zhu, Guopu and Shi, Yun Qing},
     title = {A Novel Method for Detecting Image Sharpening Based on Local Binary Pattern},
     journal = {Digital-Forensics and Watermarking},
     publisher = {Springer},
     year = {2014}}
    
  42. A. Dirik, H. Sencar & N. Memon
    Analysis of Seam-Carving-Based Anonymization of Images Against PRNU Noise Pattern-Based Source Attribution
    Information Forensics and Security, IEEE Transactions on, 2014, Vol. 9(12), pp. 2277-2290
    DOI: 10.1109/TIFS.2014.2361200
    BibTeX
    @article{Dirik2014a,
     author = {Dirik, A.E. and Sencar, H.T. and Memon, N.},
     title = {Analysis of Seam-Carving-Based Anonymization of Images Against PRNU Noise Pattern-Based Source Attribution},
     journal = {Information Forensics and Security, IEEE Transactions on},
     year = {2014},
     volume = {9},
     number = {12},
     pages = {2277--2290}}
    
  43. A.E. Dirik & A. Karakücük
    Forensic use of photo response non-uniformity of imaging sensors and a counter method
    Optics Express, 2014, Vol. 22(1), pp. -
    DOI: DOI:10.1364/OE.22.000470
    BibTeX
    @article{Dirik2014,
     author = {Ahmet Emir Dirik and Ahmet Karakücük},
     title = {Forensic use of photo response non-uniformity of imaging sensors and a counter method},
     journal = {Optics Express},
     year = {2014},
     volume = {22},
     number = {1},
     pages = {-}}
    
  44. M. Doyoddorj & K.-H. Rhee
    Robust Copy-Move Forgery Detection Based on Dual-Transform
    Digital Forensics and Cyber Crime
    Digital Forensics and Cyber Crime, Springer, 2014
    DOI: 10.1007/978-3-319-14289-0_1
    BibTeX
    @incollection{Doyoddorj2014,
     author = {Doyoddorj, Munkhbaatar and Rhee, Kyung-Hyune},
     title = {Robust Copy-Move Forgery Detection Based on Dual-Transform},
     booktitle = {Digital Forensics and Cyber Crime},
     journal = {Digital Forensics and Cyber Crime},
     publisher = {Springer},
     year = {2014}}
    
  45. D. Dupplaw, M. Matthews, R. Johansson, G. Boato, A. Costanzo, M. Fontani, E. Minack, E. Demidova, R. Blanco, T. Griffiths, P. Lewis, J. Hare & A. Moschitti
    Information extraction from multimedia web documents: an open-source platform and testbed
    International Journal of Multimedia Information Retrieval, Springer London, 2014, pp. 1-15
    DOI: 10.1007/s13735-014-0051-2
    BibTeX
    @article{Dupplaw2014,
     author = {Dupplaw, DavidPaul and Matthews, Michael and Johansson, Richard and Boato, Giulia and Costanzo, Andrea and Fontani, Marco and Minack, Enrico and Demidova, Elena and Blanco, Roi and Griffiths, Thomas and Lewis, Paul and Hare, Jonathon and Moschitti, Alessandro},
     title = {Information extraction from multimedia web documents: an open-source platform and testbed},
     journal = {International Journal of Multimedia Information Retrieval},
     publisher = {Springer London},
     year = {2014},
     pages = {1--15}}
    
  46. E.-S.M. El-Alfy & M.A. Qureshi
    Combining spatial and DCT based Markov features for enhanced blind detection of image splicing
    Pattern Analysis and Applications, Springer London, 2014, pp. 1-11
    DOI: 10.1007/s10044-014-0396-4
    BibTeX
    @article{El-Alfy2014,
     author = {El-Alfy, E-Sayed M. and Qureshi, Muhammad Ali},
     title = {Combining spatial and DCT based Markov features for enhanced blind detection of image splicing},
     journal = {Pattern Analysis and Applications},
     publisher = {Springer London},
     year = {2014},
     pages = {1--11}}
    
  47. S. Elkasrawi & F. Shafait
    Printer Identification using Supervised Learning for Document Forgery Detection
    2014
    BibTeX
    @misc{Elkasrawi2014,
     author = {Sara Elkasrawi and Faisal Shafait},
     title = {Printer Identification using Supervised Learning for Document Forgery Detection},
     year = {2014}}
    
  48. S. Fadl & N. Semary
    A proposed accelerated image copy-move forgery detection
    Visual Communications and Image Processing Conference, 2014 IEEE
    2014, pp. 253-257
    DOI: 10.1109/VCIP.2014.7051552
    BibTeX
    @inproceedings{Fadl2014a,
     author = {Fadl, S.M. and Semary, N.A.},
     title = {A proposed accelerated image copy-move forgery detection},
     booktitle = {Visual Communications and Image Processing Conference, 2014 IEEE},
     year = {2014},
     pages = {253--257}}
    
  49. S. Fadl, N. Semary & M. Hadhoud
    Copy-rotate-move forgery detection based on spatial domain
    Computer Engineering & Systems (ICCES), 2014 9th International Conference on
    2014, pp. 136-141
    DOI: 10.1109/ICCES.2014.7030944
    BibTeX
    @inproceedings{Fadl2014,
     author = {Fadl, S.M. and Semary, N.A. and Hadhoud, M.M.},
     title = {Copy-rotate-move forgery detection based on spatial domain},
     booktitle = {Computer Engineering & Systems (ICCES), 2014 9th International Conference on},
     year = {2014},
     pages = {136--141}}
    
  50. S.M. Fadl, N.A. Semary & M.M. Hadhoud
    Fan Search for Image Copy-Move Forgery Detection
    Advanced Machine Learning Technologies and Applications
    Springer, 2014
    DOI: 10.1007/978-3-319-13461-1_18
    BibTeX
    @incollection{Fadl2014b,
     author = {Fadl, Sondos M. and Semary, Noura A. and Hadhoud, Mohiy M.},
     title = {Fan Search for Image Copy-Move Forgery Detection},
     booktitle = {Advanced Machine Learning Technologies and Applications},
     publisher = {Springer},
     year = {2014}}
    
  51. G. Fahmy
    Nonorthogonal DCT implementation for JPEG forensics
    Hybrid Intelligent Systems (HIS), 2014 14th International Conference on
    2014, pp. 7-11
    DOI: 10.1109/HIS.2014.7086195
    BibTeX
    @inproceedings{Fahmy2014,
     author = {Fahmy, G.},
     title = {Nonorthogonal DCT implementation for JPEG forensics},
     booktitle = {Hybrid Intelligent Systems (HIS), 2014 14th International Conference on},
     year = {2014},
     pages = {7--11}}
    
  52. G. Fahmy
    Nonorthogonal DCT block convergence for JPEG-75 forensics
    Proc. IEEE Int. Symp. Signal Processing and Information Technology (ISSPIT)
    2014, pp. 000349-000353
    DOI: 10.1109/ISSPIT.2014.7300613
    BibTeX
    @inproceedings{Fahmy2014a,
     author = {G. Fahmy},
     title = {Nonorthogonal DCT block convergence for JPEG-75 forensics},
     booktitle = {Proc. IEEE Int. Symp. Signal Processing and Information Technology (ISSPIT)},
     year = {2014},
     pages = {000349--000353}}
    
  53. W. Fan, K. Wang, F. Cayre & Z. Xiong
    JPEG Anti-Forensics With Improved Tradeoff Between Forensic Undetectability and Image Quality
    Information Forensics and Security, IEEE Transactions on, 2014, Vol. 9(8), pp. 1211-1226
    DOI: 10.1109/TIFS.2014.2317949
    BibTeX
    @article{Fan2014,
     author = {Wei Fan and Kai Wang and Cayre, F. and Zhang Xiong},
     title = {JPEG Anti-Forensics With Improved Tradeoff Between Forensic Undetectability and Image Quality},
     journal = {Information Forensics and Security, IEEE Transactions on},
     year = {2014},
     volume = {9},
     number = {8},
     pages = {1211--1226}}
    
  54. S. Fattah, M. Ullah, M. Ahmed, I. Ahmmed & C. Shahnaz
    A scheme for copy-move forgery detection in digital images based on 2D-DWT
    Circuits and Systems (MWSCAS), 2014 IEEE 57th International Midwest Symposium on
    2014, pp. 801-804
    DOI: 10.1109/MWSCAS.2014.6908536
    BibTeX
    @inproceedings{Fattah2014,
     author = {Fattah, S.A. and Ullah, M.M.I. and Ahmed, M. and Ahmmed, I. and Shahnaz, C.},
     title = {A scheme for copy-move forgery detection in digital images based on 2D-DWT},
     booktitle = {Circuits and Systems (MWSCAS), 2014 IEEE 57th International Midwest Symposium on},
     year = {2014},
     pages = {801--804}}
    
  55. A. Ferreira & A. Rocha
    A Multiscale and Multi-Perturbation Blind Forensic Technique For Median Detecting
    Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications
    Springer Science mathplus Business Media, 2014, pp. 302-310
    DOI: 10.1007/978-3-319-12568-8_37
    BibTeX
    @incollection{Ferreira2014,
     author = {Anselmo Ferreira and Anderson Rocha},
     title = {A Multiscale and Multi-Perturbation Blind Forensic Technique For Median Detecting},
     booktitle = {Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications},
     publisher = {Springer Science mathplus Business Media},
     year = {2014},
     pages = {302--310}}
    
  56. M. Fontani, A. Bonchi, A. Piva & M. Barni
    Countering anti-forensics by means of data fusion
    Alattar, A. M., Memon, N. D. & Heitzenrater, C. D. (ed.)
    Proc. SPIE 9028, Media Watermarking, Security, and Forensics 2014
    Proc. SPIE, 2014, Vol. 9028, pp. 90280Z-90280Z-15
    DOI: 10.1117/12.2039569
    BibTeX
    @inproceedings{Fontani2014,
     author = {Fontani, Marco and Bonchi, Alessandro and Piva, Alessandro and Barni, Mauro},
     title = {Countering anti-forensics by means of data fusion},
     booktitle = {Proc. SPIE 9028, Media Watermarking, Security, and Forensics 2014},
     journal = {Proc. SPIE},
     year = {2014},
     volume = {9028},
     pages = {90280Z-90280Z-15}}
    
  57. K. Francis, S. Gholap & P. Bora
    Illuminant colour based image forensics using mismatch in human skin highlights
    Communications (NCC), 2014 Twentieth National Conference on
    2014, pp. 1-6
    DOI: 10.1109/NCC.2014.6811349
    BibTeX
    @inproceedings{Francis2014,
     author = {Francis, Kiran and Gholap, Sandeep and Bora, P.K.},
     title = {Illuminant colour based image forensics using mismatch in human skin highlights},
     booktitle = {Communications (NCC), 2014 Twentieth National Conference on},
     year = {2014},
     pages = {1--6}}
    
  58. L. Gaborini
    Image tampering detection and localization
    Politecnico di Milano, Politecnico di Milano, 2014
    BibTeX
    @mastersthesis{Gaborini2014,
     author = {Gaborini, Lorenzo},
     title = {Image tampering detection and localization},
     school = {Politecnico di Milano},
     year = {2014}}
    
  59. L. Gaborini, P. Bestagini, S. Milani, M. Tagliasacchi & S. Tubaro
    Multi-Clue Image Tampering Localization
    Information Forensics and Security (WIFS), 2014 IEEE International Workshop on
    2014, pp. 125-130
    DOI: 10.1109/WIFS.2014.7084315
    BibTeX
    @inproceedings{Gaborini2014a,
     author = {Gaborini, L. and Bestagini, P. and Milani, S. and Tagliasacchi, M. and Tubaro, S.},
     title = {Multi-Clue Image Tampering Localization},
     booktitle = {Information Forensics and Security (WIFS), 2014 IEEE International Workshop on},
     year = {2014},
     pages = {125--130}}
    
  60. F. Galvan, G. Puglisi, A. Bruna & S. Battiato
    First Quantization Matrix Estimation From Double Compressed JPEG Images
    Information Forensics and Security, IEEE Transactions on, 2014, Vol. 9(8), pp. 1299-1310
    DOI: 10.1109/TIFS.2014.2330312
    BibTeX
    @article{Galvan2014,
     author = {Galvan, F. and Puglisi, G. and Bruna, A.R. and Battiato, S.},
     title = {First Quantization Matrix Estimation From Double Compressed JPEG Images},
     journal = {Information Forensics and Security, IEEE Transactions on},
     year = {2014},
     volume = {9},
     number = {8},
     pages = {1299--1310}}
    
  61. Y. Gan & J. Zhong
    Image copy-move tamper blind detection algorithm based on integrated feature vectors
    Journal of Chemical and Pharmaceutical Research, 2014, Vol. 6(6), pp. 1584-1590
    BibTeX
    @article{Gan2014,
     author = {Yanfen Gan and Junli Zhong},
     title = {Image copy-move tamper blind detection algorithm based on integrated feature vectors},
     journal = {Journal of Chemical and Pharmaceutical Research},
     year = {2014},
     volume = {6},
     number = {6},
     pages = {1584--1590}}
    
  62. S. Gao, C. Zhang, C.-L. Wu, G. Ye & L. Huang
    A Hybrid Feature Based Method for Distinguishing Computer Graphics and Photo-Graphic Image
    Digital-Forensics and Watermarking, Springer, 2014
    DOI: 10.1007/978-3-662-43886-2_22
    BibTeX
    @article{Gao2014,
     author = {Gao, Shang and Zhang, Cong and Wu, Chan-Le and Ye, Gang and Huang, Lei},
     title = {A Hybrid Feature Based Method for Distinguishing Computer Graphics and Photo-Graphic Image},
     journal = {Digital-Forensics and Watermarking},
     publisher = {Springer},
     year = {2014}}
    
  63. L. Ge
    Image Perspective Invariant Features Algorithm Based on Particle Swarm Optimization
    Journal of Multimedia, 2014, Vol. 9(3)
    BibTeX
    @article{Ge2014,
     author = {Lu Ge},
     title = {Image Perspective Invariant Features Algorithm Based on Particle Swarm Optimization},
     journal = {Journal of Multimedia},
     year = {2014},
     volume = {9},
     number = {3}}
    
  64. B. Gencturk, V. Nabiyev, G. Ulutas & M. Ulutas
    A hybrid image authentication method robust to JPEG attacks
    Proc. 22nd Signal Processing and Communications Applications Conf. (SIU)
    Institute of Electrical & Electronics Engineers (IEEE), 2014, pp. 1596-1599
    DOI: 10.1109/SIU.2014.6830549
    BibTeX
    @inproceedings{Gencturk2014,
     author = {Beste Gencturk and Vasif Nabiyev and Guzin Ulutas and Mustafa Ulutas},
     title = {A hybrid image authentication method robust to JPEG attacks},
     booktitle = {Proc. 22nd Signal Processing and Communications Applications Conf. (SIU)},
     publisher = {Institute of Electrical & Electronics Engineers (IEEE)},
     year = {2014},
     pages = {1596--1599}}
    
  65. S.A. Gieske
    Search optimization through JPEG Quantization Tables
    University of Amsterdam Faculty of Science, University of Amsterdam Faculty of Science, 2014
    BibTeX
    @mastersthesis{Gieske2014,
     author = {Shanron A. Gieske},
     title = {Search optimization through JPEG Quantization Tables},
     school = {University of Amsterdam Faculty of Science},
     year = {2014}}
    
  66. A. Gironi, M. Fontani, T. Bianchi, A. Piva & M. Barni
    A video forensic technique for detecting frame deletion and insertion
    Acoustics, Speech and Signal Processing (ICASSP), 2014 IEEE International Conference on
    2014, pp. 6226-6230
    DOI: 10.1109/ICASSP.2014.6854801
    BibTeX
    @inproceedings{Gironi2014,
     author = {Gironi, A. and Fontani, M. and Bianchi, T. and Piva, A. and Barni, M.},
     title = {A video forensic technique for detecting frame deletion and insertion},
     booktitle = {Acoustics, Speech and Signal Processing (ICASSP), 2014 IEEE International Conference on},
     year = {2014},
     pages = {6226--6230}}
    
  67. F. Gisolf, P. Barens, E. Snel, A. Malgoezar, M. Vos, A. Mieremet & Z. Geradts
    Common source identification of images in large databases
    Forensic Science International, Elsevier BV, 2014, Vol. 244, pp. 222-230
    DOI: 10.1016/j.forsciint.2014.08.034
    BibTeX
    @article{Gisolf2014,
     author = {Floris Gisolf and Pelle Barens and Ewald Snel and Anwar Malgoezar and Mark Vos and Arjan Mieremet and Zeno Geradts},
     title = {Common source identification of images in large databases},
     journal = {Forensic Science International},
     publisher = {Elsevier BV},
     year = {2014},
     volume = {244},
     pages = {222--230}}
    
  68. T. Gloe, A. Fischer & M. Kirchner
    Forensic analysis of video file formats
    Digital Investigation, 2014, Vol. 11, Supplement 1(0), pp. 68-76
    DOI: 10.1016/j.diin.2014.03.009
    BibTeX
    @article{Gloe2014,
     author = {Thomas Gloe and André Fischer and Matthias Kirchner},
     title = {Forensic analysis of video file formats},
     journal = {Digital Investigation},
     year = {2014},
     volume = {11, Supplement 1},
     number = {0},
     pages = {68--76}}
    
  69. M. Goljan & J. Fridrich
    Estimation of Lens Distortion Correction from Single Images
    Department of ECE, SUNY Binghamton, NY, USA, Department of ECE, SUNY Binghamton, NY, USA, 2014
    BibTeX
    @techreport{Goljan2014,
     author = {Miroslav Goljan and Jessica Fridrich},
     title = {Estimation of Lens Distortion Correction from Single Images},
     school = {Department of ECE, SUNY Binghamton, NY, USA},
     year = {2014}}
    
  70. X. Gui, X. Li, W. Qi & B. Yang
    Blind median filtering detection based on histogram features
    Proc. Asia-Pacific Signal and Information Processing Association Annual Summit and Conf. (APSIPA)
    2014, pp. 1-4
    DOI: 10.1109/APSIPA.2014.7041536
    BibTeX
    @inproceedings{Gui2014,
     author = {X. Gui and X. Li and W. Qi and B. Yang},
     title = {Blind median filtering detection based on histogram features},
     booktitle = {Proc. Asia-Pacific Signal and Information Processing Association Annual Summit and Conf. (APSIPA)},
     year = {2014},
     pages = {1--4}}
    
  71. W. Guicquero, M. Benetti, A. Peizerat, A. Dupret & P. Vandergheynst
    On compensating unknown pixel behaviors for image sensors with embedded processing
    Signals, Systems and Computers, 2014 48th Asilomar Conference on
    2014, pp. 933-937
    DOI: 10.1109/ACSSC.2014.7094590
    BibTeX
    @inproceedings{Guicquero2014,
     author = {Guicquero, W. and Benetti, M. and Peizerat, A. and Dupret, A. and Vandergheynst, P.},
     title = {On compensating unknown pixel behaviors for image sensors with embedded processing},
     booktitle = {Signals, Systems and Computers, 2014 48th Asilomar Conference on},
     year = {2014},
     pages = {933--937}}
    
  72. M. Hashmi, V. Anand & A. Keskar
    A copy-move image forgery detection based on speeded up robust feature transform and Wavelet Transforms
    Computer and Communication Technology (ICCCT), 2014 International Conference on
    2014, pp. 147-152
    DOI: 10.1109/ICCCT.2014.7001483
    BibTeX
    @inproceedings{Hashmi2014,
     author = {Hashmi, M.F. and Anand, V. and Keskar, A.G.},
     title = {A copy-move image forgery detection based on speeded up robust feature transform and Wavelet Transforms},
     booktitle = {Computer and Communication Technology (ICCCT), 2014 International Conference on},
     year = {2014},
     pages = {147--152}}
    
  73. J.-U. Hou, H.-U. Jang & H.-K. Lee
    Hue modification estimation using sensor pattern noise
    Image Processing (ICIP), 2014 IEEE International Conference on
    2014, pp. 5287-5291
    DOI: 10.1109/ICIP.2014.7026070
    BibTeX
    @inproceedings{Hou2014,
     author = {Jong-Uk Hou and Han-Ul Jang and Heung-Kyu Lee},
     title = {Hue modification estimation using sensor pattern noise},
     booktitle = {Image Processing (ICIP), 2014 IEEE International Conference on},
     year = {2014},
     pages = {5287--5291}}
    
  74. Y. Hu, C.-T. Li & Z. Lai
    Fast source camera identification using matching signs between query and reference fingerprints
    Multimedia Tools and Applications, Springer US, 2014, pp. 1-24
    DOI: 10.1007/s11042-014-1985-3
    BibTeX
    @article{Hu2014,
     author = {Hu, Yongjian and Li, Chang-Tsun and Lai, Zhimao},
     title = {Fast source camera identification using matching signs between query and reference fingerprints},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer US},
     year = {2014},
     pages = {1--24}}
    
  75. D.-Y. Huang, T.-W. Lin, W.-C. Hu & C.-H. Chou
    Boosting Scheme for Detecting Region Duplication Forgery in Digital Images
    Pan, J.-S., Krömer, P. & Snášel, V. (ed.)
    Genetic and Evolutionary Computing
    Springer International Publishing, 2014, Vol. 238, pp. 125-133
    DOI: 10.1007/978-3-319-01796-9_13
    BibTeX
    @incollection{Huang2014,
     author = {Huang, Deng-Yuan and Lin, Ta-Wei and Hu, Wu-Chih and Chou, Chih-Hung},
     title = {Boosting Scheme for Detecting Region Duplication Forgery in Digital Images},
     booktitle = {Genetic and Evolutionary Computing},
     publisher = {Springer International Publishing},
     year = {2014},
     volume = {238},
     pages = {125--133}}
    
  76. M. Hussain, S. Qasem, G. Bebis, G. Muhammad, H. Aboalsamh & H. Mathkour
    Evaluation Of Image Forgery Detect Ion Using Multi - Scale Weber Local Descript Ors
    International Journal on Artificial Intelligence Tools, 2014, Vol. XX(X), pp. 1-27
    BibTeX
    @article{Hussain2014a,
     author = {Muhammad Hussain and Sahar Qasem and George Bebis and Ghulam Muhammad and Hatim Aboalsamh and Hassan Mathkour},
     title = {Evaluation Of Image Forgery Detect Ion Using Multi - Scale Weber Local Descript Ors},
     journal = {International Journal on Artificial Intelligence Tools},
     year = {2014},
     volume = {XX},
     number = {X},
     pages = {1--27}}
    
  77. M. Hussain, S.Q. Saleh, H. Aboalsamh, G. Muhammad & G. Bebis
    Comparison between WLD and LBP descriptors for non-intrusive image forgery detection
    Innovations in Intelligent Systems and Applications (INISTA) Proceedings, 2014 IEEE International Symposium on
    2014, pp. 197-204
    DOI: 10.1109/INISTA.2014.6873618
    BibTeX
    @inproceedings{Hussain2014,
     author = {Hussain, Muhammad and Saleh, Sahar Q. and Aboalsamh, Hatim and Muhammad, Ghulam and Bebis, George},
     title = {Comparison between WLD and LBP descriptors for non-intrusive image forgery detection},
     booktitle = {Innovations in Intelligent Systems and Applications (INISTA) Proceedings, 2014 IEEE International Symposium on},
     year = {2014},
     pages = {197--204}}
    
  78. J. Indumathi & S. Amala
    State-of-The-Art in Block based Copy Move Forgery Detection
    Proc of the itl. Conf. on Cryptography and Security 2014 (ICCS)
    2014
    BibTeX
    @inproceedings{Indumathi2014,
     author = {Indumathi, J. and Amala, S.P},
     title = {State-of-The-Art in Block based Copy Move Forgery Detection},
     booktitle = {Proc of the itl. Conf. on Cryptography and Security 2014 (ICCS)},
     year = {2014}}
    
  79. M. Iuliani, S. Rossetto, T. Bianchi, A. De Rosa, A. Piva & M. Barni
    Image counter-forensics based on feature injection
    Alattar, A. M., Memon, N. D. & Heitzenrater, C. D. (ed.)
    Proc. SPIE 9028, Media Watermarking, Security, and Forensics 2014
    Proc. SPIE, 2014, Vol. 9028, pp. 902810-902810-15
    DOI: 10.1117/12.2042234
    BibTeX
    @inproceedings{Iuliani2014,
     author = {Iuliani, M. and Rossetto, S. and Bianchi, T. and De Rosa, Alessia and Piva, A. and Barni, M.},
     title = {Image counter-forensics based on feature injection},
     booktitle = {Proc. SPIE 9028, Media Watermarking, Security, and Forensics 2014},
     journal = {Proc. SPIE},
     year = {2014},
     volume = {9028},
     pages = {902810-902810-15}}
    
  80. L. Jiao & Z. Du
    Copy-paste image forgery blind detection based on mean shift
    Journal of Computer Applications, 2014, Vol. 34(3), pp. 806-809
    BibTeX
    @article{Jiao2014,
     author = {Jiao, Lixin And Du, Zhenglong},
     title = {Copy-paste image forgery blind detection based on mean shift},
     journal = {Journal of Computer Applications},
     year = {2014},
     volume = {34},
     number = {3},
     pages = {806--809}}
    
  81. X. Kang, J. Chen, K. Lin & P. Anjie
    A context-adaptive SPN predictor for trustworthy source camera identification
    EURASIP Journal on Image and Video Processing, 2014, Vol. 2014(1), pp. 19
    DOI: 10.1186/1687-5281-2014-19
    BibTeX
    @article{Kang2014,
     author = {Kang, Xiangui and Chen, Jiansheng and Lin, Kerui and Anjie, Peng},
     title = {A context-adaptive SPN predictor for trustworthy source camera identification},
     journal = {EURASIP Journal on Image and Video Processing},
     year = {2014},
     volume = {2014},
     number = {1},
     pages = {19}}
    
  82. H. Kato, T. Nagao, H. Fujiwara & K. Kondo
    Boundary Detection of Altered Region by Differential Features on Camera Response Function
    International Journal of Signal Processing Systems, 2014, Vol. 2(1), pp. 31-36
    BibTeX
    @article{Kato2014,
     author = {Hirokazu Kato and Toshiyuki Nagao and Hideaki Fujiwara and Katsuya Kondo},
     title = {Boundary Detection of Altered Region by Differential Features on Camera Response Function},
     journal = {International Journal of Signal Processing Systems},
     year = {2014},
     volume = {2},
     number = {1},
     pages = {31--36}}
    
  83. Y. Ke, W. Min, F. Qin & J. Shang
    Image Forgery Detection Based on Semantics
    International Journal of Hybrid Information Technology, 2014, Vol. 1(7), pp. 109-124
    DOI: 10.14257/ijhit.2014.7.1.09
    BibTeX
    @article{Ke2014,
     author = {Yongzhen Ke and Weidong Min and Fan Qin and Junjun Shang},
     title = {Image Forgery Detection Based on Semantics},
     journal = {International Journal of Hybrid Information Technology},
     year = {2014},
     volume = {1},
     number = {7},
     pages = {109--124}}
    
  84. Y. Ke, F. Qin, W. Min & G. Zhangws
    Exposing Image Forgery by Detecting Consistency of Shadow
    The Scientific World Journal, 2014, Vol. 2014
    DOI: 10.1155/2014/364501
    BibTeX
    @article{Ke2014a,
     author = {Yongzhen Ke and Fan Qin and Weidong Min and Guiling Zhangws},
     title = {Exposing Image Forgery by Detecting Consistency of Shadow},
     journal = {The Scientific World Journal},
     year = {2014},
     volume = {2014}}
    
  85. E. Kee, J.F. Otextquotesinglebrien & H. Farid
    Exposing Photo Manipulation from Shading and Shadows
    ACM Transactions on Graphics, Association for Computing Machinery (ACM), 2014, Vol. 33(5), pp. 1-21
    DOI: 10.1145/2629646
    BibTeX
    @article{Kee2014,
     author = {Eric Kee and James F. Otextquotesinglebrien and Hany Farid},
     title = {Exposing Photo Manipulation from Shading and Shadows},
     journal = {ACM Transactions on Graphics},
     publisher = {Association for Computing Machinery (ACM)},
     year = {2014},
     volume = {33},
     number = {5},
     pages = {1--21}}
    
  86. S. Ketenci & G. Uluta&x015F
    Replication regions detection in images based on frequency analysis of blocks
    Proc. 22nd Signal Processing and Communications Applications Conf. (SIU)
    2014, pp. 461-464
    DOI: 10.1109/SIU.2014.6830265
    BibTeX
    @inproceedings{Ketenci2014a,
     author = {S. Ketenci and G. Uluta&x015F},
     title = {Replication regions detection in images based on frequency analysis of blocks},
     booktitle = {Proc. 22nd Signal Processing and Communications Applications Conf. (SIU)},
     year = {2014},
     pages = {461--464}}
    
  87. S. Ketenci & G. Ulutas
    Replication regions detection in images based on frequency analysis of blocks
    Signal Processing and Communications Applications Conference (SIU), 2014 22nd
    2014, pp. 461-464
    DOI: 10.1109/SIU.2014.6830265
    BibTeX
    @inproceedings{Ketenci2014b,
     author = {Ketenci, S. and Ulutas, G.},
     title = {Replication regions detection in images based on frequency analysis of blocks},
     booktitle = {Signal Processing and Communications Applications Conference (SIU), 2014 22nd},
     year = {2014},
     pages = {461--464}}
    
  88. S. Ketenci & G. Ulutaş
    Replication regions detection in images based on frequency analysis of blocks
    Proc. 22nd Signal Processing and Communications Applications Conf. (SIU)
    2014, pp. 461-464
    DOI: 10.1109/SIU.2014.6830265
    BibTeX
    @inproceedings{Ketenci2014d,
     author = {S. Ketenci and G. Ulutaş},
     title = {Replication regions detection in images based on frequency analysis of blocks},
     booktitle = {Proc. 22nd Signal Processing and Communications Applications Conf. (SIU)},
     year = {2014},
     pages = {461--464}}
    
  89. S. Ketenci, G. Ulutas & M. Ulutas
    Detection of duplicated regions in images using 1D-Fourier transform
    Systems, Signals and Image Processing (IWSSIP), 2014 International Conference on
    2014, pp. 171-174
    BibTeX
    @inproceedings{Ketenci2014,
     author = {Ketenci, S. and Ulutas, G. and Ulutas, M.},
     title = {Detection of duplicated regions in images using 1D-Fourier transform},
     booktitle = {Systems, Signals and Image Processing (IWSSIP), 2014 International Conference on},
     year = {2014},
     pages = {171--174}}
    
  90. S. Khamankar & M. Madankar
    Exposing Digital Image Forgeries from Near Duplicate Images
    Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on
    2014, pp. 924-928
    DOI: 10.1109/CSNT.2014.190
    BibTeX
    @inproceedings{Khamankar2014,
     author = {Khamankar, S.M. and Madankar, M.S.},
     title = {Exposing Digital Image Forgeries from Near Duplicate Images},
     booktitle = {Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on},
     year = {2014},
     pages = {924--928}}
    
  91. A. Kharboutly, W. Puech, G. Subsol & D. Hoa
    CT-Scanner identification based on sensor noise analysis
    Visual Information Processing (EUVIP), 2014 5th European Workshop on
    2014, pp. 1-5
    DOI: 10.1109/EUVIP.2014.7018385
    BibTeX
    @inproceedings{Kharboutly2014,
     author = {Kharboutly, A. and Puech, W. and Subsol, G. and Hoa, D.},
     title = {CT-Scanner identification based on sensor noise analysis},
     booktitle = {Visual Information Processing (EUVIP), 2014 5th European Workshop on},
     year = {2014},
     pages = {1--5}}
    
  92. D.-G. Kim & H.-K. Lee
    Color Laser Printer Identification Using Photographed Halftone Images
    Proceedings of the 17th European Signal Processing Conference (EUSIPCO 2014)
    2014
    BibTeX
    @inproceedings{Kim2014,
     author = {Do-Guk Kim and Heung-Kyu Lee},
     title = {Color Laser Printer Identification Using Photographed Halftone Images},
     booktitle = {Proceedings of the 17th European Signal Processing Conference (EUSIPCO 2014)},
     year = {2014}}
    
  93. G.-B. Lee, Y.-c. Shin, J.-h. Park & M.-j. Lee
    Low-complexity camera tamper detection based on edge information
    Consumer Electronics - Taiwan (ICCE-TW), 2014 IEEE International Conference on
    2014, pp. 155-156
    DOI: 10.1109/ICCE-TW.2014.6904034
    BibTeX
    @inproceedings{Lee2014,
     author = {Gil-Beom Lee and Youn-chul Shin and Joo-heon Park and Myeong-jin Lee},
     title = {Low-complexity camera tamper detection based on edge information},
     booktitle = {Consumer Electronics - Taiwan (ICCE-TW), 2014 IEEE International Conference on},
     year = {2014},
     pages = {155--156}}
    
  94. B. Li, T.-T. Ng, X. Li, S. Tan & J. Huang
    JPEG Noises beyond the First Compression Cycle
    arXiv:1405.7571, 2014
    BibTeX
    @article{Li2014f,
     author = {Bin Li and Tian-Tsong Ng and Xiaolong Li and Shunquan Tan and Jiwu Huang},
     title = {JPEG Noises beyond the First Compression Cycle},
     journal = {arXiv:1405.7571},
     year = {2014}}
    
  95. F. Li & T. Huang
    Video Copy-Move Forgery Detection and Localization Based on Structural Similarity
    Farag, A. A., Yang, J. & Jiao, F. (ed.)
    Proceedings of the 3rd International Conference on Multimedia Technology (ICMT 2013)
    Springer Berlin Heidelberg, 2014, Vol. 278, pp. 63-76
    DOI: 10.1007/978-3-642-41407-7_7
    BibTeX
    @incollection{Li2014,
     author = {Li, Fugui and Huang, Tianqiang},
     title = {Video Copy-Move Forgery Detection and Localization Based on Structural Similarity},
     booktitle = {Proceedings of the 3rd International Conference on Multimedia Technology (ICMT 2013)},
     publisher = {Springer Berlin Heidelberg},
     year = {2014},
     volume = {278},
     pages = {63--76}}
    
  96. H. Li, W. Luo & J. Huang
    Anti-forensics of double JPEG compression with the same quantization matrix
    Multimedia Tools and Applications, Springer US, 2014, pp. 1-16
    DOI: 10.1007/s11042-014-1927-0
    BibTeX
    @article{Li2014c,
     author = {Li, Haodong and Luo, Weiqi and Huang, Jiwu},
     title = {Anti-forensics of double JPEG compression with the same quantization matrix},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer US},
     year = {2014},
     pages = {1--16}}
    
  97. K. Li, H. Li, B. Yang, Q. Meng & S. Luo
    Detection of Image Forgery Based on Improved PCA-SIFT
    Wong, W. E. & Zhu, T. (ed.)
    Computer Engineering and Networking
    Springer International Publishing, 2014, Vol. 277, pp. 679-686
    DOI: 10.1007/978-3-319-01766-2_78
    BibTeX
    @incollection{Li2014a,
     author = {Li, Kunlun and Li, Hexin and Yang, Bo and Meng, Qi and Luo, Shangzong},
     title = {Detection of Image Forgery Based on Improved PCA-SIFT},
     booktitle = {Computer Engineering and Networking},
     publisher = {Springer International Publishing},
     year = {2014},
     volume = {277},
     pages = {679--686}}
    
  98. L. Li, S. Li, H. Zhu & X. Wu
    Detecting copy-move forgery under affine transforms for image forensics
    Computers & Electrical Engineering, Elsevier BV, 2014, Vol. 40(6), pp. 1951-1962
    DOI: 10.1016/j.compeleceng.2013.11.034
    BibTeX
    @article{Li2014h,
     author = {Leida Li and Shushang Li and Hancheng Zhu and Xiaoyue Wu},
     title = {Detecting copy-move forgery under affine transforms for image forensics},
     journal = {Computers & Electrical Engineering},
     publisher = {Elsevier BV},
     year = {2014},
     volume = {40},
     number = {6},
     pages = {1951--1962}}
    
  99. R. Li, Y. Guan & C.-T. Li
    PCA-based denoising of Sensor Pattern Noise for source camera identification
    Signal and Information Processing (ChinaSIP), 2014 IEEE China Summit & International Conference on
    2014, pp. 436-440
    DOI: 10.1109/ChinaSIP.2014.6889280
    BibTeX
    @inproceedings{Li2014d,
     author = {Li, Ruizhe and Guan, Yu and Li, Chang-Tsun},
     title = {PCA-based denoising of Sensor Pattern Noise for source camera identification},
     booktitle = {Signal and Information Processing (ChinaSIP), 2014 IEEE China Summit & International Conference on},
     year = {2014},
     pages = {436--440}}
    
  100. R. Li, C.-T. Li & Y. Guan
    A reference estimator based on composite sensor pattern noise for source device identification
    Alattar, A. M., Memon, N. D. & Heitzenrater, C. D. (ed.)
    Proc. SPIE 9028, Media Watermarking, Security, and Forensics 2014
    Proc. SPIE, 2014, Vol. 9028, pp. 90280O-90280O-7
    DOI: 10.1117/12.2038651
    BibTeX
    @inproceedings{Li2014b,
     author = {Li, Ruizhe and Li, Chang-Tsun and Guan, Yu},
     title = {A reference estimator based on composite sensor pattern noise for source device identification},
     booktitle = {Proc. SPIE 9028, Media Watermarking, Security, and Forensics 2014},
     journal = {Proc. SPIE},
     year = {2014},
     volume = {9028},
     pages = {90280O-90280O-7}}
    
  101. Y. Li, Y.-j. Zhou, K.-g. Yuan, Y.-c. Guo & X.-x. Niu
    Exposing photo manipulation with inconsistent perspective geometry
    The Journal of China Universities of Posts and Telecommunications, 2014, Vol. 21(4), pp. 83-104
    DOI: 10.1016/S1005-8885(14)60320-4
    BibTeX
    @article{Li2014e,
     author = {Yan Li and Ya-jian Zhou and Kai-guo Yuan and Yu-cui Guo and Xin-xin Niu},
     title = {Exposing photo manipulation with inconsistent perspective geometry},
     journal = {The Journal of China Universities of Posts and Telecommunications},
     year = {2014},
     volume = {21},
     number = {4},
     pages = {83--104}}
    
  102. Z. Li, Z. Zhang & Y. Shi
    Distinguishing computer graphics from photographic images using a multiresolution approach based on local binary patterns
    Security and Communication Networks, 2014
    DOI: 10.1002/sec.929
    BibTeX
    @article{Li2014g,
     author = {Li, Zhaohong and Zhang, Zhenzhen and Shi, Yunqing},
     title = {Distinguishing computer graphics from photographic images using a multiresolution approach based on local binary patterns},
     journal = {Security and Communication Networks},
     year = {2014}}
    
  103. B. Liu & C.M. Pun
    HSV Based Image Forgery Detection for Copy-Move Attack
    Material Science and Engeneering, 2014, Vol. 556-562, pp. 2825-2828
    DOI: 10.4028/www.scientific.net/AMM.556-562.2825
    BibTeX
    @article{Liu2014a,
     author = {Bo Liu and Chi Man Pun},
     title = {HSV Based Image Forgery Detection for Copy-Move Attack},
     journal = {Material Science and Engeneering},
     year = {2014},
     volume = {556-562},
     pages = {2825--2828}}
    
  104. B. Liu, C.-M. Pun & X.-C. Yuan
    Digital Image Forgery Detection Using JPEG Features and Local Noise Discrepancies
    The Scientific World Journal, 2014
    BibTeX
    @article{Liu2014,
     author = {Bo Liu and C.-M. Pun and Xiao-Chen Yuan},
     title = {Digital Image Forgery Detection Using JPEG Features and Local Noise Discrepancies},
     journal = {The Scientific World Journal},
     year = {2014}}
    
  105. F. Liu, H. Wang, L.-M. Cheng, A.T. Ho & S. Li
    Enhanced perceptual image authentication with tamper localization and self-restoration
    Multimedia and Expo (ICME), 2014 IEEE International Conference on
    2014, pp. 1-6
    DOI: 10.1109/ICME.2014.6890128
    BibTeX
    @inproceedings{Liu2014c,
     author = {Liu, Fang and Wang, Hui and Cheng, Lee-Ming and Ho, Anthony T.S. and Li, Shujun},
     title = {Enhanced perceptual image authentication with tamper localization and self-restoration},
     booktitle = {Multimedia and Expo (ICME), 2014 IEEE International Conference on},
     year = {2014},
     pages = {1--6}}
    
  106. J. Liu & X. Kang
    Anti-Forensics of Video Frame Deletion
    paper.edu.cn, 2014
    BibTeX
    @electronic{Liu2014b,
     author = {Jingxian Liu and Xiangui Kang},
     title = {Anti-Forensics of Video Frame Deletion},
     journal = {paper.edu.cn},
     year = {2014}}
    
  107. L. Liu, R. Ni, Y. Zhao & S. Li
    Improved SIFT-Based Copy-Move Detection Using BFSN Clustering and CFA Features
    Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2014 Tenth International Conference on
    2014, pp. 626-629
    DOI: 10.1109/IIH-MSP.2014.162
    BibTeX
    @inproceedings{Liu2014d,
     author = {Lu Liu and Rongrong Ni and Yao Zhao and Siran Li},
     title = {Improved SIFT-Based Copy-Move Detection Using BFSN Clustering and CFA Features},
     booktitle = {Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2014 Tenth International Conference on},
     year = {2014},
     pages = {626--629}}
    
  108. Y. Liu, Y. Zhao & R. Ni
    Forensics of image blurring and sharpening history based on NSCT domain
    Proc. Asia-Pacific Signal and Information Processing Association Annual Summit and Conf. (APSIPA)
    2014, pp. 1-4
    DOI: 10.1109/APSIPA.2014.7041728
    BibTeX
    @inproceedings{Liu2014e,
     author = {Y. Liu and Y. Zhao and R. Ni},
     title = {Forensics of image blurring and sharpening history based on NSCT domain},
     booktitle = {Proc. Asia-Pacific Signal and Information Processing Association Annual Summit and Conf. (APSIPA)},
     year = {2014},
     pages = {1--4}}
    
  109. P. Makkena, A. Rajagopalan & G. Seetharaman
    Harnessing Motion Blur to Unveil Splicing
    Information Forensics and Security, IEEE Transactions on, 2014, Vol. PP(99), pp. 1-1
    DOI: 10.1109/TIFS.2014.2302895
    BibTeX
    @article{Makkena2014,
     author = {Makkena, P. and Rajagopalan, A. and Seetharaman, G.},
     title = {Harnessing Motion Blur to Unveil Splicing},
     journal = {Information Forensics and Security, IEEE Transactions on},
     year = {2014},
     volume = {PP},
     number = {99},
     pages = {1--1}}
    
  110. P. Malviya & R. Naskar
    Digital Forensic Technique for Double Compression Based JPEG Image Forgery Detection
    Information Systems Security
    Springer, 2014
    DOI: 10.1007/978-3-319-13841-1_25
    BibTeX
    @incollection{Malviya2014,
     author = {Malviya, Pankaj and Naskar, Ruchira},
     title = {Digital Forensic Technique for Double Compression Based JPEG Image Forgery Detection},
     booktitle = {Information Systems Security},
     publisher = {Springer},
     year = {2014}}
    
  111. F. Marra, F. Roli, D. Cozzolino, C. Sansone & L. Verdoliva
    Attacking the triangle test in sensor-based camera identification
    Image Processing (ICIP), 2014 IEEE International Conference on
    2014, pp. 5307-5311
    DOI: 10.1109/ICIP.2014.7026074
    BibTeX
    @inproceedings{Marra2014,
     author = {Marra, F. and Roli, F. and Cozzolino, D. and Sansone, C. and Verdoliva, L.},
     title = {Attacking the triangle test in sensor-based camera identification},
     booktitle = {Image Processing (ICIP), 2014 IEEE International Conference on},
     year = {2014},
     pages = {5307--5311}}
    
  112. F. Marturana
    Device Classification in Digital Forensics Triage
    Universita Degli Studi Di Roma Tor Vergata Dipartimento Di Ingegneria Civile E Ingegneria Informatica, Universita Degli Studi Di Roma Tor Vergata Dipartimento Di Ingegneria Civile E Ingegneria Informatica, 2014
    BibTeX
    @phdthesis{Marturana2014,
     author = {Fabio Marturana},
     title = {Device Classification in Digital Forensics Triage},
     school = {Universita Degli Studi Di Roma Tor Vergata Dipartimento Di Ingegneria Civile E Ingegneria Informatica},
     year = {2014}}
    
  113. A. Melloni, P. Bestagini, S. Milani, M. Tagliasacchi, A. Rocha & S. Tubaro
    Image phylogeny through dissimilarity metrics fusion
    Proc. 5th European Workshop Visual Information Processing (EUVIP)
    2014, pp. 1-6
    DOI: 10.1109/EUVIP.2014.7018370
    BibTeX
    @inproceedings{Melloni2014,
     author = {A. Melloni and P. Bestagini and S. Milani and M. Tagliasacchi and A. Rocha and S. Tubaro},
     title = {Image phylogeny through dissimilarity metrics fusion},
     booktitle = {Proc. 5th European Workshop Visual Information Processing (EUVIP)},
     year = {2014},
     pages = {1--6}}
    
  114. S. Milani, P. Bestagini, M. Tagliasacchi & S. Tubaro
    Demosaicing Strategy Identification Via Eigenalgorithms
    2014
    BibTeX
    @electronic{Milani2014,
     author = {Simone Milani and Paolo Bestagini and Marco Tagliasacchi and Stefano Tubaro},
     title = {Demosaicing Strategy Identification Via Eigenalgorithms},
     year = {2014}}
    
  115. S. Milani, L. Cuccovillo, M. Tagliasacchi, S. Tubaro & P. Aichroth
    Video camera identification using audio-visual features
    Visual Information Processing (EUVIP), 2014 5th European Workshop on
    2014, pp. 1-6
    DOI: 10.1109/EUVIP.2014.7018382
    BibTeX
    @inproceedings{Milani2014a,
     author = {Milani, S. and Cuccovillo, L. and Tagliasacchi, M. and Tubaro, S. and Aichroth, P.},
     title = {Video camera identification using audio-visual features},
     booktitle = {Visual Information Processing (EUVIP), 2014 5th European Workshop on},
     year = {2014},
     pages = {1--6}}
    
  116. S. Milani, M. Tagliasacchi & S. Tubaro
    Discriminating multiple JPEG compressions using first digit features
    APSIPA Transactions on Signal and Information Processing, 2014, Vol. 3
    DOI: doi:10.1017/ATSIP.2014.19
    BibTeX
    @article{Milani2014b,
     author = {Milani, S. and Tagliasacchi, M. and Tubaro, S.},
     title = {Discriminating multiple JPEG compressions using first digit features},
     journal = {APSIPA Transactions on Signal and Information Processing},
     year = {2014},
     volume = {3}}
    
  117. A. Mire, S. Dhok, P. Porey & N. Mistry
    Digital Forensic of JPEG Images
    Signal and Image Processing (ICSIP), 2014 Fifth International Conference on
    2014, pp. 131-136
    DOI: 10.1109/ICSIP.2014.26
    BibTeX
    @inproceedings{Mire2014,
     author = {Mire, A.V. and Dhok, S.B. and Porey, P.D. and Mistry, N.J.},
     title = {Digital Forensic of JPEG Images},
     booktitle = {Signal and Image Processing (ICSIP), 2014 Fifth International Conference on},
     year = {2014},
     pages = {131--136}}
    
  118. M. Mishra & M.C. Adhikary
    Detection of Clones in Digital Images
    International Journal of Computer Science and Business Informatics, 2014, Vol. 9(1)
    BibTeX
    @article{Mishra2014,
     author = {Minati Mishra and M. C. Adhikary},
     title = {Detection of Clones in Digital Images},
     journal = {International Journal of Computer Science and Business Informatics},
     year = {2014},
     volume = {9},
     number = {1}}
    
  119. Z. Moghaddasi, H.A. Jalab & R.M. Noor
    SVD-based image splicing detection
    Information Technology and Multimedia (ICIMU), 2014 International Conference on
    2014, pp. 27-30
    DOI: 10.1109/ICIMU.2014.7066598
    BibTeX
    @inproceedings{Moghaddasi2014,
     author = {Moghaddasi, Zahra and Jalab, Hamid A. and Noor, Rafidah Md},
     title = {SVD-based image splicing detection},
     booktitle = {Information Technology and Multimedia (ICIMU), 2014 International Conference on},
     year = {2014},
     pages = {27--30}}
    
  120. C. Moun & C. Netramai
    Localization and building identification in outdoor environment for smartphone using integrated GPS and camera
    Proc. Fourth Int Digital Information and Communication Technology and it's Applications (DICTAP) Conf
    2014, pp. 327-332
    DOI: 10.1109/DICTAP.2014.6821705
    BibTeX
    @inproceedings{Moun2014,
     author = {C. Moun and C. Netramai},
     title = {Localization and building identification in outdoor environment for smartphone using integrated GPS and camera},
     booktitle = {Proc. Fourth Int Digital Information and Communication Technology and it's Applications (DICTAP) Conf},
     year = {2014},
     pages = {327--332}}
    
  121. S. Mushtaq & A. Mir
    Forgery detection using statistical features
    Computational Intelligence on Power, Energy and Controls with their impact on Humanity (CIPECH), 2014 Innovative Applications of
    2014, pp. 92-97
    DOI: 10.1109/CIPECH.2014.7019062
    BibTeX
    @inproceedings{Mushtaq2014,
     author = {Mushtaq, S. and Mir, A.H.},
     title = {Forgery detection using statistical features},
     booktitle = {Computational Intelligence on Power, Energy and Controls with their impact on Humanity (CIPECH), 2014 Innovative Applications of},
     year = {2014},
     pages = {92--97}}
    
  122. S. Mushtaq & A. Mir
    Novel method for image splicing detection
    Advances in Computing, Communications and Informatics (ICACCI, 2014 International Conference on
    2014, pp. 2398-2403
    DOI: 10.1109/ICACCI.2014.6968386
    BibTeX
    @inproceedings{Mushtaq2014a,
     author = {Mushtaq, S. and Mir, A.H.},
     title = {Novel method for image splicing detection},
     booktitle = {Advances in Computing, Communications and Informatics (ICACCI, 2014 International Conference on},
     year = {2014},
     pages = {2398--2403}}
    
  123. H. Neenu & J. Cheriyan
    Image forgery detection based on illumination inconsistencies & intrinsic resampling properties
    Emerging Research Areas: Magnetics, Machines and Drives (AICERA/iCMMD), 2014 Annual International Conference on
    2014, pp. 1-6
    DOI: 10.1109/AICERA.2014.6908192
    BibTeX
    @inproceedings{Neenu2014,
     author = {Neenu, H.U. and Cheriyan, J.},
     title = {Image forgery detection based on illumination inconsistencies & intrinsic resampling properties},
     booktitle = {Emerging Research Areas: Magnetics, Machines and Drives (AICERA/iCMMD), 2014 Annual International Conference on},
     year = {2014},
     pages = {1--6}}
    
  124. C. Nothelle
    Vorsicht Falle! Scripted Reality, retouchierte Fotos, Pseudonyme -- Täuschung als medienethische Herausforderung
    Communicatio Socialis, 2014, Vol. 46(3-4)
    BibTeX
    @article{Nothelle2014,
     author = {Claudia Nothelle},
     title = {Vorsicht Falle! Scripted Reality, retouchierte Fotos, Pseudonyme -- Täuschung als medienethische Herausforderung},
     journal = {Communicatio Socialis},
     year = {2014},
     volume = {46},
     number = {3--4}}
    
  125. S. Orozco, AnaLucila, A. González, DavidManuel, G. Villalba, L. Javier & J. Hernández-Castro
    Analysis of errors in EXIF metadata on mobile devices
    Multimedia Tools and Applications, Springer US, 2014, pp. 1-29
    DOI: 10.1007/s11042-013-1837-6
    BibTeX
    @article{Orozco2014,
     author = {Sandoval Orozco and AnaLucila and Arenas González and DavidManuel and García Villalba and Luis Javier and Hernández-Castro, Julio},
     title = {Analysis of errors in EXIF metadata on mobile devices},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer US},
     year = {2014},
     pages = {1--29}}
    
  126. D. Pande
    Towards Detection of Image Tampering over Diverse Information Security Schemata: A StateoftheArt
    International Journal of Information and Network Security (IJINS), 2014, Vol. 3(1)
    BibTeX
    @article{Pande2014,
     author = {Deepali Pande},
     title = {Towards Detection of Image Tampering over Diverse Information Security Schemata: A StateoftheArt},
     journal = {International Journal of Information and Network Security (IJINS)},
     year = {2014},
     volume = {3},
     number = {1}}
    
  127. R. Pandey, S. Singh & K. Shukla
    Passive copy-move forgery detection in videos
    Computer and Communication Technology (ICCCT), 2014 International Conference on
    2014, pp. 301-306
    DOI: 10.1109/ICCCT.2014.7001509
    BibTeX
    @inproceedings{Pandey2014a,
     author = {Pandey, R.C. and Singh, S.K. and Shukla, K.K.},
     title = {Passive copy-move forgery detection in videos},
     booktitle = {Computer and Communication Technology (ICCCT), 2014 International Conference on},
     year = {2014},
     pages = {301--306}}
    
  128. R.C. Pandey, S.K. Singh, K. Shukla & R. Agrawal
    Fast and robust passive copy-move forgery detection using SURF and SIFT image features
    Industrial and Information Systems (ICIIS), 2014 9th International Conference on
    2014, pp. 1-6
    DOI: 10.1109/ICIINFS.2014.7036519
    BibTeX
    @inproceedings{Pandey2014,
     author = {Pandey, Ramesh Chand and Singh, Sanjay Kumar and Shukla, K.K. and Agrawal, Rishabh},
     title = {Fast and robust passive copy-move forgery detection using SURF and SIFT image features},
     booktitle = {Industrial and Information Systems (ICIIS), 2014 9th International Conference on},
     year = {2014},
     pages = {1--6}}
    
  129. A. Peng & X. Kang
    A Robust Median Filtering Detector Based On Filter Residual
    paper.edu.cn, 2014
    BibTeX
    @electronic{Peng2014a,
     author = {Anjie Peng, Xiangui Kang},
     title = {A Robust Median Filtering Detector Based On Filter Residual},
     journal = {paper.edu.cn},
     year = {2014}}
    
  130. F. Peng, J. Shi & M. Long
    Identifying photographic images and photorealistic computer graphics using multifractal spectrum features of PRNU
    Multimedia and Expo (ICME), 2014 IEEE International Conference on
    2014, pp. 1-6
    DOI: 10.1109/ICME.2014.6890296
    BibTeX
    @inproceedings{Peng2014b,
     author = {Peng, Fei and Shi, Jiaoling and Long, Min},
     title = {Identifying photographic images and photorealistic computer graphics using multifractal spectrum features of PRNU},
     booktitle = {Multimedia and Expo (ICME), 2014 IEEE International Conference on},
     year = {2014},
     pages = {1--6}}
    
  131. F. Peng & D.-l. Zhou
    Discriminating natural images and computer generated graphics based on the impact of CFA\ interpolation on the correlation of {PRNU}\
    Digital Investigation, 2014(0), pp. -
    DOI: 10.1016/j.diin.2014.04.002
    BibTeX
    @article{Peng2014,
     author = {Fei Peng and Die-lan Zhou},
     title = {Discriminating natural images and computer generated graphics based on the impact of CFA\ interpolation on the correlation of {PRNU}\},
     journal = {Digital Investigation},
     year = {2014},
     number = {0},
     pages = {-}}
    
  132. H.S.D. Perera
    Video Analysis Tool Box for Digital Video Forensics
    University of Moratuwa, University of Moratuwa, 2014
    BibTeX
    @phdthesis{Perer2014,
     author = {Halloluwage Susinda Deemantha Perera},
     title = {Video Analysis Tool Box for Digital Video Forensics},
     school = {University of Moratuwa},
     year = {2014}}
    
  133. A. Costanzo Piccinnano
    Techniques for Digital Image Forensics and Counter-Forensics
    Università degli studi di siena, Università degli studi di siena, 2014
    BibTeX
    @phdthesis{Costanzo2014a,
     author = {Andrea Costanzo Piccinnano},
     title = {Techniques for Digital Image Forensics and Counter-Forensics},
     school = {Università degli studi di siena},
     year = {2014}}
    
  134. Z. Qian & X. Zhang
    Improved Anti-forensics of JPEG\ Compression
    Journal of Systems and Software, 2014(0), pp. -
    DOI: 10.1016/j.jss.2013.12.043
    BibTeX
    @article{Qian2014,
     author = {Zhenxing Qian and Xinpeng Zhang},
     title = {Improved Anti-forensics of JPEG\ Compression},
     journal = {Journal of Systems and Software},
     year = {2014},
     number = {0},
     pages = {-}}
    
  135. X. Qiu, H. Li, W. Luo & J. Huang
    A Universal Image Forensic Strategy Based on Steganalytic Model
    Proceedings of the 2Nd ACM Workshop on Information Hiding and Multimedia Security
    ACM, 2014, pp. 165-170
    DOI: 10.1145/2600918.2600941
    BibTeX
    @inproceedings{Qiu2014,
     author = {Qiu, Xiaoqing and Li, Haodong and Luo, Weiqi and Huang, Jiwu},
     title = {A Universal Image Forensic Strategy Based on Steganalytic Model},
     booktitle = {Proceedings of the 2Nd ACM Workshop on Information Hiding and Multimedia Security},
     publisher = {ACM},
     year = {2014},
     pages = {165--170}}
    
  136. Z. Qu, W. Luo & J. Huang
    A framework for identifying shifted double JPEG compression artifacts with application to non-intrusive digital image forensics
    Science China Information Sciences, Science China Press, 2014, Vol. 57(2), pp. 1-18
    DOI: 10.1007/s11432-013-5046-8
    BibTeX
    @article{Qu2014,
     author = {Qu, ZhenHua and Luo, WeiQi and Huang, JiWu},
     title = {A framework for identifying shifted double JPEG compression artifacts with application to non-intrusive digital image forensics},
     journal = {Science China Information Sciences},
     publisher = {Science China Press},
     year = {2014},
     volume = {57},
     number = {2},
     pages = {1--18}}
    
  137. M.A. Qureshi & M. Deriche
    A review on copy move image forgery detection techniques
    Proc. 11th Int Systems, Signals Devices (SSD) Multi-Conf
    2014, pp. 1-5
    DOI: 10.1109/SSD.2014.6808907
    BibTeX
    @inproceedings{Qureshi2014,
     author = {M. Ali Qureshi and M. Deriche},
     title = {A review on copy move image forgery detection techniques},
     booktitle = {Proc. 11th Int Systems, Signals Devices (SSD) Multi-Conf},
     year = {2014},
     pages = {1--5}}
    
  138. M. Rao, A. Rajagopalan & G. Seetharaman
    Harnessing Motion Blur to Unveil Splicing
    Information Forensics and Security, IEEE Transactions on, 2014, Vol. 9(4), pp. 583-595
    DOI: 10.1109/TIFS.2014.2302895
    BibTeX
    @article{Rao2014,
     author = {Rao, M.P. and Rajagopalan, A.N. and Seetharaman, G.},
     title = {Harnessing Motion Blur to Unveil Splicing},
     journal = {Information Forensics and Security, IEEE Transactions on},
     year = {2014},
     volume = {9},
     number = {4},
     pages = {583--595}}
    
  139. C. Richao, Y. Gaobo & Z. Ningbo
    Detection of object-based manipulation by the statistical features of object contour
    Forensic Science International, 2014
    BibTeX
    @article{Richao2014,
     author = {Chen Richao and Yang Gaobo and Zhu Ningbo},
     title = {Detection of object-based manipulation by the statistical features of object contour},
     journal = {Forensic Science International},
     year = {2014}}
    
  140. S.-J. Ryu & H.-K. Lee
    Estimation of linear transformation by analyzing the periodicity of interpolation
    Pattern Recognition Letters, 2014, Vol. 36(0), pp. 89-99
    DOI: 10.1016/j.patrec.2013.09.028
    BibTeX
    @article{Ryu2014,
     author = {Seung-Jin Ryu and Heung-Kyu Lee},
     title = {Estimation of linear transformation by analyzing the periodicity of interpolation},
     journal = {Pattern Recognition Letters},
     year = {2014},
     volume = {36},
     number = {0},
     pages = {89--99}}
    
  141. Seung-Jin. Ryu, H.-Y. Lee & H.-k. Lee
    Detecting Trace of Seam Carving for Forensic Analysis
    IEICE TRANSACTIONS on Information and Systems, 2014, Vol. E97-D(5), pp. 1304-1311
    BibTeX
    @article{Ryu2014a,
     author = {Seung-Jin Ryu and Hae-Yeoun Lee and Heung-kyu Lee},
     title = {Detecting Trace of Seam Carving for Forensic Analysis},
     journal = {IEICE TRANSACTIONS on Information and Systems},
     year = {2014},
     volume = {E97-D},
     number = {5},
     pages = {1304--1311}}
    
  142. M. Saleem
    A Key-Point Based Robust Algorithm for Detecting Cloning Forgery
    International Journal of Current Engineering and Technology, 2014
    BibTeX
    @article{Saleem2014,
     author = {Mariam Saleem},
     title = {A Key-Point Based Robust Algorithm for Detecting Cloning Forgery},
     journal = {International Journal of Current Engineering and Technology},
     year = {2014}}
    
  143. M. Saleem, M. Altaf & Q. Chaudry
    A comparative analysis on pixel-based blind cloning techniques
    Control System, Computing and Engineering (ICCSCE), 2014 IEEE International Conference on
    2014, pp. 130-135
    DOI: 10.1109/ICCSCE.2014.7072702
    BibTeX
    @inproceedings{Saleem2014a,
     author = {Saleem, M. and Altaf, M.Q. and Chaudry, Q.},
     title = {A comparative analysis on pixel-based blind cloning techniques},
     booktitle = {Control System, Computing and Engineering (ICCSCE), 2014 IEEE International Conference on},
     year = {2014},
     pages = {130--135}}
    
  144. A.L. Sandoval Orozco, D.M. Arenas González, J. Rosales Corripio, L.J. García Villalba & J.C. Hernandez-Castro
    Source identification for mobile devices, based on wavelet transforms combined with sensor imperfections
    Computing, Springer, 2014, Vol. 96(9), pp. 829
    DOI: 10.1007/s00607-013-0313-5
    BibTeX
    @article{SandovalOrozco2014,
     author = {Sandoval Orozco, A. L. and Arenas González, D. M. and Rosales Corripio, J. and García Villalba, L. J. and Hernandez-Castro, J. C.},
     title = {Source identification for mobile devices, based on wavelet transforms combined with sensor imperfections},
     journal = {Computing},
     publisher = {Springer},
     year = {2014},
     volume = {96},
     number = {9},
     pages = {829}}
    
  145. T.K. Sarode & N. Vaswani
    Copy-Move Forgery Detection using Orthogonal Wavelet Transforms.
    International Journal of Computer Applications, 2014, Vol. 88, pp. 41-45
    BibTeX
    @article{Sarode2014,
     author = {Sarode, Tanuja K. and Vaswani, Naveen},
     title = {Copy-Move Forgery Detection using Orthogonal Wavelet Transforms.},
     journal = {International Journal of Computer Applications},
     year = {2014},
     volume = {88},
     pages = {41--45}}
    
  146. R. Satta & P. Stirparo
    On the usage of Sensor Pattern Noise for Picture-to-Identity linking through social network accounts
    Proceeding of the International Conference on Computer Vision Theory and Applications Lisbon, Portugal
    2014
    BibTeX
    @inproceedings{Satta2014,
     author = {Riccardo Satta and Pasquale Stirparo},
     title = {On the usage of Sensor Pattern Noise for Picture-to-Identity linking through social network accounts},
     booktitle = {Proceeding of the International Conference on Computer Vision Theory and Applications Lisbon, Portugal},
     year = {2014}}
    
  147. S. Shang, N. Memon & X. Kong
    Detecting documents forged by printing and copying
    EURASIP Journal on Advances in Signal Processing, Springer, 2014, Vol. 2014(1), pp. 140
    BibTeX
    @article{Shang2014,
     author = {Shang, Shize and Memon, Nasir and Kong, Xiangwei},
     title = {Detecting documents forged by printing and copying},
     journal = {EURASIP Journal on Advances in Signal Processing},
     publisher = {Springer},
     year = {2014},
     volume = {2014},
     number = {1},
     pages = {140}}
    
  148. N. Shaozhang, M. Xianzhe & C. Haoliang
    Digital Image Forensics Using Orthogonal 1-D Objects
    Chinese Journal of Electronics, 2014, Vol. 23(3)
    BibTeX
    @article{Shaozhang201,
     author = {Niu Shaozhang and Meng Xianzhe and Cui Haoliang},
     title = {Digital Image Forensics Using Orthogonal 1-D Objects},
     journal = {Chinese Journal of Electronics},
     year = {2014},
     volume = {23},
     number = {3}}
    
  149. K. Sharma
    Computationally Efficient Copy-Move Image Forgery Detection Based on DCT and SVD
    Advanced Research in Electrical and Electronic Engineering, 2014, Vol. 1(3), pp. 79-81
    BibTeX
    @article{Sharma2014,
     author = {Kavya Sharma},
     title = {Computationally Efficient Copy-Move Image Forgery Detection Based on DCT and SVD},
     journal = {Advanced Research in Electrical and Electronic Engineering},
     year = {2014},
     volume = {1},
     number = {3},
     pages = {79--81}}
    
  150. Shehnaz & M. Kaur
    Forgery Detection Based on Blur Inconsistencies: A Review
    International Journal of Engineering and Technical Research (IJETR), 2014, Vol. 2(12), pp. 198-201
    BibTeX
    @article{Shehnaz2014,
     author = {Shehnaz and Mandeep Kaur},
     title = {Forgery Detection Based on Blur Inconsistencies: A Review},
     journal = {International Journal of Engineering and Technical Research (IJETR)},
     year = {2014},
     volume = {2},
     number = {12},
     pages = {198--201}}
    
  151. Z. Shen, J. Ni & C. Chen
    Blind detection of median filtering using linear and nonlinear descriptors
    Multimedia Tools and Applications, Springer, 2014, pp. 1
    DOI: 10.1007/s11042-014-2407-2
    BibTeX
    @article{Shen2014,
     author = {Shen, Zhaoyi and Ni, Jiangqun and Chen, Chenglong},
     title = {Blind detection of median filtering using linear and nonlinear descriptors},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2014},
     pages = {1}}
    
  152. C. Shi, N.-F. Law, H.-F. Leung & W.-C. Siu
    Weighting optimization with neural network for photo-response-non-uniformity-based source camera identification
    Asia-Pacific Signal and Information Processing Association, 2014 Annual Summit and Conference (APSIPA)
    2014, pp. 1-7
    DOI: 10.1109/APSIPA.2014.7041642
    BibTeX
    @inproceedings{Shi2014,
     author = {Chao Shi and Ngai-Fong Law and Hung-Fat Leung and Wan-Chi Siu},
     title = {Weighting optimization with neural network for photo-response-non-uniformity-based source camera identification},
     booktitle = {Asia-Pacific Signal and Information Processing Association, 2014 Annual Summit and Conference (APSIPA)},
     year = {2014},
     pages = {1--7}}
    
  153. Y.-D. Shin
    Forgery Image Detection of Scale Up and Down Image Using Discrete Cosine Transform
    Journal of Next Generation Information Technology (JNIT), 2014, Vol. 5(2)
    BibTeX
    @article{Shin2014,
     author = {Yong-Dal Shin},
     title = {Forgery Image Detection of Scale Up and Down Image Using Discrete Cosine Transform},
     journal = {Journal of Next Generation Information Technology (JNIT)},
     year = {2014},
     volume = {5},
     number = {2}}
    
  154. C. Song & X. Lin
    Natural image splicing detection based on defocus blur at edges
    Communications in China (ICCC), 2014 IEEE/CIC International Conference on
    2014, pp. 225-230
    DOI: 10.1109/ICCChina.2014.7008276
    BibTeX
    @inproceedings{Song2014,
     author = {Chunhe Song and Xiaodong Lin},
     title = {Natural image splicing detection based on defocus blur at edges},
     booktitle = {Communications in China (ICCC), 2014 IEEE/CIC International Conference on},
     year = {2014},
     pages = {225--230}}
    
  155. B. Su, Q. Yuan, S. Wang, C. Zhao & S. Li
    Enhanced state selection Markov model for image splicing detection
    EURASIP Journal on Wireless Communications and Networking, 2014, Vol. 2014(1), pp. 7
    DOI: 10.1186/1687-1499-2014-7
    BibTeX
    @article{Su2014,
     author = {Su, Bo and Yuan, Quanqiao and Wang, Shilin and Zhao, Chenglin and Li, Shenghong},
     title = {Enhanced state selection Markov model for image splicing detection},
     journal = {EURASIP Journal on Wireless Communications and Networking},
     year = {2014},
     volume = {2014},
     number = {1},
     pages = {7}}
    
  156. L. Su, T. Huang & J. Yang
    A video forgery detection algorithm based on compressive sensing
    Multimedia Tools and Applications, Springer US, 2014, pp. 1-16
    DOI: 10.1007/s11042-014-1915-4
    BibTeX
    @article{Su2014a,
     author = {Su, Lichao and Huang, Tianqiang and Yang, Jianmei},
     title = {A video forgery detection algorithm based on compressive sensing},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer US},
     year = {2014},
     pages = {1--16}}
    
  157. K. Sudhakar, V. Sandeep & S. Kulkarni
    Speeding-up SIFT based copy move forgery detection using level set approach
    Advances in Electronics, Computers and Communications (ICAECC), 2014 International Conference on
    2014, pp. 1-6
    DOI: 10.1109/ICAECC.2014.7002407
    BibTeX
    @inproceedings{Sudhakar2014,
     author = {Sudhakar, K. and Sandeep, V.M. and Kulkarni, S.},
     title = {Speeding-up SIFT based copy move forgery detection using level set approach},
     booktitle = {Advances in Electronics, Computers and Communications (ICAECC), 2014 International Conference on},
     year = {2014},
     pages = {1--6}}
    
  158. K. Sudhakar, V. Sandeep & S. Kulkarni
    Shape Based Copy Move Forgery Detection Using Level Set Approach
    Signal and Image Processing (ICSIP), 2014 Fifth International Conference on
    2014, pp. 213-217
    DOI: 10.1109/ICSIP.2014.40
    BibTeX
    @inproceedings{Sudhakar2014a,
     author = {Sudhakar, K. and Sandeep, V.M. and Kulkarni, S.},
     title = {Shape Based Copy Move Forgery Detection Using Level Set Approach},
     booktitle = {Signal and Image Processing (ICSIP), 2014 Fifth International Conference on},
     year = {2014},
     pages = {213--217}}
    
  159. R. Sumner
    Processing RAW Images in MATLAB
    Department of Electrical Engineering, UC Santa Cruz, Department of Electrical Engineering, UC Santa Cruz, 2014
    BibTeX
    @other{Sumner2014,
     author = {Rob Sumner},
     title = {Processing RAW Images in MATLAB},
     school = {Department of Electrical Engineering, UC Santa Cruz},
     year = {2014}}
    
  160. K. Sunil, D. Jagan & M. Shaktidev
    DCT-PCA Based Method for Copy-Move Forgery Detection
    Satapathy, S. C., Avadhani, P. S., Udgata, S. K. & Lakshminarayana, S. (ed.)
    ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol II
    Springer International Publishing, 2014, Vol. 249, pp. 577-583
    DOI: 10.1007/978-3-319-03095-1_62
    BibTeX
    @incollection{Sunil2014,
     author = {Sunil, Kumar and Jagan, Desai and Shaktidev, Mukherjee},
     title = {DCT-PCA Based Method for Copy-Move Forgery Detection},
     booktitle = {ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol II},
     publisher = {Springer International Publishing},
     year = {2014},
     volume = {249},
     pages = {577--583}}
    
  161. T.H. Thai, R. Cogranne & F. Retraint
    Optimal detector for camera model identification based on an accurate model of DCT coefficients
    Proc. IEEE 16th Int Multimedia Signal Processing (MMSP) Workshop
    2014, pp. 1-6
    DOI: 10.1109/MMSP.2014.6958810
    BibTeX
    @inproceedings{Thai2014,
     author = {Thanh Hai Thai and Cogranne, R. and Retraint, F.},
     title = {Optimal detector for camera model identification based on an accurate model of DCT coefficients},
     booktitle = {Proc. IEEE 16th Int Multimedia Signal Processing (MMSP) Workshop},
     year = {2014},
     pages = {1--6}}
    
  162. T.H. Thai, R. Cogranne & F. Retraint
    Camera Model Identification Based on the Heteroscedastic Noise Model
    IEEE_J_IP, 2014, Vol. 23(1), pp. 250-263
    DOI: 10.1109/TIP.2013.2290596
    BibTeX
    @article{Thai2014b,
     author = {T. H. Thai and R. Cogranne and F. Retraint},
     title = {Camera Model Identification Based on the Heteroscedastic Noise Model},
     journal = {IEEE_J_IP},
     year = {2014},
     volume = {23},
     number = {1},
     pages = {250--263}}
    
  163. T. Thongkamwitoon, H. Muammar & P.L. Dragotti
    Robust image recapture detection using a K-SVD learning approach to train dictionaries of edge profiles
    Proc. IEEE Int. Conf. Image Processing (ICIP)
    2014, pp. 5317-5321
    DOI: 10.1109/ICIP.2014.7026076
    BibTeX
    @inproceedings{Thongkamwitoon2014,
     author = {T. Thongkamwitoon and H. Muammar and P. L. Dragotti},
     title = {Robust image recapture detection using a K-SVD learning approach to train dictionaries of edge profiles},
     booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)},
     year = {2014},
     pages = {5317--5321}}
    
  164. D. Tralic, S. Grgic & B. Zovko-Cihlar
    Video frame copy-move forgery detection based on Cellular Automata and Local Binary Patterns
    Telecommunications (BIHTEL), 2014 X International Symposium on
    2014, pp. 1-4
    DOI: 10.1109/BIHTEL.2014.6987651
    BibTeX
    @inproceedings{Tralic2014a,
     author = {Tralic, D. and Grgic, S. and Zovko-Cihlar, B.},
     title = {Video frame copy-move forgery detection based on Cellular Automata and Local Binary Patterns},
     booktitle = {Telecommunications (BIHTEL), 2014 X International Symposium on},
     year = {2014},
     pages = {1--4}}
    
  165. D. Tralic, P. Rosin, X. Sun & S. Grgic
    Copy-Move Forgery Detection Using Cellular Automata
    Rosin, P., Adamatzky, A. & Sun, X. (ed.)
    Cellular Automata in Image Processing and Geometry
    Chapter Copy-Move Forgery Detection Using Cellular Automata
    Springer, 2014, pp. 105-125
    BibTeX
    @inbook{Tralic2014,
     author = {Tralic, Dijana and Rosin, Paul and Sun, Xianfang and Grgic, Sonja},
     title = {Copy-Move Forgery Detection Using Cellular Automata},
     booktitle = {Cellular Automata in Image Processing and Geometry},
     publisher = {Springer},
     year = {2014},
     pages = {105--125}}
    
  166. D. Tralic, P. Rosin, X. Sun & S. Grgic
    Detection of duplicated image regions using cellular automata
    Systems, Signals and Image Processing (IWSSIP), 2014 International Conference on
    2014, pp. 167-170
    BibTeX
    @inproceedings{Tralic2014b,
     author = {Tralic, D. and Rosin, P.L. and Xianfang Sun and Grgic, S.},
     title = {Detection of duplicated image regions using cellular automata},
     booktitle = {Systems, Signals and Image Processing (IWSSIP), 2014 International Conference on},
     year = {2014},
     pages = {167--170}}
    
  167. D.T. Trung, A. Beghdadi & M.-C. Larabi
    Blind inpainting forgery detection
    Signal and Information Processing (GlobalSIP), 2014 IEEE Global Conference on
    2014, pp. 1019-1023
    DOI: 10.1109/GlobalSIP.2014.7032275
    BibTeX
    @inproceedings{Trung2014,
     author = {Dang Thanh Trung and Beghdadi, A. and Larabi, M.-C.},
     title = {Blind inpainting forgery detection},
     booktitle = {Signal and Information Processing (GlobalSIP), 2014 IEEE Global Conference on},
     year = {2014},
     pages = {1019--1023}}
    
  168. G. Valenzise, M. Tagliasacchi & S. Tubaro
    Detectability-quality trade-off in JPEG counter-forensics
    Proc. IEEE Int. Conf. Image Processing (ICIP)
    2014, pp. 5337-5341
    DOI: 10.1109/ICIP.2014.7026080
    BibTeX
    @inproceedings{Valenzise2014,
     author = {G. Valenzise and M. Tagliasacchi and S. Tubaro},
     title = {Detectability-quality trade-off in JPEG counter-forensics},
     booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)},
     year = {2014},
     pages = {5337--5341}}
    
  169. L. Verdoliva, D. Cozzolino & G. Poggi
    A feature-based approach for image tampering detection and localization
    Information Forensics and Security (WIFS), 2014 IEEE International Workshop on
    2014, pp. 149-154
    DOI: 10.1109/WIFS.2014.7084319
    BibTeX
    @inproceedings{Verdoliva2014,
     author = {Verdoliva, L. and Cozzolino, D. and Poggi, G.},
     title = {A feature-based approach for image tampering detection and localization},
     booktitle = {Information Forensics and Security (WIFS), 2014 IEEE International Workshop on},
     year = {2014},
     pages = {149--154}}
    
  170. K.A. Vladimirovich & M.V. Valerievich
    A Fast Plain Copy-Move Detection Algorithm Based on Structural Pattern and 2D Rabin-Karp Rolling Hash
    Image Analysis and Recognition, Springer, 2014
    DOI: 10.1007/978-3-319-11758-4_50
    BibTeX
    @article{Vladimirovich2014,
     author = {Vladimirovich, Kuznetsov Andrey and Valerievich, Myasnikov Vladislav},
     title = {A Fast Plain Copy-Move Detection Algorithm Based on Structural Pattern and 2D Rabin-Karp Rolling Hash},
     journal = {Image Analysis and Recognition},
     publisher = {Springer},
     year = {2014}}
    
  171. A.W.A. Wahab, M.A. Bagiwa, M.Y.I. Idris, S. Khan, Z. Razak & M.R.K. Ariffin
    Passive video forgery detection techniques: A survey
    Information Assurance and Security (IAS), 2014 10th International Conference on
    2014, pp. 29-34
    DOI: 10.1109/ISIAS.2014.7064616
    BibTeX
    @inproceedings{Wahab2014,
     author = {Wahab, Ainuddin Wahid Abdul and Bagiwa, Mustapha Aminu and Idris, Mohd Yamani Idna and Khan, Suleman and Razak, Zaidi and Ariffin, Muhammad Rezal Kamel},
     title = {Passive video forgery detection techniques: A survey},
     booktitle = {Information Assurance and Security (IAS), 2014 10th International Conference on},
     year = {2014},
     pages = {29--34}}
    
  172. S.-L. Wang, A.W.-C. Liew, S.-H. Li, Y.-J. Zhang & J.-H. Li
    Detection of shifted double JPEG compression by an adaptive DCT coefficient model
    EURASIP Journal on Advances in Signal Processing, 2014, Vol. 2014(1), pp. 101
    DOI: 10.1186/1687-6180-2014-101
    BibTeX
    @article{Wang2014,
     author = {Wang, Shi-Lin and Liew, Alan Wee-Chung and Li, Sheng-Hong and Zhang, Yu-Jin and Li, Jian-Hua},
     title = {Detection of shifted double JPEG compression by an adaptive DCT coefficient model},
     journal = {EURASIP Journal on Advances in Signal Processing},
     year = {2014},
     volume = {2014},
     number = {1},
     pages = {101}}
    
  173. W. Wang, J. Dong & T. Tan
    Exploring DCT Coefficient Quantization Effects for Local Tampering Detection
    Information Forensics and Security, IEEE Transactions on, 2014, Vol. 9(10), pp. 1653-1666
    DOI: 10.1109/TIFS.2014.2345479
    BibTeX
    @article{Wang2014a,
     author = {Wei Wang and Jing Dong and Tieniu Tan},
     title = {Exploring DCT Coefficient Quantization Effects for Local Tampering Detection},
     journal = {Information Forensics and Security, IEEE Transactions on},
     year = {2014},
     volume = {9},
     number = {10},
     pages = {1653--1666}}
    
  174. W. Wang, X. Jiang, S. Wang, M. Wan & T. Sun
    Identifying Video Forgery Process Using Optical Flow
    Digital-Forensics and Watermarking, Springer, 2014
    DOI: 10.1007/978-3-662-43886-2_18
    BibTeX
    @article{Wang2014b,
     author = {Wang, Wan and Jiang, Xinghao and Wang, Shilin and Wan, Meng and Sun, Tanfeng},
     title = {Identifying Video Forgery Process Using Optical Flow},
     journal = {Digital-Forensics and Watermarking},
     publisher = {Springer},
     year = {2014}}
    
  175. J.-D. Wei, Y.-J. Lin & Y.-J. Wu
    A patch analysis method to detect seam carved images
    Pattern Recognition Letters, 2014, Vol. 36(0), pp. 100-106
    DOI: 10.1016/j.patrec.2013.09.026
    BibTeX
    @article{Wei2014,
     author = {Jyh-Da Wei and Yu-Ju Lin and Yi-Jing Wu},
     title = {A patch analysis method to detect seam carved images},
     journal = {Pattern Recognition Letters},
     year = {2014},
     volume = {36},
     number = {0},
     pages = {100--106}}
    
  176. Y. Wu, Y. Deng, H. Duan & L. Zhou
    Dual tree complex wavelet transform approach to copy-rotate-move forgery detection
    Science China Information Sciences, Springer Berlin Heidelberg, 2014, Vol. 57(1), pp. 1-12
    DOI: 10.1007/s11432-013-4823-8
    BibTeX
    @article{Wu2014,
     author = {Wu, YunJie and Deng, Yu and Duan, HaiBin and Zhou, LinNa},
     title = {Dual tree complex wavelet transform approach to copy-rotate-move forgery detection},
     journal = {Science China Information Sciences},
     publisher = {Springer Berlin Heidelberg},
     year = {2014},
     volume = {57},
     number = {1},
     pages = {1--12}}
    
  177. Y. Xiao
    Image Splicing Detection Based on Machine Learning Algorithm
    Wong, W. E. & Zhu, T. (ed.)
    Computer Engineering and Networking
    Springer International Publishing, 2014, Vol. 277, pp. 601-608
    DOI: 10.1007/978-3-319-01766-2_69
    BibTeX
    @incollection{Xiao2014,
     author = {Xiao, Yan},
     title = {Image Splicing Detection Based on Machine Learning Algorithm},
     booktitle = {Computer Engineering and Networking},
     publisher = {Springer International Publishing},
     year = {2014},
     volume = {277},
     pages = {601--608}}
    
  178. N. Xing, J. Wang, X. Zhang & J. Zhang
    Digital image identification based on generalized Gaussian model
    Proc. SPIE 9233, International Symposium on Photonics and Optoelectronics 2014
    Proc. SPIE, 2014, Vol. 9233, pp. 923303-923303-6
    DOI: 10.1117/12.2069695
    BibTeX
    @inproceedings{Xing2014,
     author = {Xing, Nan and Wang, Jing and Zhang, Xiaolei and Zhang, Jingbo},
     title = {Digital image identification based on generalized Gaussian model},
     booktitle = {Proc. SPIE 9233, International Symposium on Photonics and Optoelectronics 2014},
     journal = {Proc. SPIE},
     year = {2014},
     volume = {9233},
     pages = {923303-923303-6}}
    
  179. B. Xu, Guangjie Liu & Y. Dai
    Detecting Image Splicing Using Merged Features in Chroma Space
    The Scientific World Journal, 2014, Vol. 2014
    BibTeX
    @article{Xu2014,
     author = {Bo Xu and Guangjie Liu, and Yuewei Dai},
     title = {Detecting Image Splicing Using Merged Features in Chroma Space},
     journal = {The Scientific World Journal},
     year = {2014},
     volume = {2014}}
    
  180. B. Yang & B. Liu
    Feature Fusion for Blurring Detection in Image Forensics
    IEICE TRANSACTIONS on Information and Systems, 2014, Vol. E97-D(6), pp. 1690-1693
    BibTeX
    @article{Yang2014a,
     author = {Benjuan Yang and Benyong Liu},
     title = {Feature Fusion for Blurring Detection in Image Forensics},
     journal = {IEICE TRANSACTIONS on Information and Systems},
     year = {2014},
     volume = {E97-D},
     number = {6},
     pages = {1690--1693}}
    
  181. H. Yang & Z. Zhou
    Hiding the Trace of JPEG Compression History
    Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on
    2014, pp. 909-913
    DOI: 10.1109/CSNT.2014.187
    BibTeX
    @inproceedings{Yang2014,
     author = {Hong Yang and Zhiping Zhou},
     title = {Hiding the Trace of JPEG Compression History},
     booktitle = {Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on},
     year = {2014},
     pages = {909--913}}
    
  182. J. Yang, J. Xie, G. Zhu, S. Kwong & Y.-Q. Shi
    An Effective Method for Detecting Double JPEG Compression With the Same Quantization Matrix
    Information Forensics and Security, IEEE Transactions on, 2014, Vol. 9(11), pp. 1933-1942
    DOI: 10.1109/TIFS.2014.2359368
    BibTeX
    @article{Yang2014b,
     author = {Jianquan Yang and Jin Xie and Guopu Zhu and Sam Kwong and Yun-Qing Shi},
     title = {An Effective Method for Detecting Double JPEG Compression With the Same Quantization Matrix},
     journal = {Information Forensics and Security, IEEE Transactions on},
     year = {2014},
     volume = {9},
     number = {11},
     pages = {1933--1942}}
    
  183. R. Yang
    Additive noise detection and its application to audio forensics
    Asia-Pacific Signal and Information Processing Association, 2014 Annual Summit and Conference (APSIPA)
    2014, pp. 1-5
    DOI: 10.1109/APSIPA.2014.7041688
    BibTeX
    @inproceedings{Yang2014c,
     author = {Yang, Rui},
     title = {Additive noise detection and its application to audio forensics},
     booktitle = {Asia-Pacific Signal and Information Processing Association, 2014 Annual Summit and Conference (APSIPA)},
     year = {2014},
     pages = {1--5}}
    
  184. S. Yang, C. Qin, Z. Qian & B. Xu
    Tampering Detection and Content Recovery for Digital Images Using Halftone Mechanism
    Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2014 Tenth International Conference on
    2014, pp. 130-133
    DOI: 10.1109/IIH-MSP.2014.39
    BibTeX
    @inproceedings{Yang2014d,
     author = {Shanshan Yang and Chuan Qin and Zhenxing Qian and Boqing Xu},
     title = {Tampering Detection and Content Recovery for Digital Images Using Halftone Mechanism},
     booktitle = {Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2014 Tenth International Conference on},
     year = {2014},
     pages = {130--133}}
    
  185. H. Yan-Li, N. Shao-Zhang, Z. Jian-Cheng & Z. Lin-Na
    Forensics of image tampering based on the consistency of illuminant chromaticity
    Asia-Pacific Signal and Information Processing Association, 2014 Annual Summit and Conference (APSIPA)
    2014, pp. 1-4
    DOI: 10.1109/APSIPA.2014.7041551
    BibTeX
    @inproceedings{Yan-Li2014,
     author = {Huang Yan-Li and Niu Shao-Zhang and Zou Jian-Cheng and Zhou Lin-Na},
     title = {Forensics of image tampering based on the consistency of illuminant chromaticity},
     booktitle = {Asia-Pacific Signal and Information Processing Association, 2014 Annual Summit and Conference (APSIPA)},
     year = {2014},
     pages = {1--4}}
    
  186. H. Yong-Jian, G. Hua, Z. Jing & L. Bei-Bei
    Simplification and Analysis of Counter-attack Algorithm for Image Source Identification
    JSCUT(Natural Science Edition), 2014
    BibTeX
    @article{Yongjian2014,
     author = {Hu Yong-Jian and Guan Hua and Zhao Jing and Liu Bei-Bei},
     title = {Simplification and Analysis of Counter-attack Algorithm for Image Source Identification},
     journal = {JSCUT(Natural Science Edition)},
     year = {2014}}
    
  187. L. Yu, Q. Han & X. Niu
    Copy-Rotation-Move Forgery Detection Using the MROGH Descriptor
    Cloud Engineering (IC2E), 2014 IEEE International Conference on
    2014, pp. 510-513
    DOI: 10.1109/IC2E.2014.54
    BibTeX
    @inproceedings{Yu2014b,
     author = {Liyang Yu and Qi Han and Xiamu Niu},
     title = {Copy-Rotation-Move Forgery Detection Using the MROGH Descriptor},
     booktitle = {Cloud Engineering (IC2E), 2014 IEEE International Conference on},
     year = {2014},
     pages = {510--513}}
    
  188. Z. Yu, L. Lin, B.-K. Ling, C.-F. Ho, C. Qing, H. Xu, W. Dai, Y. Liang, J. Chen & Q. Dai
    Camera identification for very low bit rate time varying quantization noise videos
    Communication Systems, Networks & Digital Signal Processing (CSNDSP), 2014 9th International Symposium on
    2014, pp. 208-212
    DOI: 10.1109/CSNDSP.2014.6923826
    BibTeX
    @inproceedings{Yu2014a,
     author = {Zitong Yu and Lianshi Lin and Ling, B.W.-K. and Ho, C.Y.-F. and Chunmei Qing and Hailiang Xu and Weihang Dai and Yuming Liang and Jiameng Chen and Qingyun Dai},
     title = {Camera identification for very low bit rate time varying quantization noise videos},
     booktitle = {Communication Systems, Networks & Digital Signal Processing (CSNDSP), 2014 9th International Symposium on},
     year = {2014},
     pages = {208--212}}
    
  189. Z. Yu, R. Wang, S. Xin, W. Li & J. Wang
    Single-view Recaptured Photo Detection Based on HSV Color Space
    Journal of Computational Information Systems, 2014, Vol. 10(8), pp. 3229-3236
    BibTeX
    @article{Yu2014,
     author = {Zan Yu and Rangding Wang and Shiqing Xin and Wei Li and Jiaji Wang},
     title = {Single-view Recaptured Photo Detection Based on HSV Color Space},
     journal = {Journal of Computational Information Systems},
     year = {2014},
     volume = {10},
     number = {8},
     pages = {3229--3236}}
    
  190. M. Zandi, A. Mahmoudi-Aznaveh & A. Mansouri
    Adaptive matching for copy-move Forgery detection
    Information Forensics and Security (WIFS), 2014 IEEE International Workshop on
    2014, pp. 119-124
    DOI: 10.1109/WIFS.2014.7084314
    BibTeX
    @inproceedings{Zandi2014,
     author = {Zandi, M. and Mahmoudi-Aznaveh, A. and Mansouri, A.},
     title = {Adaptive matching for copy-move Forgery detection},
     booktitle = {Information Forensics and Security (WIFS), 2014 IEEE International Workshop on},
     year = {2014},
     pages = {119--124}}
    
  191. H. Zeng & X. Kang
    Camera Source Identification Game with Incomplete Information
    Digital-Forensics and Watermarking, Springer, 2014
    DOI: 10.1007/978-3-662-43886-2_14
    BibTeX
    @article{Zeng2014a,
     author = {Zeng, Hui and Kang, Xiangui},
     title = {Camera Source Identification Game with Incomplete Information},
     journal = {Digital-Forensics and Watermarking},
     publisher = {Springer},
     year = {2014}}
    
  192. H. Zeng, T. Qin, X. Kang & L. Liu
    Countering anti-forensics of median filtering
    Acoustics, Speech and Signal Processing (ICASSP), 2014 IEEE International Conference on
    2014, pp. 2704-2708
    DOI: 10.1109/ICASSP.2014.6854091
    BibTeX
    @inproceedings{Zeng2014,
     author = {Hui Zeng and Tengfei Qin and Xiangui Kang and Li Liu},
     title = {Countering anti-forensics of median filtering},
     booktitle = {Acoustics, Speech and Signal Processing (ICASSP), 2014 IEEE International Conference on},
     year = {2014},
     pages = {2704--2708}}
    
  193. J. Zhang, Q. Ruan & Y. Jin
    Combined SIFT and bi-coherence features to detect image forgery
    Signal Processing (ICSP), 2014 12th International Conference on
    2014, pp. 1859-1863
    DOI: 10.1109/ICOSP.2014.7015314
    BibTeX
    @inproceedings{Zhang2014d,
     author = {Ju Zhang and Qiuqi Ruan and Yi Jin},
     title = {Combined SIFT and bi-coherence features to detect image forgery},
     booktitle = {Signal Processing (ICSP), 2014 12th International Conference on},
     year = {2014},
     pages = {1859--1863}}
    
  194. R. Zhang & R.-D. Wang
    In-camera JPEG compression detection for doubly compressed images
    Multimedia Tools and Applications, Springer US, 2014, pp. 1-19
    DOI: 10.1007/s11042-014-1868-7
    BibTeX
    @article{Zhang2014a,
     author = {Zhang, Rong and Wang, Rang-Ding},
     title = {In-camera JPEG compression detection for doubly compressed images},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer US},
     year = {2014},
     pages = {1--19}}
    
  195. R.F. Zhang, H.M. Ye, Z.H. Song & M. Wang
    Blind Detection of Copy-Move Forgery in Digital Images Based on Dyadic Wavelet Transform
    Cai, S. Z., Zhang, Q. F., Xu, X. P., Hu, D. H. & Qu, Y. M. (ed.)
    Chapter Chapter 7: Communication, Signal and Image Processing, Data Acquisition and Recognation Technologies
    Advanced Materials Research, Trans Tech Publications, 2014, Vol. 989-994, pp. 4127-4131
    DOI: 10.4028/www.scientific.net/AMR.989-994.4127
    BibTeX
    @article{Zhang2014c,
     author = {Rui Fang Zhang and Han Min Ye and Zi Hang Song and Min Wang},
     title = {Blind Detection of Copy-Move Forgery in Digital Images Based on Dyadic Wavelet Transform},
     journal = {Advanced Materials Research},
     publisher = {Trans Tech Publications},
     year = {2014},
     volume = {989-994},
     pages = {4127--4131}}
    
  196. Y. Zhang, S. Li, S. Wang & Y.Q. Shi
    Revealing the Traces of Median Filtering Using High-Order Local Ternary Patterns
    IEEE_J_SPL, 2014, Vol. 21(3), pp. 275-279
    DOI: 10.1109/LSP.2013.2295858
    BibTeX
    @article{Zhang2014e,
     author = {Y. Zhang and S. Li and S. Wang and Y. Q. Shi},
     title = {Revealing the Traces of Median Filtering Using High-Order Local Ternary Patterns},
     journal = {IEEE_J_SPL},
     year = {2014},
     volume = {21},
     number = {3},
     pages = {275--279}}
    
  197. Y. Zhang, C. Zhao, F. Zhao & S. Li
    Blind Forensics of Median Filtering Based on Markov Statistics in Median-Filtered Residual Domain
    Zhang, B., Mu, J., Wang, W., Liang, Q. & Pi, Y. (ed.)
    The Proceedings of the Second International Conference on Communications, Signal Processing, and Systems
    Springer International Publishing, 2014, Vol. 246, pp. 179-186
    DOI: 10.1007/978-3-319-00536-2_21
    BibTeX
    @incollection{Zhang2014,
     author = {Zhang, Yujin and Zhao, Chenglin and Zhao, Feng and Li, Shenghong},
     title = {Blind Forensics of Median Filtering Based on Markov Statistics in Median-Filtered Residual Domain},
     booktitle = {The Proceedings of the Second International Conference on Communications, Signal Processing, and Systems},
     publisher = {Springer International Publishing},
     year = {2014},
     volume = {246},
     pages = {179--186}}
    
  198. Z. Zhang, J. Hou, Q. Ma & Z. Li
    Efficient video frame insertion and deletion detection based on inconsistency of correlations between local binary pattern coded frames
    Security and Communication Networks, 2014, pp. n/a-n/a
    DOI: 10.1002/sec.981
    BibTeX
    @article{Zhang2014b,
     author = {Zhang, Zhenzhen and Hou, Jianjun and Ma, Qinglong and Li, Zhaohong},
     title = {Efficient video frame insertion and deletion detection based on inconsistency of correlations between local binary pattern coded frames},
     journal = {Security and Communication Networks},
     year = {2014},
     pages = {n/a--n/a}}
    
  199. X. Zhao, J. Li, S. Wang & S. Li
    A Distributed Local Margin Learning based scheme for high-dimensional feature processing in image tampering detection
    Multimedia and Expo (ICME), 2014 IEEE International Conference on
    2014, pp. 1-6
    DOI: 10.1109/ICME.2014.6890238
    BibTeX
    @inproceedings{Zhao2014a,
     author = {Zhao, Xudong and Li, Jianhua and Wang, Shilin and Li, Shenghong},
     title = {A Distributed Local Margin Learning based scheme for high-dimensional feature processing in image tampering detection},
     booktitle = {Multimedia and Expo (ICME), 2014 IEEE International Conference on},
     year = {2014},
     pages = {1--6}}
    
  200. X. Zhao, S. Wang, S. Li & J. Li
    Passive Image Splicing Detection by 2-D Noncausal Markov Model
    Circuits and Systems for Video Technology, IEEE Transactions on, 2014(99)
    DOI: 10.1109/TCSVT.2014.2347513
    BibTeX
    @article{Zhao2014,
     author = {Zhao, X. and Wang, S. and Li, S. and Li, J.},
     title = {Passive Image Splicing Detection by 2-D Noncausal Markov Model},
     journal = {Circuits and Systems for Video Technology, IEEE Transactions on},
     year = {2014},
     number = {99}}
    
  201. X. Zhao, S. Wang, S. Li, J. Li & X. Lin
    A Distributed Scheme for Image Splicing Detection
    Digital-Forensics and Watermarking, Springer, 2014
    DOI: 10.1007/978-3-662-43886-2_23
    BibTeX
    @article{Zhao2014b,
     author = {Zhao, Xudong and Wang, Shilin and Li, Shenghong and Li, Jianhua and Lin, Xiang},
     title = {A Distributed Scheme for Image Splicing Detection},
     journal = {Digital-Forensics and Watermarking},
     publisher = {Springer},
     year = {2014}}
    
  202. J. Zheng & L. Chang
    Detection Technology of Tampering Image Based on Harris Corner Points
    Journal of Computational Information Systems, 2014, Vol. 10(4), pp. 1481-1488
    BibTeX
    @article{Zheng2014,
     author = {Jiming Zheng and Liping Chang},
     title = {Detection Technology of Tampering Image Based on Harris Corner Points},
     journal = {Journal of Computational Information Systems},
     year = {2014},
     volume = {10},
     number = {4},
     pages = {1481--1488}}
    
  203. J. Zheng & L. Chang
    Detection of Region-duplication Forgery in Image Based on Key Points' Binary Descriptors
    Journal of Information & Computational Scien, 2014, Vol. 11, pp. 3959-3966
    BibTeX
    @article{Zheng2014c,
     author = {Jiming Zheng and Liping Chang},
     title = {Detection of Region-duplication Forgery in Image Based on Key Points' Binary Descriptors},
     journal = {Journal of Information & Computational Scien},
     year = {2014},
     volume = {11},
     pages = {3959--3966}}
    
  204. J. Zheng, X. Song, J. Ren & T. Zhu
    Exposing photo manipulation using geometry and shadows
    Proc. SPIE 9159, Sixth International Conference on Digital Image Processing (ICDIP 2014)
    Proc. SPIE, 2014, Vol. 9159, pp. 91591W-91591W-6
    DOI: 10.1117/12.2064531
    BibTeX
    @inproceedings{Zheng2014a,
     author = {Zheng, Jiangbin and Song, Xuemei and Ren, Jinchang and Zhu, Tingge},
     title = {Exposing photo manipulation using geometry and shadows},
     booktitle = {Proc. SPIE 9159, Sixth International Conference on Digital Image Processing (ICDIP 2014)},
     journal = {Proc. SPIE},
     year = {2014},
     volume = {9159},
     pages = {91591W-91591W-6}}
    
  205. J. Zheng, T. Zhu, Z. Li, W. Xing & J. Ren
    Exposing Image Forgery by Detecting Traces of Feather Operation
    2014
    BibTeX
    @misc{Zheng2014b,
     author = {Jiangbin Zheng and Tingge Zhu and Zhe Li and Weiwei Xing and JinChang Ren},
     title = {Exposing Image Forgery by Detecting Traces of Feather Operation},
     year = {2014}}
    
  206. D. Zhu & Z. Zhou
    Resampling Tamper Detection Based on JPEG Double Compression
    Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on
    2014, pp. 914-918
    DOI: 10.1109/CSNT.2014.188
    BibTeX
    @inproceedings{Zhu2014,
     author = {Dan Zhu and Zhiping Zhou},
     title = {Resampling Tamper Detection Based on JPEG Double Compression},
     booktitle = {Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on},
     year = {2014},
     pages = {914--918}}
    
  207. M. Zimba
    DWT-SATS Based Detection of Image Region Cloning
    International Journal of Physical, Natural Science and Engineering, 2014, Vol. 8(2)
    BibTeX
    @article{Zimba2014,
     author = {Michael Zimba},
     title = {DWT-SATS Based Detection of Image Region Cloning},
     journal = {International Journal of Physical, Natural Science and Engineering},
     year = {2014},
     volume = {8},
     number = {2}}
    


2013

  1. J. Ackermann & M. Goesele
    How Bright Is the Moon? Recovering and Using Absolute Luminance Values from Internet Images
    Tominaga, S., Schettini, R. & Trémeau, A. (ed.)
    Computational Color Imaging
    Springer Berlin Heidelberg, 2013, Vol. 7786, pp. 90-104
    DOI: 10.1007/978-3-642-36700-7_8
    BibTeX
    @incollection{Ackermann2013,
     author = {Ackermann, Jens and Goesele, Michael},
     title = {How Bright Is the Moon? Recovering and Using Absolute Luminance Values from Internet Images},
     booktitle = {Computational Color Imaging},
     publisher = {Springer Berlin Heidelberg},
     year = {2013},
     volume = {7786},
     pages = {90--104}}
    
  2. I. Amerini, M. Barni, R. Caldelli & A. Costanzo
    Counter-forensics of SIFT-based copy-move detection by means of keypoint classification
    EURASIP Journal on Image and Video Processing, 2013, Vol. 2013(1), pp. 18
    DOI: 10.1186/1687-5281-2013-18
    BibTeX
    @article{Amerini2013b,
     author = {Amerini, Irene and Barni, Mauro and Caldelli, Roberto and Costanzo, Andrea},
     title = {Counter-forensics of SIFT-based copy-move detection by means of keypoint classification},
     journal = {EURASIP Journal on Image and Video Processing},
     year = {2013},
     volume = {2013},
     number = {1},
     pages = {18}}
    
  3. Abbadi
    Blind Fake Image detection
    IJCSI International Journal of Computer Science Issues, 2013, Vol. 10(4-1), pp. 180-186
    DOI: 10.1093/ietcom/e89-b.5.1726
    BibTeX
    @article{Abbadi2013,
     author = {Abbadi},
     title = {Blind Fake Image detection},
     journal = {IJCSI International Journal of Computer Science Issues},
     year = {2013},
     volume = {10},
     number = {4-1},
     pages = {180--186}}
    
  4. K. Abcyrathne, W. Wijesinghe, G. Godaliyadda, M. Ekanayake & J. Wijayakulasooriya
    Temporal ICA based source extraction from dynamic image sequences with visual interference under noise
    Industrial and Information Systems (ICIIS), 2013 8th IEEE International Conference on
    2013, pp. 671-675
    DOI: 10.1109/ICIInfS.2013.6732065
    BibTeX
    @inproceedings{Abcyrathne2013,
     author = {Abcyrathne, K.A.B.S. and Wijesinghe, W.V.D. and Godaliyadda, G.M.R.I. and Ekanayake, M.P.B. and Wijayakulasooriya, J.V.},
     title = {Temporal ICA based source extraction from dynamic image sequences with visual interference under noise},
     booktitle = {Industrial and Information Systems (ICIIS), 2013 8th IEEE International Conference on},
     year = {2013},
     pages = {671--675}}
    
  5. J.E. Adams Jr & B. Pillman
    Digital Camera Image Formation: Introduction and Hardware
    Sencar, H. T. & Memon, N. (ed.)
    Digital Image Forensics
    Springer New York, 2013, pp. 3-44
    DOI: 10.1007/978-1-4614-0757-7_1
    BibTeX
    @incollection{AdamsJr2013,
     author = {Adams Jr, James E. and Pillman, Bruce},
     title = {Digital Camera Image Formation: Introduction and Hardware},
     booktitle = {Digital Image Forensics},
     publisher = {Springer New York},
     year = {2013},
     pages = {3--44}}
    
  6. E. Agnes, S.D. Mahalakshmi & K. Vijayalakshmi
    A Forensic Method for Detecting Image Forgery Using Codebook
    International Journal of Advanced Research in Computer Science and Software Engineering, 2013
    DOI: 10.1109/ice-ccn.2013.6528568
    BibTeX
    @article{Agnes2013,
     author = {E. Agnes and S. Devi Mahalakshmi and K. Vijayalakshmi},
     title = {A Forensic Method for Detecting Image Forgery Using Codebook},
     journal = {International Journal of Advanced Research in Computer Science and Software Engineering},
     year = {2013}}
    
  7. A. Al Ahmadi, M. Hussain, H. Aboalsamh, G. Muhammad & G. Bebis
    Splicing image forgery detection based on DCT and Local Binary Pattern
    Global Conference on Signal and Information Processing (GlobalSIP), 2013 IEEE
    2013, pp. 253-256
    DOI: 10.1109/GlobalSIP.2013.6736863
    BibTeX
    @inproceedings{AlAhmadi2013,
     author = {Al Ahmadi, A.A. and Hussain, M. and Aboalsamh, H. and Muhammad, G. and Bebis, G.},
     title = {Splicing image forgery detection based on DCT and Local Binary Pattern},
     booktitle = {Global Conference on Signal and Information Processing (GlobalSIP), 2013 IEEE},
     year = {2013},
     pages = {253--256}}
    
  8. M. Al Sawadi, G. Muhammad & M. Hussain
    Copy-Move Image Forgery Detection Using Local Binary Pattern and Neighborhood Clustering
    Proceedings of the European Modeling Symposium (EMS), Manchester, UK, November 2013.
    2013
    DOI: 10.1109/ems.2013.43
    BibTeX
    @inproceedings{AlSawadi2013,
     author = {Al Sawadi, Motasem and Ghulam Muhammad and Muhammad Hussain},
     title = {Copy-Move Image Forgery Detection Using Local Binary Pattern and Neighborhood Clustering},
     booktitle = {Proceedings of the European Modeling Symposium (EMS), Manchester, UK, November 2013.},
     year = {2013}}
    
  9. A.A. Alahmadi, M. Hussain, H. Aboalsamh, G. Muhammad & G. Bebis
    Splicing image forgery detection based on DCT and Local Binary Pattern
    Proc. IEEE Global Conf. Signal and Information Processing (GlobalSIP)
    2013, pp. 253-256
    DOI: 10.1109/GlobalSIP.2013.6736863
    BibTeX
    @inproceedings{Alahmadi2013,
     author = {A. A. Alahmadi and M. Hussain and H. Aboalsamh and G. Muhammad and G. Bebis},
     title = {Splicing image forgery detection based on DCT and Local Binary Pattern},
     booktitle = {Proc. IEEE Global Conf. Signal and Information Processing (GlobalSIP)},
     year = {2013},
     pages = {253--256}}
    
  10. M.H. Al-Hammadi, G. Muhammad, M. Hussain & G. Bebis
    Curvelet Transform and Local Texture Based Image Forgery Detection
    Advances in Visual Computing, Springer, 2013
    DOI: 10.1007/978-3-642-41939-3_49
    BibTeX
    @article{Al-Hammadi2013,
     author = {Al-Hammadi, Muneer H. and Muhammad, Ghulam and Hussain, Muhammad and Bebis, George},
     title = {Curvelet Transform and Local Texture Based Image Forgery Detection},
     journal = {Advances in Visual Computing},
     publisher = {Springer},
     year = {2013}}
    
  11. O.M. Al-Qershi & B.E. Khoo
    Passive detection of copy-move forgery in digital images: State-of-the-art
    Forensic Science International, 2013, Vol. 231(1-3), pp. 284-295
    DOI: 10.1016/j.forsciint.2013.05.027
    BibTeX
    @article{Al-Qershi2013,
     author = {Osamah M. Al-Qershi and Bee Ee Khoo},
     title = {Passive detection of copy-move forgery in digital images: State-of-the-art},
     journal = {Forensic Science International},
     year = {2013},
     volume = {231},
     number = {1--3},
     pages = {284--295}}
    
  12. I. Amerini, L. Ballan, R. Caldelli, A. Del Bimbo, L. Del Tongo & G. Serra
    Copy-move forgery detection and localization by means of robust clustering with J-linkage
    Signal Processing: Image Communication, Elsevier, 2013
    DOI: 10.1016/j.image.2013.03.006
    BibTeX
    @article{Amerini2013,
     author = {Amerini, Irene and Ballan, Lamberto and Caldelli, Roberto and Del Bimbo, Alberto and Del Tongo, Luca and Serra, Giuseppe},
     title = {Copy-move forgery detection and localization by means of robust clustering with J-linkage},
     journal = {Signal Processing: Image Communication},
     publisher = {Elsevier},
     year = {2013}}
    
  13. I. Amerini, M. Barni, R. Caldelli & A. Costanzo
    SIFT keypoint removal and injection for countering matching-based image forensics
    Proceedings of the first ACM workshop on Information hiding and multimedia security
    ACM, 2013, pp. 123-130
    DOI: 10.1145/2482513.2482524
    BibTeX
    @inproceedings{Amerini2013a,
     author = {Amerini, Irene and Barni, Mauro and Caldelli, Roberto and Costanzo, Andrea},
     title = {SIFT keypoint removal and injection for countering matching-based image forensics},
     booktitle = {Proceedings of the first ACM workshop on Information hiding and multimedia security},
     publisher = {ACM},
     year = {2013},
     pages = {123--130}}
    
  14. I. Amerini, M. Barni, R. Caldelli & A. Costanzo
    Removal and Injection of Keypoints for Sift-based Copy-move Counter-forensics
    EURASIP Journal on Information Security, 2013
    DOI: 10.1186/1687-417x-2013-8
    BibTeX
    @article{Amerini2013c,
     author = {Irene Amerini and Mauro Barni and Roberto Caldelli and Andrea Costanzo},
     title = {Removal and Injection of Keypoints for Sift-based Copy-move Counter-forensics},
     journal = {EURASIP Journal on Information Security},
     year = {2013}}
    
  15. S.H. Anamandra & V. Chandrasekaran
    CHILD: A robust Computationally-Efficient Histogram-based Image Local Descriptor
    Proc. Fourth National Conf. Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG)
    2013, pp. 1-5
    DOI: 10.1109/NCVPRIPG.2013.6776154
    BibTeX
    @inproceedings{Anamandra2013,
     author = {S. H. Anamandra and V. Chandrasekaran},
     title = {CHILD: A robust Computationally-Efficient Histogram-based Image Local Descriptor},
     booktitle = {Proc. Fourth National Conf. Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG)},
     year = {2013},
     pages = {1--5}}
    
  16. S. Arathy, D.S. Vidyadharan, C Balan & T Sobha
    Auto White Balancing and comparison of Support Vector Machine and neural network classifiers in prediction of source camera
    Control Communication and Computing (ICCC), 2013 International Conference on
    2013, pp. 96-101
    DOI: 10.1109/ICCC.2013.6731631
    BibTeX
    @inproceedings{Arathy2013,
     author = {S Arathy and Vidyadharan, Divya S and Balan C and Sobha T},
     title = {Auto White Balancing and comparison of Support Vector Machine and neural network classifiers in prediction of source camera},
     booktitle = {Control Communication and Computing (ICCC), 2013 International Conference on},
     year = {2013},
     pages = {96--101}}
    
  17. D. Asatryan, N. Asatryan, N. Lanina & A. Petrosyan
    Method for detection of image tampering and partial recovery
    Computer Science and Information Technologies (CSIT), 2013
    2013, pp. 1-6
    DOI: 10.1109/CSITechnol.2013.6710350
    BibTeX
    @inproceedings{Asatryan2013,
     author = {Asatryan, D. and Asatryan, N. and Lanina, N. and Petrosyan, A.},
     title = {Method for detection of image tampering and partial recovery},
     booktitle = {Computer Science and Information Technologies (CSIT), 2013},
     year = {2013},
     pages = {1--6}}
    
  18. Associated-Press
    AP News Values & Principles
    2013
    BibTeX
    @electronic{AssociatedPress2013,
     author = {Associated-Press, },
     title = {AP News Values & Principles},
     year = {2013}}
    
  19. N.A.N. Azhan, I.R. Adeyemi & S.A. Razak
    Analysis of DQT and DHT in JPEG Files
    International Journal of Information Technology and Computer Science ( IJITCS ), 2013
    BibTeX
    @article{Azhan2013,
     author = {Nor Amira Nor Azhan and Ikuesan R. Adeyemi and Shukor Abd Razak},
     title = {Analysis of DQT and DHT in JPEG Files},
     journal = {International Journal of Information Technology and Computer Science ( IJITCS )},
     year = {2013}}
    
  20. R. Böhme & M. Kirchner
    Counter-Forensics: Attacking Image Forensics
    Sencar, H. T. & Memon, N. (ed.)
    Digital Image Forensics
    Springer Science mathplus Business Media, 2013, pp. 327-366
    DOI: 10.1007/978-1-4614-0757-7_12
    BibTeX
    @incollection{Boehme2013,
     author = {Rainer Böhme and Matthias Kirchner},
     title = {Counter-Forensics: Attacking Image Forensics},
     booktitle = {Digital Image Forensics},
     publisher = {Springer Science mathplus Business Media},
     year = {2013},
     pages = {327--366}}
    
  21. K.S. Bacchuwar & K. Ramakrishnan
    A jump patch-block match algorithm for multiple forgery detection
    Automation, Computing, Communication, Control and Compressed Sensing (iMac4s), 2013 International Multi-Conference on
    2013, pp. 723-728
    DOI: 10.1109/iMac4s.2013.6526502
    BibTeX
    @inproceedings{Department2013,
     author = {Bacchuwar, Ketan S and Ramakrishnan, K.R},
     title = {A jump patch-block match algorithm for multiple forgery detection},
     booktitle = {Automation, Computing, Communication, Control and Compressed Sensing (iMac4s), 2013 International Multi-Conference on},
     year = {2013},
     pages = {723--728}}
    
  22. K. Bahrami, A.C. Kot & J. Fan
    Splicing detection in out-of-focus blurred images
    Information Forensics and Security (WIFS), 2013 IEEE International Workshop on
    2013, pp. 144-149
    DOI: 10.1109/WIFS.2013.6707809
    BibTeX
    @inproceedings{Bahrami2013,
     author = {Bahrami, Khosro and Kot, Alex C. and Fan, Jiayuan},
     title = {Splicing detection in out-of-focus blurred images},
     booktitle = {Information Forensics and Security (WIFS), 2013 IEEE International Workshop on},
     year = {2013},
     pages = {144--149}}
    
  23. M. Barni, M. Fontani & B. Tondi
    A Universal Attack Against Histogram-Based Image Forensics
    International Journal of Digital Crime and Forensics (IJDCF), 2013
    DOI: 10.4018/jdcf.2013070103
    BibTeX
    @article{Barni2013a,
     author = {Mauro Barni and Marco Fontani and Benedetta Tondi},
     title = {A Universal Attack Against Histogram-Based Image Forensics},
     journal = {International Journal of Digital Crime and Forensics (IJDCF)},
     year = {2013}}
    
  24. M. Barni & B. Tondi
    The Source Identification Game:an Information-Theoretic Perspective
    IEEE Transactions on Information Forensics and Security, 2013
    DOI: 10.1109/TIFS.2012.2237397
    BibTeX
    @article{Barni2013,
     author = {Barni, Mauro and Tondi, Benedetta},
     title = {The Source Identification Game:an Information-Theoretic Perspective},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2013}}
    
  25. P. Bestagini, S. Battaglia, S. Milani, M. Tagliasacchi & S. Tubaro
    Detection of Temporal Interpolation In Video Sequences
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013, 2013
    BibTeX
    @inproceedings{Bestagini2013,
     author = {Paolo Bestagini and Simone Battaglia and Simone Milani and Marco Tagliasacchi and Stefano Tubaro},
     title = {Detection of Temporal Interpolation In Video Sequences},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013},
     journal = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013},
     year = {2013}}
    
  26. S. Bian, W. Luo & J. Huang
    Detecting video frame-rate up-conversion based on periodic properties of inter-frame similarity
    Multimedia Tools and Applications, Springer US, 2013, Vol. -, pp. 1-15
    DOI: 10.1007/s11042-013-1364-5
    BibTeX
    @article{Bian2013,
     author = {Bian, Shan and Luo, Weiqi and Huang, Jiwu},
     title = {Detecting video frame-rate up-conversion based on periodic properties of inter-frame similarity},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer US},
     year = {2013},
     volume = {-},
     pages = {1--15}}
    
  27. T. Bianchi, A. Piva & F. Perez-Gonzalez
    Near optimal detection of quantized signals and application to JPEG forensics
    Information Forensics and Security (WIFS), 2013 IEEE International Workshop on
    2013, pp. 168-173
    DOI: 10.1109/WIFS.2013.6707813
    BibTeX
    @inproceedings{Bianchi2013,
     author = {Bianchi, Tiziano and Piva, Alessandro and Perez-Gonzalez, Fernando},
     title = {Near optimal detection of quantized signals and application to JPEG forensics},
     booktitle = {Information Forensics and Security (WIFS), 2013 IEEE International Workshop on},
     year = {2013},
     pages = {168--173}}
    
  28. A. Biney & H. Sellahewa
    Analysis of Smartphone Model Identification using Digital Images
    Proc. IEEE International Conference on Image Processing ICIP 2013
    2013, pp. 4487-4491
    BibTeX
    @inproceedings{Biney2013,
     author = {Akua Biney and Harin Sellahewa},
     title = {Analysis of Smartphone Model Identification using Digital Images},
     booktitle = {Proc. IEEE International Conference on Image Processing ICIP 2013},
     year = {2013},
     pages = {4487--4491}}
    
  29. G.K. Birajdar & V.H. Mankar
    Digital image forgery detection using passive techniques: A survey
    Digital Investigation, 2013, Vol. 10(3), pp. 226-245
    DOI: 10.1016/j.diin.2013.04.007
    BibTeX
    @article{Birajdar2013,
     author = {Gajanan K. Birajdar and Vijay H. Mankar},
     title = {Digital image forgery detection using passive techniques: A survey},
     journal = {Digital Investigation},
     year = {2013},
     volume = {10},
     number = {3},
     pages = {226--245}}
    
  30. G.K. Birajdar & V.H. Mankar
    Blind Authentication of Resampled Images and Rescaling Factor Estimation
    Cloud Ubiquitous Computing Emerging Technologies (CUBE), 2013 International Conference on
    2013, pp. 112-116
    DOI: 10.1109/CUBE.2013.28
    BibTeX
    @inproceedings{Birajdar2013a,
     author = {Birajdar, Gajanan K. and Mankar, Vijay H.},
     title = {Blind Authentication of Resampled Images and Rescaling Factor Estimation},
     booktitle = {Cloud Ubiquitous Computing Emerging Technologies (CUBE), 2013 International Conference on},
     year = {2013},
     pages = {112--116}}
    
  31. K. Bolouri, M. Javanmard & M. Firouzmand
    Camera Identification Algorithm Based on Sensor Pattern Noise Using Wavelet Transform, SVD / PCA and SVM Classifier
    Journal of Information Systems and Telecommunication, 2013
    BibTeX
    @article{Bolouri2013,
     author = {Kimia Bolouri and Mehdi Javanmard and Mohammad Firouzmand},
     title = {Camera Identification Algorithm Based on Sensor Pattern Noise Using Wavelet Transform, SVD / PCA and SVM Classifier},
     journal = {Journal of Information Systems and Telecommunication},
     year = {2013}}
    
  32. S. Bourouis, M.A. Mashrgy & N. Bouguila
    Bayesian learning of finite generalized inverted Dirichlet mixtures: Application to object classification and forgery detection
    Expert Systems with Applications, 2013(0), pp. -
    DOI: 10.1016/j.eswa.2013.09.030
    BibTeX
    @article{Bourouis2013,
     author = {Sami Bourouis and Mohamed Al Mashrgy and Nizar Bouguila},
     title = {Bayesian learning of finite generalized inverted Dirichlet mixtures: Application to object classification and forgery detection},
     journal = {Expert Systems with Applications},
     year = {2013},
     number = {0},
     pages = {-}}
    
  33. A. Bruna
    Applied Image Processing Algorithms for Forensic Applications
    Universita’ Degli Studi Di Catania, Universita’ Degli Studi Di Catania, 2013
    BibTeX
    @phdthesis{Bruna2013,
     author = {Bruna, A.R.},
     title = {Applied Image Processing Algorithms for Forensic Applications},
     school = {Universita’ Degli Studi Di Catania},
     year = {2013}}
    
  34. H. Cao & A. Kot
    Estimating EXIF Parameters Based on Noise Features for Image Manipulation Detection
    IEEE Transactions on Information Forensics and Security, 2013, Vol. 8, pp. 608-618
    DOI: 10.1109/TIFS.2013.2249064
    BibTeX
    @article{Cao2013,
     author = {Cao, H. and Kot, A.C.},
     title = {Estimating EXIF Parameters Based on Noise Features for Image Manipulation Detection},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2013},
     volume = {8},
     pages = {608--618}}
    
  35. T. de Carvalho, C. Riess, E. Angelopoulou, H. Pedrini & A.R. Rocha
    Exposing Digital Image Forgeries by Illumination Color Classification
    IEEE Transactions on Information Forensics and Security, 2013, Vol. 8(7), pp. 1182-1194
    DOI: 10.1109/TIFS.2013.2265677
    BibTeX
    @article{Carvalho2013,
     author = {de Carvalho, T. and Riess, C. and Angelopoulou, E. and Pedrini, H. and Rocha, A. R.},
     title = {Exposing Digital Image Forgeries by Illumination Color Classification},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2013},
     volume = {8},
     number = {7},
     pages = {1182--1194}}
    
  36. S. Chakraborty
    Copy move image forgery detection using mutual information
    Computing, Communications and Networking Technologies (ICCCNT),2013 Fourth International Conference on
    2013, pp. 1-4
    DOI: 10.1109/ICCCNT.2013.6726743
    BibTeX
    @inproceedings{Chakraborty2013,
     author = {Chakraborty, Somnath},
     title = {Copy move image forgery detection using mutual information},
     booktitle = {Computing, Communications and Networking Technologies (ICCCNT),2013 Fourth International Conference on},
     year = {2013},
     pages = {1--4}}
    
  37. L.-H. Chan, N.-F. Law & W.-C. Siu
    A confidence map and pixel-based weighted correlation for PRNU-based camera identification
    Digital Investigation, Elsevier, 2013
    BibTeX
    @article{Chan2013,
     author = {Chan, Lit-Hung and Law, Ngai-Fong and Siu, Wan-Chi},
     title = {A confidence map and pixel-based weighted correlation for PRNU-based camera identification},
     journal = {Digital Investigation},
     publisher = {Elsevier},
     year = {2013}}
    
  38. T.-Y. Chang, G.-S. Lin & S.-C. Tai
    Identifying Device Brand by Using Characteristics of Color Filter Array
    Pan, J.-S., Yang, C.-N. & Lin, C.-C. (ed.)
    Advances in Intelligent Systems and Applications - Volume 2
    Springer Berlin Heidelberg, 2013, Vol. 21, pp. 349-358
    DOI: 10.1007/978-3-642-35473-1_35
    BibTeX
    @incollection{Chang2013,
     author = {Chang, Tang-You and Lin, Guo-Shiang and Tai, Shen-Chuan},
     title = {Identifying Device Brand by Using Characteristics of Color Filter Array},
     booktitle = {Advances in Intelligent Systems and Applications - Volume 2},
     publisher = {Springer Berlin Heidelberg},
     year = {2013},
     volume = {21},
     pages = {349--358}}
    
  39. C. Chen, J. Ni & J. Huang
    Blind Detection of Median Filtering in Digital Images: A Difference Domain Based Approach
    Image Processing, IEEE Transactions on, 2013, Vol. PP(99), pp. 1-1
    DOI: 10.1109/TIP.2013.2277814
    BibTeX
    @article{Chen2013c,
     author = {Chen, C. and Ni, J. and Huang, J.},
     title = {Blind Detection of Median Filtering in Digital Images: A Difference Domain Based Approach},
     journal = {Image Processing, IEEE Transactions on},
     year = {2013},
     volume = {PP},
     number = {99},
     pages = {1--1}}
    
  40. C. Chen, J. Ni & J. Huang
    Blind Detection of Median Filtering in Digital Images: A Difference Domain Based Approach
    IEEE_J_IP, 2013, Vol. 22(12), pp. 4699-4710
    DOI: 10.1109/TIP.2013.2277814
    BibTeX
    @article{Chen2013g,
     author = {C. Chen and J. Ni and J. Huang},
     title = {Blind Detection of Median Filtering in Digital Images: A Difference Domain Based Approach},
     journal = {IEEE_J_IP},
     year = {2013},
     volume = {22},
     number = {12},
     pages = {4699--4710}}
    
  41. L. Chen, W. Lu & J. Ni
    3 An Image region Description Method Based on Stap Sector Statistics and its Application in Image Copy-Rotate/Flip-Move Forgery Detection
    Li, C.-T. (ed.)
    Emerging Digital Forensics Application for Crime Detection, Prevention and Security
    Chapter 3 An Image region Description Method Based on Stap Sector Statistics and its Application in Image Copy-Rotate/Flip-Move Forgery Detection
    IGI Global, 2013, pp. 35-49
    DOI: 10.4018/978-1-4666-4006-1.ch003
    BibTeX
    @inbook{Chen2013d,
     author = {Likai Chen and Wei Lu and Jianqun Ni},
     title = {3 An Image region Description Method Based on Stap Sector Statistics and its Application in Image Copy-Rotate/Flip-Move Forgery Detection},
     booktitle = {Emerging Digital Forensics Application for Crime Detection, Prevention and Security},
     publisher = {IGI Global},
     year = {2013},
     pages = {35--49}}
    
  42. L. Chen, W. Lu, J. Ni, W. Sun & J. Huang
    Region duplication detection based on Harris corner points and step sector statistics
    Journal of Visual Communication and Image Representation, Elsevier, 2013, Vol. 24(3), pp. 244-254
    DOI: 10.1016/j.jvcir.2013.01.008
    BibTeX
    @article{Chen2013a,
     author = {Chen, Likai and Lu, Wei and Ni, Jiangqun and Sun, Wei and Huang, Jiwu},
     title = {Region duplication detection based on Harris corner points and step sector statistics},
     journal = {Journal of Visual Communication and Image Representation},
     publisher = {Elsevier},
     year = {2013},
     volume = {24},
     number = {3},
     pages = {244--254}}
    
  43. L. Chen, S. Wang, S. Li & J. Li
    Countering Universal Image Tampering Detection with Histogram Restoration
    Shi, Y., Kim, H.-J. & Pérez-González, F. (ed.)
    Digital Forensics and Watermaking
    Springer Berlin Heidelberg, 2013, Vol. 7809, pp. 282-289
    DOI: 10.1007/978-3-642-40099-5_23
    BibTeX
    @incollection{Chen2013b,
     author = {Chen, Luyi and Wang, Shilin and Li, Shenghong and Li, Jianhua},
     title = {Countering Universal Image Tampering Detection with Histogram Restoration},
     booktitle = {Digital Forensics and Watermaking},
     publisher = {Springer Berlin Heidelberg},
     year = {2013},
     volume = {7809},
     pages = {282--289}}
    
  44. S. Chen, A. Pande, K. Zeng & P. Mohapatra
    Video Source Identification in Lossy Wireless Networks
    Department of Computer Science, University of California, Davis, CA 95616, Department of Computer Science, University of California, Davis, CA 95616, 2013
    BibTeX
    @techreport{Chen2013,
     author = {Chen, S. and Pande, A. and Zeng, K. and Mohapatra, P.},
     title = {Video Source Identification in Lossy Wireless Networks},
     school = {Department of Computer Science, University of California, Davis, CA 95616},
     year = {2013}}
    
  45. Y.-L. Chen & C.-T. Hsu
    What has been tampered? From a sparse manipulation perspective
    Multimedia Signal Processing (MMSP), 2013 IEEE 15th International Workshop on
    2013, pp. 123-128
    DOI: 10.1109/MMSP.2013.6659275
    BibTeX
    @inproceedings{Chen2013e,
     author = {Chen, Yi-Lei and Hsu, Chiou-Ting},
     title = {What has been tampered? From a sparse manipulation perspective},
     booktitle = {Multimedia Signal Processing (MMSP), 2013 IEEE 15th International Workshop on},
     year = {2013},
     pages = {123--128}}
    
  46. Z. Chen, Y. Zhao & R. Ni
    Forensics of blurred images based on no-reference image quality assessment
    Signal and Information Processing (ChinaSIP), 2013 IEEE China Summit & International Conference on
    2013, pp. 437-441
    DOI: 10.1109/ChinaSIP.2013.6625377
    BibTeX
    @inproceedings{Chen2013f,
     author = {Zhipeng Chen and Yao Zhao and Rongrong Ni},
     title = {Forensics of blurred images based on no-reference image quality assessment},
     booktitle = {Signal and Information Processing (ChinaSIP), 2013 IEEE China Summit & International Conference on},
     year = {2013},
     pages = {437--441}}
    
  47. G. Chierchia, G. Poggi, C. Sansone & L. Verdoliva
    PRNU-based forgery detection with regularity constraints and global optimization
    Multimedia Signal Processing (MMSP), 2013 IEEE 15th International Workshop on
    2013, pp. 236-241
    DOI: 10.1109/MMSP.2013.6659294
    BibTeX
    @inproceedings{Chierchia2013,
     author = {Giovann Chierchia and Poggi, Giovanni and Sansone, Carlo and Verdoliva, Luisa},
     title = {PRNU-based forgery detection with regularity constraints and global optimization},
     booktitle = {Multimedia Signal Processing (MMSP), 2013 IEEE 15th International Workshop on},
     year = {2013},
     pages = {236--241}}
    
  48. Chippendale
    Geo-positional Image Forensics through Scene-terrain Registration
    Proceedings of the International Conference on Computer Vision Theory and Applications (VISIGRAPP 2013)
    Scitepress, 2013
    DOI: 10.5220/0004282300410047
    BibTeX
    @conference{Chippendale2013,
     author = {Chippendale},
     title = {Geo-positional Image Forensics through Scene-terrain Registration},
     booktitle = {Proceedings of the International Conference on Computer Vision Theory and Applications (VISIGRAPP 2013)},
     publisher = {Scitepress},
     year = {2013}}
    
  49. C.-H. Choi, H.-Y. Lee & H.-K. Lee
    Estimation of color modification in digital images by CFA pattern change
    Forensic Science International, 2013, Vol. -(0), pp. -
    DOI: 10.1016/j.forsciint.2012.12.014
    BibTeX
    @article{Choi2013,
     author = {Chang-Hee Choi and Hae-Yeoun Lee and Heung-Kyu Lee},
     title = {Estimation of color modification in digital images by CFA pattern change},
     journal = {Forensic Science International},
     year = {2013},
     volume = {-},
     number = {0},
     pages = {-}}
    
  50. X. Chu, M.C. Stamm & K.J.R.L. Yan Chen
    Concealability-rate-distortion Tradeoff In Image Compression Anti-forensics
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013
    Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013, 2013, pp. 3063-3067
    DOI: 10.1109/ICASSP.2013.6638221
    BibTeX
    @inproceedings{Chu2013a,
     author = {Xiaoyu Chu and Matthew C. Stamm and Yan Chen, K. J. Ray Liu},
     title = {Concealability-rate-distortion Tradeoff In Image Compression Anti-forensics},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013},
     journal = {Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013},
     year = {2013},
     pages = {3063--3067}}
    
  51. Ciptasari
    Exploiting reference images in exposing geometrical distortions
    International Journal of Multimedia & Its Applications (IJMA), 2013, Vol. 5(3)
    BibTeX
    @article{Ciptasari2013,
     author = {Ciptasari},
     title = {Exploiting reference images in exposing geometrical distortions},
     journal = {International Journal of Multimedia & Its Applications (IJMA)},
     year = {2013},
     volume = {5},
     number = {3}}
    
  52. R. Ciptasari, K.-H. Rhee & K. Sakurai
    Image Splicing Verification Based on Pixel-Based Alignment Method
    Shi, Y., Kim, H.-J. & Pérez-González, F. (ed.)
    Digital Forensics and Watermaking
    Springer Berlin Heidelberg, 2013, Vol. 7809, pp. 198-212
    DOI: 10.1007/978-3-642-40099-5_17
    BibTeX
    @incollection{Ciptasari2013a,
     author = {Ciptasari, RimbaWhidiana and Rhee, Kyung-Hyune and Sakurai, Kouichi},
     title = {Image Splicing Verification Based on Pixel-Based Alignment Method},
     booktitle = {Digital Forensics and Watermaking},
     publisher = {Springer Berlin Heidelberg},
     year = {2013},
     volume = {7809},
     pages = {198--212}}
    
  53. P. Comesana, F. Perez-Gonzalez & N. Liste
    Quantization Lattice Estimation for Multimedia Forensics
    Proc. IEEE International Conference on Image Processing ICIP 2013
    2013, pp. 4462 - 4466
    BibTeX
    @inproceedings{Comesana2013,
     author = {Pedro Comesana and Fernando Perez-Gonzalez and and Noelia Liste},
     title = {Quantization Lattice Estimation for Multimedia Forensics},
     booktitle = {Proc. IEEE International Conference on Image Processing ICIP 2013},
     year = {2013},
     pages = {4462 -- 4466}}
    
  54. P. Comesaña-Alfaro & F. Pérez-González
    Optimal Counterforensics For Histogram-based Forensics
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013
    Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013, 2013
    DOI: 10.1109/icassp.2013.6638218
    BibTeX
    @inproceedings{Comesana-Alfaro2013,
     author = {Pedro Comesaña-Alfaro and Fernando Pérez-González},
     title = {Optimal Counterforensics For Histogram-based Forensics},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013},
     journal = {Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013},
     year = {2013}}
    
  55. V. Conotter, P. Comesana & F. Pérez-González
    Joint detection of full-frame linear filtering and JPEG compression in digital images
    2013
    BibTeX
    @electronic{Conotter2013a,
     author = {Conotter, V and Comesana, P and Pérez-González, F},
     title = {Joint detection of full-frame linear filtering and JPEG compression in digital images},
     year = {2013}}
    
  56. V. Conotter, P. Comesaña-Alfaro & F. Pérez-González
    Forensic Analysis Of Full-frame Linearly Filtered Jpeg Images
    Proc. IEEE International Conference on Image Processing ICIP 2013
    2013, pp. 4517 - 4521
    BibTeX
    @inproceedings{Conotter2013,
     author = {Valentina Conotter and Pedro Comesaña-Alfaro and Fernando Pérez-González},
     title = {Forensic Analysis Of Full-frame Linearly Filtered Jpeg Images},
     booktitle = {Proc. IEEE International Conference on Image Processing ICIP 2013},
     year = {2013},
     pages = {4517 -- 4521}}
    
  57. A.J. Cooper
    Improved photo response non-uniformity (PRNU) based source camera identification
    Forensic Science International, 2013, Vol. -(0), pp. -
    DOI: 10.1016/j.forsciint.2012.12.018
    BibTeX
    @article{Cooper2013,
     author = {Alan J. Cooper},
     title = {Improved photo response non-uniformity (PRNU) based source camera identification},
     journal = {Forensic Science International},
     year = {2013},
     volume = {-},
     number = {0},
     pages = {-}}
    
  58. J.R. Corripio, A.L.S. Orozco, L.J.G. Villalba, J. Hernandez-Castro & S.J. Gibson
    Source Smartphone Identification Using Sensor Pattern Noise and Wavelet Transform
    The 5th International Conference on Imaging for Crime Detection and Prevention, 16th-17th December 2013, London, UK., 2013
    BibTeX
    @article{Corripio2013,
     author = {Jocelin Rosales Corripio and Ana Lucila Sandoval Orozco and Luis Javier Garc’ıa Villalba and Julio Hernandez-Castro and Stuart James Gibson},
     title = {Source Smartphone Identification Using Sensor Pattern Noise and Wavelet Transform},
     journal = {The 5th International Conference on Imaging for Crime Detection and Prevention, 16th-17th December 2013, London, UK.},
     year = {2013}}
    
  59. F.O. de Costa, E. Silva, M. Eckmann, W.J. Scheirer & A. Rocha
    Open Set Source Camera Attribution and Device Linking
    Pattern Recognition Letters, 2013(0), pp. -
    DOI: 10.1016/j.patrec.2013.09.006
    BibTeX
    @article{deCosta2013,
     author = {Filipe O. de Costa and Ewerton Silva and Michael Eckmann and Walter J. Scheirer and Anderson Rocha},
     title = {Open Set Source Camera Attribution and Device Linking},
     journal = {Pattern Recognition Letters},
     year = {2013},
     number = {0},
     pages = {-}}
    
  60. D. Cozzolino, F. Gargiulo, C. Sansone & L. Verdoliva
    Multiple Classifier Systems for Image Forgery Detection
    Proc. of the International Conference on Image Analysis and Processing (ICIAP)
    International Conference on Image Analysis and Processing (ICIAP), 2013
    DOI: 10.1007/978-3-642-41184-7_27
    BibTeX
    @inproceedings{Cozzolino2013,
     author = {D. Cozzolino and F. Gargiulo and C. Sansone and L. Verdoliva},
     title = {Multiple Classifier Systems for Image Forgery Detection},
     booktitle = {Proc. of the International Conference on Image Analysis and Processing (ICIAP)},
     journal = {International Conference on Image Analysis and Processing (ICIAP)},
     year = {2013}}
    
  61. D. Cozzolino, D. Gragnaniello & L. Verdoliva
    A novel framework for image forgery localization
    arXiv.org, 2013
    BibTeX
    @article{Cozzolino2013a,
     author = {Davide Cozzolino and Diego Gragnaniello and Luisa Verdoliva},
     title = {A novel framework for image forgery localization},
     journal = {arXiv.org},
     year = {2013}}
    
  62. D. Cozzolino, D. Gragnaniello & L. Verdoliva
    Image forgery detection based on the fusion of machine learning and block-matching methods
    arXiv.org, 2013
    BibTeX
    @article{Cozzolino2013b,
     author = {Davide Cozzolino and Diego Gragnaniello and Luisa Verdoliva},
     title = {Image forgery detection based on the fusion of machine learning and block-matching methods},
     journal = {arXiv.org},
     year = {2013}}
    
  63. HYUN Dai-Kyung, JUNG Dae-Jin, LEE Hae-Yeoun & LEE Heung-Kyu
    Rotation-Tolerant Camera Identification Using Optimal Tradeoff Circular Harmonic Function Correlation Filter
    IEICE TRANSACTIONS on Information and Systems, 2013, Vol. E96-D(6), pp. 1394-1397
    DOI: 10.1587/transinf.e96.d.1394
    BibTeX
    @article{HYUN2013,
     author = {Dai-Kyung HYUN and Dae-Jin JUNG and Hae-Yeoun LEE and Heung-Kyu LEE},
     title = {Rotation-Tolerant Camera Identification Using Optimal Tradeoff Circular Harmonic Function Correlation Filter},
     journal = {IEICE TRANSACTIONS on Information and Systems},
     year = {2013},
     volume = {E96-D},
     number = {6},
     pages = {1394--1397}}
    
  64. D.T. Dang-Nguyen, I.D. Gebru, V. Conotter, G. Boato & F.G.B.D. Natale
    Counter-forensics of median filtering
    Proc. IEEE 15th Int Multimedia Signal Processing (MMSP) Workshop
    2013, pp. 260-265
    DOI: 10.1109/MMSP.2013.6659298
    BibTeX
    @inproceedings{Dang-Nguyen2013,
     author = {D. T. Dang-Nguyen and I. D. Gebru and V. Conotter and G. Boato and F. G. B. De Natale},
     title = {Counter-forensics of median filtering},
     booktitle = {Proc. IEEE 15th Int Multimedia Signal Processing (MMSP) Workshop},
     year = {2013},
     pages = {260--265}}
    
  65. U. Datta & C. Sharma
    Analysis of Copy-Move Image Forgery Detection
    IInternational Journal of Advanced Research in Computer Science and Electroic Engineering(IJARCSEE), 2013, Vol. 2(2)
    BibTeX
    @article{Datta2013,
     author = {Unmukh Datta and Chetna Sharma},
     title = {Analysis of Copy-Move Image Forgery Detection},
     journal = {IInternational Journal of Advanced Research in Computer Science and Electroic Engineering(IJARCSEE)},
     year = {2013},
     volume = {2},
     number = {2}}
    
  66. R. Davarzani, K. Yaghmaie, S. Mozaffari & M. Tapak
    Copy-move forgery detection using multiresolution local binary patterns
    Forensic Science International, 2013, Vol. 231(1-3), pp. 61-72
    DOI: 10.1016/j.forsciint.2013.04.023
    BibTeX
    @article{Davarzani2013,
     author = {Reza Davarzani and Khashayar Yaghmaie and Saeed Mozaffari and Meysam Tapak},
     title = {Copy-move forgery detection using multiresolution local binary patterns},
     journal = {Forensic Science International},
     year = {2013},
     volume = {231},
     number = {1--3},
     pages = {61--72}}
    
  67. A. Deever, M. Kumar & B. Pillman
    Digital Camera Image Formation: Processing and Storage
    Sencar, H. T. & Memon, N. (ed.)
    Digital Image Forensics
    Springer New York, 2013, pp. 45-78
    BibTeX
    @incollection{Deever2013,
     author = {Aaron Deever and Mrityunjay Kumar and Bruce Pillman},
     title = {Digital Camera Image Formation: Processing and Storage},
     booktitle = {Digital Image Forensics},
     publisher = {Springer New York},
     year = {2013},
     pages = {45--78}}
    
  68. Z. Deng, J. Zhang & Y. Zeng
    Image Splicing Detection via Demosaicking Inconsistency
    2013
    BibTeX
    @electronic{Deng2013,
     author = {Zhonghai Deng and Jingyuan Zhang and Yuguang Zeng},
     title = {Image Splicing Detection via Demosaicking Inconsistency},
     year = {2013}}
    
  69. F.N. Dezfoli, A. Dehghantanha, R. Mahmoud, N.F.B.M. Sani & F. Daryaba
    Digital Forensic Trends and Future
    International Journal of Cyber-Security and Digital Forensics (IJCSDF), 2013, Vol. 2(2), pp. 48-76
    BibTeX
    @article{Dezfoli2013,
     author = {Farhood Norouzizadeh Dezfoli and Ali Dehghantanha and Ramlan Mahmoud and Nor Fazlida Binti Mohd Sani and Farid Daryaba},
     title = {Digital Forensic Trends and Future},
     journal = {International Journal of Cyber-Security and Digital Forensics (IJCSDF)},
     year = {2013},
     volume = {2},
     number = {2},
     pages = {48--76}}
    
  70. J. Dong & W. Wang
    CASIA Image Tampering Detection Evaluation Database
    2013 IEEE China Summit and International Conference on Signal and Information Processing
    Institute of Electrical and Electronics Engineers (IEEE), 2013, pp. 422-426
    DOI: 10.1109/chinasip.2013.6625374
    BibTeX
    @inproceedings{Dong2013,
     author = {Jing Dong and Wei Wang},
     title = {CASIA Image Tampering Detection Evaluation Database},
     booktitle = {2013 IEEE China Summit and International Conference on Signal and Information Processing},
     publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
     year = {2013},
     pages = {422--426}}
    
  71. M. Doyoddorj & K.-H. Rhee
    A blind forgery detection scheme using image compatibility metrics
    Industrial Electronics (ISIE), 2013 IEEE International Symposium on
    2013, pp. 1-6
    DOI: 10.1109/ISIE.2013.6563873
    BibTeX
    @inproceedings{Doyoddorj2013,
     author = {M. Doyoddorj and Rhee, Kyung-Hyune},
     title = {A blind forgery detection scheme using image compatibility metrics},
     booktitle = {Industrial Electronics (ISIE), 2013 IEEE International Symposium on},
     year = {2013},
     pages = {1--6}}
    
  72. Z.F. Elsharkawy, S.A. Abdelwahab, S.M. Elaraby, M.I. Dessouky & F.E. Abd El-Samie
    Accurate and Robust Identifying Forged Region Method in Scanned Images
    International Journal of Computer Applications, 2013, Vol. 83, pp. 40-47
    BibTeX
    @article{Elsharkawy2013,
     author = {Elsharkawy, Zeinab F., Abdelwahab, Safey A., Elaraby, Sayed M., Dessouky, Moawad I., Abd El-Samie, Fathi E.},
     title = {Accurate and Robust Identifying Forged Region Method in Scanned Images},
     journal = {International Journal of Computer Applications},
     year = {2013},
     volume = {83},
     pages = {40--47}}
    
  73. J. Fan, H. Cao & A. Kot
    Estimating EXIF Parameters Based on Noise Features for Image Manipulation Detection
    Information Forensics and Security, IEEE Transactions on, IEEE, 2013, Vol. 8(4), pp. 608-618
    DOI: 10.1109/TIFS.2013.2249064
    BibTeX
    @article{Fan2013a,
     author = {Fan, Jiayuan and Cao, Hong and Kot, A},
     title = {Estimating EXIF Parameters Based on Noise Features for Image Manipulation Detection},
     journal = {Information Forensics and Security, IEEE Transactions on},
     publisher = {IEEE},
     year = {2013},
     volume = {8},
     number = {4},
     pages = {608--618}}
    
  74. W. Fan, K. Wang, F. Cayre & Z. Xiong
    A variational approach to JPEG anti-forensics
    2013 IEEE International Conference on Acoustics, Speech and Signal Processing
    Institute of Electrical & Electronics Engineers (IEEE), 2013
    DOI: 10.1109/ICASSP.2013.6638220
    BibTeX
    @inproceedings{Fan2013,
     author = {Fan, Wei and Wang, Kai and Cayre, François and Xiong, Zhang},
     title = {A variational approach to JPEG anti-forensics},
     booktitle = {2013 IEEE International Conference on Acoustics, Speech and Signal Processing},
     publisher = {Institute of Electrical & Electronics Engineers (IEEE)},
     year = {2013}}
    
  75. F. Farhadzadeh, S. Voloshynovskiy, T. Holotyak & F. Beekhof
    Active Content Fingerprinting: Shrinkage And Lattice Based Modulations
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013
    Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013, 2013
    DOI: 10.1109/icassp.2013.6638223
    BibTeX
    @inproceedings{Farhadzadeh2013,
     author = {Farzad Farhadzadeh and Sviatoslav Voloshynovskiy and Taras Holotyak and Fokko Beekhof},
     title = {Active Content Fingerprinting: Shrinkage And Lattice Based Modulations},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013},
     journal = {Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013},
     year = {2013}}
    
  76. P. Ferrara, T. Bianchi, A. De Rosa & A. Piva
    Detection and estimation of contrast enhancement in double compressed images
    Proceedings of the 2013 IEEE International Workshop on Multimedia Signal Processing (MMSP 2013)
    2013
    BibTeX
    @inproceedings{Ferrara2013,
     author = {Ferrara, Pasquale and Bianchi, Tiziano and De Rosa, Alessia and Piva, Alessandro},
     title = {Detection and estimation of contrast enhancement in double compressed images},
     booktitle = {Proceedings of the 2013 IEEE International Workshop on Multimedia Signal Processing (MMSP 2013)},
     year = {2013}}
    
  77. P. Ferrara, T. Bianchi, A. De Rosa & A. Piva
    Reverse engineering of double compressed images in the presence of contrast enhancement
    Multimedia Signal Processing (MMSP), 2013 IEEE 15th International Workshop on
    2013, pp. 141-146
    DOI: 10.1109/MMSP.2013.6659278
    BibTeX
    @inproceedings{Ferrara2013a,
     author = {Ferrara, Pasquale and Bianchi, Tiziano and De Rosa, Alessia and Piva, Alessandro},
     title = {Reverse engineering of double compressed images in the presence of contrast enhancement},
     booktitle = {Multimedia Signal Processing (MMSP), 2013 IEEE 15th International Workshop on},
     year = {2013},
     pages = {141--146}}
    
  78. A. Fischer & T. Gloe
    Forensic analysis of interdependencies between vignetting and radial lens distortion
    IS&T/SPIE Electronic Imaging
    2013, pp. 86650D-86650D
    BibTeX
    @inproceedings{Fischer2013,
     author = {Fischer, André and Gloe, Thomas},
     title = {Forensic analysis of interdependencies between vignetting and radial lens distortion},
     booktitle = {IS&T/SPIE Electronic Imaging},
     year = {2013},
     pages = {86650D--86650D}}
    
  79. M. Fontani
    A Forensic Tool for Investigating Image Forgeries
    International Journal of Digital Crime and Forensics (IJDCF), IGI Global, 2013, Vol. 5(4), pp. 15-33
    DOI: 10.4018/ijdcf.2013100102
    BibTeX
    @article{Fontani2013a,
     author = {Marco Fontani},
     title = {A Forensic Tool for Investigating Image Forgeries},
     journal = {International Journal of Digital Crime and Forensics (IJDCF)},
     publisher = {IGI Global},
     year = {2013},
     volume = {5},
     number = {4},
     pages = {15--33}}
    
  80. M. Fontani, E. Argones-Rua, C. Troncoso & M. Barni
    The watchful forensic analyst: Multi-clue information fusion with background knowledge
    Information Forensics and Security (WIFS), 2013 IEEE International Workshop on
    2013, pp. 120-125
    DOI: 10.1109/WIFS.2013.6707805
    BibTeX
    @inproceedings{Fontani2013b,
     author = {Fontani, M. and Argones-Rua, E. and Troncoso, C. and Barni, M.},
     title = {The watchful forensic analyst: Multi-clue information fusion with background knowledge},
     booktitle = {Information Forensics and Security (WIFS), 2013 IEEE International Workshop on},
     year = {2013},
     pages = {120--125}}
    
  81. M. Fontani, T. Bianchi, A. De Rosa, A. Piva & M. Barni
    A Framework for Decision Fusion in Image Forensics based on Dempster-Shafer Theory of Evidence
    IEEE Transactions on Information Forensics and Security, 2013, Vol. -, pp. -
    DOI: 10.1109/TIFS.2013.2248727
    BibTeX
    @article{Fontani2013,
     author = {Fontani, M and Bianchi, Tiziano and De Rosa, Alessia and Piva, Alessandro and Barni, M.},
     title = {A Framework for Decision Fusion in Image Forensics based on Dempster-Shafer Theory of Evidence},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2013},
     volume = {-},
     pages = {-}}
    
  82. J. Fridrich
    Sensor Defects in Digital Image Forensic
    Sencar, H. T. & Memon, N. (ed.)
    Digital Image Forensics
    Springer Science mathplus Business Media, 2013, pp. 179-218
    DOI: 10.1007/978-1-4614-0757-7_6
    BibTeX
    @incollection{Fridrich2013,
     author = {Jessica Fridrich},
     title = {Sensor Defects in Digital Image Forensic},
     booktitle = {Digital Image Forensics},
     publisher = {Springer Science mathplus Business Media},
     year = {2013},
     pages = {179--218}}
    
  83. F. Galvan, G. Puglisi, A. Bruna & S. Battiato
    First Quantization Coefficient Extraction from Double Compressed JPEG Images
    Petrosino, A. (ed.)
    Image Analysis and Processing -- ICIAP 2013
    Springer Berlin Heidelberg, 2013, Vol. 8156, pp. 783-792
    DOI: 10.1007/978-3-642-41181-6_79
    BibTeX
    @incollection{Galvan2013,
     author = {Galvan, Fausto and Puglisi, Giovanni and Bruna, ArcangeloR. and Battiato, Sebastiano},
     title = {First Quantization Coefficient Extraction from Double Compressed JPEG Images},
     booktitle = {Image Analysis and Processing -- ICIAP 2013},
     publisher = {Springer Berlin Heidelberg},
     year = {2013},
     volume = {8156},
     pages = {783--792}}
    
  84. Y. Gan & J. Cang
    A Detection Algorithm for Image Copy-move Forgery Based on Improved Circular Projection Matching and PCA
    Sensors & Transducers, 2013, Vol. 159(11), pp. 19-25
    BibTeX
    @article{Gan2013,
     author = {Yanfen Gan and Jing Cang},
     title = {A Detection Algorithm for Image Copy-move Forgery Based on Improved Circular Projection Matching and PCA},
     journal = {Sensors & Transducers},
     year = {2013},
     volume = {159},
     number = {11},
     pages = {19--25}}
    
  85. D. Garc\ia-Ordás, L. Fernández-Robles, E. Alegre, M.T. Garc\ia-Ordás & O. Garc\ia-Olalla
    Automatic Tampering Detection in Spliced Images with Different Compression Levels
    Sanches, J., Micó, L. & Cardoso, J. (ed.)
    Pattern Recognition and Image Analysis
    Springer Science mathplus Business Media, 2013, Vol. 7887, pp. 416-423
    DOI: 10.1007/978-3-642-38628-2_49
    BibTeX
    @incollection{Garcia-Ordas2013,
     author = {Diego Garc\ia-Ordás and Laura Fernández-Robles and Enrique Alegre and Mar\ia Teresa Garc\ia-Ordás and Oscar Garc\ia-Olalla},
     title = {Automatic Tampering Detection in Spliced Images with Different Compression Levels},
     booktitle = {Pattern Recognition and Image Analysis},
     publisher = {Springer Science mathplus Business Media},
     year = {2013},
     volume = {7887},
     pages = {416--423}}
    
  86. D. Garc\ia-Ordás, L. Fernández-Robles, E. Alegre, M.T. Garc\ia-Ordás & O. Garc\ia-Olalla
    Automatic Tampering Detection in Spliced Images with Different Compression Levels
    Pattern Recognition and Image Analysis
    Springer, 2013, pp. 416-423
    DOI: 10.1007/978-3-642-38628-2_49
    BibTeX
    @incollection{Garcia-Ordas2013a,
     author = {Diego Garc\ia-Ordás and Laura Fernández-Robles and Enrique Alegre and Mar\ia Teresa Garc\ia-Ordás and Oscar Garc\ia-Olalla},
     title = {Automatic Tampering Detection in Spliced Images with Different Compression Levels},
     booktitle = {Pattern Recognition and Image Analysis},
     publisher = {Springer},
     year = {2013},
     pages = {416--423}}
    
  87. D. Garc\ia-Ordás, L. Fernández-Robles, E. Alegre, M.T. Garc\ia-Ordás & O. Garc\ia-Olalla
    Automatic Tampering Detection in Spliced Images with Different Compression Levels
    Pattern Recognition and Image Analysis
    Pattern Recognition and Image Analysis, Springer, 2013, pp. 416-423
    DOI: 10.1007/978-3-642-38628-2_49
    BibTeX
    @article{Garcia-Ordas2013b,
     author = {Diego Garc\ia-Ordás and Laura Fernández-Robles and Enrique Alegre and Mar\ia Teresa Garc\ia-Ordás and Oscar Garc\ia-Olalla},
     title = {Automatic Tampering Detection in Spliced Images with Different Compression Levels},
     booktitle = {Pattern Recognition and Image Analysis},
     journal = {Pattern Recognition and Image Analysis},
     publisher = {Springer},
     year = {2013},
     pages = {416--423}}
    
  88. F. Gisolf, Z. Geradts, D. Verhoeven & C. Klaver
    The effects of switching the camera module from BlackBerry Curve 9360 devices
    Digital Investigation, 2013, Vol. -(0), pp. -
    DOI: 10.1016/j.diin.2013.01.007
    BibTeX
    @article{Gisolf2013a,
     author = {Floris Gisolf and Zeno Geradts and Dennie Verhoeven and Coert Klaver},
     title = {The effects of switching the camera module from BlackBerry Curve 9360 devices},
     journal = {Digital Investigation},
     year = {2013},
     volume = {-},
     number = {0},
     pages = {-}}
    
  89. F. Gisolf, A. Malgoezar, T. Baar & Z. Geradts
    Improving source camera identification using a simplified total variation based noise removal algorithm
    Digital Investigation, 2013(0), pp. -
    DOI: 10.1016/j.diin.2013.08.002
    BibTeX
    @article{Gisolf2013,
     author = {Floris Gisolf and Anwar Malgoezar and Teun Baar and Zeno Geradts},
     title = {Improving source camera identification using a simplified total variation based noise removal algorithm},
     journal = {Digital Investigation},
     year = {2013},
     number = {0},
     pages = {-}}
    
  90. U.M. Gokhale & Y.V.Joshi
    Noise Estimation Using Filtering and SVD for Image Tampering Detection
    International Journal of Engineering Science and Innovative Technology (IJESIT), 2013
    BibTeX
    @article{Gokhale2013,
     author = {U. M. Gokhale and Y.V.Joshi},
     title = {Noise Estimation Using Filtering and SVD for Image Tampering Detection},
     journal = {International Journal of Engineering Science and Innovative Technology (IJESIT)},
     year = {2013}}
    
  91. M. Goljan & J. Fridrich
    Sensor Fingerprint Digests for Fast Camera Identification from Geometrically Distorted Images
    Department of ECE, SUNY Binghamton, NY, USA, Department of ECE, SUNY Binghamton, NY, USA, 2013
    BibTeX
    @techreport{Goljan2013,
     author = {Goljan, Miroslav and Fridrich, Jessica},
     title = {Sensor Fingerprint Digests for Fast Camera Identification from Geometrically Distorted Images},
     school = {Department of ECE, SUNY Binghamton, NY, USA},
     year = {2013}}
    
  92. M.E. Graves
    Forensic Video Analysis
    Proceedings of the17th Interpol International Forensic Science Managers Symposium, Lyon
    2013, pp. 638-651
    BibTeX
    @inproceedings{Graves2013,
     author = {Matthew E. Graves},
     title = {Forensic Video Analysis},
     booktitle = {Proceedings of the17th Interpol International Forensic Science Managers Symposium, Lyon},
     year = {2013},
     pages = {638--651}}
    
  93. A. Gupta, N. Saxena & S. Vasistha
    Detecting Copy Move Forgery In Digital Images
    International Journal of Engineering Research and Applications (IJERA), 2013, Vol. 3(4), pp. 94-97
    BibTeX
    @article{Gupta2013,
     author = {Ashima Gupta and Nisheeth Saxena and S.K. Vasistha},
     title = {Detecting Copy Move Forgery In Digital Images},
     journal = {International Journal of Engineering Research and Applications (IJERA)},
     year = {2013},
     volume = {3},
     number = {4},
     pages = {94--97}}
    
  94. A. Gupta, N. Saxena & S. Vasistha
    Detecting Copy move Forgery using DCT
    International Journal of Scientific and Research Publications, 2013
    BibTeX
    @article{Gupta2013a,
     author = {Ashima Gupta and Nisheeth Saxena and S.K Vasistha},
     title = {Detecting Copy move Forgery using DCT},
     journal = {International Journal of Scientific and Research Publications},
     year = {2013}}
    
  95. S. Gupta & P.S. Sandhu
    Document Forgery: The State of Art
    International Journal of Research in Engineering and Technology (IJRET), 2013
    BibTeX
    @article{Gupta2013b,
     author = {Surbhi Gupta and Parvinder S. Sandhu},
     title = {Document Forgery: The State of Art},
     journal = {International Journal of Research in Engineering and Technology (IJRET)},
     year = {2013}}
    
  96. K. Hara, K. Inoue & K. Urahama
    Generalized Mixture Ratio Based Blind Image Separation
    Signal Processing Letters, IEEE, 2013, Vol. 20(8), pp. 743-746
    DOI: 10.1109/LSP.2013.2265274
    BibTeX
    @article{Hara2013,
     author = {Hara, K. and Inoue, K. and Urahama, K.},
     title = {Generalized Mixture Ratio Based Blind Image Separation},
     journal = {Signal Processing Letters, IEEE},
     year = {2013},
     volume = {20},
     number = {8},
     pages = {743--746}}
    
  97. M. Hashmi, A. Hambarde & A. Keskar
    Copy move forgery detection using DWT and SIFT features
    Intelligent Systems Design and Applications (ISDA), 2013 13th International Conference on
    2013, pp. 188-193
    DOI: 10.1109/ISDA.2013.6920733
    BibTeX
    @inproceedings{Hashmi2013,
     author = {Hashmi, M.F. and Hambarde, A.R. and Keskar, A.G.},
     title = {Copy move forgery detection using DWT and SIFT features},
     booktitle = {Intelligent Systems Design and Applications (ISDA), 2013 13th International Conference on},
     year = {2013},
     pages = {188--193}}
    
  98. He
    Exposing Copy-move Forgeries Based on a Dimension-reduced Sift Method
    Information Technology Journal, 2013, Vol. 12(14), pp. 2975-2979
    BibTeX
    @article{He2013,
     author = {He},
     title = {Exposing Copy-move Forgeries Based on a Dimension-reduced Sift Method},
     journal = {Information Technology Journal},
     year = {2013},
     volume = {12},
     number = {14},
     pages = {2975--2979}}
    
  99. P.D. Hiscocks
    Measuring Luminance with a Digital Camera: Case History
    Syscomp Electronic Design Limited, Syscomp Electronic Design Limited, 2013
    BibTeX
    @techreport{Hiscocks2013,
     author = {Peter D. Hiscocks},
     title = {Measuring Luminance with a Digital Camera: Case History},
     school = {Syscomp Electronic Design Limited},
     year = {2013}}
    
  100. J. Hou, H. Shi, Y. Cheng & R. Li
    Fogery image splicing detection by abnormal prediction features
    Mechatronics and Automation (ICMA), 2013 IEEE International Conference on
    2013, pp. 1394-1398
    DOI: 10.1109/ICMA.2013.6618117
    BibTeX
    @inproceedings{Hou2013a,
     author = {Jun Hou and Shi, Haojie and Cheng, Yan and Li, Ran},
     title = {Fogery image splicing detection by abnormal prediction features},
     booktitle = {Mechatronics and Automation (ICMA), 2013 IEEE International Conference on},
     year = {2013},
     pages = {1394--1398}}
    
  101. X. Hou, T. Zhang, G. Xiong, Y. Zhang & X. Ping
    Image resampling detection based on texture classification
    Multimedia Tools and Applications, Springer US, 2013, pp. 1-28
    DOI: 10.1007/s11042-013-1466-0
    BibTeX
    @article{Hou2013,
     author = {Hou, Xiaodan and Zhang, Tao and Xiong, Gang and Zhang, Yan and Ping, Xin},
     title = {Image resampling detection based on texture classification},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer US},
     year = {2013},
     pages = {1--28}}
    
  102. P. Hrudya, L. Nair, S. Adithya, R. Unni, V. Priya & P. Poornachandran
    Digital image forgery detection on artificially blurred images
    Emerging Trends in Communication, Control, Signal Processing & Computing Applications (C2SPCA), 2013 International Conference on
    2013, pp. 1-5
    DOI: 10.1109/C2SPCA.2013.6749392
    BibTeX
    @inproceedings{Hrudya2013,
     author = {Hrudya, P. and Nair, L.S. and Adithya, S.M. and Unni, R. and Priya, V.H. and Poornachandran, P.},
     title = {Digital image forgery detection on artificially blurred images},
     booktitle = {Emerging Trends in Communication, Control, Signal Processing & Computing Applications (C2SPCA), 2013 International Conference on},
     year = {2013},
     pages = {1--5}}
    
  103. C.-J. Hsieh, C.-T. Weng & J.-S. Li
    JPEG forensics scheme for signature embedding and packet-level detection
    International Journal of Communication Systems, 2013, pp. n/a-n/a
    DOI: 10.1002/dac.2547
    BibTeX
    @article{Hsieh2013,
     author = {Hsieh, Che-Jen and Weng, Chi-Tien and Li, Jung-Shian},
     title = {JPEG forensics scheme for signature embedding and packet-level detection},
     journal = {International Journal of Communication Systems},
     year = {2013},
     pages = {n/a--n/a}}
    
  104. W. Huang & X. Han
    An Improved RANSAC Algorithm of Color Image Stitching
    Proceedings of 2013 Chinese Intelligent Automation Conference
    Springer, 2013
    DOI: 10.1007/978-3-642-38466-0_3
    BibTeX
    @incollection{Huang2013,
     author = {Huang, Weijie and Han, Xiaowei},
     title = {An Improved RANSAC Algorithm of Color Image Stitching},
     booktitle = {Proceedings of 2013 Chinese Intelligent Automation Conference},
     publisher = {Springer},
     year = {2013}}
    
  105. M. Hussain, G. Muhammad, S.Q. Saleh, A.M. Mirza & G. Bebis
    Image forgery detection using multi-resolution Weber local descriptors
    EUROCON, 2013 IEEE
    2013, pp. 1570-1577
    DOI: 10.1109/EUROCON.2013.6625186
    BibTeX
    @inproceedings{Hussain2013,
     author = {Hussain, M. and Muhammad, G. and Saleh, S. Q. and Mirza, A. M. and Bebis, G.},
     title = {Image forgery detection using multi-resolution Weber local descriptors},
     booktitle = {EUROCON, 2013 IEEE},
     year = {2013},
     pages = {1570--1577}}
    
  106. M.G. Hwang, H.J. Park & D.H. Har
    Source camera identification based on interpolation via lens distortion correction
    Australian Journal of Forensic Sciences, 2013, Vol. 0(0), pp. 1-13
    DOI: 10.1080/00450618.2013.804946
    BibTeX
    @article{Hwang2013,
     author = {Hwang, Min Gu and Park, Hyung Ju and Har, Dong Hwan},
     title = {Source camera identification based on interpolation via lens distortion correction},
     journal = {Australian Journal of Forensic Sciences},
     year = {2013},
     volume = {0},
     number = {0},
     pages = {1--13}}
    
  107. D.-K. Hyun, M.-J. Lee, S.-J. Ryu, H.-Y. Lee & H.-K. Lee
    Forgery Detection for Surveillance Video
    The Era of Interactive Media
    Springer New York, 2013, pp. 25-36
    DOI: 10.1007/978-1-4614-3501-3_3
    BibTeX
    @incollection{Hyun2013,
     author = {Hyun, Dai-Kyung and Lee, Min-Jeong and Ryu, Seung-Jin and Lee, Hae-Yeoun and Lee, Heung-Kyu},
     title = {Forgery Detection for Surveillance Video},
     booktitle = {The Era of Interactive Media},
     publisher = {Springer New York},
     year = {2013},
     pages = {25--36}}
    
  108. D.-K. Hyun, S.-J. Ryu, H.-Y. Lee & H.-K. Lee
    Detection of Upscale-Crop and Partial Manipulation in Surveillance Video Based on Sensor Pattern Noise
    Sensors, 2013, pp. 12605-12631
    DOI: 10.3390/s130912605
    BibTeX
    @article{Hyun2013a,
     author = {Dai-Kyung Hyun and Seung-Jin Ryu and Hae-Yeoun Lee and Heung-Kyu Lee},
     title = {Detection of Upscale-Crop and Partial Manipulation in Surveillance Video Based on Sensor Pattern Noise},
     journal = {Sensors},
     year = {2013},
     pages = {12605--12631}}
    
  109. M.B. Imamoglu, G. Ulutas & M. Ulutas
    Detection of copy-move forgery using Krawtchouk moment
    Electrical and Electronics Engineering (ELECO), 2013 8th International Conference on
    2013, pp. 311-314
    DOI: 10.1109/ELECO.2013.6713851
    BibTeX
    @inproceedings{Imamoglu2013,
     author = {Imamoglu, Mustafa Bilgehan and Ulutas, Guzin and Ulutas, Mustafa},
     title = {Detection of copy-move forgery using Krawtchouk moment},
     booktitle = {Electrical and Electronics Engineering (ELECO), 2013 8th International Conference on},
     year = {2013},
     pages = {311--314}}
    
  110. M. Jaberi, G. Bebis, M. Hussain & G. Muhammad
    Accurate and Robust Localization of Duplicated Region In Copy-move Image Forgery
    Machine Vision and Applications, 2013, Vol. 25(2), pp. 451-457
    DOI: 10.1007/s00138-013-0522-0
    BibTeX
    @article{Jaberi2013,
     author = {Maryam Jaberi and George Bebis and Muhammad Hussain and Ghulam Muhammad},
     title = {Accurate and Robust Localization of Duplicated Region In Copy-move Image Forgery},
     journal = {Machine Vision and Applications},
     year = {2013},
     volume = {25},
     number = {2},
     pages = {451--457}}
    
  111. M. Jaberi, G. Bebis, M. Hussain & G. Muhammad
    Improving the detection and localization of duplicated regions in copy-move image forgery
    Digital Signal Processing (DSP), 2013 18th International Conference on
    2013, pp. 1-6
    DOI: 10.1109/ICDSP.2013.6622700
    BibTeX
    @inproceedings{Jaberi2013a,
     author = {Jaberi, M. and Bebis, G. and Hussain, M. and Muhammad, G.},
     title = {Improving the detection and localization of duplicated regions in copy-move image forgery},
     booktitle = {Digital Signal Processing (DSP), 2013 18th International Conference on},
     year = {2013},
     pages = {1--6}}
    
  112. Y. Jiang, H. Zeng, X. Kang & L. Liu
    The Game of Countering JPEG Anti-forensics Based on the Noise Level Estimation
    Proceedings of the APSIPA
    2013
    BibTeX
    @inproceedings{Jiang2013,
     author = {Yunwen Jiang and Hui Zeng and Xiangui Kang and Li Liu},
     title = {The Game of Countering JPEG Anti-forensics Based on the Noise Level Estimation},
     booktitle = {Proceedings of the APSIPA},
     year = {2013}}
    
  113. M.K. Johnson
    Detecting Doctored Images
    Sencar, H. T. & Memon, N. (ed.)
    Digital Image Forensics
    Springer New York, 2013, pp. 257-274
    BibTeX
    @incollection{Johnson2013,
     author = {Johnson, Micah K},
     title = {Detecting Doctored Images},
     booktitle = {Digital Image Forensics},
     publisher = {Springer New York},
     year = {2013},
     pages = {257--274}}
    
  114. K.Karthikeyan & R. Lakshmi
    Fuzzy based Image Forgery Localization Using Blocking Artifacts
    International Journal of New Trends in Electronics and Communication (IJNTEC), 2013, Vol. 1(1), pp. 18 - 20
    BibTeX
    @article{Karthikeyan2013,
     author = {K.Karthikeyan and R.Sowmya Lakshmi},
     title = {Fuzzy based Image Forgery Localization Using Blocking Artifacts},
     journal = {International Journal of New Trends in Electronics and Communication (IJNTEC)},
     year = {2013},
     volume = {1},
     number = {1},
     pages = {18 -- 20}}
    
  115. A.B. Kaimal, S. Manimurugan & J. Anitha
    A modified anti-forensic technique for removing detectable traces from digital images
    Proc. Int Computer Communication and Informatics (ICCCI) Conf
    2013, pp. 1-4
    DOI: 10.1109/ICCCI.2013.6466109
    BibTeX
    @inproceedings{Kaimal2013,
     author = {Kaimal, Athira B. and Manimurugan, S. and Anitha, J.},
     title = {A modified anti-forensic technique for removing detectable traces from digital images},
     booktitle = {Proc. Int Computer Communication and Informatics (ICCCI) Conf},
     year = {2013},
     pages = {1--4}}
    
  116. A.B. Kaimal, S. Manimurugan, J. Rajivkumar & Anitha
    A new technique for removing forensically detectable traces from digital images
    Proc. 7th Int Intelligent Systems and Control (ISCO) Conf
    2013, pp. 321-324
    DOI: 10.1109/ISCO.2013.6481171
    BibTeX
    @inproceedings{Kaimal2013a,
     author = {Kaimal, Athira B. and Manimurugan, S. and Rajivkumar, J. and Anitha},
     title = {A new technique for removing forensically detectable traces from digital images},
     booktitle = {Proc. 7th Int Intelligent Systems and Control (ISCO) Conf},
     year = {2013},
     pages = {321--324}}
    
  117. X. Kang, M. Stamm, A. Peng & K. Liu
    Robust Median Filtering Forensics Using an Autoregressive Model
    Information Forensics and Security, IEEE Transactions on, 2013, Vol. 8(9), pp. 1456-1468
    DOI: 10.1109/TIFS.2013.2273394
    BibTeX
    @article{Kang2013,
     author = {Kang, X. and Stamm, M.C. and Peng, A. and Liu, K.J.R.},
     title = {Robust Median Filtering Forensics Using an Autoregressive Model},
     journal = {Information Forensics and Security, IEEE Transactions on},
     year = {2013},
     volume = {8},
     number = {9},
     pages = {1456--1468}}
    
  118. A. Kashyap & S.D. Joshi
    Detection of copy-move forgery using wavelet decomposition
    Signal Processing and Communication (ICSC), 2013 International Conference on
    2013, pp. 396-400
    DOI: 10.1109/ICSPCom.2013.6719820
    BibTeX
    @inproceedings{Kashyap2013,
     author = {Kashyap, Abhishek and Joshi, Shiv Dutt},
     title = {Detection of copy-move forgery using wavelet decomposition},
     booktitle = {Signal Processing and Communication (ICSC), 2013 International Conference on},
     year = {2013},
     pages = {396--400}}
    
  119. Y. Ke, Q. Shan, F. Qin & W. Min
    Image Recapture Detection Using Multiple Features
    International Journal of Multimedia and Ubiquitous Engineering, 2013
    BibTeX
    @article{Ke2013,
     author = {Yongzhen Ke and Qingqing Shan and Fan Qin and Weidong Min},
     title = {Image Recapture Detection Using Multiple Features},
     journal = {International Journal of Multimedia and Ubiquitous Engineering},
     year = {2013}}
    
  120. E. Kee, J. O'brien & H. Farid
    Exposing photo manipulation with inconsistent shadows
    ACM Trans. Graph., ACM, 2013, Vol. 32(3), pp. 28:1-28:12
    DOI: 10.1145/2487228.2487236
    BibTeX
    @article{Kee2013,
     author = {Kee, Eric and O'brien, James and Farid, Hany},
     title = {Exposing photo manipulation with inconsistent shadows},
     journal = {ACM Trans. Graph.},
     publisher = {ACM},
     year = {2013},
     volume = {32},
     number = {3},
     pages = {28:1--28:12}}
    
  121. S. Ketenci & G. Ulutas
    Copy-move forgery detection in images via 2D-Fourier Transform
    Telecommunications and Signal Processing (TSP), 2013 36th International Conference on
    2013, pp. 813-816
    DOI: 10.1109/TSP.2013.6614051
    BibTeX
    @inproceedings{Ketenci2013,
     author = {Ketenci, S. and Ulutas, G.},
     title = {Copy-move forgery detection in images via 2D-Fourier Transform},
     booktitle = {Telecommunications and Signal Processing (TSP), 2013 36th International Conference on},
     year = {2013},
     pages = {813--816}}
    
  122. M. Kirchner, P. Winkler & H. Farid
    Impeding forgers at photo inception
    IS&T/SPIE Electronic Imaging
    2013, pp. 866504-866504
    BibTeX
    @inproceedings{Kirchner2013,
     author = {Kirchner, Matthias and Winkler, Peter and Farid, Hany},
     title = {Impeding forgers at photo inception},
     booktitle = {IS&T/SPIE Electronic Imaging},
     year = {2013},
     pages = {866504--866504}}
    
  123. A.C. Kot & H. Cao
    Image and Video Source Class Identi�?cation
    Sencar, H. T. & Memon, N. (ed.)
    Digital Image Forensics
    Springer New York, 2013, pp. 157-179
    BibTeX
    @incollection{Kot2013,
     author = {Alex C. Kot and Hong Cao},
     title = {Image and Video Source Class Identi�?cation},
     booktitle = {Digital Image Forensics},
     publisher = {Springer New York},
     year = {2013},
     pages = {157--179}}
    
  124. S. Kumar, J. Desai & S. Mukherjee
    A fast DCT based method for copy move forgery detection
    Image Information Processing (ICIIP), 2013 IEEE Second International Conference on
    2013, pp. 649-654
    DOI: 10.1109/ICIIP.2013.6707675
    BibTeX
    @inproceedings{Kumar2013a,
     author = {Kumar, Sunil and Desai, Jagannath and Mukherjee, Shaktidev},
     title = {A fast DCT based method for copy move forgery detection},
     booktitle = {Image Information Processing (ICIIP), 2013 IEEE Second International Conference on},
     year = {2013},
     pages = {649--654}}
    
  125. S. Kumar, J. Desai, S. Mukherjee & P. Das
    Suitability of Independent Component Analysis in Digital Image Forgery Detection
    International Journal of Engineering and Technology, 2013, Vol. 5, pp. -
    BibTeX
    @article{Kumar2013,
     author = {Kumar, Sunil and Desai, JV and Mukherjee, S and Das, PK},
     title = {Suitability of Independent Component Analysis in Digital Image Forgery Detection},
     journal = {International Journal of Engineering and Technology},
     year = {2013},
     volume = {5},
     pages = {-}}
    
  126. T.-Y. Kuo, Y.-C. Lo & S.-N. Huang
    Image forgery detection for region duplication tampering
    Multimedia and Expo (ICME), 2013 IEEE International Conference on
    2013, pp. 1-6
    DOI: 10.1109/ICME.2013.6607452
    BibTeX
    @inproceedings{Kuo2013,
     author = {Tien-Ying Kuo and Yi-Chung Lo and Ssu-Neng Huang},
     title = {Image forgery detection for region duplication tampering},
     booktitle = {Multimedia and Expo (ICME), 2013 IEEE International Conference on},
     year = {2013},
     pages = {1--6}}
    
  127. K. Kurosawa, K. Kuroki, K. Tsuchiya, N. Igarashi & N. Akiba
    Case studies and further improvements on source camera identification
    IS&T/SPIE Electronic Imaging
    2013, pp. 86650C-86650C
    BibTeX
    @inproceedings{Kurosawa2013,
     author = {Kurosawa, Kenji and Kuroki, Kenro and Tsuchiya, Ken�ichi and Igarashi, Naoaki and Akiba, Norimitsu},
     title = {Case studies and further improvements on source camera identification},
     booktitle = {IS&T/SPIE Electronic Imaging},
     year = {2013},
     pages = {86650C--86650C}}
    
  128. D. Labartino, T. Bianchi, A.D. Rosa, M. Fontani, D. Vazquez-Padın, A. Piva & M. Barni
    Localization of Forgeries in MPEG-2 Video through GOP Size and DQ Analysis
    Proceedings of the 2013 IEEE International Workshop on Multimedia Signal Processing (MMSP 2013)
    2013
    DOI: 10.1109/mmsp.2013.6659338
    BibTeX
    @inproceedings{Labartino2013,
     author = {D. Labartino and T. Bianchi and A. De Rosa and M. Fontani and D. Vazquez-Padın and A. Piva and M. Barni},
     title = {Localization of Forgeries in MPEG-2 Video through GOP Size and DQ Analysis},
     booktitle = {Proceedings of the 2013 IEEE International Workshop on Multimedia Signal Processing (MMSP 2013)},
     year = {2013}}
    
  129. S. Lai & R. Böhme
    Block convergence in repeated transform coding: jpeg-100 forensics, carbon dating, and tamper detection
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013
    Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013, 2013, pp. 3028-3032
    DOI: 10.1109/icassp.2013.6638214
    BibTeX
    @inproceedings{Lai2013,
     author = {Lai, ShiYue and Böhme, Rainer},
     title = {Block convergence in repeated transform coding: jpeg-100 forensics, carbon dating, and tamper detection},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013},
     journal = {Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013},
     year = {2013},
     pages = {3028--3032}}
    
  130. L. Laijie, Y. Gaobo & X. Ming
    Anti-Forensics for Unsharp Masking Sharpening in Digital Images
    International Journal of Digital Crime and Forensics (IJDCF), 2013, Vol. 5(3)
    DOI: 10.4018/jdcf.2013070104
    BibTeX
    @article{Laijie2013,
     author = {Lu Laijie and Yang Gaobo and Xia Ming},
     title = {Anti-Forensics for Unsharp Masking Sharpening in Digital Images},
     journal = {International Journal of Digital Crime and Forensics (IJDCF)},
     year = {2013},
     volume = {5},
     number = {3}}
    
  131. M Lalitha, H. Holalad, S. Rajput, D Muktanidhi S & U. Mudenagudi
    A classifier framework for the detection of doctored images
    Proc. Fourth National Conf. Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG)
    2013, pp. 1-4
    DOI: 10.1109/NCVPRIPG.2013.6776155
    BibTeX
    @inproceedings{Lalitha2013a,
     author = {Lalitha M and H. Holalad and S. Rajput and Muktanidhi S D and U. Mudenagudi},
     title = {A classifier framework for the detection of doctored images},
     booktitle = {Proc. Fourth National Conf. Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG)},
     year = {2013},
     pages = {1--4}}
    
  132. M. Lalitha, H. Holalad, S. Rajput, S. Muktanidhi & U. Mudenagudi
    A classifier framework for the detection of doctored images
    Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG), 2013 Fourth National Conference on
    2013, pp. 1-4
    DOI: 10.1109/NCVPRIPG.2013.6776155
    BibTeX
    @inproceedings{Lalitha2013,
     author = {Lalitha, M. and Holalad, H. and Rajput, S. and Muktanidhi, S.D. and Mudenagudi, U.},
     title = {A classifier framework for the detection of doctored images},
     booktitle = {Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG), 2013 Fourth National Conference on},
     year = {2013},
     pages = {1--4}}
    
  133. A. Lawgaly, F. Khelifi & A. Bouridane
    Image Sharpening for Efficient Source Camera Identification Based on Sensor Pattern Noise Estimation
    Emerging Security Technologies (EST), 2013 Fourth International Conference on
    2013, pp. 113-116
    DOI: 10.1109/EST.2013.25
    BibTeX
    @inproceedings{Lawgaly2013,
     author = {Lawgaly, A. and Khelifi, F. and Bouridane, A.},
     title = {Image Sharpening for Efficient Source Camera Identification Based on Sensor Pattern Noise Estimation},
     booktitle = {Emerging Security Technologies (EST), 2013 Fourth International Conference on},
     year = {2013},
     pages = {113--116}}
    
  134. L. Li, S. Li, H. Zhu, S.-C. Chu, J.F. Roddick & J.-S. Pan
    An Efficient Scheme for Detecting Copy-move Forged Images by Local Binary Patterns
    Journal of Information Hiding and Multimedia Signal Processing, 2013, Vol. 4(1)
    BibTeX
    @article{Li2013e,
     author = {Leida Li and Shushang Li and Hancheng Zhu and Shu-Chuan Chu and John F. Roddick and Jeng-Shyang Pan},
     title = {An Efficient Scheme for Detecting Copy-move Forged Images by Local Binary Patterns},
     journal = {Journal of Information Hiding and Multimedia Signal Processing},
     year = {2013},
     volume = {4},
     number = {1}}
    
  135. L. Li, J. Xue, X. Wang & L. Tian
    A robust approach to detect digital forgeries by exploring correlation patterns
    Pattern Analysis and Applications, Springer-Verlag, 2013, Vol. -, pp. 1-15
    DOI: 10.1007/s10044-013-0319-9
    BibTeX
    @article{Li2013,
     author = {Li, Lu and Xue, Jianru and Wang, Xiaofeng and Tian, Lihua},
     title = {A robust approach to detect digital forgeries by exploring correlation patterns},
     journal = {Pattern Analysis and Applications},
     publisher = {Springer-Verlag},
     year = {2013},
     volume = {-},
     pages = {1--15}}
    
  136. L. Li, W. Zhang, S. Li & J.S. Pan
    Detection of Region Duplication Forgery in Images under Affine Transforms
    Proc. Ninth Int Intelligent Information Hiding and Multimedia Signal Processing Conf
    2013, pp. 543-546
    DOI: 10.1109/IIH-MSP.2013.140
    BibTeX
    @inproceedings{Li2013f,
     author = {L. Li and W. Zhang and S. Li and J. S. Pan},
     title = {Detection of Region Duplication Forgery in Images under Affine Transforms},
     booktitle = {Proc. Ninth Int Intelligent Information Hiding and Multimedia Signal Processing Conf},
     year = {2013},
     pages = {543--546}}
    
  137. Q. Li
    Searching and Extracting Digital Image Evidence
    Sencar, H. T. & Memon, N. (ed.)
    Digital Image Forensics
    Springer New York, 2013, pp. 123-156
    BibTeX
    @incollection{Li2013a,
     author = {Qiming Li},
     title = {Searching and Extracting Digital Image Evidence},
     booktitle = {Digital Image Forensics},
     publisher = {Springer New York},
     year = {2013},
     pages = {123--156}}
    
  138. X. Li, X.J. Shen, Y.D. Lv & H.P. Chen
    Visual Saliency and Extended Hidden Markov Model Based Approach for Image Splicing Detection
    Applied Mechanics and Materials, 2013, Vol. 385 - 386, pp. 1466-1469
    BibTeX
    @article{Li2013c,
     author = {Xiang Li and Xuan Jing Shen and Ying Da Lv and Hai Peng Chen},
     title = {Visual Saliency and Extended Hidden Markov Model Based Approach for Image Splicing Detection},
     journal = {Applied Mechanics and Materials},
     year = {2013},
     volume = {385 - 386},
     pages = {1466--1469}}
    
  139. Y. Li
    Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching
    Forensic Science International, Elsevier BV, 2013, Vol. 224(1-3), pp. 59-67
    DOI: 10.1016/j.forsciint.2012.10.031
    BibTeX
    @article{Li2013d,
     author = {Yuenan Li},
     title = {Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching},
     journal = {Forensic Science International},
     publisher = {Elsevier BV},
     year = {2013},
     volume = {224},
     number = {1-3},
     pages = {59--67}}
    
  140. Z. Li, J. Ye & Y. Shi
    Distinguishing Computer Graphics from Photographic Images Using Local Binary Patterns
    Shi, Y., Kim, H.-J. & Pérez-González, F. (ed.)
    Digital Forensics and Watermaking
    Springer Berlin Heidelberg, 2013, Vol. 7809, pp. 228-241
    DOI: 10.1007/978-3-642-40099-5_19
    BibTeX
    @incollection{Li2013b,
     author = {Li, Zhaohong and Ye, Jingyu and Shi, YunQing},
     title = {Distinguishing Computer Graphics from Photographic Images Using Local Binary Patterns},
     booktitle = {Digital Forensics and Watermaking},
     publisher = {Springer Berlin Heidelberg},
     year = {2013},
     volume = {7809},
     pages = {228--241}}
    
  141. Y.Y. Liang & Y. Wang
    A splicing image detecting metheod based on original image estimation
    Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013)
    2013
    DOI: 10.2991/iccsee.2013.143
    BibTeX
    @inproceedings{Liang2013,
     author = {Yun Yi Liang and Ying Wang},
     title = {A splicing image detecting metheod based on original image estimation},
     booktitle = {Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013)},
     year = {2013}}
    
  142. S.-Y. Liao & T.-Q. Huang
    Video copy-move forgery detection and localization based on Tamura texture features
    Image and Signal Processing (CISP), 2013 6th International Congress on
    2013, Vol. 2, pp. 864-868
    DOI: 10.1109/CISP.2013.6745286
    BibTeX
    @inproceedings{Liao2013,
     author = {Sheng-Yang Liao and Tian-Qiang Huang},
     title = {Video copy-move forgery detection and localization based on Tamura texture features},
     booktitle = {Image and Signal Processing (CISP), 2013 6th International Congress on},
     year = {2013},
     volume = {2},
     pages = {864--868}}
    
  143. C.-S. Lin & J.-J. Tsay
    Passive Approach for Video Forgery Detection and Localization
    Proc of the second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec2013) - Xianggang/Hong Kong
    2013, pp. 107-112
    BibTeX
    @inproceedings{Lin2013,
     author = {Cheng-Shain Lin and Jyh-Jong Tsay},
     title = {Passive Approach for Video Forgery Detection and Localization},
     booktitle = {Proc of the second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec2013) - Xianggang/Hong Kong},
     year = {2013},
     pages = {107--112}}
    
  144. X. Lin, C. Li & Y. Hu
    Exposing Image Forgery Through the Detection of Contrast Enhancement
    ICIP
    2013
    BibTeX
    @inproceedings{Lin2013a,
     author = {X Lin and CT Li and Y Hu},
     title = {Exposing Image Forgery Through the Detection of Contrast Enhancement},
     booktitle = {ICIP},
     year = {2013}}
    
  145. B. Liu & C.-M. Pun
    A SIFT and local features based integrated method for copy-move attack detection in digital image
    Information and Automation (ICIA), 2013 IEEE International Conference on
    2013, pp. 865-869
    DOI: 10.1109/ICInfA.2013.6720415
    BibTeX
    @inproceedings{Liu2013b,
     author = {Bo Liu and Chi-Man Pun},
     title = {A SIFT and local features based integrated method for copy-move attack detection in digital image},
     booktitle = {Information and Automation (ICIA), 2013 IEEE International Conference on},
     year = {2013},
     pages = {865--869}}
    
  146. Q. Liu, P. Cooper, L. Chen, H. Cho, Z. Chen, M. Qiao, Y. Su, M. Wei & A. Sung
    Detection of JPEG double compression and identification of smartphone image source and post-capture manipulation
    Applied Intelligence, Springer US, 2013, pp. 1-22
    DOI: 10.1007/s10489-013-0430-z
    BibTeX
    @article{Liu2013a,
     author = {Liu, Qingzhong and Cooper, PeterA. and Chen, Lei and Cho, Hyuk and Chen, Zhongxue and Qiao, Mengyu and Su, Yuting and Wei, Mingzhen and Sung, AndrewH.},
     title = {Detection of JPEG double compression and identification of smartphone image source and post-capture manipulation},
     journal = {Applied Intelligence},
     publisher = {Springer US},
     year = {2013},
     pages = {1--22}}
    
  147. X. Liu, F. Li & L. Xiang
    Copy-Move Forgery Detection Using the MROGH
    Journal of Computational Information Systems, 2013, Vol. 9(3), pp. 1071-1078
    BibTeX
    @article{Liu2013,
     author = {Liu, Xiaoxia and Li, Feng and Xiang, Lingyun},
     title = {Copy-Move Forgery Detection Using the MROGH},
     journal = {Journal of Computational Information Systems},
     year = {2013},
     volume = {9},
     number = {3},
     pages = {1071--1078}}
    
  148. J. Lopez-Moreno, E. Garces, S. Hadap, E. Reinhard & D. Gutierrez
    Multiple Light Source Estimation in a Single Image
    Computer Graphics Forum, 2013, pp. n/a-n/a
    DOI: 10.1111/cgf.12195
    BibTeX
    @article{Lopez-Moreno2013,
     author = {Lopez-Moreno, Jorge and Garces, Elena and Hadap, Sunil and Reinhard, Erik and Gutierrez, Diego},
     title = {Multiple Light Source Estimation in a Single Image},
     journal = {Computer Graphics Forum},
     year = {2013},
     pages = {n/a--n/a}}
    
  149. G. Lynch, F.Y. Shih & H.-Y.M. Liao
    An Efficient Expanding Block Algorithm for Image Copy-Move Forgery Detection
    Information Sciences, 2013(0), pp. -
    DOI: 10.1016/j.ins.2013.03.028
    BibTeX
    @article{Lynch2013,
     author = {Gavin Lynch and Frank Y. Shih and Hong-Yuan Mark Liao},
     title = {An Efficient Expanding Block Algorithm for Image Copy-Move Forgery Detection},
     journal = {Information Sciences},
     year = {2013},
     number = {0},
     pages = {-}}
    
  150. S. Lyu
    Natural Image Statistics in Digital Image Forensics
    Sencar, H. T. & Memon, N. (ed.)
    Digital Image Forensics
    Springer New York, 2013, pp. 239-256
    BibTeX
    @incollection{Lyu2013,
     author = {Siwei Lyu},
     title = {Natural Image Statistics in Digital Image Forensics},
     booktitle = {Digital Image Forensics},
     publisher = {Springer New York},
     year = {2013},
     pages = {239--256}}
    
  151. S. Lyu, X. Pan & X. Zhang
    Exposing Region Splicing Forgeries with Blind Local Noise Estimation
    International Journal of Computer Vision, Springer US, 2013, pp. 1-20
    DOI: 10.1007/s11263-013-0688-y
    BibTeX
    @article{Lyu2013a,
     author = {Lyu, Siwei and Pan, Xunyu and Zhang, Xing},
     title = {Exposing Region Splicing Forgeries with Blind Local Noise Estimation},
     journal = {International Journal of Computer Vision},
     publisher = {Springer US},
     year = {2013},
     pages = {1--20}}
    
  152. D. Mahalakshmi, K. Vijayalakshmi & E. Agnes
    A forensic method for detecting image forgery
    Emerging Trends in Computing, Communication and Nanotechnology (ICE-CCN), 2013 International Conference on
    2013, pp. 590-594
    DOI: 10.1109/ICE-CCN.2013.6528568
    BibTeX
    @inproceedings{Mahalakshmi2013,
     author = {Devi Mahalakshmi and Vijayalakshmi, K. and Agnes, E.},
     title = {A forensic method for detecting image forgery},
     booktitle = {Emerging Trends in Computing, Communication and Nanotechnology (ICE-CCN), 2013 International Conference on},
     year = {2013},
     pages = {590--594}}
    
  153. B. Mahdian, R. Nedbal & S. Saic
    Blind Verification of Digital Image Originality: A Statistical Approach
    Information Forensics and Security, IEEE Transactions on, 2013, Vol. 8(9), pp. 1531-1540
    DOI: 10.1109/TIFS.2013.2276000
    BibTeX
    @article{Mahdian2013,
     author = {Mahdian, B. and Nedbal, R. and Saic, S.},
     title = {Blind Verification of Digital Image Originality: A Statistical Approach},
     journal = {Information Forensics and Security, IEEE Transactions on},
     year = {2013},
     volume = {8},
     number = {9},
     pages = {1531--1540}}
    
  154. B. Mahdian & S. Saic
    A Novel Method for Identifying Exact Sensor Using Multiplicative Noise Component
    Multimedia (ISM), 2013 IEEE International Symposium on
    2013, pp. 241-247
    DOI: 10.1109/ISM.2013.46
    BibTeX
    @inproceedings{Mahdian2013a,
     author = {Mahdian, B. and Saic, S.},
     title = {A Novel Method for Identifying Exact Sensor Using Multiplicative Noise Component},
     booktitle = {Multimedia (ISM), 2013 IEEE International Symposium on},
     year = {2013},
     pages = {241--247}}
    
  155. R.R. Maind, A. Khade & D. Chitre
    Robust Image Copy Move Forgery Detection
    IJAIR, 2013
    BibTeX
    @article{Maind2013,
     author = {Rohini R. Maind and Alka Khade and D.K. Chitre},
     title = {Robust Image Copy Move Forgery Detection},
     journal = {IJAIR},
     year = {2013}}
    
  156. K. Manudhane & M. Bartere
    Methodology for Evidence Reconstruction in Digital Image Forensics
    International Journal of Engineering Research & Technology (IJERT), 2013, Vol. 2(11), pp. 1311-1318
    BibTeX
    @article{Manudhane2013,
     author = {Kalpana Manudhane and M.M. Bartere},
     title = {Methodology for Evidence Reconstruction in Digital Image Forensics},
     journal = {International Journal of Engineering Research & Technology (IJERT)},
     year = {2013},
     volume = {2},
     number = {11},
     pages = {1311--1318}}
    
  157. X. Meng, S. Niu, R. Yan & Y. Li
    Detecting Photographic Cropping Based on Vanishing Points
    Chinese Journal of Electronics, 2013
    BibTeX
    @article{Meng2013,
     author = {Meng, X.. and Niu, S. and Yan, R. and Li, Y.},
     title = {Detecting Photographic Cropping Based on Vanishing Points},
     journal = {Chinese Journal of Electronics},
     year = {2013}}
    
  158. L. Meng-Jiao, N. Shao-Zhang & Z. Jian-Cheng
    Research on Image Detection Algorithm with Markov Process
    Intelligent Information Hiding and Multimedia Signal Processing, 2013 Ninth International Conference on
    2013, pp. 238-241
    DOI: 10.1109/IIH-MSP.2013.68
    BibTeX
    @inproceedings{Meng-Jiao2013,
     author = {Li Meng-Jiao and Niu Shao-Zhang and Zou Jian-Cheng},
     title = {Research on Image Detection Algorithm with Markov Process},
     booktitle = {Intelligent Information Hiding and Multimedia Signal Processing, 2013 Ninth International Conference on},
     year = {2013},
     pages = {238--241}}
    
  159. R. Mercuri
    Courtroom Considerations in Digital Image Forensics
    Sencar, H. T. & Memon, N. (ed.)
    Digital Image Forensics
    Springer New York, 2013, pp. 313-326
    BibTeX
    @incollection{Mercuri2013,
     author = {Rebecca Mercuri},
     title = {Courtroom Considerations in Digital Image Forensics},
     booktitle = {Digital Image Forensics},
     publisher = {Springer New York},
     year = {2013},
     pages = {313--326}}
    
  160. N. Mettripun, N. Khanna, T. Amornraksa & E.J. Delp
    Partial sharpness index for classifying digital camera and scanned images
    Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON), 2013 10th International Conference on
    2013, pp. 1-5
    DOI: 10.1109/ECTICon.2013.6559643
    BibTeX
    @inproceedings{Mettripun2013,
     author = {Mettripun, Narong and Khanna, Nitin and Amornraksa, Thumrongrat and Delp, Edward J.},
     title = {Partial sharpness index for classifying digital camera and scanned images},
     booktitle = {Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON), 2013 10th International Conference on},
     year = {2013},
     pages = {1--5}}
    
  161. S. Milani, M. Tagliasacchi & S. Tubaro
    Antiforensics attacks to benford´s law for the detection of double compressed images
    2013 IEEE International Conference on Acoustics, Speech and Signal Processing
    Institute of Electrical & Electronics Engineers (IEEE), 2013
    DOI: 10.1109/ICASSP.2013.6638219
    BibTeX
    @inproceedings{Milani2013,
     author = {Milani, Simone and Tagliasacchi, Marco and Tubaro, Stefano},
     title = {Antiforensics attacks to benford´s law for the detection of double compressed images},
     booktitle = {2013 IEEE International Conference on Acoustics, Speech and Signal Processing},
     publisher = {Institute of Electrical & Electronics Engineers (IEEE)},
     year = {2013}}
    
  162. A. Mire, S. Dhok, P. Porey & N. Mistry
    Automation of JPEG Ghost Detection using Graph Based Segmentation
    International Journal Of Computational Engineering Research, 2013, Vol. 3(12)
    BibTeX
    @article{Mire2013,
     author = {AV Mire and SB Dhok and PD Porey and NJ Mistry},
     title = {Automation of JPEG Ghost Detection using Graph Based Segmentation},
     journal = {International Journal Of Computational Engineering Research},
     year = {2013},
     volume = {3},
     number = {12}}
    
  163. M. Mishra & F.L.D.M.C. Adhikary
    Digital Image Tamper Detection Techniques - A Comprehensive Study
    International Journal of Computer Science and Business Informatics, 2013
    BibTeX
    @article{Mishra2013a,
     author = {Minati Mishra and Flt. Lt. Dr. M. C. Adhikary},
     title = {Digital Image Tamper Detection Techniques - A Comprehensive Study},
     journal = {International Journal of Computer Science and Business Informatics},
     year = {2013}}
    
  164. M. Mishra & M.C. Adhikary
    Region Duplication Forgery Detection Technique based on SURF and HAC
    International Journal of Computer Science and Business Informatics, 2013, Vol. 2(1), pp. 1 - 12
    BibTeX
    @article{Mishra2013,
     author = {Minati Mishra and M. C. Adhikary},
     title = {Region Duplication Forgery Detection Technique based on SURF and HAC},
     journal = {International Journal of Computer Science and Business Informatics},
     year = {2013},
     volume = {2},
     number = {1},
     pages = {1 -- 12}}
    
  165. Z. Mohamadian & A.A. Pouyan
    Detection of Duplication Forgery in Digital Images in Uniform and Non-uniform Regions
    Computer Modelling and Simulation (UKSim), 2013 UKSim 15th International Conference on
    2013, pp. 455-460
    DOI: 10.1109/UKSim.2013.94
    BibTeX
    @inproceedings{Mohamadian2013,
     author = {Mohamadian, Z. and Pouyan, A. A.},
     title = {Detection of Duplication Forgery in Digital Images in Uniform and Non-uniform Regions},
     booktitle = {Computer Modelling and Simulation (UKSim), 2013 UKSim 15th International Conference on},
     year = {2013},
     pages = {455--460}}
    
  166. H. Muammar & P.L. Dragotti
    An investigation into aliasing in images recaptured from an LCD monitor using a digital camera
    Proc. Speech and Signal Processing 2013 IEEE Int. Conf. Acoustics
    2013, pp. 2242-2246
    DOI: 10.1109/ICASSP.2013.6638053
    BibTeX
    @inproceedings{Muammar2013,
     author = {H. Muammar and P. L. Dragotti},
     title = {An investigation into aliasing in images recaptured from an LCD monitor using a digital camera},
     booktitle = {Proc. Speech and Signal Processing 2013 IEEE Int. Conf. Acoustics},
     year = {2013},
     pages = {2242--2246}}
    
  167. G. Muhammad
    Multi-scale local texture descriptor for image forgery detection
    Industrial Technology (ICIT), 2013 IEEE International Conference on
    2013, pp. 1146-1151
    DOI: 10.1109/ICIT.2013.6505834
    BibTeX
    @inproceedings{Muhammad2013,
     author = {Muhammad, Ghulam},
     title = {Multi-scale local texture descriptor for image forgery detection},
     booktitle = {Industrial Technology (ICIT), 2013 IEEE International Conference on},
     year = {2013},
     pages = {1146--1151}}
    
  168. G. Muhammad, M. Al-Hammadi, M. Hussain & G. Bebis
    Image forgery detection using steerable pyramid transform and local binary pattern
    Machine Vision and Applications, Springer Berlin Heidelberg, 2013, pp. 1-11
    DOI: 10.1007/s00138-013-0547-4
    BibTeX
    @article{Muhammad2013a,
     author = {Muhammad, Ghulam and Al-Hammadi, MunnerH. and Hussain, Muhammad and Bebis, George},
     title = {Image forgery detection using steerable pyramid transform and local binary pattern},
     journal = {Machine Vision and Applications},
     publisher = {Springer Berlin Heidelberg},
     year = {2013},
     pages = {1--11}}
    
  169. G. Muhammad, M.H. Al-Hammadi, M. Hussain, A.M. Mirza & G. Bebis
    Copy move image forgery detection method using steerable pyramid transform and texture descriptor
    EUROCON, 2013 IEEE
    2013, pp. 1586-1592
    DOI: 10.1109/EUROCON.2013.6625188
    BibTeX
    @inproceedings{Muhammad2013b,
     author = {Muhammad, G and Al-Hammadi, M. H. and Hussain, M. and Mirza, A. M. and Bebis, G.},
     title = {Copy move image forgery detection method using steerable pyramid transform and texture descriptor},
     booktitle = {EUROCON, 2013 IEEE},
     year = {2013},
     pages = {1586--1592}}
    
  170. G. Muhammad & M. Hussain
    Passive Detection of Copy - Move Image Forgery using Undecimated Wavelets and Zernike Moments
    INFORMATION, 2013, Vol. 16(5), pp. 2957-2964
    BibTeX
    @article{Muhammad2013c,
     author = {Ghulam Muhammad and Muhammad Hussain},
     title = {Passive Detection of Copy - Move Image Forgery using Undecimated Wavelets and Zernike Moments},
     journal = {INFORMATION},
     year = {2013},
     volume = {16},
     number = {5},
     pages = {2957--2964}}
    
  171. S. Murali, G. Chittapur & H. Prabhakara
    Detection of Digital Photo Image Forgery Using Copy-Create Techniques
    Mohan, S. & Kumar, S. S. (ed.)
    Proceedings of the Fourth International Conference on Signal and Image Processing 2012 (ICSIP 2012)
    Springer India, 2013, Vol. 221, pp. 281-290
    DOI: 10.1007/978-81-322-0997-3_26
    BibTeX
    @incollection{Murali2013,
     author = {Murali, S. and Chittapur, GovndrajB. and Prabhakara, H.S.},
     title = {Detection of Digital Photo Image Forgery Using Copy-Create Techniques},
     booktitle = {Proceedings of the Fourth International Conference on Signal and Image Processing 2012 (ICSIP 2012)},
     publisher = {Springer India},
     year = {2013},
     volume = {221},
     pages = {281--290}}
    
  172. S. Murali, G.B. Chittapur, B.S. Anami & others
    Comparision and analysis of photo image forgery detection techniques
    International Journal on Computational Sciences & Applications (IJCSA), 2013, Vol. 2(6), pp. 45-56
    BibTeX
    @article{Murali2013a,
     author = {Murali, S and Chittapur, Govindraj B and Anami, Basavaraj S and others},
     title = {Comparision and analysis of photo image forgery detection techniques},
     journal = {International Journal on Computational Sciences & Applications (IJCSA)},
     year = {2013},
     volume = {2},
     number = {6},
     pages = {45--56}}
    
  173. C. Neamtu, C. Barca, E. Achimescu & B. Gavriloaia
    Exposing copy-move image tampering using forensic method based on SURF
    Electronics, Computers and Artificial Intelligence (ECAI), 2013 International Conference on
    2013, pp. 1-4
    DOI: 10.1109/ECAI.2013.6636173
    BibTeX
    @inproceedings{Neamtu2013,
     author = {Neamtu, C. and Barca, C. and Achimescu, E. and Gavriloaia, B.},
     title = {Exposing copy-move image tampering using forensic method based on SURF},
     booktitle = {Electronics, Computers and Artificial Intelligence (ECAI), 2013 International Conference on},
     year = {2013},
     pages = {1--4}}
    
  174. A. Newson, A. Almansa, M. Fradet, Y. Gousseau & P. Pérez
    Towards Fast, Generic Video Inpainting
    Proceedings of the 10th European Conference on Visual Media Production
    ACM, 2013, pp. 7:1-7:8
    DOI: 10.1145/2534008.2534019
    BibTeX
    @inproceedings{Newson2013,
     author = {Newson, Alasdair and Almansa, Andrés and Fradet, Matthieu and Gousseau, Yann and Pérez, Patrick},
     title = {Towards Fast, Generic Video Inpainting},
     booktitle = {Proceedings of the 10th European Conference on Visual Media Production},
     publisher = {ACM},
     year = {2013},
     pages = {7:1--7:8}}
    
  175. T.-T. Ng & S.-F. Chang
    Discrimination of Computer Synthesized or Recaptured Images from Real Images
    Sencar, H. T. & Memon, N. (ed.)
    Digital Image Forensics
    Springer New York, 2013, pp. 275-312
    BibTeX
    @incollection{Ng2013,
     author = {Tian-Tsong Ng and Shih-Fu Chang},
     title = {Discrimination of Computer Synthesized or Recaptured Images from Real Images},
     booktitle = {Digital Image Forensics},
     publisher = {Springer New York},
     year = {2013},
     pages = {275--312}}
    
  176. H.C. Nguyen
    Security of Forensic Techniques for Digital Images
    Technische Universität Darmstadt, Technische Universität Darmstadt, 2013
    BibTeX
    @phdthesis{Nguyen2013,
     author = {Hieu Cuong Nguyen},
     title = {Security of Forensic Techniques for Digital Images},
     school = {Technische Universität Darmstadt},
     year = {2013}}
    
  177. H.C. Nguyen & S. Katzenbeisser
    Detecting Resized Double JPEG Compressed Images – Using Support Vector Machine
    Communications and Multimedia Security
    Springer, 2013
    DOI: 10.1007/978-3-642-40779-6_9
    BibTeX
    @incollection{Nguyen2013a,
     author = {Nguyen, Hieu Cuong and Katzenbeisser, Stefan},
     title = {Detecting Resized Double JPEG Compressed Images – Using Support Vector Machine},
     booktitle = {Communications and Multimedia Security},
     publisher = {Springer},
     year = {2013}}
    
  178. NPPA
    NPPA Code of Ethics
    2013
    BibTeX
    @electronic{NPPA2013,
     author = {NPPA},
     title = {NPPA Code of Ethics},
     year = {2013}}
    
  179. A.L.S. Orozco, J.R. Corripio, D.M.A. González, L.J.G. Villalba & J.C.H. Castro
    Techniques for Source Camera Identification
    Proceedings of the ICIT 2013 -- The 6th International Conference on Information Technology
    ICIT, 2013
    BibTeX
    @inproceedings{Orozco2013,
     author = {Ana Lucila Sandoval Orozco and Jocelin Rosales Corripio and David Manuel Arenas González and Luis Javier García Villalba and Julio César Hernández Castro},
     title = {Techniques for Source Camera Identification},
     booktitle = {Proceedings of the ICIT 2013 -- The 6th International Conference on Information Technology},
     journal = {ICIT},
     year = {2013}}
    
  180. L. Pancheri, E. Panina, G.F.D. Betta, L. Gasparini & D. Stoppa
    Compact analog counting SPAD pixel with 1.9% PRNU and 530ps time gating
    Proc. ESSCIRC (ESSCIRC)
    2013, pp. 295-298
    DOI: 10.1109/ESSCIRC.2013.6649131
    BibTeX
    @inproceedings{Pancheri2013,
     author = {L. Pancheri and E. Panina and G. F. Dalla Betta and L. Gasparini and D. Stoppa},
     title = {Compact analog counting SPAD pixel with 1.9% PRNU and 530ps time gating},
     booktitle = {Proc. ESSCIRC (ESSCIRC)},
     year = {2013},
     pages = {295--298}}
    
  181. A. Pande, S. Chen, P. Mohapatra & J. Zambreno
    Hardware Architecture for Video Authentication using Sensor Pattern Noise
    Circuits and Systems for Video Technology, IEEE Transactions on, 2013, Vol. PP(99), pp. 1-1
    DOI: 10.1109/TCSVT.2013.2276869
    BibTeX
    @article{Pande2013,
     author = {Pande, A. and Chen, S. and Mohapatra, P. and Zambreno, J.},
     title = {Hardware Architecture for Video Authentication using Sensor Pattern Noise},
     journal = {Circuits and Systems for Video Technology, IEEE Transactions on},
     year = {2013},
     volume = {PP},
     number = {99},
     pages = {1--1}}
    
  182. C. Pasquini & G. Boato
    JPEG compression anti-forensics based on first significant digit distribution
    Multimedia Signal Processing (MMSP), 2013 IEEE 15th International Workshop on
    2013, pp. 500-505
    DOI: 10.1109/MMSP.2013.6659339
    BibTeX
    @inproceedings{Pasquini2013,
     author = {Pasquini, Cecilia and Boato, Giulia},
     title = {JPEG compression anti-forensics based on first significant digit distribution},
     booktitle = {Multimedia Signal Processing (MMSP), 2013 IEEE 15th International Workshop on},
     year = {2013},
     pages = {500--505}}
    
  183. A. Peng & X. Kang
    Robust Median Filtering Detection Based on Filtered Residual
    Shi, Y., Kim, H.-J. & Pérez-González, F. (ed.)
    Digital Forensics and Watermaking
    Springer Berlin Heidelberg, 2013, Vol. 7809, pp. 344-357
    DOI: 10.1007/978-3-642-40099-5_29
    BibTeX
    @incollection{Peng2013b,
     author = {Peng, Anjie and Kang, Xiangui},
     title = {Robust Median Filtering Detection Based on Filtered Residual},
     booktitle = {Digital Forensics and Watermaking},
     publisher = {Springer Berlin Heidelberg},
     year = {2013},
     volume = {7809},
     pages = {344--357}}
    
  184. F. Peng, J. Li & M. Long
    Discriminating Natural Images and Computer Generated Graphics Based on Compound Fractal Features
    Journal of Computational Information Systems, 2013, Vol. 9(13), pp. 101-5108
    BibTeX
    @article{Peng2013a,
     author = {Fei Peng and Jiaoting Li and Min Long},
     title = {Discriminating Natural Images and Computer Generated Graphics Based on Compound Fractal Features},
     journal = {Journal of Computational Information Systems},
     year = {2013},
     volume = {9},
     number = {13},
     pages = {101--5108}}
    
  185. F. Peng, J. Shi & M. Long
    Comparison and Analysis of the Performance of PRNU Extraction Methods in Source Camera Identification
    Journal of Computational Information Systems, 2013, Vol. 9(14), pp. 585-5592
    BibTeX
    @article{Peng2013,
     author = {Fei Peng and Jiaoling Shi and Min Long},
     title = {Comparison and Analysis of the Performance of PRNU Extraction Methods in Source Camera Identification},
     journal = {Journal of Computational Information Systems},
     year = {2013},
     volume = {9},
     number = {14},
     pages = {585--5592}}
    
  186. Y. Peng & B. Liu
    Accurate estimation of primary quantisation table with applications to tampering detection
    Institution of Engineering and Technology, Electronics Letters, 2013
    DOI: 10.1049/el.2013.2218
    BibTeX
    @article{Peng2013c,
     author = {Yuanyuan Peng and Benyong Liu},
     title = {Accurate estimation of primary quantisation table with applications to tampering detection},
     journal = {Institution of Engineering and Technology, Electronics Letters},
     year = {2013}}
    
  187. A. Piva
    An Overview on Image Forensics
    ISRN Signal Processing, 2013, Vol. 2013, pp. 1-22
    DOI: 10.1155/2013/496701
    BibTeX
    @article{Piva2013,
     author = {Piva, Alessandro},
     title = {An Overview on Image Forensics},
     journal = {ISRN Signal Processing},
     year = {2013},
     volume = {2013},
     pages = {1--22}}
    
  188. Presserat
    Publizistische Grundsätze (Pressekodex) -- Richtlinien für die publizistische Arbeit nach den Empfehlungen des Deutschen Presserats
    2013
    BibTeX
    @electronic{Presserat2013,
     author = {Presserat},
     title = {Publizistische Grundsätze (Pressekodex) -- Richtlinien für die publizistische Arbeit nach den Empfehlungen des Deutschen Presserats},
     year = {2013}}
    
  189. G. Puglisi, A. Bruna, F. Galvan & S. Battiato
    First JPEG Quantization Matrix Estimation Based On Histogram Analysis
    Proc. IEEE International Conference on Image Processing ICIP 2013
    2013, pp. 4502 - 4506
    BibTeX
    @inproceedings{Puglisi2013,
     author = {Giovanni Puglisi and Arcangelo Bruna and Fausto Galvan and Sebastiano Battiato},
     title = {First JPEG Quantization Matrix Estimation Based On Histogram Analysis},
     booktitle = {Proc. IEEE International Conference on Image Processing ICIP 2013},
     year = {2013},
     pages = {4502 -- 4506}}
    
  190. T. Qazi, K. Hayat, S.U. Khan, S.A. Madani, I.A. Khan, J. Kołodziej, H. Li, W. Lin, K.C. Yow & C.-Z. Xu
    Survey on blind image forgery detection
    IET Image Processing, 2013
    DOI: 10.1049/iet-ipr.2012.0388
    BibTeX
    @article{Qazi2013,
     author = {Tanzeela Qazi and Khizar Hayat and Samee U. Khan and Sajjad A. Madani and Imran A. Khan and Joanna Kołodziej and Hongxiang Li and Weiyao Lin and Kin Choong Yow and Cheng-Zhong Xu},
     title = {Survey on blind image forgery detection},
     journal = {IET Image Processing},
     year = {2013}}
    
  191. R. Qian, W. Li & N. Yu
    High precision rotation angle estimation for rotated images
    Multimedia and Expo Workshops (ICMEW), 2013 IEEE International Conference on
    2013, pp. 1-4
    DOI: 10.1109/ICMEW.2013.6618298
    BibTeX
    @inproceedings{Qian2013a,
     author = {Ruohan Qian and Weihai Li and Nenghai Yu},
     title = {High precision rotation angle estimation for rotated images},
     booktitle = {Multimedia and Expo Workshops (ICMEW), 2013 IEEE International Conference on},
     year = {2013},
     pages = {1--4}}
    
  192. R. Qian, W. Li, N. Yu & B. Liu
    High Precision Image Rotation Angle Estimation with Periodicity of Pixel Variance
    Image and Graphics (ICIG), 2013 Seventh International Conference on
    2013, pp. 106-111
    DOI: 10.1109/ICIG.2013.27
    BibTeX
    @inproceedings{Qian2013,
     author = {Ruohan Qian and Weihai Li and Nenghai Yu and Bin Liu},
     title = {High Precision Image Rotation Angle Estimation with Periodicity of Pixel Variance},
     booktitle = {Image and Graphics (ICIG), 2013 Seventh International Conference on},
     year = {2013},
     pages = {106--111}}
    
  193. Z. Qian & T. Qiao
    Simplified Anti-Forensics of JPEG Compression
    Journal of Computers, ACADEMY PUBLISHER, 2013, Vol. 8(10), pp. 2483-2488
    DOI: 10.4304/jcp.8.10.2483-2488
    BibTeX
    @article{Qian2013b,
     author = {Zhenxing Qian and Tong Qiao},
     title = {Simplified Anti-Forensics of JPEG Compression},
     journal = {Journal of Computers},
     publisher = {ACADEMY PUBLISHER},
     year = {2013},
     volume = {8},
     number = {10},
     pages = {2483--2488}}
    
  194. Z. Qu, X. Kang, J. Huang & Y. Li
    Forensic sensor pattern noise extraction from large image data set
    Proc. Speech and Signal Processing 2013 IEEE Int. Conf. Acoustics
    2013, pp. 3023-3027
    DOI: 10.1109/ICASSP.2013.6638213
    BibTeX
    @inproceedings{Qu2013a,
     author = {Z. Qu and X. Kang and J. Huang and Y. Li},
     title = {Forensic sensor pattern noise extraction from large image data set},
     booktitle = {Proc. Speech and Signal Processing 2013 IEEE Int. Conf. Acoustics},
     year = {2013},
     pages = {3023--3027}}
    
  195. Z. Qu, X. Kang, J. Huang & S.Y.-S. Yinxiang Li
    Forensic Sensor Pattern Noise Extraction From Large Image Data Set
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013
    Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013, 2013
    DOI: 10.1109/icassp.2013.6638213
    BibTeX
    @inproceedings{Qu2013,
     author = {Zhenhua Qu and Xiangui Kang and Jiwu Huang and Yinxiang Li, Sun Yat-Sen},
     title = {Forensic Sensor Pattern Noise Extraction From Large Image Data Set},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013},
     journal = {Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013},
     year = {2013}}
    
  196. D. Quick & K.-K.R. Choo
    Forensic collection of cloud storage data: Does the act of collection result in changes to the data or its metadata?
    Digital Investigation, 2013(0), pp. -
    DOI: 10.1016/j.diin.2013.07.001
    BibTeX
    @article{Quick2013,
     author = {Darren Quick and Kim-Kwang Raymond Choo},
     title = {Forensic collection of cloud storage data: Does the act of collection result in changes to the data or its metadata?},
     journal = {Digital Investigation},
     year = {2013},
     number = {0},
     pages = {-}}
    
  197. S. Rahman & A. Robles-Kelly
    A Method For Estimating Light Direction, Shape, And Reflection Parameters From A Single Image
    Proc. IEEE International Conference on Image Processing ICIP 2013
    2013, pp. 2034-2038
    BibTeX
    @inproceedings{Rahman2013,
     author = {Sejuti Rahman and Antonio Robles-Kelly},
     title = {A Method For Estimating Light Direction, Shape, And Reflection Parameters From A Single Image},
     booktitle = {Proc. IEEE International Conference on Image Processing ICIP 2013},
     year = {2013},
     pages = {2034--2038}}
    
  198. V. Raj & L. Thomas
    A Novel Approach for Forgery Detection of Images
    International Journal of Application or Innovation in Engineering & Management (IJAIEM), 2013
    BibTeX
    @article{Raj2013,
     author = {Vimal Raj and Lija Thomas},
     title = {A Novel Approach for Forgery Detection of Images},
     journal = {International Journal of Application or Innovation in Engineering & Management (IJAIEM)},
     year = {2013}}
    
  199. M. Purnachandra Rao & A. Rajagopalan
    Harnessing Motion Blur To Uncover Splicing
    Proc. IEEE International Conference on Image Processing ICIP 2013
    2013, pp. 4507 - 4511
    BibTeX
    @inproceedings{PurnachandraRao2013,
     author = {M. Purnachandra Rao and A.N. Rajagopalan},
     title = {Harnessing Motion Blur To Uncover Splicing},
     booktitle = {Proc. IEEE International Conference on Image Processing ICIP 2013},
     year = {2013},
     pages = {4507 -- 4511}}
    
  200. Q. Rao, H. Li, W. Luo & J. Huang
    Anti-Forensics of the Triangle Test by Random Fingerprint-Copy Attack
    Computational Visual Media Conference, 2013
    BibTeX
    @article{Rao2013,
     author = {Quanquan Rao and Haodong Li and Weiqi Luo and Jiwu Huang},
     title = {Anti-Forensics of the Triangle Test by Random Fingerprint-Copy Attack},
     journal = {Computational Visual Media Conference},
     year = {2013}}
    
  201. C. Riess
    Physics-based and Statistical Features for Image Forensics -- Physikalische und statistische Merkmale in der Bildforensik
    Der Technischen Fakultät der Universität Erlangen--Nürnberg, Der Technischen Fakultät der Universität Erlangen--Nürnberg, 2013
    BibTeX
    @phdthesis{Riess2013,
     author = {Christian Riess},
     title = {Physics-based and Statistical Features for Image Forensics -- Physikalische und statistische Merkmale in der Bildforensik},
     school = {Der Technischen Fakultät der Universität Erlangen--Nürnberg},
     year = {2013}}
    
  202. A. Ruifrok, Z. Geradts & J. Bijhold
    Imaging
    Proceedings of the17th Interpol International Forensic Science Managers Symposium, Lyon
    2013, pp. 638-651
    BibTeX
    @inproceedings{Ruifrok2013,
     author = {Arnout Ruifrok and Zeno Geradts and Jurrien Bijhold},
     title = {Imaging},
     booktitle = {Proceedings of the17th Interpol International Forensic Science Managers Symposium, Lyon},
     year = {2013},
     pages = {638--651}}
    
  203. S.-J. Ryu, M. Kirchner, M.-J. Lee & H.-K. Lee
    Rotation Invariant Localization of Duplicated Image Regions Based on Zernike Moments
    IEEE Transactions on Information Forensics and Security, 2013, Vol. 8(8), pp. 1355-1370
    DOI: 10.1109/TIFS.2013.2272377
    BibTeX
    @article{Ryu2013,
     author = {S.-J. Ryu and Kirchner, M. and Lee, M.-J. and Lee, H.-K.},
     title = {Rotation Invariant Localization of Duplicated Image Regions Based on Zernike Moments},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2013},
     volume = {8},
     number = {8},
     pages = {1355--1370}}
    
  204. A. Saini
    A Survey on Passive-Blind Image Forensics
    Proceedings of the second International Conference on Role of Technology in Nation Building (ICRTNB - 2013), 2013
    BibTeX
    @article{Saini2013,
     author = {Anupama Saini},
     title = {A Survey on Passive-Blind Image Forensics},
     journal = {Proceedings of the second International Conference on Role of Technology in Nation Building (ICRTNB - 2013)},
     year = {2013}}
    
  205. A. Sandoval Orozco, D. Arenas González, J. Rosales Corripio, L. García Villalba & J. Hernandez-Castro
    Source identification for mobile devices, based on wavelet transforms combined with sensor imperfections
    Computing, Springer Vienna, 2013, Vol. -, pp. 1-13
    DOI: 10.1007/s00607-013-0313-5
    BibTeX
    @article{SandovalOrozco2013,
     author = {Sandoval Orozco, A.L. and Arenas González, D.M. and Rosales Corripio, J. and García Villalba, L.J. and Hernandez-Castro, J.C.},
     title = {Source identification for mobile devices, based on wavelet transforms combined with sensor imperfections},
     journal = {Computing},
     publisher = {Springer Vienna},
     year = {2013},
     volume = {-},
     pages = {1--13}}
    
  206. R. Satta & P. Stirparo
    Picture-to-Identity linking of social network accounts based on Sensor Pattern Noise
    Proceedings International Conference on Imaging for Crime Detection and Prevention (ICDP 2013), Kingston University London, UK
    2013
    DOI: 10.1049/ic.2013.0266
    BibTeX
    @inproceedings{Satta2013,
     author = {Riccardo Satta and Pasquale Stirparo},
     title = {Picture-to-Identity linking of social network accounts based on Sensor Pattern Noise},
     booktitle = {Proceedings International Conference on Imaging for Crime Detection and Prevention (ICDP 2013), Kingston University London, UK},
     year = {2013}}
    
  207. H.T. Sencar & N.D. Memon
    Digital Image Forensics: There is More to a Picture than Meets the Eye
    Springer, 2013
    BibTeX
    @book{Sencar2013,
     author = {Husrev T. Sencar and Nasir D. Memon},
     title = {Digital Image Forensics: There is More to a Picture than Meets the Eye},
     publisher = {Springer},
     year = {2013}}
    
  208. M. Shabanifard, M.G. Shayesteh & M.A. Akhaee
    Forensic detection of image manipulation using the Zernike moments and pixel-pair histogram
    Institution of Engineering and Technology, Institution of Engineering and Technology, 2013, pp. -(0)
    BibTeX
    @article{Shabanifard2013,
     author = {Mahmood Shabanifard and Mahrokh G. Shayesteh and Mohammad Ali Akhaee},
     title = {Forensic detection of image manipulation using the Zernike moments and pixel-pair histogram},
     journal = {Institution of Engineering and Technology},
     publisher = {Institution of Engineering and Technology},
     year = {2013},
     pages = {-(0)}}
    
  209. T. Shanableh
    Detection of frame deletion for digital video forensics
    Digital Investigation, 2013(0), pp. -
    DOI: 10.1016/j.diin.2013.10.004
    BibTeX
    @article{Shanableh2013,
     author = {Tamer Shanableh},
     title = {Detection of frame deletion for digital video forensics},
     journal = {Digital Investigation},
     year = {2013},
     number = {0},
     pages = {-}}
    
  210. A. Sharang & P. Jindal
    Digital Image forensics using noise features
    Department of Computer Science & Engineering, Indian Institute of Technology (IIT), Kanpur, Department of Computer Science & Engineering, Indian Institute of Technology (IIT), Kanpur, 2013
    BibTeX
    @techreport{Sharang2013,
     author = {Abhijit Sharang and Pankaj Jindal},
     title = {Digital Image forensics using noise features},
     school = {Department of Computer Science & Engineering, Indian Institute of Technology (IIT), Kanpur},
     year = {2013}}
    
  211. C. Sharma & U. Datta
    Copy-Move Image Forgery Detection by DyWT and DCT using Euclidean distances
    International Journal of Computer Technology and Electronics Communication, 2013
    BibTeX
    @article{Sharma2013a,
     author = {Chetna Sharma and Unmukh Datta},
     title = {Copy-Move Image Forgery Detection by DyWT and DCT using Euclidean distances},
     journal = {International Journal of Computer Technology and Electronics Communication},
     year = {2013}}
    
  212. D. Sharma & P. Abrol
    Digital Image Tampering -- A Threat to Security Management
    International Journal of Advanced Research in Computer and Communication Engineering, 2013, Vol. 2(10), pp. 4120 - 4123
    BibTeX
    @article{Sharma2013,
     author = {Deepika Sharma and Pawanesh Abrol},
     title = {Digital Image Tampering -- A Threat to Security Management},
     journal = {International Journal of Advanced Research in Computer and Communication Engineering},
     year = {2013},
     volume = {2},
     number = {10},
     pages = {4120 -- 4123}}
    
  213. X. Shen, Y. Zhu, Y. Lv & H. Chen
    Image Copy-Move Forgery Detection Based on SIFT and Gray Level
    Applied Mechanics and Materials, Trans Tech Publ, 2013, Vol. 263, pp. 3021-3024
    BibTeX
    @article{Shen2013,
     author = {Shen, X.J. and Zhu, Y. and Lv, Y.D. and Chen, H.P.},
     title = {Image Copy-Move Forgery Detection Based on SIFT and Gray Level},
     journal = {Applied Mechanics and Materials},
     publisher = {Trans Tech Publ},
     year = {2013},
     volume = {263},
     pages = {3021--3024}}
    
  214. Y. Sheng, H. Wang & G. Zhang
    Comparison and Analysis of Copy-Move Forgery Detection Algorithms for Electronic Image Processing
    Jin, D. & Lin, S. (ed.)
    Advances in Mechanical and Electronic Engineering
    Springer Berlin Heidelberg, 2013, Vol. 178, pp. 343-348
    BibTeX
    @incollection{Sheng2013,
     author = {Sheng, YunZhong and Wang, HangJun and Zhang, GuangQun},
     title = {Comparison and Analysis of Copy-Move Forgery Detection Algorithms for Electronic Image Processing},
     booktitle = {Advances in Mechanical and Electronic Engineering},
     publisher = {Springer Berlin Heidelberg},
     year = {2013},
     volume = {178},
     pages = {343--348}}
    
  215. A.R. Soobhany, K.P. Lam, P. Fletcher & D. Collins
    Source Identification Of Camera Phones Using Svd
    Proc. IEEE International Conference on Image Processing ICIP 2013
    2013, pp. 4487-4491
    BibTeX
    @inproceedings{Soobhany2013,
     author = {Ahmad Ryad Soobhany and K. P. Lam and Peter Fletcher and David Collins},
     title = {Source Identification Of Camera Phones Using Svd},
     booktitle = {Proc. IEEE International Conference on Image Processing ICIP 2013},
     year = {2013},
     pages = {4487--4491}}
    
  216. M.S. Sreelakshmi & D. Venkataraman
    Image compression using anti-forensics method
    CoRR, 2013, Vol. abs/1303.2330
    BibTeX
    @article{Sreelakshmi2013,
     author = {M. S. Sreelakshmi and D. Venkataraman},
     title = {Image compression using anti-forensics method},
     journal = {CoRR},
     year = {2013},
     volume = {abs/1303.2330}}
    
  217. M.S. Sreelakshmi & D. Venkataraman
    Image compression using anti-forensics method
    arxiv, 2013
    BibTeX
    @article{Sreelakshmi2013a,
     author = {M. S. Sreelakshmi and D. Venkataraman},
     title = {Image compression using anti-forensics method},
     journal = {arxiv},
     year = {2013}}
    
  218. M. Stamm, M. Wu & K.J.R. Liu
    Information Forensics: An Overview of the First Decade
    IEEE Access, 2013, Vol. 1, pp. 167-200
    DOI: 10.1109/ACCESS.2013.2260814
    BibTeX
    @article{Stamm2013,
     author = {Stamm, M and Wu, M. and Liu, K. J. R.},
     title = {Information Forensics: An Overview of the First Decade},
     journal = {IEEE Access},
     year = {2013},
     volume = {1},
     pages = {167--200}}
    
  219. B. Su, Q. Yuan, Y. Zhang, M. Zhai & S. Wang
    Rapid Image Splicing Detection Based on Relevance Vector Machine
    Shi, Y., Kim, H.-J. & Pérez-González, F. (ed.)
    Digital Forensics and Watermaking
    Springer Berlin Heidelberg, 2013, Vol. 7809, pp. 300-310
    DOI: 10.1007/978-3-642-40099-5_25
    BibTeX
    @incollection{Su2013,
     author = {Su, Bo and Yuan, Quanqiao and Zhang, Yujin and Zhai, Mengying and Wang, Shilin},
     title = {Rapid Image Splicing Detection Based on Relevance Vector Machine},
     booktitle = {Digital Forensics and Watermaking},
     publisher = {Springer Berlin Heidelberg},
     year = {2013},
     volume = {7809},
     pages = {300--310}}
    
  220. M. Tagliasacchi, M. Visentini-Scarzanella, P.L. Dragotti & S. Tubaro
    Transform Coder Identification
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013
    2013
    BibTeX
    @inproceedings{Tagliasacchi2013,
     author = {Marco Tagliasacchi and Marco Visentini-Scarzanella and Pier Luigi Dragotti and Stefano Tubaro},
     title = {Transform Coder Identification},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013},
     year = {2013}}
    
  221. W. Taktak & J.-L. Dugelay
    Digital Image Forensics: A Two-Step Approach for Identifying Source and Detecting Forgeries
    The Era of Interactive Media
    Springer New York, 2013, pp. 37-51
    DOI: 10.1007/978-1-4614-3501-3_4
    BibTeX
    @incollection{Taktak2013,
     author = {Taktak, Wiem and Dugelay, Jean-Luc},
     title = {Digital Image Forensics: A Two-Step Approach for Identifying Source and Detecting Forgeries},
     booktitle = {The Era of Interactive Media},
     publisher = {Springer New York},
     year = {2013},
     pages = {37--51}}
    
  222. G.R. Talmale & Y. Malode
    Study Of Different Techniques Of Image Forgery Detection
    International Journal of Advanced Research in Computer Science, 2013, Vol. 4(1), pp. 8-13
    BibTeX
    @article{Talmale2013,
     author = {Girish. R. Talmale and Yogesh Malode},
     title = {Study Of Different Techniques Of Image Forgery Detection},
     journal = {International Journal of Advanced Research in Computer Science},
     year = {2013},
     volume = {4},
     number = {1},
     pages = {8--13}}
    
  223. S.A. Thajeel & G.B. Sulong
    State of The Art of Copy-move Forgery Detection Techniques: A Review
    IJCSI International Journal of Computer Science, 2013, Vol. 10(6), pp. 174-183
    BibTeX
    @article{Thajeel2013,
     author = {Thajeel, Salam A. and Ghazali Bin Sulong},
     title = {State of The Art of Copy-move Forgery Detection Techniques: A Review},
     journal = {IJCSI International Journal of Computer Science},
     year = {2013},
     volume = {10},
     number = {6},
     pages = {174--183}}
    
  224. E. Tokuda, H. Pedrini & A. Rocha
    Computer Generated Images vs. Digital Photographs: A Synergetic Feature and Classifier Combination Approach
    Journal of Visual Communication and Image Representation, 2013(0), pp. -
    DOI: 10.1016/j.jvcir.2013.08.009
    BibTeX
    @article{Tokuda2013,
     author = {Eric Tokuda and Helio Pedrini and Anderson Rocha},
     title = {Computer Generated Images vs. Digital Photographs: A Synergetic Feature and Classifier Combination Approach},
     journal = {Journal of Visual Communication and Image Representation},
     year = {2013},
     number = {0},
     pages = {-}}
    
  225. Y. Tomioka, Y. Ito & H. Kitazawa
    Robust Digital Camera Identification Based on Pairwise Magnitude Relations of Clustered Sensor Pattern Noise
    IEEE Transactions on Information Forensics and Security, 2013, Vol. 8(12), pp. 1986-1995
    DOI: 10.1109/TIFS.2013.2284761
    BibTeX
    @article{Tomioka2013,
     author = {Y. Tomioka and Ito, Y. and Kitazawa, H.},
     title = {Robust Digital Camera Identification Based on Pairwise Magnitude Relations of Clustered Sensor Pattern Noise},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2013},
     volume = {8},
     number = {12},
     pages = {1986--1995}}
    
  226. S. Tong, Z. Zhang, Y. Xie & X. Wu
    Image Splicing Detection Based on Statistical Properties of Benford Model
    Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013)
    2013
    DOI: 10.2991/iccsee.2013.200
    BibTeX
    @inproceedings{Tong2013,
     author = {Tong, Senfeng And Zhang, Zhen And Xie, Yongjie And Wu, Xiaodi},
     title = {Image Splicing Detection Based on Statistical Properties of Benford Model},
     booktitle = {Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013)},
     year = {2013}}
    
  227. S.F. Tong, Y.H. Yang & Y.J. Xie
    Distinguishing Computer Graphics from Natural Images Based on Statistical Characteristics
    Vehicle, Mechatronics and Information Technologies, 2013, Vol. 380 - 384, pp. 1306-1309
    DOI: 10.4028/www.scientific.net/AMM.380-384.1306
    BibTeX
    @article{Tong2013a,
     author = {Sen Feng Tong and Yu Hao Yang and Yong Jie Xie},
     title = {Distinguishing Computer Graphics from Natural Images Based on Statistical Characteristics},
     journal = {Vehicle, Mechatronics and Information Technologies},
     year = {2013},
     volume = {380 - 384},
     pages = {1306--1309}}
    
  228. D. Tralic, I. Zupancic, S. Grgic & M. Grgic
    CoMoFoD --- New database for copy-move forgery detection
    ELMAR, 2013 55th International Symposium
    2013, pp. 49-54
    BibTeX
    @inproceedings{Tralic2013,
     author = {Tralic, Dijana and Zupancic, Ivan and Grgic, Sonja and Grgic, Mislay},
     title = {CoMoFoD --- New database for copy-move forgery detection},
     booktitle = {ELMAR, 2013 55th International Symposium},
     year = {2013},
     pages = {49--54}}
    
  229. G. Ulutas & M. Ulutas
    Image forgery detection using Color Coherence Vector
    Electronics, Computer and Computation (ICECCO), 2013 International Conference on
    2013, pp. 107-110
    DOI: 10.1109/ICECCO.2013.6718240
    BibTeX
    @inproceedings{Ulutas2013b,
     author = {Ulutas, G. and Ulutas, M.},
     title = {Image forgery detection using Color Coherence Vector},
     booktitle = {Electronics, Computer and Computation (ICECCO), 2013 International Conference on},
     year = {2013},
     pages = {107--110}}
    
  230. G. Ulutas, M. Ulutas & V.V. Nabiyev
    Copy move forgery detection based on LBP
    Signal Processing and Communications Applications Conference (SIU), 2013 21st
    2013, pp. 1-4
    DOI: 10.1109/SIU.2013.6531569
    BibTeX
    @inproceedings{Ulutas2013,
     author = {Ulutas, G. and Ulutas, M. and Nabiyev, V. V.},
     title = {Copy move forgery detection based on LBP},
     booktitle = {Signal Processing and Communications Applications Conference (SIU), 2013 21st},
     year = {2013},
     pages = {1--4}}
    
  231. G. Valenzise, M. Tagliasacchi & S. Tubaro
    Revealing the Traces of JPEG Compression Anti-Forensics
    IEEE Transactions on Information Forensics and Security, 2013, Vol. 8(2), pp. 335-349
    DOI: 10.1109/TIFS.2012.2234117
    BibTeX
    @article{Valenzise2013,
     author = {Valenzise, Giuseppe and Tagliasacchi, Marco and Tubaro, Stefano},
     title = {Revealing the Traces of JPEG Compression Anti-Forensics},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2013},
     volume = {8},
     number = {2},
     pages = {335--349}}
    
  232. J. Valera & N. Garcia
    Unambiguous interpolation rate estimation in uncompressed resized color digital images
    Biometrics and Forensics (IWBF), 2013 International Workshop on
    2013, pp. 1-4
    DOI: 10.1109/IWBF.2013.6547314
    BibTeX
    @inproceedings{Valera2013,
     author = {Jesus Valera and Narciso Garcia},
     title = {Unambiguous interpolation rate estimation in uncompressed resized color digital images},
     booktitle = {Biometrics and Forensics (IWBF), 2013 International Workshop on},
     year = {2013},
     pages = {1--4}}
    
  233. D. Vázquez-Padın, P. Comesana & F. Pérez-González
    Set-Membership Identification of Resampled Signals
    2013 IEEE International Workshop on Information Forensics and Security (WIFS)
    Institute of Electrical & Electronics Engineers (IEEE), 2013
    DOI: 10.1109/WIFS.2013.6707810
    BibTeX
    @inproceedings{Vazquez-Padin2013,
     author = {D. Vázquez-Padın and P. Comesana and F Pérez-González},
     title = {Set-Membership Identification of Resampled Signals},
     booktitle = {2013 IEEE International Workshop on Information Forensics and Security (WIFS)},
     publisher = {Institute of Electrical & Electronics Engineers (IEEE)},
     year = {2013}}
    
  234. S. Venkata
    Pixel Estimation Based Video Forgery Detection
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013
    Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013, 2013
    DOI: 10.1109/icassp.2013.6638216
    BibTeX
    @inproceedings{Venkata2013,
     author = {Subramanyam Venkata},
     title = {Pixel Estimation Based Video Forgery Detection},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013},
     journal = {Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013},
     year = {2013}}
    
  235. N.D. Wandji & S. Xingming
    Robust Detection of Copy-Move Forgery in Color Images
    2013
    BibTeX
    @electronic{Wandji2013a,
     author = {Nathalie Diane Wandji and Sun Xingming},
     title = {Robust Detection of Copy-Move Forgery in Color Images},
     year = {2013}}
    
  236. N.D. Wandji, S. Xingming & M.F. Kue
    Detection of copy-move forgery in digital images based on DCT
    Arxiv, 2013
    BibTeX
    @article{Wandji2013,
     author = {Nathalie Diane Wandji and Sun Xingming and Moise Fah Kue},
     title = {Detection of copy-move forgery in digital images based on DCT},
     journal = {Arxiv},
     year = {2013}}
    
  237. T. Wang, J. Tang & B. Luo
    Blind Detection of Region Duplication Forgery by Merging Blur and Affine Moment Invariants
    Proc. Seventh Int Image and Graphics (ICIG) Conf
    2013, pp. 258-264
    DOI: 10.1109/ICIG.2013.61
    BibTeX
    @inproceedings{Wang2013b,
     author = {T. Wang and J. Tang and B. Luo},
     title = {Blind Detection of Region Duplication Forgery by Merging Blur and Affine Moment Invariants},
     booktitle = {Proc. Seventh Int Image and Graphics (ICIG) Conf},
     year = {2013},
     pages = {258--264}}
    
  238. W. Wang, X. Jiang, S. Wang & T. Sun
    Estimation of the primary quantization parameter in MPEG videos
    Visual Communications and Image Processing (VCIP), 2013
    2013, pp. 1-6
    DOI: 10.1109/VCIP.2013.6706413
    BibTeX
    @inproceedings{Wang2013,
     author = {Wang, Wan and Jiang, Xinghao and Wang, Shilin and Sun, Tanfeng},
     title = {Estimation of the primary quantization parameter in MPEG videos},
     booktitle = {Visual Communications and Image Processing (VCIP), 2013},
     year = {2013},
     pages = {1--6}}
    
  239. W. Wang, F. Zeng, H. Yuan & X. Duan
    Identifying Image Composites by Detecting Discrepancies in Defocus and Motion Blur
    Journal of Computers, 2013, Vol. 8(11)
    DOI: 10.4304/jcp.8.11.2789-2794
    BibTeX
    @article{Wang2013a,
     author = {Wei Wang and Feng Zeng and Honglin Yuan and Xintao Duan},
     title = {Identifying Image Composites by Detecting Discrepancies in Defocus and Motion Blur},
     journal = {Journal of Computers},
     year = {2013},
     volume = {8},
     number = {11}}
    
  240. J. Watanabe, T. Hosaka & T. Hamamoto
    Sensor-Pattern-Noise Map Reconstruction in Source Camera Identification for Size-Reduced Images
    IEICE TRANSACTIONS on Information and Systems, 2013, Vol. E96-D(8), pp. 1882-1885
    BibTeX
    @article{Watanabe2013,
     author = {Joji Watanabe And Tadaaki Hosaka And Takayuki Hamamoto},
     title = {Sensor-Pattern-Noise Map Reconstruction in Source Camera Identification for Size-Reduced Images},
     journal = {IEICE TRANSACTIONS on Information and Systems},
     year = {2013},
     volume = {E96-D},
     number = {8},
     pages = {1882--1885}}
    
  241. J. Wen
    Duplicated Region Detection Using Robust Features
    International Journal of Applied Mathematics and Statistics, 2013, Vol. 49(19)
    BibTeX
    @article{Wen2013,
     author = {Jiang Wen},
     title = {Duplicated Region Detection Using Robust Features},
     journal = {International Journal of Applied Mathematics and Statistics},
     year = {2013},
     volume = {49},
     number = {19}}
    
  242. L. Wu, X. Kong, B. Wang & S. Shang
    Image tampering localization via estimating the non-aligned double JPEG compression
    Proc. SPIE 8665, Media Watermarking, Security, and Forensics, 2013, pp. 86650R-86650R-7
    DOI: 10.1117/12.2003695
    BibTeX
    @article{Wu2013b,
     author = {Wu, Lanying and Kong, Xiangwei and Wang, Bo and Shang, Shize},
     title = {Image tampering localization via estimating the non-aligned double JPEG compression},
     journal = {Proc. SPIE 8665, Media Watermarking, Security, and Forensics},
     year = {2013},
     pages = {86650R-86650R-7}}
    
  243. S. Wu & D. Shen
    Blind Detection of Tampered JPEG Image Based on Blocking Artifacts of Double Quantization
    Applied Mechanics and Materials, Trans Tech Publ, 2013, Vol. 263, pp. 3104-3107
    BibTeX
    @article{Wu2013,
     author = {Wu, S.B. and Shen, D.S.},
     title = {Blind Detection of Tampered JPEG Image Based on Blocking Artifacts of Double Quantization},
     journal = {Applied Mechanics and Materials},
     publisher = {Trans Tech Publ},
     year = {2013},
     volume = {263},
     pages = {3104--3107}}
    
  244. Z.-H. Wu, M.C. Stamm & K.J.R. Liu
    Anti-forensics Of Median Filtering
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013
    Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013, 2013
    DOI: 10.1109/icassp.2013.6638217
    BibTeX
    @inproceedings{Wu2013a,
     author = {Zhung-Han Wu and Matthew C. Stamm and K. J. Ray Liu},
     title = {Anti-forensics Of Median Filtering},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013},
     journal = {Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013},
     year = {2013}}
    
  245. Y.J. Xie, Y. Bao, S.F. Tong & Y.H. Yang
    Source Camera Identification Based on In-and-Inter Channel Traces
    Applied Mechanics and Materials, 2013, Vol. 380-384, pp. 3754-3757
    DOI: 10.4028/www.scientific.net/AMM.380-384.3754
    BibTeX
    @article{Xie2013a,
     author = {Yong Jie Xie and Yi Bao and Sen Feng Tong and Yu Hao Yang},
     title = {Source Camera Identification Based on In-and-Inter Channel Traces},
     journal = {Applied Mechanics and Materials},
     year = {2013},
     volume = {380-384},
     pages = {3754--3757}}
    
  246. Y.-j. Xie, BAO Yi, TONG Sen-feng & YANG Yu-hao
    Source Digital Image Identification based on Cross-correlation
    Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013)
    2013, pp. 201
    DOI: 10.2991/iccsee.2013.199
    BibTeX
    @inproceedings{Xie2013,
     author = {Xie, Yong-jie and BAO, Yi and TONG, Sen-feng and YANG, Yu-hao},
     title = {Source Digital Image Identification based on Cross-correlation},
     booktitle = {Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013)},
     year = {2013},
     pages = {201}}
    
  247. W. Xiuping, B. Ruilin & G. Xinnian
    Camera calibration method based on a flexible spliced pattern of equilateral triangles
    Chinese Automation Congress (CAC), 2013
    2013, pp. 250-254
    DOI: 10.1109/CAC.2013.6775737
    BibTeX
    @inproceedings{Xiuping2013,
     author = {Wang Xiuping and Bai Ruilin and Guo Xinnian},
     title = {Camera calibration method based on a flexible spliced pattern of equilateral triangles},
     booktitle = {Chinese Automation Congress (CAC), 2013},
     year = {2013},
     pages = {250--254}}
    
  248. B. Xu, G. Liu & Y. Dai
    Detect Image splicing using merged features in chroma space
    The Scientific World Journal, 2013
    BibTeX
    @article{Xu2013,
     author = {Bo Xu and Guangjie Liu and Yuewei Dai},
     title = {Detect Image splicing using merged features in chroma space},
     journal = {The Scientific World Journal},
     year = {2013}}