Literatur
Letzte Version: 3.09.1 Build 3396 - 28. Sep. 201p
2015
-
An Image Forensic Technique Based on 2D Lighting Estimation Using Spherical Harmonic Frames
Zha, H., Chen, X., Wang, L. & Miao, Q. (ed.)
Computer Vision
Springer Berlin Heidelberg, 2015, Vol. 546, pp. 325-334
DOI: 10.1007/978-3-662-48558-3_33
BibTeX@incollection{Zhao2015b, author = {Zhao, Wenyong and Liu, Hong}, title = {An Image Forensic Technique Based on 2D Lighting Estimation Using Spherical Harmonic Frames}, booktitle = {Computer Vision}, publisher = {Springer Berlin Heidelberg}, year = {2015}, volume = {546}, pages = {325--334}}
-
Multiple Point Android Digital Image Authentication
Proc. Int Signals, Circuits and Systems (ISSCS) Symp
2015, pp. 1-4
DOI: 10.1109/ISSCS.2015.7203945
BibTeX@inproceedings{Achimescu2015, author = {Achimescu, E. and Preda, R. O. and Vizireanu, N. and Pirnog, I.}, title = {Multiple Point Android Digital Image Authentication}, booktitle = {Proc. Int Signals, Circuits and Systems (ISSCS) Symp}, year = {2015}, pages = {1--4}}
-
Image Forgery Detection Using Multi Scale Entropy Filter and Local Phase Quantization
I.J. Image, Graphics and Signal Processing, 2015
DOI: 10.5815/ijigsp.2015.10.08
BibTeX@article{Agarwal2015, author = {Agarwal, Saurabh and Chand, Satish}, title = {Image Forgery Detection Using Multi Scale Entropy Filter and Local Phase Quantization}, journal = {I.J. Image, Graphics and Signal Processing}, year = {2015}}
-
Anti-forensics of JPEG Images Using Interpolation
I.J. Image, Graphics and Signal Processing, 2015, Vol. 12, pp. 10-17
DOI: 10.5815/ijigsp.2015.12.02
BibTeX@article{Agarwal2015a, author = {Agarwal, Saurabh and Chand, Satish}, title = {Anti-forensics of JPEG Images Using Interpolation}, journal = {I.J. Image, Graphics and Signal Processing}, year = {2015}, volume = {12}, pages = {10--17}}
-
A Method for Detect Forgery from Images
Eng.& Tech.Journal, 2015, Vol. 33(2)
DOI: 10.1109/ceec.2014.6958558
BibTeX@article{Ahmed2015, author = {Ahmed, Hanaa Mohsin and Salim, Sabaa Rakan}, title = {A Method for Detect Forgery from Images}, journal = {Eng.& Tech.Journal}, year = {2015}, volume = {33}, number = {2}}
-
Method for Detect and Extract Forgery from Images
Al - Mansour Journal, 2015
BibTeX@article{Ahmed2015a, author = {Ahmed, Hanaa Mohsin and Salim, Sabaa Rakan}, title = {Method for Detect and Extract Forgery from Images}, journal = {Al - Mansour Journal}, year = {2015}}
-
The Value of Metadata in Digital Forensics
Proc. European Intelligence and Security Informatics Conf
2015, pp. 182
DOI: 10.1109/EISIC.2015.26
BibTeX@inproceedings{Alanazi2015, author = {Alanazi, F. and Jones, A.}, title = {The Value of Metadata in Digital Forensics}, booktitle = {Proc. European Intelligence and Security Informatics Conf}, year = {2015}, pages = {182}}
-
Detection Techniques of Digital Image Forgery by Using Images Metadata in Digital Investigation
Proc. of the Int. Academic Conf. on Law, Politics & Management
Al-Khanjari,, 2015
BibTeX@inproceedings{Alani2015, author = {Alani, A. and Al-Khanjari, Z.}, title = {Detection Techniques of Digital Image Forgery by Using Images Metadata in Digital Investigation}, booktitle = {Proc. of the Int. Academic Conf. on Law, Politics & Management}, journal = {Al-Khanjari,}, year = {2015}}
-
A Novel Image Filtering Approach for Sensor Fingerprint Estimation in Source Camera Identification
Proc. 12th IEEE Int Advanced Video and Signal Based Surveillance (AVSS) Conf
2015, pp. 1-5
DOI: 10.1109/AVSS.2015.7301808
BibTeX@inproceedings{Al-Ani2015, author = {Al-Ani, Mustafa and Khelifi, Fouad and Lawgaly, Ashref and Bouridane, Ahmed}, title = {A Novel Image Filtering Approach for Sensor Fingerprint Estimation in Source Camera Identification}, booktitle = {Proc. 12th IEEE Int Advanced Video and Signal Based Surveillance (AVSS) Conf}, year = {2015}, pages = {1--5}}
-
Cloning Localization Approach Using K-means Clustering and Support Vector Machine
Journal of Electronic Imaging, 2015, Vol. 24(4), pp. 043019
DOI: 10.1117/1.JEI.24.4.043019
BibTeX@article{Alfraih2015, author = {Alfraih, Areej S. and Briffa, Johann A. and Wesemeyer, Stephan}, title = {Cloning Localization Approach Using K-means Clustering and Support Vector Machine}, journal = {Journal of Electronic Imaging}, year = {2015}, volume = {24}, number = {4}, pages = {043019}}
-
Cloning Localization Based on Feature Extraction and K-means Clustering
Digital-Forensics and Watermarking, Springer, 2015
DOI: 10.1007/978-3-319-19321-2_31
BibTeX@article{Alfraih2015a, author = {Alfraih, Areej S. and Briffa, Johann A. and Wesemeyer, Stephan}, title = {Cloning Localization Based on Feature Extraction and K-means Clustering}, journal = {Digital-Forensics and Watermarking}, publisher = {Springer}, year = {2015}}
-
Enhanced Matching Method for Copy-move Forgery Detection by Means of Zernike Moments
Digital-Forensics and Watermarking, Springer, 2015
DOI: 10.1007/978-3-319-19321-2_37
BibTeX@article{Al-Qershi2015, author = {Al-Qershi, Osamah M. and Khoo, Bee Ee}, title = {Enhanced Matching Method for Copy-move Forgery Detection by Means of Zernike Moments}, journal = {Digital-Forensics and Watermarking}, publisher = {Springer}, year = {2015}}
-
Detection of Copy-move Forgery in Images Containing Flipped and Random-shaped Tampered Regions
Egyptian Computer Science Journal, ECS, 2015, Vol. 36(6), pp. 80-95
BibTeX@article{Alsanussi2015, author = {Alsanussi, Reem A. and Shamardan, Hossam Eldeen and Mostafa and Mostafa, Sami M.}, title = {Detection of Copy-move Forgery in Images Containing Flipped and Random-shaped Tampered Regions}, journal = {Egyptian Computer Science Journal, ECS}, year = {2015}, volume = {36}, number = {6}, pages = {80--95}}
-
A Feature-based Forensic Procedure for Splicing Forgeries Detection
Mathematical Problems in Engineering, 2015, Vol. 2015(653164)
DOI: 10.1155/2015/653164
BibTeX@article{Amerini2015b, author = {Amerini, Irene}, title = {A Feature-based Forensic Procedure for Splicing Forgeries Detection}, journal = {Mathematical Problems in Engineering}, year = {2015}, volume = {2015}, number = {653164}}
-
Acquisition Source Identification through a Blind Image Classification
Image Processing, IET, 2015, Vol. 9(4), pp. 329-337
DOI: 10.1049/iet-ipr.2014.0316
BibTeX@article{Amerini2015a, author = {Amerini, Irene and Becarelli, R. and Bertini, B. and Caldelli, R.}, title = {Acquisition Source Identification through a Blind Image Classification}, journal = {Image Processing, IET}, year = {2015}, volume = {9}, number = {4}, pages = {329--337}}
-
Detection of Manipulations on Printed Images to Address Crime Scene Analysis: A Case Study
Forensic Science International, 2015
DOI: 10.1016/j.forsciint.2015.03.020
BibTeX@article{Amerini2015, author = {Amerini, Irene and Caldelli, Roberto and Bimbo, Alberto Del and Fuccia, Andrea Di and Rizzo, Anna Paola and Saravo, Luigi}, title = {Detection of Manipulations on Printed Images to Address Crime Scene Analysis: A Case Study}, journal = {Forensic Science International}, year = {2015}}
-
On Forensic Use of Biometrics
Ho/Handbook of Digital Forensics of Multimedia Data and Devices
Wiley-Blackwell, 2015, pp. 270-304
DOI: 10.1002/9781118705773.ch7
BibTeX@incollection{Arbab-Zavar2015, author = {Arbab-Zavar, Banafshe and Wei, Xingjie and Bustard, John D. and Nixon, Mark S. and Li, Chang-Tsun}, title = {On Forensic Use of Biometrics}, booktitle = {Ho/Handbook of Digital Forensics of Multimedia Data and Devices}, publisher = {Wiley-Blackwell}, year = {2015}, pages = {270--304}}
-
Copy-move Forgery Detection by Matching Triangles of Keypoints
IEEE Transactions on Information Forensics and Security, 2015, Vol. 10(10), pp. 2084-2094
DOI: 10.1109/TIFS.2015.2445742
BibTeX@article{Ardizzone2015a, author = {Ardizzone, Edoardo and Bruno, Arcangelo Ranieri. and Mazzola, Giuseppe}, title = {Copy-move Forgery Detection by Matching Triangles of Keypoints}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2015}, volume = {10}, number = {10}, pages = {2084--2094}}
-
A Tool to Support the Creation of Datasets of Tampered Videos
Image Analysis and Processing — ICIAP 2015
Springer, 2015, pp. 665-675
DOI: 10.1007/978-3-319-23234-8_61
BibTeX@incollection{Ardizzone2015, author = {Ardizzone, Edoardo and Mazzola, Giuseppe}, title = {A Tool to Support the Creation of Datasets of Tampered Videos}, booktitle = {Image Analysis and Processing — ICIAP 2015}, publisher = {Springer}, year = {2015}, pages = {665--675}}
-
Image Forgery and Its Detection: A Survey
Proc. Int Innovations in Information, Embedded and Communication Systems (ICIIECS) Conf
2015, pp. 1-9
DOI: 10.1109/ICIIECS.2015.7193253
BibTeX@inproceedings{ArunAnoop2015, author = {Arun Anoop, M.}, title = {Image Forgery and Its Detection: A Survey}, booktitle = {Proc. Int Innovations in Information, Embedded and Communication Systems (ICIIECS) Conf}, year = {2015}, pages = {1--9}}
-
Adaptive Neuro Fuzzy Classifier Based Digital Image Forgery Detection Using Color Illumination
International Journal of Advanced Engineering and Global Technology, 2015, Vol. 3(2)
BibTeX@article{Arun2015, author = {Arun, Anusree and Vimala, A. and Joshya, Y. Camy and Murugan, C. Arul}, title = {Adaptive Neuro Fuzzy Classifier Based Digital Image Forgery Detection Using Color Illumination}, journal = {International Journal of Advanced Engineering and Global Technology}, year = {2015}, volume = {3}, number = {2}}
-
Blurred Image Splicing Localization by Exposing Blur Type Inconsistency
Information Forensics and Security, IEEE Transactions on, 2015, Vol. 10(99), pp. 999-1009
DOI: 10.1109/TIFS.2015.2394231
BibTeX@article{Bahrami2015, author = {Bahrami, K. and Kot, A. and Li, L. and Li, H.}, title = {Blurred Image Splicing Localization by Exposing Blur Type Inconsistency}, journal = {Information Forensics and Security, IEEE Transactions on}, year = {2015}, volume = {10}, number = {99}, pages = {999--1009}}
-
Image Splicing Localization Based on Blur Type Inconsistency
Proc. IEEE Int Circuits and Systems (ISCAS) Symp
Institute of Electrical & Electronics Engineers (IEEE), 2015, pp. 1042-1045
DOI: 10.1109/ISCAS.2015.7168815
BibTeX@inproceedings{Bahrami2015a, author = {Bahrami, K. and Kot, A. C.}, title = {Image Splicing Localization Based on Blur Type Inconsistency}, booktitle = {Proc. IEEE Int Circuits and Systems (ISCAS) Symp}, publisher = {Institute of Electrical & Electronics Engineers (IEEE)}, year = {2015}, pages = {1042--1045}}
-
Universal Counterforensics of Multiple Compressed JPEG Images
Digital-Forensics and Watermarking, Springer, 2015
DOI: 10.1007/978-3-319-19321-2_3
BibTeX@article{Barni2015, author = {Barni, Mauro and Fontani, Marco and Tondi, Benedetta}, title = {Universal Counterforensics of Multiple Compressed JPEG Images}, journal = {Digital-Forensics and Watermarking}, publisher = {Springer}, year = {2015}}
-
Analysis of Photo Response Non-uniformity (PRNU)
Journal of Homicide and Major Incident, 2015, Vol. 10(2), pp. 45-57
DOI: 10.1016/j.forsciint.2012.12.018
BibTeX@article{Bartle2015, author = {Bartle, Anna and Langley, Andy}, title = {Analysis of Photo Response Non-uniformity (PRNU)}, journal = {Journal of Homicide and Major Incident}, year = {2015}, volume = {10}, number = {2}, pages = {45--57}}
-
Sensor Fingerprint Identification through Composite Fingerprints and Group Testing
Information Forensics and Security, IEEE Transactions on, 2015, Vol. 10(3), pp. 597-612
DOI: 10.1109/TIFS.2014.2385634
BibTeX@article{Bayram2015, author = {Bayram, Sevinc and Sencar, H. T. and Memon, N.}, title = {Sensor Fingerprint Identification through Composite Fingerprints and Group Testing}, journal = {Information Forensics and Security, IEEE Transactions on}, year = {2015}, volume = {10}, number = {3}, pages = {597--612}}
-
Performance analysis of forgery detection of JPEG image compression
Proc. Online Int. Conf. Green Engineering and Technologies (IC-GET)
2015, pp. 1-12
DOI: 10.1109/GET.2015.7453773
BibTeX@inproceedings{Bennet2015, author = {Bennet, M. A. and Krishna, R. K. and Babu, G. S. and Jayavignesh, B. S.}, title = {Performance analysis of forgery detection of JPEG image compression}, booktitle = {Proc. Online Int. Conf. Green Engineering and Technologies (IC-GET)}, year = {2015}, pages = {1--12}}
-
Smartphone Verification and User Profiles Linking across Social Networks by Camera Fingerprinting
Digital Forensics and Cyber Crime, Springer, 2015
DOI: 10.1007/978-3-319-25512-5_12
BibTeX@article{Bertini2015b, author = {Bertini, Flavio and Sharma, Rajesh and Iannì, Andrea and Montesi, Danilo}, title = {Smartphone Verification and User Profiles Linking across Social Networks by Camera Fingerprinting}, journal = {Digital Forensics and Cyber Crime}, publisher = {Springer}, year = {2015}}
-
Smartphone Verification and User Profiles Linking across Social Networks by Camera Fingerprinting
James, J. & Breitinger, F. (ed.)
Digital Forensics and Cyber Crime
Springer International Publishing, 2015, Vol. 157, pp. 176-186
DOI: 10.1007/978-3-319-25512-5_12
BibTeX@incollection{Bertini2015, author = {Bertini, Flavio and Sharma, Rajesh and Iannì, Andrea and Montesi, Danilo}, title = {Smartphone Verification and User Profiles Linking across Social Networks by Camera Fingerprinting}, booktitle = {Digital Forensics and Cyber Crime}, publisher = {Springer International Publishing}, year = {2015}, volume = {157}, pages = {176--186}}
-
Profile Resolution across Multilayer Networks through Smartphone Camera Fingerprint
Proceedings of the 19th International Database Engineering &38, Applications Symposium
ACM, 2015, pp. 23-32
DOI: 10.1145/2790755.2790765
BibTeX@inproceedings{Bertini2015a, author = {Bertini, Flavio and Sharma, Rajesh and Iann\i, Andrea and Montesi, Danilo}, title = {Profile Resolution across Multilayer Networks through Smartphone Camera Fingerprint}, booktitle = {Proceedings of the 19th International Database Engineering &38, Applications Symposium}, publisher = {ACM}, year = {2015}, pages = {23--32}}
-
Over-segmentation Based Image Forgery Detection
Proc of the International Conference on Electronic Science and Automation Control (ESAC 2015)
2015
DOI: 10.2991/esac-15.2015.7
BibTeX@inproceedings{Bi2015, author = {Bi, Xiu-Li and Pun, Chi-Man and Yuan, Xiao-Chen}, title = {Over-segmentation Based Image Forgery Detection}, booktitle = {Proc of the International Conference on Electronic Science and Automation Control (ESAC 2015)}, year = {2015}}
-
Image and Video Processing History Recovery
Ho/Handbook of Digital Forensics of Multimedia Data and Devices
Wiley-Blackwell, 2015, pp. 572-611
DOI: 10.1002/9781118705773.ch15
BibTeX@incollection{Bianchi2015, author = {Bianchi, Tiziano and Piva, Alessandro}, title = {Image and Video Processing History Recovery}, booktitle = {Ho/Handbook of Digital Forensics of Multimedia Data and Devices}, publisher = {Wiley-Blackwell}, year = {2015}, pages = {572--611}}
-
Robust Technique of Localizing Blurred Image Splicing Based on Exposing Blur Type Inconsistency
Proc. Int. Conf. Applied and Theoretical Computing and Communication Technology (iCATccT)
2015, pp. 398-402
DOI: 10.1109/ICATCCT.2015.7456916
BibTeX@inproceedings{Binnar2015, author = {Binnar, P. and Mane, V.}, title = {Robust Technique of Localizing Blurred Image Splicing Based on Exposing Blur Type Inconsistency}, booktitle = {Proc. Int. Conf. Applied and Theoretical Computing and Communication Technology (iCATccT)}, year = {2015}, pages = {398--402}}
-
Fake As a Format of Modern Journalism: The Information Reliability Problem
Indian Journal of Science and Technology, 2015, Vol. 8(Special Issue 10)
DOI: 10.17485/ijst/2015/v8is(10)/84840
BibTeX@article{Blokhin2015, author = {Blokhin, Igor Nikolaevich and Ilchenko, Sergey Nikolaevich}, title = {Fake As a Format of Modern Journalism: The Information Reliability Problem}, journal = {Indian Journal of Science and Technology}, year = {2015}, volume = {8}, number = {Special Issue 10}}
-
Localization Overlaid Text Based on Noise Inconsistencies
Advanced Computational Intelligence: An International Journal, 2015
BibTeX@article{Boaz2015, author = {Boaz, Too Kipyego and Prabhakar, C. J.}, title = {Localization Overlaid Text Based on Noise Inconsistencies}, journal = {Advanced Computational Intelligence: An International Journal}, year = {2015}}
-
Digital Image Processing: An Algorithmic Introduction Using Java
Springer, 2015
DOI: 10.1007/978-1-84800-195-4_1
BibTeX@book{Burger2015, author = {Burger, Wilhelm and Burge, Mark J.}, title = {Digital Image Processing: An Algorithmic Introduction Using Java}, publisher = {Springer}, year = {2015}, edition = {3rd}}
-
SIFT Match Removal and Keypoint Preservation through Dominant Orientation Shift
Proc. of the 23rd European Signal Processing Conference (EUSIPCO) 2015
Institute of Electrical & Electronics Engineers (IEEE), 2015
DOI: 10.1109/eusipco.2015.7362747
BibTeX@inproceedings{Caldelli2015, author = {Caldelli, R. and Amerini, Irene and Costanzo, A.}, title = {SIFT Match Removal and Keypoint Preservation through Dominant Orientation Shift}, booktitle = {Proc. of the 23rd European Signal Processing Conference (EUSIPCO) 2015}, publisher = {Institute of Electrical & Electronics Engineers (IEEE)}, year = {2015}}
-
Detection of copy-move forgery in digital image using locality preserving projections
Proc. 8th Int. Congress Image and Signal Processing (CISP)
2015, pp. 599-603
DOI: 10.1109/CISP.2015.7407949
BibTeX@inproceedings{Cao2015c, author = {Cao, G. and Chen, Y. and Zong, G. and Chen, Y.}, title = {Detection of copy-move forgery in digital image using locality preserving projections}, booktitle = {Proc. 8th Int. Congress Image and Signal Processing (CISP)}, year = {2015}, pages = {599--603}}
-
On the Security of Image Manipulation Forensics
Ho, Y.-S., Sang, J., Ro, Y., Kim, J. & Wu, F. (ed.)
Advances in Multimedia Information Processing - PCM 2015
Advances in Multimedia Information Processing -- PCM 2015, Springer Science + Business Media, 2015, Vol. 9314, pp. 97-105
DOI: 10.1007/978-3-319-24075-6_10
BibTeX@incollection{Cao2015b, author = {Cao, Gang and Wang, Yongbin and Zhao, Yao and Ni, Rongrong and Lin, Chunyu}, title = {On the Security of Image Manipulation Forensics}, booktitle = {Advances in Multimedia Information Processing - PCM 2015}, journal = {Advances in Multimedia Information Processing -- PCM 2015}, publisher = {Springer Science + Business Media}, year = {2015}, volume = {9314}, pages = {97--105}}
-
Image Composite Authentication Using a Single Shadow Observation
Science China Information Sciences, Science China Press, 2015, pp. 1-13
DOI: 10.1007/s11432-015-5296-8
BibTeX@article{Cao2015a, author = {Cao, XiaoChun and Zhao, HanDong and Wang, Chuan and Zhang, Wei}, title = {Image Composite Authentication Using a Single Shadow Observation}, journal = {Science China Information Sciences}, publisher = {Science China Press}, year = {2015}, pages = {1--13}}
-
A New Anti-forensic Scheme--hiding the Single JPEG Compression Trace for Digital Image.
J Forensic Sci, College of Information Technical Science, Nankai University, No 94, Weijin Road, Tianjin, Nankai District, 300071, China., College of Information Technical Science, Nankai University, No 94, Weijin Road, Tianjin, Nankai District, 300071, China., 2015, Vol. 60(1), pp. 197-205
DOI: 10.1111/1556-4029.12618
BibTeX@article{Cao2015, author = {Cao, Yanjun and Gao, Tiegang and Sheng, Guorui and Fan, Li and Gao, Lin}, title = {A New Anti-forensic Scheme--hiding the Single JPEG Compression Trace for Digital Image.}, journal = {J Forensic Sci}, school = {College of Information Technical Science, Nankai University, No 94, Weijin Road, Tianjin, Nankai District, 300071, China.}, year = {2015}, volume = {60}, number = {1}, pages = {197--205}}
-
Forensics of High-quality JPEG Images with Color Subsampling
Information Forensics and Security (WIFS), 2015 IEEE International Workshop on
Institute of Electrical & Electronics Engineers (IEEE), 2015, pp. 1-6
DOI: 10.1109/WIFS.2015.7368556
BibTeX@inproceedings{Carnein2015, author = {Carnein, M. and Schöttle, P. and Böhme, R.}, title = {Forensics of High-quality JPEG Images with Color Subsampling}, booktitle = {Information Forensics and Security (WIFS), 2015 IEEE International Workshop on}, publisher = {Institute of Electrical & Electronics Engineers (IEEE)}, year = {2015}, pages = {1--6}}
-
Forensics of high-quality JPEG images with color subsampling
Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)
2015, pp. 1-6
DOI: 10.1109/WIFS.2015.7368556
BibTeX@inproceedings{Carnein2015a, author = {Carnein, M. and Schöttle, P. and Böhme, R.}, title = {Forensics of high-quality JPEG images with color subsampling}, booktitle = {Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)}, year = {2015}, pages = {1--6}}
-
Illuminant-based Transformed Spaces for Image Forensics
IEEE Transactions on Information Forensics and Security, 2015, Vol. PP(99), pp. 1
DOI: 10.1109/TIFS.2015.2506548
BibTeX@article{Carvalho2015a, author = {Carvalho, T. and Faria, F. A. and Pedrini, H. and Torres, R. S. and Rocha, A.}, title = {Illuminant-based Transformed Spaces for Image Forensics}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2015}, volume = {PP}, number = {99}, pages = {1}}
-
Exposing Photo Manipulation from User-guided 3D Lighting Analysis
IS&T/SPIE Electronic Imaging
Proc. SPIE, 2015, Vol. 9409, pp. 940902-940902-10
DOI: 10.1117/12.2075544
BibTeX@inproceedings{Carvalho2015, author = {Carvalho, Tiago and Farid, Hany and Kee, Eric}, title = {Exposing Photo Manipulation from User-guided 3D Lighting Analysis}, booktitle = {IS&T/SPIE Electronic Imaging}, journal = {Proc. SPIE}, year = {2015}, volume = {9409}, pages = {940902-940902-10}}
-
A PNU-based Technique to Detect Forged Regions in Digital Images
Battiato, S., Blanc-Talon, J., Gallo, G., Philips, W., Popescu, D. & Scheunders, P. (ed.)
Advanced Concepts for Intelligent Vision Systems
Advanced Concepts for Intelligent Vision Systems, Springer, 2015, Vol. 9386, pp. 486-498
DOI: 10.1007/978-3-319-25903-1_42
BibTeX@article{Cattaneo2015, author = {Cattaneo, Giuseppe and Ferraro Petrillo, Umberto and Roscigno, Gianluca and Fusco, Carmine}, title = {A PNU-based Technique to Detect Forged Regions in Digital Images}, booktitle = {Advanced Concepts for Intelligent Vision Systems}, journal = {Advanced Concepts for Intelligent Vision Systems}, publisher = {Springer}, year = {2015}, volume = {9386}, pages = {486--498}}
-
Revealing Image Forgery through Image Manipulation Detection
Proc. Global Conf. Communication Technologies (GCCT)
2015, pp. 723-727
DOI: 10.1109/GCCT.2015.7342759
BibTeX@inproceedings{Charpe2015, author = {Charpe, J. and Bhattacharya, A.}, title = {Revealing Image Forgery through Image Manipulation Detection}, booktitle = {Proc. Global Conf. Communication Technologies (GCCT)}, year = {2015}, pages = {723--727}}
-
Fast Computation of Sliding Discrete Tchebichef Moments and Its Application in Duplicated Regions Detection
IEEE Transactions on Signal Processing, Institute of Electrical and Electronics Engineers (IEEE), 2015, Vol. 63(20), pp. 5424-5436
DOI: 10.1109/TSP.2015.2451107
BibTeX@article{Chen2015b, author = {Chen, B. and Coatrieux, G. and Wu, J. and Dong, Z. and Coatrieux, J. and Shu, H.}, title = {Fast Computation of Sliding Discrete Tchebichef Moments and Its Application in Duplicated Regions Detection}, journal = {IEEE Transactions on Signal Processing}, publisher = {Institute of Electrical and Electronics Engineers (IEEE)}, year = {2015}, volume = {63}, number = {20}, pages = {5424--5436}}
-
Camera Model Identification Framework Using an Ensemble of Demosaicing Features
Information Forensics and Security (WIFS), 2015 IEEE International Workshop on
2015, pp. 1-6
DOI: 10.1109/WIFS.2015.7368573
BibTeX@inproceedings{Chen2015a, author = {Chen, Chen and Stamm, M. C.}, title = {Camera Model Identification Framework Using an Ensemble of Demosaicing Features}, booktitle = {Information Forensics and Security (WIFS), 2015 IEEE International Workshop on}, year = {2015}, pages = {1--6}}
-
Median Filtering Forensics Based on Convolutional Neural Networks
Signal Processing Letters, IEEE, 2015, Vol. 22(11), pp. 1849-1853
DOI: 10.1109/LSP.2015.2438008
BibTeX@article{Chen2015, author = {Chen, J. and Kang, X. and Liu, Y. and Wang, Z. J.}, title = {Median Filtering Forensics Based on Convolutional Neural Networks}, journal = {Signal Processing Letters, IEEE}, year = {2015}, volume = {22}, number = {11}, pages = {1849--1853}}
-
Images, Videos, and Bigdata
Mathematical Problems in Data Science
Springer, 2015
DOI: 10.1007/978-3-319-25127-1_5
BibTeX@incollection{Chen2015c, author = {Chen, Li M.}, title = {Images, Videos, and Bigdata}, booktitle = {Mathematical Problems in Data Science}, publisher = {Springer}, year = {2015}}
-
Automatic Detection of Object-based Forgery in Advanced Video
IEEE Transactions on Circuits and Systems for Video Technology, Institute of Electrical and Electronics Engineers (IEEE), 2015, Vol. PP(11), pp. 2138-2151
DOI: 10.1109/TCSVT.2015.2473436
BibTeX@article{Chen2015d, author = {Chen, Shengda and Tan, Shunquan and Li, Bin and Huang, Jiwu}, title = {Automatic Detection of Object-based Forgery in Advanced Video}, journal = {IEEE Transactions on Circuits and Systems for Video Technology}, publisher = {Institute of Electrical and Electronics Engineers (IEEE)}, year = {2015}, volume = {PP}, number = {11}, pages = {2138--2151}}
-
Digital Wavelet Transform Based Image Forgery Detection Using Post -processing
Proc of SDPS 2015, 2015
BibTeX@article{Chiluka2015, author = {Chiluka, Praveen K. and Das, Sunil R. and Assaf, Mansour H. and Biswas, Satyendra N. and Morton, Scott and Petriu, Emil M. and Groza, Voicu}, title = {Digital Wavelet Transform Based Image Forgery Detection Using Post -processing}, journal = {Proc of SDPS 2015}, year = {2015}}
-
Who’s behind the Camera? Identifying the Authorship of a Photograph
arXiv, 2015
BibTeX@article{Christopher2015, author = {Christopher and Kovashka, Thomas Adriana}, title = {Who’s behind the Camera? Identifying the Authorship of a Photograph}, journal = {arXiv}, year = {2015}}
-
Fundamental Limits in Multimedia Forensics and Anti-forensics
Faculty of the Graduate School of the University of Maryland, Department of Electrical and Computer Engineering University of Maryland, 2015
BibTeX@phdthesis{Chu2015a, author = {Chu, X.}, title = {Fundamental Limits in Multimedia Forensics and Anti-forensics}, school = {Faculty of the Graduate School of the University of Maryland}, year = {2015}}
-
Information Theoretical Limit of Media Forensics: The Forensicability
IEEE Transactions on Information Forensics and Security, 2015, Vol. PP(99), pp. 1
DOI: 10.1109/TIFS.2015.2510820
BibTeX@article{Chu2015e, author = {Chu, X. and Chen, Y. and Stamm, M. and Liu, K.}, title = {Information Theoretical Limit of Media Forensics: The Forensicability}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2015}, volume = {PP}, number = {99}, pages = {1}}
-
On Antiforensic Concealability with Rate-distortion Tradeoff
Image Processing, IEEE Transactions on, 2015, Vol. 24(3), pp. 1087-1100
DOI: 10.1109/TIP.2015.2390137
BibTeX@article{Chu2015, author = {Chu, X. and Stamm, M. C. and Chen, Y. and Liu, K. J. R.}, title = {On Antiforensic Concealability with Rate-distortion Tradeoff}, journal = {Image Processing, IEEE Transactions on}, year = {2015}, volume = {24}, number = {3}, pages = {1087--1100}}
-
Video Spatio-Temporal Filtering Based on Cameras and Target Objects Trajectories -- Videosurveillance Forensic Framework
Proc. 10th Int Availability, Reliability and Security (ARES) Conf
2015, pp. 611-617
DOI: 10.1109/ARES.2015.102
BibTeX@inproceedings{Codreanu2015, author = {Codreanu, D. and Peninou, A. and Sedes, F.}, title = {Video Spatio-Temporal Filtering Based on Cameras and Target Objects Trajectories -- Videosurveillance Forensic Framework}, booktitle = {Proc. 10th Int Availability, Reliability and Security (ARES) Conf}, year = {2015}, pages = {611--617}}
-
Forensic Detection of Processing Operator Chains: Recovering the History of Filtered JPEG Images
Information Forensics and Security, IEEE Transactions on, 2015(99)
DOI: 10.1109/TIFS.2015.2424195
BibTeX@article{Conotter2015, author = {Conotter, V. and Comesana, P. and Perez-Gonzalez, F.}, title = {Forensic Detection of Processing Operator Chains: Recovering the History of Filtered JPEG Images}, journal = {Information Forensics and Security, IEEE Transactions on}, year = {2015}, number = {99}}
-
Forensic Detection of Processing Operator Chains: Recovering the History of Filtered JPEG Images
IEEE Transactions on Information Forensics and Security, 2015, Vol. 10(11), pp. 2257-2269
DOI: 10.1109/TIFS.2015.2424195
BibTeX@article{Conotter2015a, author = {Conotter, V. and Comesaña, P. and Pérez-González, F.}, title = {Forensic Detection of Processing Operator Chains: Recovering the History of Filtered JPEG Images}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2015}, volume = {10}, number = {11}, pages = {2257--2269}}
-
Richtlinien Zur «erklärung Der Pflichten Und Rechte Der Journalistinnen Und Journalisten»
2015
BibTeX@electronic{SchweizerPresserat2015, author = {suisse de la presse Consiglio svizzero della stampa and Conseil, Schweizer Presserat}, title = {Richtlinien Zur «erklärung Der Pflichten Und Rechte Der Journalistinnen Und Journalisten»}, year = {2015}}
-
Unsupervised Classification of Mobile Device Images
ICIT 2015 The 7th International Conference on Information Technology
2015
DOI: 10.15849/icit.2015.0014
BibTeX@inproceedings{Corripio2015, author = {Corripio, Jocelin Rosales and Orozco, Ana Lucila Sandoval and Villalba, Luis Javier García}, title = {Unsupervised Classification of Mobile Device Images}, booktitle = {ICIT 2015 The 7th International Conference on Information Technology}, year = {2015}}
-
New Technique of Forensic Analysis for Digital Cameras in Mobile Devices
Proc of the 7th International Conference on Information Technology ICIT
2015
DOI: 10.15849/icit.2015.0105
BibTeX@inproceedings{Corripio2015a, author = {Corripio, Jocelin Rosales and Orozco, Ana Lucila Sandoval and Villalba, Luis Javier García}, title = {New Technique of Forensic Analysis for Digital Cameras in Mobile Devices}, booktitle = {Proc of the 7th International Conference on Information Technology ICIT}, year = {2015}}
-
Splicebuster: A New Blind Image Splicing Detector
Information Forensics and Security (WIFS), 2015 IEEE International Workshop on
2015, pp. 1-6
DOI: 10.1109/WIFS.2015.7368565
BibTeX@inproceedings{Cozzolino2015, author = {Cozzolino, D. and Poggi, G. and Verdoliva, L.}, title = {Splicebuster: A New Blind Image Splicing Detector}, booktitle = {Information Forensics and Security (WIFS), 2015 IEEE International Workshop on}, year = {2015}, pages = {1--6}}
-
Efficient Dense-field Copy-move Forgery Detection
IEEE Transactions on Information Forensics and Security, 2015
DOI: 10.1109/TIFS.2015.2455334
BibTeX@article{Cozzolino2015a, author = {Cozzolino, D. and Poggi, G. and Verdoliva, L.}, title = {Efficient Dense-field Copy-move Forgery Detection}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2015}}
-
Video Forgery Detection and Localization Based on 3D Patchmatch
Proc. IEEE Int Multimedia & Expo Workshops (ICMEW) Conf
2015, pp. 1-6
DOI: 10.1109/ICMEW.2015.7169805
BibTeX@inproceedings{DAmiano2015, author = {D'Amiano, L. and Cozzolino, D. and Poggi, G. and Verdoliva, L.}, title = {Video Forgery Detection and Localization Based on 3D Patchmatch}, booktitle = {Proc. IEEE Int Multimedia & Expo Workshops (ICMEW) Conf}, year = {2015}, pages = {1--6}}
-
Video Forgery Detection and Localization Based on 3D Patchmatch
Proc. IEEE Int Multimedia & Expo Workshops (ICMEW) Conf, 2015
DOI: 10.1109/icmew.2015.7169805
BibTeX@article{D’Amiano2015, author = {D’Amiano, L. and Cozzolino, D. and Poggi, G. and Verdoliva, L.}, title = {Video Forgery Detection and Localization Based on 3D Patchmatch}, journal = {Proc. IEEE Int Multimedia & Expo Workshops (ICMEW) Conf}, year = {2015}}
-
Image Validation by Demosaicing
International Journal of Advanced Research in Computer and Communication Engineering, 2015, Vol. 4(4), pp. 118-121
DOI: 10.17148/ijarcce.2015.4329
BibTeX@article{Dangale2015, author = {Dangale, P. and Amage, P. and Ubale, S. and Jadhav, D. and Gaikwad, G. M.}, title = {Image Validation by Demosaicing}, journal = {International Journal of Advanced Research in Computer and Communication Engineering}, year = {2015}, volume = {4}, number = {4}, pages = {118--121}}
-
Raise: A Raw Images Dataset for Digital Image Forensics
Proceedings of the 6th ACM Multimedia Systems Conference
ACM, 2015, pp. 219-224
DOI: 10.1145/2713168.2713194
BibTeX@inproceedings{Dang-Nguyen2015, author = {Dang-Nguyen, Duc-Tien and Pasquini, Cecilia and Conotter, Valentina and Boato, Giulia}, title = {Raise: A Raw Images Dataset for Digital Image Forensics}, booktitle = {Proceedings of the 6th ACM Multimedia Systems Conference}, publisher = {ACM}, year = {2015}, pages = {219--224}}
-
Image Authentication Using LBP-based Perceptual Image Hashing
Journal of AI and Data Mining, 2015
BibTeX@article{Davarzani2015, author = {Davarzani, R. and Mozaffari, S. and Kh.Yaghmaie}, title = {Image Authentication Using LBP-based Perceptual Image Hashing}, journal = {Journal of AI and Data Mining}, year = {2015}}
-
Second-order Statistics Analysis to Cope with Contrast Enhancement Counter-forensics
Signal Processing Letters, IEEE, 2015, Vol. 22(8), pp. 1132-1136
DOI: 10.1109/LSP.2015.2389241
BibTeX@article{DeRosa2015, author = {De Rosa, A. and Fontani, M. and Massai, M. and Piva, A. and Barni, Mauro}, title = {Second-order Statistics Analysis to Cope with Contrast Enhancement Counter-forensics}, journal = {Signal Processing Letters, IEEE}, year = {2015}, volume = {22}, number = {8}, pages = {1132--1136}}
-
A Forensic Analysis of the CASIA-iris V4 Database
Inst f. Angewandte Informatik an der Paris-Lodron-Universität Salzburg, Inst f. Angewandte Informatik an der Paris-Lodron-Universität Salzburg, 2015
BibTeX@mastersthesis{Debiasi2015b, author = {Debiasi, Luca}, title = {A Forensic Analysis of the CASIA-iris V4 Database}, school = {Inst f. Angewandte Informatik an der Paris-Lodron-Universität Salzburg}, year = {2015}}
-
Blind Biometric Source Sensor Recognition Using Advanced PRNU Fingerprints
Proc. of the 23rd European Signal Processing Conference (EUSIPCO) 2015
2015
DOI: 10.1109/eusipco.2015.7362489
BibTeX@inproceedings{Debiasi2015, author = {Debiasi, Luca and Uhl, Andreas}, title = {Blind Biometric Source Sensor Recognition Using Advanced PRNU Fingerprints}, booktitle = {Proc. of the 23rd European Signal Processing Conference (EUSIPCO) 2015}, year = {2015}}
-
Techniques for a Forensic Analysis of the CASia-IRis V4 Database
Proc. Int Biometrics and Forensics (IWBF) Workshop
2015, pp. 1-6
DOI: 10.1109/IWBF.2015.7110236
BibTeX@inproceedings{Debiasi2015a, author = {Debiasi, L. and Uhl, A.}, title = {Techniques for a Forensic Analysis of the CASia-IRis V4 Database}, booktitle = {Proc. Int Biometrics and Forensics (IWBF) Workshop}, year = {2015}, pages = {1--6}}
-
A Bayesian Classifier Approach for Glcm Based Image Forgery Detection
International Journal of Engineering Research & Technology, 2015, Vol. 4(2)
BibTeX@article{Dhevana2015, author = {Dhevana, S. and Jayasri, C.}, title = {A Bayesian Classifier Approach for Glcm Based Image Forgery Detection}, journal = {International Journal of Engineering Research & Technology}, year = {2015}, volume = {4}, number = {2}}
-
Edge Perpendicular Binary Coding for USM Sharpening Detection
IEEE Signal Processing Letters, 2015, Vol. 22(3), pp. 327-331
DOI: 10.1109/LSP.2014.2359033
BibTeX@article{Ding2015, author = {Ding, F. and Zhu, G. and Yang, J. and Xie, J. and Shi, Y. Q.}, title = {Edge Perpendicular Binary Coding for USM Sharpening Detection}, journal = {IEEE Signal Processing Letters}, year = {2015}, volume = {22}, number = {3}, pages = {327--331}}
-
Paint-doctored JPEG Image Forensics Based on Blocking Artifacts
Proc. Int Computing and Communication (IEMCON) Conf. and Workshop
2015, pp. 1-5
DOI: 10.1109/IEMCON.2015.7344427
BibTeX@inproceedings{Ebrahimi2015, author = {Ebrahimi, Ali and Ibrahim, Subariah and Ghazizadeh, Eghbal and Alizadeh, Mojtaba}, title = {Paint-doctored JPEG Image Forensics Based on Blocking Artifacts}, booktitle = {Proc. Int Computing and Communication (IEMCON) Conf. and Workshop}, year = {2015}, pages = {1--5}}
-
Paint-doctored JPEG image forensics based on blocking artifacts
Proc. Int. Conf. and Workshop Computing and Communication (IEMCON)
2015, pp. 1-5
DOI: 10.1109/IEMCON.2015.7344427
BibTeX@inproceedings{Ebrahimi2015a, author = {Ebrahimi, A. and Ibrahim, S. and Ghazizadeh, E. and Alizadeh, M.}, title = {Paint-doctored JPEG image forensics based on blocking artifacts}, booktitle = {Proc. Int. Conf. and Workshop Computing and Communication (IEMCON)}, year = {2015}, pages = {1--5}}
-
Image Forgery Detection Using Multidimensional Spectral Hashing Based Polar Cosine Transform
Indian Journal of Science and Technology, 2015, Vol. 8(S9), pp. 128-139
DOI: 10.17485/ijst/2015/v8is9/54344
BibTeX@article{Elwin2015, author = {Elwin, J. Granty Regina and Kousalya, G.}, title = {Image Forgery Detection Using Multidimensional Spectral Hashing Based Polar Cosine Transform}, journal = {Indian Journal of Science and Technology}, year = {2015}, volume = {8}, number = {S9}, pages = {128--139}}
-
PCET Based Copy-move Forgery Detection in Images under Geometric Transforms
Multimedia Tools and Applications, Springer US, 2015, pp. 1-15
DOI: 10.1007/s11042-015-2872-2
BibTeX@article{Emam2015a, author = {Emam, Mahmoud and Han, Qi and Niu, Xiamu}, title = {PCET Based Copy-move Forgery Detection in Images under Geometric Transforms}, journal = {Multimedia Tools and Applications}, publisher = {Springer US}, year = {2015}, pages = {1--15}}
-
A Passive Technique for Detecting Copy-move Forgery with Rotation Based on Polar Complex Exponential Transform
Proc. SPIE 9631, Seventh International Conference on Digital Image Processing (ICDIP 2015)
Proc. SPIE, 2015, Vol. 9631, pp. 963104-963104-6
DOI: 10.1117/12.2196997
BibTeX@inproceedings{Emam2015, author = {Emam, Mahmoud and Han, Qi and Yu, Liyang and Zhang, Ye and Niu, Xiamu}, title = {A Passive Technique for Detecting Copy-move Forgery with Rotation Based on Polar Complex Exponential Transform}, booktitle = {Proc. SPIE 9631, Seventh International Conference on Digital Image Processing (ICDIP 2015)}, journal = {Proc. SPIE}, year = {2015}, volume = {9631}, pages = {963104-963104-6}}
-
Integer DCT Convergence for JPEG-75 Forensics for Images
Journal of Information Assurance and Security, 2015, Vol. 10, pp. 80-88
BibTeX@article{Fahmy2015a, author = {Fahmy, Gamal}, title = {Integer DCT Convergence for JPEG-75 Forensics for Images}, journal = {Journal of Information Assurance and Security}, year = {2015}, volume = {10}, pages = {80--88}}
-
Phase based detection of JPEG counter forensics
Proc. and Systems (ICECS) 2015 IEEE Int. Conf. Electronics, Circuits
2015, pp. 37-40
DOI: 10.1109/ICECS.2015.7440243
BibTeX@inproceedings{Fahmy2015b, author = {Fahmy, G. and Alqallaf, A. and Wurtz, R.}, title = {Phase based detection of JPEG counter forensics}, booktitle = {Proc. and Systems (ICECS) 2015 IEEE Int. Conf. Electronics, Circuits}, year = {2015}, pages = {37--40}}
-
An Efficient Clustering Technique for Cameras Identification Using Sensor Pattern Noise
Proc. Int Systems, Signals and Image Processing (IWSSIP) Conf
2015, pp. 249-252
DOI: 10.1109/IWSSIP.2015.7314223
BibTeX@inproceedings{Fahmy2015, author = {Fahmy, O. M.}, title = {An Efficient Clustering Technique for Cameras Identification Using Sensor Pattern Noise}, booktitle = {Proc. Int Systems, Signals and Image Processing (IWSSIP) Conf}, year = {2015}, pages = {249--252}}
-
Image Tampering Detection Using Noise Histogram Features
Proc. IEEE Int Digital Signal Processing (DSP) Conf
2015, pp. 1044-1048
DOI: 10.1109/ICDSP.2015.7252037
BibTeX@inproceedings{Fan2015b, author = {Fan, Jiayuan and Chen, Tao and Cao, Jiuwen}, title = {Image Tampering Detection Using Noise Histogram Features}, booktitle = {Proc. IEEE Int Digital Signal Processing (DSP) Conf}, year = {2015}, pages = {1044--1048}}
-
Towards Digital Image Anti-Forensics via Image RestorationVers l’anti-criminalistique en images numériques via la restauration d’images
Université Grenoble Alpes, Université Grenoble Alpes, 2015
BibTeX@phdthesis{Fan2015a, author = {Fan, Wei}, title = {Towards Digital Image Anti-Forensics via Image RestorationVers l’anti-criminalistique en images numériques via la restauration d’images}, school = {Université Grenoble Alpes}, year = {2015}}
-
General-purpose Image Forensics Using Patch Likelihood under Image Statistical Models
Proc. IEEE Int Information Forensics and Security (WIFS) Workshop
Institute of Electrical & Electronics Engineers (IEEE), 2015, pp. 1-6
DOI: 10.1109/WIFS.2015.7368606
BibTeX@inproceedings{Fan2015e, author = {Fan, W. and Wang, K. and Cayre, F.}, title = {General-purpose Image Forensics Using Patch Likelihood under Image Statistical Models}, booktitle = {Proc. IEEE Int Information Forensics and Security (WIFS) Workshop}, publisher = {Institute of Electrical & Electronics Engineers (IEEE)}, year = {2015}, pages = {1--6}}
-
General-purpose image forensics using patch likelihood under image statistical models
Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)
2015, pp. 1-6
DOI: 10.1109/WIFS.2015.7368606
BibTeX@inproceedings{Fan2015f, author = {Fan, W. and Wang, K. and Cayre, F.}, title = {General-purpose image forensics using patch likelihood under image statistical models}, booktitle = {Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)}, year = {2015}, pages = {1--6}}
-
Median Filtered Image Quality Enhancement and Anti-forensics Via Variational Deconvolution
Information Forensics and Security, IEEE Transactions on, 2015, Vol. 10(99), pp. 1076-1091
DOI: 10.1109/TIFS.2015.2398362
BibTeX@article{Fan2015, author = {Fan, W. and Wang, K. and Cayre, F. and Xiong, Z.}, title = {Median Filtered Image Quality Enhancement and Anti-forensics Via Variational Deconvolution}, journal = {Information Forensics and Security, IEEE Transactions on}, year = {2015}, volume = {10}, number = {99}, pages = {1076--1091}}
-
Median Filtered Image Quality Enhancement and Anti-Forensics via Variational Deconvolution
#IEEE_J_IFS#, 2015, Vol. 10(5), pp. 1076-1091
DOI: 10.1109/TIFS.2015.2398362
BibTeX@article{Fan2015c, author = {Fan, W. and Wang, K. and Cayre, F. and Xiong, Z.}, title = {Median Filtered Image Quality Enhancement and Anti-Forensics via Variational Deconvolution}, journal = {#IEEE_J_IFS#}, year = {2015}, volume = {10}, number = {5}, pages = {1076--1091}}
-
Image Splicing Detection with Local Illumination Estimation
Proc. IEEE Int Image Processing (ICIP) Conf
2015, pp. 2940-2944
DOI: 10.1109/ICIP.2015.7351341
BibTeX@inproceedings{Fan2015d, author = {Fan, Yu and Carre, Philippe and Fernandez-Maloigne, Christine}, title = {Image Splicing Detection with Local Illumination Estimation}, booktitle = {Proc. IEEE Int Image Processing (ICIP) Conf}, year = {2015}, pages = {2940--2944}}
-
Chapter 65. Detecting Image Authenticity Based on Lambert Illumination Model and Shadows
Network Security and Communication Engineering
Network Security and Communication Engineering, Informa UK Limited, 2015, pp. 313-316
DOI: 10.1201/b18660-70
BibTeX@incollection{Fang2015, author = {Fang, S. . J. . and Ge, H. . Y. .}, title = {Chapter 65. Detecting Image Authenticity Based on Lambert Illumination Model and Shadows}, booktitle = {Network Security and Communication Engineering}, journal = {Network Security and Communication Engineering}, publisher = {Informa UK Limited}, year = {2015}, pages = {313--316}}
-
On Blind Source Camera Identification
Battiato, S., Blanc-Talon, J., Gallo, G., Philips, W., Popescu, D. & Scheunders, P. (ed.)
Advanced Concepts for Intelligent Vision Systems
Advanced Concepts for Intelligent Vision Systems, Springer International Publishing, 2015, Vol. 9386, pp. 464-473
DOI: 10.1007/978-3-319-25903-1_40
BibTeX@incollection{Farinella2015, author = {Farinella, Giovanni Maria and Giuffrida, M. V. and Digiacomo, V. and Battiato, Sebastiano}, title = {On Blind Source Camera Identification}, booktitle = {Advanced Concepts for Intelligent Vision Systems}, journal = {Advanced Concepts for Intelligent Vision Systems}, publisher = {Springer International Publishing}, year = {2015}, volume = {9386}, pages = {464--473}}
-
Unsupervised Fusion for Forgery Localization Exploiting Background Information
Proc. IEEE Int Multimedia & Expo Workshops (ICMEW) Conf
2015, pp. 1-6
DOI: 10.1109/ICMEW.2015.7169770
BibTeX@inproceedings{Ferrara2015, author = {Ferrara, P. and Fontani, M. and Bianchi, T. and De Rosa, A. and Piva, A. and Barni, Mauro}, title = {Unsupervised Fusion for Forgery Localization Exploiting Background Information}, booktitle = {Proc. IEEE Int Multimedia & Expo Workshops (ICMEW) Conf}, year = {2015}, pages = {1--6}}
-
Laser Printer Attribution: Exploring New Features and Beyond
Forensic Science International, Elsevier BV, 2015, Vol. 247(0), pp. 105-125
DOI: 10.1016/j.forsciint.2014.11.030
BibTeX@article{Ferreira2015, author = {Ferreira, Anselmo and Navarro, Luiz C. and Pinheiro, Giuliano and dos Santos, Jefersson A. and Rocha, Anderson}, title = {Laser Printer Attribution: Exploring New Features and Beyond}, journal = {Forensic Science International}, publisher = {Elsevier BV}, year = {2015}, volume = {247}, number = {0}, pages = {105--125}}
-
A Novel Image Splicing Forensic Algorithm Based on Generalized DCT Coefficient-pair Histogram
Tan, T., Ruan, Q., Wang, S., Ma, H. & Di, K. (ed.)
Advances in Image and Graphics Technologies
Springer Berlin Heidelberg, 2015, Vol. 525, pp. 63-71
DOI: 10.1007/978-3-662-47791-5_8
BibTeX@incollection{Fusheng2015, author = {Fusheng, Yang and Gao, Tiegang}, title = {A Novel Image Splicing Forensic Algorithm Based on Generalized DCT Coefficient-pair Histogram}, booktitle = {Advances in Image and Graphics Technologies}, publisher = {Springer Berlin Heidelberg}, year = {2015}, volume = {525}, pages = {63--71}}
-
A Hybrid Approach for Camera-model Detection
International Journal of Security and Its Applications, 2015, Vol. 9(8)
DOI: 10.14257/ijsia.2015.9.8.24
BibTeX@article{Gao2015, author = {Gao, Shang}, title = {A Hybrid Approach for Camera-model Detection}, journal = {International Journal of Security and Its Applications}, year = {2015}, volume = {9}, number = {8}}
-
A Neural Algorithm of Artistic Style
arXiv, 2015
BibTeX@article{Gatys2015, author = {Gatys, Leon A. and Ecker, Alexander S. and Bethge, Matthias}, title = {A Neural Algorithm of Artistic Style}, journal = {arXiv}, year = {2015}}
-
Detecting Image Forgery Using Linear Constraints Based on Shading and Shadows
Proceedings of the International Conference on Informative and Cybernetics for Computational Social Systems (ICCSS) 2015
2015, pp. 116-121
DOI: 10.1109/iccss.2015.7281160
BibTeX@inproceedings{Ge2015, author = {Ge, Huayong and Fang, Shujuan}, title = {Detecting Image Forgery Using Linear Constraints Based on Shading and Shadows}, booktitle = {Proceedings of the International Conference on Informative and Cybernetics for Computational Social Systems (ICCSS) 2015}, year = {2015}, pages = {116--121}}
-
Algorithms for Detection of Plain Copy-move Regions in Digital Images
Pattern Recognition and Image Analysis, Pleiades Publishing, 2015, Vol. 25(3), pp. 423-429
DOI: 10.1134/S1054661815030074
BibTeX@article{Glumov2015, author = {Glumov, N. I. and Kuznetsov, A. V. and Myasnikov, V. V.}, title = {Algorithms for Detection of Plain Copy-move Regions in Digital Images}, journal = {Pattern Recognition and Image Analysis}, publisher = {Pleiades Publishing}, year = {2015}, volume = {25}, number = {3}, pages = {423--429}}
-
The Effect of Image Preprocessing Techniques and Varying JPEG Quality on the Identifiability of Digital Image Splicing Forgery
Arizona State University, Arizona State University, 2015
BibTeX@mastersthesis{Gubrud2015, author = {Gubrud, Aaron}, title = {The Effect of Image Preprocessing Techniques and Varying JPEG Quality on the Identifiability of Digital Image Splicing Forgery}, school = {Arizona State University}, year = {2015}}
-
Video Authentication in Digital Forensic
Proc. Int Futuristic Trends Computational Analysis and Knowledge Management (ABLAZE) Conf
2015, pp. 659-663
DOI: 10.1109/ABLAZE.2015.7154945
BibTeX@inproceedings{Gupta2015, author = {Gupta, A. and Gupta, S. and Mehra, A.}, title = {Video Authentication in Digital Forensic}, booktitle = {Proc. Int Futuristic Trends Computational Analysis and Knowledge Management (ABLAZE) Conf}, year = {2015}, pages = {659--663}}
-
Rotation invariant copy move forgery detection method
Proc. 9th Int. Conf. Electrical and Electronics Engineering (ELECO)
2015, pp. 202-206
DOI: 10.1109/ELECO.2015.7394451
BibTeX@inproceedings{Guerbuez2015, author = {Gürbüz, E. and Ulutaş, G. and Ulutaş, M.}, title = {Rotation invariant copy move forgery detection method}, booktitle = {Proc. 9th Int. Conf. Electrical and Electronics Engineering (ELECO)}, year = {2015}, pages = {202--206}}
-
Image - Splicing Forgery Detection Based on Improved LBP and K-nearest Neighbors Algorithm
Electronics Information & Planning, 2015
BibTeX@article{Hakimi2015, author = {Hakimi, Fahime and Hariri, Mahdi}, title = {Image - Splicing Forgery Detection Based on Improved LBP and K-nearest Neighbors Algorithm}, journal = {Electronics Information & Planning}, year = {2015}}
-
Image Splicing Forgery Detection Using Local Binary Pattern and Discrete Wavelet Transform
Proc. 2nd Int. Conf. Knowledge-Based Engineering and Innovation (KBEI)
2015, pp. 1074-1077
DOI: 10.1109/KBEI.2015.7436195
BibTeX@inproceedings{Hakimi2015a, author = {Hakimi, F. and Hariri, M. and GharehBaghi, F.}, title = {Image Splicing Forgery Detection Using Local Binary Pattern and Discrete Wavelet Transform}, booktitle = {Proc. 2nd Int. Conf. Knowledge-Based Engineering and Innovation (KBEI)}, year = {2015}, pages = {1074--1077}}
-
Tamper detection based on the consistency of quantization error caused by multiple JPEG compression
Proc. IEEE 16th Int. Conf. Communication Technology (ICCT)
2015, pp. 314-319
DOI: 10.1109/ICCT.2015.7399850
BibTeX@inproceedings{Han2015, author = {Han, Hongli and Li, Yezhou and Niu, Shaozhang and Gong, Zhenzhen}, title = {Tamper detection based on the consistency of quantization error caused by multiple JPEG compression}, booktitle = {Proc. IEEE 16th Int. Conf. Communication Technology (ICCT)}, year = {2015}, pages = {314--319}}
-
Passive Aproaches for Detecting Image Tampering: A Review
Jurnal Teknologi, 2015, Vol. 73(2), pp. 31-36
DOI: 10.11113/jt.v73.4189
BibTeX@article{Hashem2015, author = {Hashem, Fatma Salman and Sulong, Ghazali}, title = {Passive Aproaches for Detecting Image Tampering: A Review}, journal = {Jurnal Teknologi}, year = {2015}, volume = {73}, number = {2}, pages = {31--36}}
-
Fast and Robust Copy-move Forgery Detection Using SURF and Wavelets
2015
BibTeX@electronic{Hashmi2015a, author = {Hashmi, M. F. and Hambarde, A. and Keskar, A.}, title = {Fast and Robust Copy-move Forgery Detection Using SURF and Wavelets}, year = {2015}}
-
Block and Fuzzy Techniques Based Forensic Tool for Detection Classification of Image Forgery
J Electr Eng Technol., 2015, pp. 709-718
DOI: 10.5370/jeet.2015.10.4.1886
BibTeX@article{Hashmi2015, author = {Hashmi, Mohammad Farukh and Keskar, Avinash G.}, title = {Block and Fuzzy Techniques Based Forensic Tool for Detection Classification of Image Forgery}, journal = {J Electr Eng Technol.}, year = {2015}, pages = {709--718}}
-
Camera-based Image Forgery Detection
Ho, A. T. S. & Li, S. (ed.)
Handbook of Digital Forensics of Multimedia Data and Devices
Wiley-IEEE Press, 2015, pp. 704-
DOI: 10.1002/9781118705773.ch14
BibTeX@inbook{Hel-Or2015, author = {Hel-Or, Hagit and Yerushalmy, Ido}, title = {Camera-based Image Forgery Detection}, booktitle = {Handbook of Digital Forensics of Multimedia Data and Devices}, publisher = {Wiley-IEEE Press}, year = {2015}, pages = {704-}}
-
Digital Image Forensics with Statistical Analysis
Handbook of Digital Forensics of Multimedia Data and Devices
Wiley-IEEE Press, 2015, pp. 704-
DOI: 10.1002/9781118705773.ch13
BibTeX@inbook{Ho2015, author = {Ho, Anthony T. S. and Li, Shujun}, title = {Digital Image Forensics with Statistical Analysis}, booktitle = {Handbook of Digital Forensics of Multimedia Data and Devices}, publisher = {Wiley-IEEE Press}, year = {2015}, pages = {704-}}
-
Printer and Scanner Forensics
Handbook of Digital Forensics of Multimedia Data and Devices
Wiley-IEEE Press, 2015, pp. 704-
DOI: 10.1002/9781118705773.ch10
BibTeX@inbook{Ho2015a, author = {Ho, Anthony T. S. and Li, Shujun}, title = {Printer and Scanner Forensics}, booktitle = {Handbook of Digital Forensics of Multimedia Data and Devices}, publisher = {Wiley-IEEE Press}, year = {2015}, pages = {704-}}
-
Digital Image Forensics with Statistical Analysis
Handbook of Digital Forensics of Multimedia Data and Devices
Wiley-IEEE Press, 2015, pp. 704-
DOI: 10.1002/9781118705773.ch13
BibTeX@inbook{Ho2015b, author = {Ho, Anthony T. S. and Li, Shujun}, title = {Digital Image Forensics with Statistical Analysis}, booktitle = {Handbook of Digital Forensics of Multimedia Data and Devices}, publisher = {Wiley-IEEE Press}, year = {2015}, pages = {704-}}
-
Multimedia Analytics for Image Collection Forensics
Handbook of Digital Forensics of Multimedia Data and Devices
Wiley-IEEE Press, 2015, pp. 704-
DOI: 10.1002/9781118705773.ch8
BibTeX@inbook{Ho2015c, author = {Ho, Anthony T. S. and Li, Shujun}, title = {Multimedia Analytics for Image Collection Forensics}, booktitle = {Handbook of Digital Forensics of Multimedia Data and Devices}, publisher = {Wiley-IEEE Press}, year = {2015}, pages = {704-}}
-
Photogrammetry in Digital Forensics
Ho, A. T. S. & Li, S. (ed.)
Handbook of Digital Forensics of Multimedia Data and Devices
Wiley-IEEE Press, 2015, pp. 704-
DOI: 10.1002/9781118705773.ch5
BibTeX@inbook{Hoogeboom2015, author = {Hoogeboom, Bart and Alberink, Ivo and Vrijdag, Derk}, title = {Photogrammetry in Digital Forensics}, booktitle = {Handbook of Digital Forensics of Multimedia Data and Devices}, publisher = {Wiley-IEEE Press}, year = {2015}, pages = {704-}}
-
Expose Spliced Photographic Basing on Boundary and Noise Features
IEICE TRANSACTIONS on Information and Systems, 2015, Vol. E98-D(7)
DOI: 10.1587/transinf.2014edl8232
BibTeX@article{Hou2015, author = {Hou, Jun and Cheng, Yan}, title = {Expose Spliced Photographic Basing on Boundary and Noise Features}, journal = {IEICE TRANSACTIONS on Information and Systems}, year = {2015}, volume = {E98-D}, number = {7}}
-
An Efficient Detection Algorithm for Copy-move Forgery
Proc. 10th Asia Joint Conf. Information Security (AsiaJCIS)
2015, pp. 33-36
DOI: 10.1109/AsiaJCIS.2015.16
BibTeX@inproceedings{Hsu2015, author = {Hsu, Chen-Ming and Lee, Jen-Chun and Chen, Wei-Kuei}, title = {An Efficient Detection Algorithm for Copy-move Forgery}, booktitle = {Proc. 10th Asia Joint Conf. Information Security (AsiaJCIS)}, year = {2015}, pages = {33--36}}
-
Effective Composite Image Detection Method Based on Feature Inconsistency of Image Components
Digital Signal Processing, 2015, Vol. 39(0), pp. 50-62
DOI: 10.1016/j.dsp.2015.01.006
BibTeX@article{Hu2015, author = {Hu, Wu-Chih and Dai, Jing-Siou and Jian, Jhih-Syuan}, title = {Effective Composite Image Detection Method Based on Feature Inconsistency of Image Components}, journal = {Digital Signal Processing}, year = {2015}, volume = {39}, number = {0}, pages = {50--62}}
-
Robustness of Copy-move Forgery Detection under High JPEG Compression Artifacts
Multimedia Tools and Applications, Springer, 2015, pp. 1
DOI: 10.1007/s11042-015-3152-x
BibTeX@article{Huang2015a, author = {Huang, Deng-Yuan and Huang, Ching-Ning and Hu, Wu-Chih and Chou, Chih-Hung}, title = {Robustness of Copy-move Forgery Detection under High JPEG Compression Artifacts}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2015}, pages = {1}}
-
Camera Model Identification with Unknown Models
IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers (IEEE), 2015, Vol. 10(12), pp. 2692-2704
DOI: 10.1109/TIFS.2015.2474836
BibTeX@article{Huang2015, author = {Huang, Y. and Zhang, J. and Huang, H.}, title = {Camera Model Identification with Unknown Models}, journal = {IEEE Transactions on Information Forensics and Security}, publisher = {Institute of Electrical and Electronics Engineers (IEEE)}, year = {2015}, volume = {10}, number = {12}, pages = {2692--2704}}
-
A Survey on Image Forgery Detection Techniques
Computing & Communication Technologies - Research, Innovation, and Vision for the Future (RIVF), 2015 IEEE RIVF International Conference on
2015, pp. 71-76
DOI: 10.1109/RIVF.2015.7049877
BibTeX@inproceedings{Huynh2015, author = {Huynh, Tu K. and Huynh, Khoa V. and Le-Tien, Thuong and Nguyen, Sy C.}, title = {A Survey on Image Forgery Detection Techniques}, booktitle = {Computing & Communication Technologies - Research, Innovation, and Vision for the Future (RIVF), 2015 IEEE RIVF International Conference on}, year = {2015}, pages = {71--76}}
-
The efficiency of applying DWT and feature extraction into copy-move images detection
Proc. Int. Conf. Advanced Technologies for Communications (ATC)
2015, pp. 44-49
DOI: 10.1109/ATC.2015.7388368
BibTeX@inproceedings{Huynh-Kha2015, author = {Huynh-Kha, T. and Le-Tien, T. and Viet-Uyen, S. Ha and Huynh-Van, K.}, title = {The efficiency of applying DWT and feature extraction into copy-move images detection}, booktitle = {Proc. Int. Conf. Advanced Technologies for Communications (ATC)}, year = {2015}, pages = {44--49}}
-
Fractional Differential Texture Descriptors Based on the Machado Entropy for Image Splicing Detection
Entropy, 2015, Vol. 17(7), pp. 4775
DOI: 10.3390/e17074775
BibTeX@article{Ibrahim2015, author = {Ibrahim, Rabha W. and Moghaddasi, Zahra and Jalab, Hamid A. and Noor, Rafidah Md}, title = {Fractional Differential Texture Descriptors Based on the Machado Entropy for Image Splicing Detection}, journal = {Entropy}, year = {2015}, volume = {17}, number = {7}, pages = {4775}}
-
Copy-move Forgery Detection Based on Harris Corner Points and BRISK
Proceedings of the Third International Symposium on Women in Computing and Informatics
ACM, 2015, pp. 394-399
DOI: 10.1145/2791405.2791453
BibTeX@inproceedings{Isaac2015, author = {Isaac, Meera Mary and Wilscy, M.}, title = {Copy-move Forgery Detection Based on Harris Corner Points and BRISK}, booktitle = {Proceedings of the Third International Symposium on Women in Computing and Informatics}, publisher = {ACM}, year = {2015}, pages = {394--399}}
-
Image Forgery Detection Based on Gabor Wavelets and Local Phase Quantization
Procedia Computer Science, 2015, Vol. 58, pp. 76-83
DOI: 10.1016/j.procs.2015.08.016
BibTeX@article{Isaac2015a, author = {Isaac, Meera Mary and Wilscy, M.}, title = {Image Forgery Detection Based on Gabor Wavelets and Local Phase Quantization}, journal = {Procedia Computer Science}, year = {2015}, volume = {58}, pages = {76--83}}
-
Image Splicing Detection Based on General Perspective Constraints
Information Forensics and Security (WIFS), 2015 IEEE International Workshop on
2015, pp. 1-6
DOI: 10.1109/WIFS.2015.7368598
BibTeX@inproceedings{Iuliani2015, author = {Iuliani, M. and Fabbri, G. and Piva, A.}, title = {Image Splicing Detection Based on General Perspective Constraints}, booktitle = {Information Forensics and Security (WIFS), 2015 IEEE International Workshop on}, year = {2015}, pages = {1--6}}
-
Blind Identification of Image Manipulation Type Using Mixed Statistical Moments
Journal of Electronic Imaging, 2015, Vol. 24(1), pp. 013029
DOI: 10.1117/1.JEI.24.1.013029
BibTeX@article{Jeong2015, author = {Jeong, Bo Gyu and Moon, Yong Ho and Eom, Il Kyu}, title = {Blind Identification of Image Manipulation Type Using Mixed Statistical Moments}, journal = {Journal of Electronic Imaging}, year = {2015}, volume = {24}, number = {1}, pages = {013029}}
-
Tampering Detection in Digital Video - a Review of Temporal Fingerprints Based Techniques
Proc. 2nd Int Computing for Sustainable Global Development (INDIACom) Conf
2015, pp. 1121-1124
BibTeX@inproceedings{Joshi2015, author = {Joshi, V. and Jain, S.}, title = {Tampering Detection in Digital Video - a Review of Temporal Fingerprints Based Techniques}, booktitle = {Proc. 2nd Int Computing for Sustainable Global Development (INDIACom) Conf}, year = {2015}, pages = {1121--1124}}
-
Automated Image Splicing Detection from Noise Estimation in Raw Images
Proc. th Int Imaging for Crime Prevention and Detection (ICDP-15) Conf
2015, pp. 1-6
DOI: 10.1049/ic.2015.0111
BibTeX@inproceedings{Julliand2015, author = {Julliand, T. and Nozick, V. and Talbot, H.}, title = {Automated Image Splicing Detection from Noise Estimation in Raw Images}, booktitle = {Proc. th Int Imaging for Crime Prevention and Detection (ICDP-15) Conf}, year = {2015}, pages = {1--6}}
-
Image Noise and Digital Image Forensics
IWDW
2015
DOI: 10.1007/978-3-319-31960-5_1
BibTeX@inproceedings{Julliand2015a, author = {Julliand, Thibaut and Nozick, Vincent and Talbot, Hugues}, title = {Image Noise and Digital Image Forensics}, booktitle = {IWDW}, year = {2015}}
-
Recaptured Video Detection Based on Sensor Pattern Noise
EURASIP Journal on Image and Video Processing, Springer, 2015, Vol. 2015(1), pp. 1
DOI: 10.1186/s13640-015-0096-z
BibTeX@article{Jung2015, author = {Jung, Dae-Jin and Hyun, Dai-Kyung and Lee, Heung-Kyu}, title = {Recaptured Video Detection Based on Sensor Pattern Noise}, journal = {EURASIP Journal on Image and Video Processing}, publisher = {Springer}, year = {2015}, volume = {2015}, number = {1}, pages = {1}}
-
A Preliminary Study on Identifying Sensors from Iris Images
2015 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)
Institute of Electrical & Electronics Engineers (IEEE), 2015
DOI: 10.1109/CVPRW.2015.7301319
BibTeX@inproceedings{Kalka2015, author = {Kalka, Nathan and Bartlow, Nick and Cukic, Bojan and Ross, Arun}, title = {A Preliminary Study on Identifying Sensors from Iris Images}, booktitle = {2015 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)}, publisher = {Institute of Electrical & Electronics Engineers (IEEE)}, year = {2015}}
-
Forensics and Counter Anti-forensics of Video Inter-frame Forgery
Multimedia Tools and Applications, 2015, pp. 1-21
DOI: 10.1007/s11042-015-2762-7
BibTeX@article{Kang2015a, author = {Kang, Xiangui and Liu, Jingxian and Liu, Hongmei and Wang, Z. Jane}, title = {Forensics and Counter Anti-forensics of Video Inter-frame Forgery}, journal = {Multimedia Tools and Applications}, year = {2015}, pages = {1--21}}
-
Countering Median Filtering Anti-forensics and Performance Evaluation of Forensics against Intentional Attacks
Proc. IEEE China Summit and Int Signal and Information Processing (ChinaSIP) Conf
2015, pp. 483-487
DOI: 10.1109/ChinaSIP.2015.7230449
BibTeX@inproceedings{Kang2015, author = {Kang, Xiangui and Qin, Tengfei and Zeng, Hui}, title = {Countering Median Filtering Anti-forensics and Performance Evaluation of Forensics against Intentional Attacks}, booktitle = {Proc. IEEE China Summit and Int Signal and Information Processing (ChinaSIP) Conf}, year = {2015}, pages = {483--487}}
-
Adaptive Photo-response Non-uniformity Noise Removal against Image Source Attribution
Digital Investigation, 2015, Vol. 12(0), pp. 66-76
DOI: 10.1016/j.diin.2015.01.017
BibTeX@article{Karakuecuek2015, author = {Karaküçük, Ahmet and Dirik, Ahmet Emir}, title = {Adaptive Photo-response Non-uniformity Noise Removal against Image Source Attribution}, journal = {Digital Investigation}, year = {2015}, volume = {12}, number = {0}, pages = {66--76}}
-
Recent Advances in Counter PRNU Based Source Attribution and Beyond
IS&T/SPIE Electronic Imaging
Proc. SPIE, 2015, Vol. 9409, pp. 94090N-94090N-11
DOI: 10.1117/12.2182458
BibTeX@inproceedings{Karakuecuek2015a, author = {Karaküçük, Ahmet and Dirik, Ahmet E. and Sencar, Hüsrev T. and Memon, Nasir D.}, title = {Recent Advances in Counter PRNU Based Source Attribution and Beyond}, booktitle = {IS&T/SPIE Electronic Imaging}, journal = {Proc. SPIE}, year = {2015}, volume = {9409}, pages = {94090N-94090N-11}}
-
Detection of Splicing Forgery Using Wavelet Decomposition
Proc. Int Computing, Communication Automation (ICCCA) Conf
2015, pp. 843-848
DOI: 10.1109/CCAA.2015.7148492
BibTeX@inproceedings{Kashyap2015, author = {Kashyap, A. and Suresh, B. and Agrawal, M. and Gupta, H. and Joshi, S. D.}, title = {Detection of Splicing Forgery Using Wavelet Decomposition}, booktitle = {Proc. Int Computing, Communication Automation (ICCCA) Conf}, year = {2015}, pages = {843--848}}
-
Fingerprint Recognition under the Influence of Image Sensor Ageing
Department of Computer Sciences, University of Salzburg, Department of Computer Sciences, University of Salzburg, 2015
DOI: 10.1109/iwbf.2016.7449683
BibTeX@techreport{Kauba2015, author = {Kauba, Christof and Uhl, Andreas}, title = {Fingerprint Recognition under the Influence of Image Sensor Ageing}, school = {Department of Computer Sciences, University of Salzburg}, year = {2015}}
-
Passive Image Forensic Method to Detect Resampling Forgery in Digital Images
IOSR Journal of Computer Engineering (IOSR-JCE), 2015, Vol. 17(3), pp. 47-52
BibTeX@article{Kaur2015, author = {Kaur, Amaninder and Malhotra, Sheenam}, title = {Passive Image Forensic Method to Detect Resampling Forgery in Digital Images}, journal = {IOSR Journal of Computer Engineering (IOSR-JCE)}, year = {2015}, volume = {17}, number = {3}, pages = {47--52}}
-
Evaluation of image forensic cues for fusion
Proc. Third Int. Conf. Image Information Processing (ICIIP)
2015, pp. 301-305
DOI: 10.1109/ICIIP.2015.7414785
BibTeX@inproceedings{Kaur2015a, author = {Kaur, M. and Gupta, S.}, title = {Evaluation of image forensic cues for fusion}, booktitle = {Proc. Third Int. Conf. Image Information Processing (ICIIP)}, year = {2015}, pages = {301--305}}
-
On Image Forgery Detection Using Two Dimensional Discrete Cosine Transform and Statistical Moments
Procedia Computer Science, 2015, Vol. 70, pp. 130-136
DOI: 10.1016/j.procs.2015.10.058
BibTeX@article{Kaushik2015, author = {Kaushik, Rajeev and Bajaj, Rakesh Kumar and Mathew, Jimson}, title = {On Image Forgery Detection Using Two Dimensional Discrete Cosine Transform and Statistical Moments}, journal = {Procedia Computer Science}, year = {2015}, volume = {70}, pages = {130--136}}
-
An Efficient Blind Detection Algorithm of Median Filtered Image
International Journal of Hybrid Information Technology, 2015, Vol. 8(1), pp. 181-192
DOI: 10.14257/ijhit.2015.8.1.16
BibTeX@article{Ke2015, author = {Ke}, title = {An Efficient Blind Detection Algorithm of Median Filtered Image}, journal = {International Journal of Hybrid Information Technology}, year = {2015}, volume = {8}, number = {1}, pages = {181--192}}
-
Improving Sensor Noise Analysis for CT-scanner Identification
Proc. of the 23rd European Signal Processing Conference (EUSIPCO) 2015
2015
DOI: 10.1109/eusipco.2015.7362817
BibTeX@inproceedings{Kharboutly2015, author = {Kharboutly, Anas and , William Puech and Subsol, Gerard and Hoa, Denis}, title = {Improving Sensor Noise Analysis for CT-scanner Identification}, booktitle = {Proc. of the 23rd European Signal Processing Conference (EUSIPCO) 2015}, year = {2015}}
-
Advanced Sensor Noise Analysis for CT-scanner Identification from Its 3D Images
Image Processing Theory, Tools and Applications (IPTA), 2015 International Conference on
2015, pp. 325-330
DOI: 10.1109/IPTA.2015.7367158
BibTeX@inproceedings{Kharboutly2015a, author = {Kharboutly, A. and Puech, W. and Subsol, G. and Hoa, D.}, title = {Advanced Sensor Noise Analysis for CT-scanner Identification from Its 3D Images}, booktitle = {Image Processing Theory, Tools and Applications (IPTA), 2015 International Conference on}, year = {2015}, pages = {325--330}}
-
Robust Image Forgery Localization and Recognition in Copy-move Using Bag of Features and SVM
Communication, Information & Computing Technology (ICCICT), 2015 International Conference on
2015, pp. 1-5
DOI: 10.1109/ICCICT.2015.7045718
BibTeX@inproceedings{Khuspe2015, author = {Khuspe, Kalyani and Mane, Vanita}, title = {Robust Image Forgery Localization and Recognition in Copy-move Using Bag of Features and SVM}, booktitle = {Communication, Information & Computing Technology (ICCICT), 2015 International Conference on}, year = {2015}, pages = {1--5}}
-
Thinking beyond the Block: Block Matching for Copy--move Forgery Detection Revisited
Alattar, A. M., Memon, N. D. & Heitzenrater, C. D. (ed.)
IS&T/SPIE Electronic Imaging
2015, Vol. 9409, pp. 940903-940903-12
DOI: 10.1117/12.2082789
BibTeX@inproceedings{Kirchner2015, author = {Kirchner, Matthias}, title = {Thinking beyond the Block: Block Matching for Copy--move Forgery Detection Revisited}, booktitle = {IS&T/SPIE Electronic Imaging}, year = {2015}, volume = {9409}, pages = {940903-940903-12}}
-
Forgery of Copy Move Image Detection Technique by Integrating Block and Feature Based Method
International Journal of Advanced Research in Computer and Communication Engineering, 2015, Vol. 4(1)
DOI: 10.17148/ijarcce.2015.4129
BibTeX@article{Kohale2015, author = {Kohale, Tushant A. and Chede, S. D. and Lakhe, P. R.}, title = {Forgery of Copy Move Image Detection Technique by Integrating Block and Feature Based Method}, journal = {International Journal of Advanced Research in Computer and Communication Engineering}, year = {2015}, volume = {4}, number = {1}}
-
Dictionary Learning and Sparse Coding for Third-order Super-symmetric Tensors
arxiv, 2015
BibTeX@article{Koniuz2015, author = {Koniusz, Piotr and Cherian, Anoop}, title = {Dictionary Learning and Sparse Coding for Third-order Super-symmetric Tensors}, journal = {arxiv}, year = {2015}}
-
Exposing Image Forgery through Contrast Enhancement
International Journal of Science and Research (IJSR), 2015, Vol. 4(12), pp. 1044-1048
DOI: 10.21275/v4i12.nov152185
BibTeX@article{Koshy2015, author = {Koshy, Priya Ann and Nair, Kavitha N.}, title = {Exposing Image Forgery through Contrast Enhancement}, journal = {International Journal of Science and Research (IJSR)}, year = {2015}, volume = {4}, number = {12}, pages = {1044--1048}}
-
Good Colour Maps: How to Design Them
arXiv:1509.03700, 2015
BibTeX@article{Kovesi2015, author = {Kovesi, Peter}, title = {Good Colour Maps: How to Design Them}, journal = {arXiv:1509.03700}, year = {2015}}
-
Considerations on the Benchmarking of Media Forensics
Proc. 23rd European Signal Processing Conf. (EUSIPCO)
2015, pp. 61-65
DOI: 10.1109/EUSIPCO.2015.7362345
BibTeX@inproceedings{Kraetzer2015, author = {Kraetzer, C. and Dittmann, J.}, title = {Considerations on the Benchmarking of Media Forensics}, booktitle = {Proc. 23rd European Signal Processing Conf. (EUSIPCO)}, year = {2015}, pages = {61--65}}
-
Microphone Forensics
Ho/Handbook of Digital Forensics of Multimedia Data and Devices
Wiley-Blackwell, 2015, pp. 411-441
DOI: 10.1002/9781118705773.ch11
BibTeX@incollection{Kraetzer2015a, author = {Kraetzer, Christian and Dittmann, Jana}, title = {Microphone Forensics}, booktitle = {Ho/Handbook of Digital Forensics of Multimedia Data and Devices}, publisher = {Wiley-Blackwell}, year = {2015}, pages = {411--441}}
-
Source Camera Identification Using GLCM
Proc. IEEE Int. Advance Computing Conf. (IACC)
2015, pp. 1242-1246
DOI: 10.1109/IADCC.2015.7154900
BibTeX@inproceedings{Kulkarni2015, author = {Kulkarni, Nilambari and Mane, Vanita}, title = {Source Camera Identification Using GLCM}, booktitle = {Proc. IEEE Int. Advance Computing Conf. (IACC)}, year = {2015}, pages = {1242--1246}}
-
Copy Move Forgery Detection in Contrast Variant Environment Using Binary DCT Vectors
I.J. Image, Graphics and Signal Processing, 2015(6), pp. 38-44
DOI: 10.5815/ijigsp.2015.06.05
BibTeX@article{Kumar2015, author = {Kumar, Sunil and Desai, J. V. and Mukherjee, Shaktidev}, title = {Copy Move Forgery Detection in Contrast Variant Environment Using Binary DCT Vectors}, journal = {I.J. Image, Graphics and Signal Processing}, year = {2015}, number = {6}, pages = {38--44}}
-
Forensic Detection of Median Filtering in Digital Images Using the Coefficient-pair Histogram of DCT Value and LBP Pattern
Huang, D.-S., Bevilacqua, V. & Premaratne, P. (ed.)
Intelligent Computing Theories and Methodologies
Springer International Publishing, 2015, Vol. 9225, pp. 421-432
DOI: 10.1007/978-3-319-22180-9_41
BibTeX@incollection{Lai2015, author = {Lai, Yun-Ni and Gao, Tie-Gang and Li, Jia-Xin and Sheng, Guo-Rui}, title = {Forensic Detection of Median Filtering in Digital Images Using the Coefficient-pair Histogram of DCT Value and LBP Pattern}, booktitle = {Intelligent Computing Theories and Methodologies}, publisher = {Springer International Publishing}, year = {2015}, volume = {9225}, pages = {421--432}}
-
Use of Sensor Noise for Source Identification
Proc. Int Noise and Fluctuations (ICNF) Conf
Institute of Electrical and Electronics Engineers (IEEE), 2015, pp. 1-6
DOI: 10.1109/ICNF.2015.7288548
BibTeX@inproceedings{Lau2015, author = {Lau, Kwun-fung and Law, Ngai-fong and Siu, Wan-chi}, title = {Use of Sensor Noise for Source Identification}, booktitle = {Proc. Int Noise and Fluctuations (ICNF) Conf}, publisher = {Institute of Electrical and Electronics Engineers (IEEE)}, year = {2015}, pages = {1--6}}
-
Copy-move Image Forgery Detection Based on Gabor Magnitude
Journal of Visual Communication and Image Representation, 2015, Vol. 31, pp. 320-334
DOI: 10.1016/j.jvcir.2015.07.007
BibTeX@article{Lee2015b, author = {Lee, Jen-Chun}, title = {Copy-move Image Forgery Detection Based on Gabor Magnitude}, journal = {Journal of Visual Communication and Image Representation}, year = {2015}, volume = {31}, pages = {320--334}}
-
Detection of Copy--move Image Forgery Using Histogram of Orientated Gradients
Information Sciences, 2015(0), pp. -
DOI: 10.1016/j.ins.2015.03.009
BibTeX@article{Lee2015, author = {Lee, Jen-Chun and Chang, Chien-Ping and Chen, Wei-Kuei}, title = {Detection of Copy--move Image Forgery Using Histogram of Orientated Gradients}, journal = {Information Sciences}, year = {2015}, number = {0}, pages = {-}}
-
Digital Camera Identification Using Sensor Pattern Noise
Proceedings of the Second International Conference on Information Security and Digital Forensics (ISDF2015)
2015, pp. 30-35
BibTeX@inproceedings{Lee2015a, author = {Lee, Sang-Hyeong and Oh, Tae-Woo and Kim, Kibom and Lee, Hae-Yeoun}, title = {Digital Camera Identification Using Sensor Pattern Noise}, booktitle = {Proceedings of the Second International Conference on Information Security and Digital Forensics (ISDF2015)}, year = {2015}, pages = {30--35}}
-
Forensic Collection and Analysis of Thumbnails in Android
Proc. IEEE Trustcom/BigDataSE/ISPA
2015, Vol. 1, pp. 1059-1066
DOI: 10.1109/Trustcom.2015.483
BibTeX@inproceedings{Leom2015, author = {Leom, M. D. and DOrazio, C. J. and Deegan, G. and Choo, K. K. R.}, title = {Forensic Collection and Analysis of Thumbnails in Android}, booktitle = {Proc. IEEE Trustcom/BigDataSE/ISPA}, year = {2015}, volume = {1}, pages = {1059--1066}}
-
Metadata protection scheme for JPEG privacy security using hierarchical and group-based models
Proc. 5th Int. Conf. Information Communication Technology and Accessibility (ICTA)
2015, pp. 1-5
DOI: 10.1109/ICTA.2015.7426905
BibTeX@inproceedings{Lepsoy2015, author = {Lepsoy, J. and Kim, S. and Atnafu, D. and Kim, H. J.}, title = {Metadata protection scheme for JPEG privacy security using hierarchical and group-based models}, booktitle = {Proc. 5th Int. Conf. Information Communication Technology and Accessibility (ICTA)}, year = {2015}, pages = {1--5}}
-
Zernike Moment-based Approach for Detecting Duplicated Image Regions by a Modified Method to Reduce Geometrical and Numerical Errors
Gervasi, O., Murgante, B., Misra, S., Gavrilova, M. L., Rocha, A. M. A. C., Torre, C., Taniar, D. & Apduhan, B. O. (ed.)
Computational Science and Its Applications -- ICCSA 2015
Springer International Publishing, 2015, Vol. 9158, pp. 458-475
DOI: 10.1007/978-3-319-21410-8_36
BibTeX@incollection{Le-Tien2015, author = {Le-Tien, Thuong and Huynh-Ngoc, Tan and Huynh-Kha, Tu and Marie, Luong}, title = {Zernike Moment-based Approach for Detecting Duplicated Image Regions by a Modified Method to Reduce Geometrical and Numerical Errors}, booktitle = {Computational Science and Its Applications -- ICCSA 2015}, publisher = {Springer International Publishing}, year = {2015}, volume = {9158}, pages = {458--475}}
-
Statistical Model of JPEG Noises and Its Application in Quantization Step Estimation
IEEE Transactions on Image Processing, 2015, Vol. 24(5), pp. 1471-1484
DOI: 10.1109/TIP.2015.2405477
BibTeX@article{Li2015g, author = {Li, B. and Ng, T. T. and Li, X. and Tan, S. and Huang, J.}, title = {Statistical Model of JPEG Noises and Its Application in Quantization Step Estimation}, journal = {IEEE Transactions on Image Processing}, year = {2015}, volume = {24}, number = {5}, pages = {1471--1484}}
-
Revealing the Trace of High-quality JPEG Compression through Quantization Noise Analysis
Information Forensics and Security, IEEE Transactions on, 2015, Vol. 10(3), pp. 558-573
DOI: 10.1109/TIFS.2015.2389148
BibTeX@article{Li2015a, author = {Li, Bin and Ng, Tian-Tsong and Li, Xiaolong and Tan, Shunquan and Huang, Jiwu}, title = {Revealing the Trace of High-quality JPEG Compression through Quantization Noise Analysis}, journal = {Information Forensics and Security, IEEE Transactions on}, year = {2015}, volume = {10}, number = {3}, pages = {558--573}}
-
Image Splicing Detection Based on Markov Features in Qdct Domain
Huang, D.-S., Jo, K.-H. & Hussain, A. (ed.)
Intelligent Computing Theories and Methodologies
Advanced Intelligent Computing Theories and Applications, Springer International Publishing, 2015, Vol. 9226, pp. 170-176
DOI: 10.1007/978-3-319-22186-1_17
BibTeX@incollection{Li2015c, author = {Li, Ce and Ma, Qiang and Xiao, Limei and Li, Ming and Zhang, Aihua}, title = {Image Splicing Detection Based on Markov Features in Qdct Domain}, booktitle = {Intelligent Computing Theories and Methodologies}, journal = {Advanced Intelligent Computing Theories and Applications}, publisher = {Springer International Publishing}, year = {2015}, volume = {9226}, pages = {170--176}}
-
Segmentation-based Image Copy-move Forgery Detection Scheme
Information Forensics and Security, IEEE Transactions on, 2015, Vol. 10(3), pp. 507-518
DOI: 10.1109/TIFS.2014.2381872
BibTeX@article{Li2015, author = {Li, Jian and Li, Xiaolong and Yang, Bin and Sun, Xingming}, title = {Segmentation-based Image Copy-move Forgery Detection Scheme}, journal = {Information Forensics and Security, IEEE Transactions on}, year = {2015}, volume = {10}, number = {3}, pages = {507--518}}
-
Detection of Seam Carving and Contrast Enhancement Operation Chain
Proc. Int. Conf. Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP)
2015, pp. 235-238
DOI: 10.1109/IIH-MSP.2015.89
BibTeX@inproceedings{Li2015i, author = {Li, J. and Zhao, Y. and Ni, R.}, title = {Detection of Seam Carving and Contrast Enhancement Operation Chain}, booktitle = {Proc. Int. Conf. Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP)}, year = {2015}, pages = {235--238}}
-
Random Subspace Method for Source Camera Identification
Proc. IEEE 25th Int. Workshop Machine Learning for Signal Processing (MLSP)
2015, pp. 1-5
DOI: 10.1109/MLSP.2015.7324339
BibTeX@inproceedings{Li2015f, author = {Li, R. and Kotropoulos, C. and Li, C. T. and Guan, Y.}, title = {Random Subspace Method for Source Camera Identification}, booktitle = {Proc. IEEE 25th Int. Workshop Machine Learning for Signal Processing (MLSP)}, year = {2015}, pages = {1--5}}
-
A Compact Representation of Sensor Fingerprint for Camera Identification and Fingerprint Matching
Proc. IEEE Int Acoustics, Speech and Signal Processing (ICASSP) Conf
2015, pp. 1777-1781
DOI: 10.1109/ICASSP.2015.7178276
BibTeX@inproceedings{Li2015d, author = {Li, Ruizhe and Li, Chang-Tsun and Guan, Yu}, title = {A Compact Representation of Sensor Fingerprint for Camera Identification and Fingerprint Matching}, booktitle = {Proc. IEEE Int Acoustics, Speech and Signal Processing (ICASSP) Conf}, year = {2015}, pages = {1777--1781}}
-
Incremental Update of Feature Extractor for Camera Identification
Proc. IEEE Int Image Processing (ICIP) Conf
2015, pp. 324-328
DOI: 10.1109/ICIP.2015.7350813
BibTeX@inproceedings{Li2015e, author = {Li, Ruizhe and Li, Chang-Tsun and Guan, Yu}, title = {Incremental Update of Feature Extractor for Camera Identification}, booktitle = {Proc. IEEE Int Image Processing (ICIP) Conf}, year = {2015}, pages = {324--328}}
-
Standards and Best Practices in Digital and Multimedia Forensics
Ho, A. T. S. & Li, S. (ed.)
Ho/Handbook of Digital Forensics of Multimedia Data and Devices
Chapter 2
Wiley-IEEE Press, 2015, pp. 38-93
DOI: 10.1002/9781118705773.ch2
BibTeX@inbook{Li2015j, author = {Li, Shujun and Dhami, Mandeep K. and Ho, Anthony T. S.}, title = {Standards and Best Practices in Digital and Multimedia Forensics}, booktitle = {Ho/Handbook of Digital Forensics of Multimedia Data and Devices}, publisher = {Wiley-IEEE Press}, year = {2015}, pages = {38--93}}
-
Digital Forensics Laboratories in Operation
Ho/Handbook of Digital Forensics of Multimedia Data and Devices
Chapter 1
Wiley-IEEE Press, 2015, pp. 1-37
DOI: 10.1002/9781118705773.ch1
BibTeX@inbook{Li2015k, author = {Li, Shujun and Ho, Anthony T. S.}, title = {Digital Forensics Laboratories in Operation}, booktitle = {Ho/Handbook of Digital Forensics of Multimedia Data and Devices}, publisher = {Wiley-IEEE Press}, year = {2015}, pages = {1--37}}
-
Anti-forensics of Lossy Predictive Image Compression
Signal Processing Letters, IEEE, 2015, Vol. 22(12), pp. 2219-2223
DOI: 10.1109/LSP.2015.2472561
BibTeX@article{Li2015b, author = {Li, Yuanman and Zhou, Jiantao}, title = {Anti-forensics of Lossy Predictive Image Compression}, journal = {Signal Processing Letters, IEEE}, year = {2015}, volume = {22}, number = {12}, pages = {2219--2223}}
-
Anti-Forensics of Lossy Predictive Image Compression
#IEEE_J_SPL#, 2015, Vol. 22(12), pp. 2219-2223
DOI: 10.1109/LSP.2015.2472561
BibTeX@article{Li2015h, author = {Li, Y. and Zhou, J.}, title = {Anti-Forensics of Lossy Predictive Image Compression}, journal = {#IEEE_J_SPL#}, year = {2015}, volume = {22}, number = {12}, pages = {2219--2223}}
-
An Efficient Forgery Detection Algorithm for Object Removal by Exemplar-based Image Inpainting
Journal of Visual Communication and Image Representation, 2015(0), pp. -
DOI: 10.1016/j.jvcir.2015.03.004
BibTeX@article{Liang2015, author = {Liang, Zaoshan and Yang, Gaobo and Ding, Xiangling and Li, Leida}, title = {An Efficient Forgery Detection Algorithm for Object Removal by Exemplar-based Image Inpainting}, journal = {Journal of Visual Communication and Image Representation}, year = {2015}, number = {0}, pages = {-}}
-
An Efficiency Enhanced Cluster Expanding Block Algorithm for Copy-move Forgery Detection
Proc. Int Intelligent Networking and Collaborative Systems (INCOS) Conf
2015, pp. 228-231
DOI: 10.1109/INCoS.2015.90
BibTeX@inproceedings{Lin2015, author = {Lin, C. S. and Chen, C. C. and Chang, Y. C.}, title = {An Efficiency Enhanced Cluster Expanding Block Algorithm for Copy-move Forgery Detection}, booktitle = {Proc. Int Intelligent Networking and Collaborative Systems (INCOS) Conf}, year = {2015}, pages = {228--231}}
-
Splicing Forgery Exposure in Digital Image by Detecting Noise Discrepancies
International Journal of Computer and Communication Engineering, 2015, Vol. 4(1), pp. 33-38
DOI: 10.7763/IJCCE.2015.V4.378
BibTeX@article{Liu2015, author = {Liu, Bo and Pun, Chi-Man}, title = {Splicing Forgery Exposure in Digital Image by Detecting Noise Discrepancies}, journal = {International Journal of Computer and Communication Engineering}, year = {2015}, volume = {4}, number = {1}, pages = {33--38}}
-
Enhancing Sensor Pattern Noise for Source Camera Identification: An Empirical Evaluation
Proc. of the The 3rd ACM Workshop on Information Hiding and Multimedia Security, 2015
DOI: 10.1145/2756601.2756614
BibTeX@article{Liu2015b, author = {Liu, Bei-bei and Wei, Xingjie and Yan, Jeff}, title = {Enhancing Sensor Pattern Noise for Source Camera Identification: An Empirical Evaluation}, journal = {Proc. of the The 3rd ACM Workshop on Information Hiding and Multimedia Security}, year = {2015}}
-
Exposing Image Tampering with the Same Quantization Matrix
Baughman, A. K., Gao, J., Pan, J.-Y. & Petrushin, V. A. (ed.)
Multimedia Data Mining and Analytics
Springer International Publishing, 2015, pp. 327-343
DOI: 10.1007/978-3-319-14998-1_15
BibTeX@incollection{Liu2015a, author = {Liu, Qingzhong and Sung, AndrewH. and Chen, Zhongxue and Chen, Lei}, title = {Exposing Image Tampering with the Same Quantization Matrix}, booktitle = {Multimedia Data Mining and Analytics}, publisher = {Springer International Publishing}, year = {2015}, pages = {327--343}}
-
Exposing Video Inter-frame Forgery by Zernike Opponent Chromaticity Moments and Coarseness Analysis
Multimedia Systems, Springer Berlin Heidelberg, 2015, pp. 1-16
DOI: 10.1007/s00530-015-0478-1
BibTeX@article{Liu2015c, author = {Liu, Yuqing and Huang, Tianqiang}, title = {Exposing Video Inter-frame Forgery by Zernike Opponent Chromaticity Moments and Coarseness Analysis}, journal = {Multimedia Systems}, publisher = {Springer Berlin Heidelberg}, year = {2015}, pages = {1--16}}
-
Detecting Cyclostationarity in Re-captured LCD Screens
Forensic Research, 2015
DOI: 10.1109/icip.2015.7350872
BibTeX@article{Mahdian2015a, author = {Mahdian, Babak and Novozamsky, Adam and Saic, Stanislav}, title = {Detecting Cyclostationarity in Re-captured LCD Screens}, journal = {Forensic Research}, year = {2015}}
-
Determination of Stop-criterion for Incremental Methods Constructing Camera Sensor Fingerprint
Shi, Y.-Q., Kim, H. J., Pérez-González, F. & Yang, C.-N. (ed.)
Digital-Forensics and Watermarking
Springer International Publishing, 2015, Vol. 9023, pp. 47-59
DOI: 10.1007/978-3-319-19321-2_4
BibTeX@incollection{Mahdian2015, author = {Mahdian, Babak and Novozámský, Adam and Saic, Stanislav}, title = {Determination of Stop-criterion for Incremental Methods Constructing Camera Sensor Fingerprint}, booktitle = {Digital-Forensics and Watermarking}, publisher = {Springer International Publishing}, year = {2015}, volume = {9023}, pages = {47--59}}
-
Identification of Aliasing-based Patterns in Re-captured LCD Screens
ICIP
2015
BibTeX@inproceedings{Mahdian2015b, author = {Mahdian, Babak and Novozámský, Adam and Saic, Stanislav}, title = {Identification of Aliasing-based Patterns in Re-captured LCD Screens}, booktitle = {ICIP}, year = {2015}}
-
Determination of Stop-criterion for Incremental Methods Constructing Camera Sensor Fingerprint
Digital-Forensics and Watermarking
Digital-Forensics and Watermarking, Springer, 2015, pp. 47-59
DOI: 10.1007/978-3-319-19321-2_4
BibTeX@article{Mahdian2015c, author = {Mahdian, Babak and Novozámský, Adam and Saic, Stanislav}, title = {Determination of Stop-criterion for Incremental Methods Constructing Camera Sensor Fingerprint}, booktitle = {Digital-Forensics and Watermarking}, journal = {Digital-Forensics and Watermarking}, publisher = {Springer}, year = {2015}, pages = {47--59}}
-
A Survey on Block Based Copy Move Image Forgery Detection Techniques
Emerging Technologies (ICET), 2015 International Conference on
2015, pp. 1-6
DOI: 10.1109/ICET.2015.7389169
BibTeX@inproceedings{Mahmood2015, author = {Mahmood, T. and Nawaz, T. and Ashraf, R. and Shah, M. and Khan, Z. and Irtaza, A. and Mehmood, Z.}, title = {A Survey on Block Based Copy Move Image Forgery Detection Techniques}, booktitle = {Emerging Technologies (ICET), 2015 International Conference on}, year = {2015}, pages = {1--6}}
-
Detection of Purple Fringing Aberration Patterns and Its Application to Forensic Analysis of Spliced Images
Proc. Int Advances in Computing, Communications and Informatics (ICACCI) Conf
2015, pp. 1421-1427
DOI: 10.1109/ICACCI.2015.7275812
BibTeX@inproceedings{Malik2015, author = {Malik, Parveen and Karthik, Kannan}, title = {Detection of Purple Fringing Aberration Patterns and Its Application to Forensic Analysis of Spliced Images}, booktitle = {Proc. Int Advances in Computing, Communications and Informatics (ICACCI) Conf}, year = {2015}, pages = {1421--1427}}
-
Copy move forgery detection using low complexity feature extraction
Proc. IEEE UP Section Conf. Electrical Computer and Electronics (UPCON)
2015, pp. 1-5
DOI: 10.1109/UPCON.2015.7456688
BibTeX@inproceedings{Malviya2015, author = {Malviya, A. V. and Ladhake, S. A.}, title = {Copy move forgery detection using low complexity feature extraction}, booktitle = {Proc. IEEE UP Section Conf. Electrical Computer and Electronics (UPCON)}, year = {2015}, pages = {1--5}}
-
Visual Artifacts Based Image Splicing Detection in Uncompressed Images
Proc. Vision and Information Security (CGVIS) 2015 IEEE Int. Conf. Computer Graphics
2015, Vol. 11/16, pp. 145-150
DOI: 10.1109/CGVIS.2015.7449911
BibTeX@inproceedings{Manu2015, author = {Manu, V. T. and Mehtre, B. M.}, title = {Visual Artifacts Based Image Splicing Detection in Uncompressed Images}, booktitle = {Proc. Vision and Information Security (CGVIS) 2015 IEEE Int. Conf. Computer Graphics}, year = {2015}, volume = {11/16}, pages = {145--150}}
-
Counter-forensics in Machine Learning Based Forgery Detection
Alattar, A. M., Memon, N. D. & Heitzenrater, C. D. (ed.)
IS&T/SPIE Electronic Imaging
Proc. SPIE, 2015, Vol. 9409, pp. 94090L-94090L-11
DOI: 10.1117/12.2182173
BibTeX@inproceedings{Marra2015, author = {Marra, Francesco and Poggi, Giovanni and Roli, Fabio and Sansone, Carlo and Verdoliva, Luisa}, title = {Counter-forensics in Machine Learning Based Forgery Detection}, booktitle = {IS&T/SPIE Electronic Imaging}, journal = {Proc. SPIE}, year = {2015}, volume = {9409}, pages = {94090L-94090L-11}}
-
Evaluation of Residual-based Local Features for Camera Model Identification
New Trends in Image Analysis and Processing -- ICIAP 2015 Workshops
New Trends in Image Analysis and Processing, Springer Science + Business Media, 2015, pp. 11-18
DOI: 10.1007/978-3-319-23222-5_2
BibTeX@incollection{Marra2015a, author = {Marra, Francesco and Poggi, Giovanni and Sansone, Carlo and Verdoliva, Luisa}, title = {Evaluation of Residual-based Local Features for Camera Model Identification}, booktitle = {New Trends in Image Analysis and Processing -- ICIAP 2015 Workshops}, journal = {New Trends in Image Analysis and Processing}, publisher = {Springer Science + Business Media}, year = {2015}, pages = {11--18}}
-
Evaluation of Residual-based Local Features for Camera Model Identification
New Trends in Image Analysis and Processing -- ICIAP 2015 Workshops, Springer, 2015
DOI: 10.1007/978-3-319-23222-5_2
BibTeX@article{Marra2015b, author = {Marra, Francesco and Poggi, Giovanni and Sansone, Carlo and Verdoliva, Luisa}, title = {Evaluation of Residual-based Local Features for Camera Model Identification}, journal = {New Trends in Image Analysis and Processing -- ICIAP 2015 Workshops}, publisher = {Springer}, year = {2015}}
-
A Machine Learning-Based Approach to Digital Triage
Ho/Handbook of Digital Forensics of Multimedia Data and Devices
Wiley-IEEE Press, 2015, pp. 94-132
DOI: 10.1002/9781118705773.ch3
BibTeX@inbook{Marturana2015, author = {Marturana, Fabio and Tacconi, Simone and Italiano, Giuseppe F.}, title = {A Machine Learning-Based Approach to Digital Triage}, booktitle = {Ho/Handbook of Digital Forensics of Multimedia Data and Devices}, publisher = {Wiley-IEEE Press}, year = {2015}, pages = {94--132}}
-
Anti-forensics of Chromatic Aberration
IS&T/SPIE Electronic Imaging
Proc. SPIE, 2015, Vol. 9409, pp. 94090M-94090M-9
DOI: 10.1117/12.2182457
BibTeX@inproceedings{Mayer2015, author = {Mayer, Owen and Stamm, Matthew C.}, title = {Anti-forensics of Chromatic Aberration}, booktitle = {IS&T/SPIE Electronic Imaging}, journal = {Proc. SPIE}, year = {2015}, volume = {9409}, pages = {94090M-94090M-9}}
-
CBFD: Coherence Based Forgery Detection technique in image forensics analysis
Proc. Computer Science and Technology (ICERECT) 2015 Int. Conf. Emerging Research in Electronics
2015, pp. 192-197
DOI: 10.1109/ERECT.2015.7499011
BibTeX@inproceedings{MeenakshiSundaram2015, author = {Meenakshi Sundaram, A. and Nandini, C.}, title = {CBFD: Coherence Based Forgery Detection technique in image forensics analysis}, booktitle = {Proc. Computer Science and Technology (ICERECT) 2015 Int. Conf. Emerging Research in Electronics}, year = {2015}, pages = {192--197}}
-
CBFD: Coherence Based Forgery Detection technique in image forensics analysis
Proc. Computer Science and Technology (ICERECT) 2015 Int. Conf. Emerging Research in Electronics
2015, pp. 192-197
DOI: 10.1109/ERECT.2015.7499011
BibTeX@inproceedings{MeenakshiSundaram2015a, author = {Meenakshi Sundaram, A. and Nandini, C.}, title = {CBFD: Coherence Based Forgery Detection technique in image forensics analysis}, booktitle = {Proc. Computer Science and Technology (ICERECT) 2015 Int. Conf. Emerging Research in Electronics}, year = {2015}, pages = {192--197}}
-
Factor Histogram Based Forgery Localization in Double Compressed JPEG\ Images
Procedia Computer Science, 2015, Vol. 54, pp. 690-696
DOI: 10.1016/j.procs.2015.06.081
BibTeX@article{Mire2015, author = {Mire, Archana V. and Dhok, S. B. and Mistry, N. J. and Porey, P. D.}, title = {Factor Histogram Based Forgery Localization in Double Compressed JPEG\ Images}, journal = {Procedia Computer Science}, year = {2015}, volume = {54}, pages = {690--696}}
-
A Comparison Study on SVD-based Features in Different Transforms for Image Splicing Detection
Proc. IEEE Int Consumer Electronics - Taiwan (ICCE-TW) Conf
2015, pp. 13-14
DOI: 10.1109/ICCE-TW.2015.7216815
BibTeX@inproceedings{Moghaddasi2015, author = {Moghaddasi, Z. and Jalab, H. A. and Noor, R. M.}, title = {A Comparison Study on SVD-based Features in Different Transforms for Image Splicing Detection}, booktitle = {Proc. IEEE Int Consumer Electronics - Taiwan (ICCE-TW) Conf}, year = {2015}, pages = {13--14}}
-
Increase the efficiency of DCT method for detection of copy-move forgery in complex and smooth images
Proc. 2nd Int. Conf. Knowledge-Based Engineering and Innovation (KBEI)
2015, pp. 436-440
DOI: 10.1109/KBEI.2015.7436084
BibTeX@inproceedings{Mohebbian2015, author = {Mohebbian, E. and Hariri, M.}, title = {Increase the efficiency of DCT method for detection of copy-move forgery in complex and smooth images}, booktitle = {Proc. 2nd Int. Conf. Knowledge-Based Engineering and Innovation (KBEI)}, year = {2015}, pages = {436--440}}
-
Image Manipulation on Facebook for Forensics Evidence
Image Processing Laboratory Dipartimento di Matematica e Informatica Universita degli Studi di Catania, Image Processing Laboratory Dipartimento di Matematica e Informatica Universita degli Studi di Catania, 2015
BibTeX@techreport{Moltisanti2015, author = {Moltisanti, Marco and Paratore, Antonino and Battiato, Sebastiano and Saravo, Luigi}, title = {Image Manipulation on Facebook for Forensics Evidence}, school = {Image Processing Laboratory Dipartimento di Matematica e Informatica Universita degli Studi di Catania}, year = {2015}}
-
Image Manipulation on Facebook for Forensics Evidence
Image Analysis and Processing — ICIAP 2015
Springer, 2015, pp. 506-517
DOI: 10.1007/978-3-319-23234-8_47
BibTeX@incollection{Moltisanti2015a, author = {Moltisanti, Marco and Paratore, Antonino and Battiato, Sebastiano and Saravo, Luigi}, title = {Image Manipulation on Facebook for Forensics Evidence}, booktitle = {Image Analysis and Processing — ICIAP 2015}, publisher = {Springer}, year = {2015}, pages = {506--517}}
-
Detecting Image Forgery Using XOR and Determinant of Pixels for Image Forensics
Proc. 11th Int. Conf. Signal-Image Technology Internet-Based Systems (SITIS)
2015, pp. 613-616
DOI: 10.1109/SITIS.2015.78
BibTeX@inproceedings{Mookdarsanit2015, author = {Mookdarsanit, P. and Soimart, L. and Ketcham, M. and Hnoohom, N.}, title = {Detecting Image Forgery Using XOR and Determinant of Pixels for Image Forensics}, booktitle = {Proc. 11th Int. Conf. Signal-Image Technology Internet-Based Systems (SITIS)}, year = {2015}, pages = {613--616}}
-
Detecting Image Forgery Using XOR and Determinant of Pixels for Image Forensics
Proc. 11th Int. Conf. Signal-Image Technology Internet-Based Systems (SITIS)
2015, pp. 613-616
DOI: 10.1109/SITIS.2015.78
BibTeX@inproceedings{Mookdarsanit2015a, author = {Mookdarsanit, P. and Soimart, L. and Ketcham, M. and Hnoohom, N.}, title = {Detecting Image Forgery Using XOR and Determinant of Pixels for Image Forensics}, booktitle = {Proc. 11th Int. Conf. Signal-Image Technology Internet-Based Systems (SITIS)}, year = {2015}, pages = {613--616}}
-
A Fast and Accurate Algorithm for Copy-move Forgery Detection
Computer Engineering Systems (ICCES), 2015 Tenth International Conference on
2015, pp. 281-285
DOI: 10.1109/ICCES.2015.7393060
BibTeX@inproceedings{Moussa2015, author = {Moussa, A. M.}, title = {A Fast and Accurate Algorithm for Copy-move Forgery Detection}, booktitle = {Computer Engineering Systems (ICCES), 2015 Tenth International Conference on}, year = {2015}, pages = {281--285}}
-
Recaptured Images Forensics Based on Color Moments and DCT Coefficients Features
Journal of Information Hiding and Multimedia Signal Processing, 2015, Vol. 6(2), pp. 323-333
BibTeX@article{Ni2015, author = {Ni, Rongrong and Zhao, Yao and Zhai, Xiaobo}, title = {Recaptured Images Forensics Based on Color Moments and DCT Coefficients Features}, journal = {Journal of Information Hiding and Multimedia Signal Processing}, year = {2015}, volume = {6}, number = {2}, pages = {323--333}}
-
A Review of Image Forgery Techniques and Their Detection
Proc. Int Innovations in Information, Embedded and Communication Systems (ICIIECS) Conf
2015, pp. 1-5
DOI: 10.1109/ICIIECS.2015.7193177
BibTeX@inproceedings{Nirmalkar2015, author = {Nirmalkar, N. and Kamble, S. and Kakde, S.}, title = {A Review of Image Forgery Techniques and Their Detection}, booktitle = {Proc. Int Innovations in Information, Embedded and Communication Systems (ICIIECS) Conf}, year = {2015}, pages = {1--5}}
-
Double JPEG Compression Detection Using Statistical Analysis
dvances in Computer Science: an International Journal, 2015, Vol. 4(15), pp. 70-76
BibTeX@article{Nowroozi2015, author = {Nowroozi, Ehsan and Zakerolhosseini, Ali}, title = {Double JPEG Compression Detection Using Statistical Analysis}, journal = {dvances in Computer Science: an International Journal}, year = {2015}, volume = {4}, number = {15}, pages = {70--76}}
-
A photo composite detection based on eye specular highlights using pixel-based approach
Proc. 3rd Int Information and Communication Technology (ICoICT ) Conf
2015, pp. 195-200
DOI: 10.1109/ICoICT.2015.7231421
BibTeX@inproceedings{Nugraha2015, author = {Nugraha, P. A. and Ciptasari, R. W. and Pudjoatmojo, B.}, title = {A photo composite detection based on eye specular highlights using pixel-based approach}, booktitle = {Proc. 3rd Int Information and Communication Technology (ICoICT ) Conf}, year = {2015}, pages = {195--200}}
-
Smartphone Image Acquisition Forensics Using Sensor Fingerprint
IET Computer Vision, 2015
DOI: 10.1049/iet-cvi.2014.0243
BibTeX@article{Orozco2015, author = {Orozco, Ana Lucila Sandoval and Villalba, Luis Javier García and González, David Manuel Arenas and Corripio, Jocelin Rosales and Hernandez-Castro, Julio and Gibson, Stuart James}, title = {Smartphone Image Acquisition Forensics Using Sensor Fingerprint}, journal = {IET Computer Vision}, year = {2015}}
-
Smartphone image acquisition forensics using sensor fingerprint
IET Comput Vision, 2015, Vol. 9(5), pp. 723-731
DOI: 10.1049/iet-cvi.2014.0243
BibTeX@article{Orozco2015a, author = {Orozco, A. L. Sandoval and Villalba, L. J. García and González, D. M. Arenas and Corripio, J. R. and Hernandez-Castro, J. and Gibson, S. J.}, title = {Smartphone image acquisition forensics using sensor fingerprint}, journal = {IET Comput Vision}, year = {2015}, volume = {9}, number = {5}, pages = {723--731}}
-
Blind Estimation of Affine Transformation Using 2D Cyclostationarity of Resampled Images
Proc. SPIE, 2015, Vol. 9811, pp. 98110L-98110L-9
DOI: 10.1117/12.2205468
BibTeX@article{Ou2015, author = {Ou, Junhai and Ni, Jiangqun}, title = {Blind Estimation of Affine Transformation Using 2D Cyclostationarity of Resampled Images}, journal = {Proc. SPIE}, year = {2015}, volume = {9811}, pages = {98110L-98110L-9}}
-
Digital Image Forensics with Statistical Analysis
Ho, A. T. S. & Li, S. (ed.)
Handbook of Digital Forensics of Multimedia Data and Devices
Wiley-IEEE Press, 2015, pp. 704-
DOI: 10.1002/9781118705773.ch13
BibTeX@inbook{Pan2015, author = {Pan, Xunyu}, title = {Digital Image Forensics with Statistical Analysis}, booktitle = {Handbook of Digital Forensics of Multimedia Data and Devices}, publisher = {Wiley-IEEE Press}, year = {2015}, pages = {704-}}
-
Passive Copy Move Forgery Detection Using SURF, HOG and SIFT Features
Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014
Springer, 2015
DOI: 10.1007/978-3-319-11933-5_74
BibTeX@incollection{Pandey2015, author = {Pandey, Ramesh Chand and Agrawal, Rishabh and Singh, Sanjay Kumar and Shukla, K. K.}, title = {Passive Copy Move Forgery Detection Using SURF, HOG and SIFT Features}, booktitle = {Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014}, publisher = {Springer}, year = {2015}}
-
Towards an Image Blurring Detection Approach Based on Color Filter Array
Proc. of the International Conference on Mechatronics, Electronic, Industrial and Control Engineering (MEIC 2015)
2015
DOI: 10.2991/meic-15.2015.55
BibTeX@inproceedings{Peng2015, author = {Peng}, title = {Towards an Image Blurring Detection Approach Based on Color Filter Array}, booktitle = {Proc. of the International Conference on Mechatronics, Electronic, Industrial and Control Engineering (MEIC 2015)}, year = {2015}}
-
Countering Anti-forensics of Image Resampling
Proc. IEEE Int Image Processing (ICIP) Conf
2015, pp. 3595-3599
DOI: 10.1109/ICIP.2015.7351474
BibTeX@inproceedings{Peng2015b, author = {Peng, Anjie and Zeng, Hui and Lin, Xiaodan and Kang, Xiangui}, title = {Countering Anti-forensics of Image Resampling}, booktitle = {Proc. IEEE Int Image Processing (ICIP) Conf}, year = {2015}, pages = {3595--3599}}
-
Countering anti-forensics of image resampling
Proc. IEEE Int. Conf. Image Processing (ICIP)
2015, pp. 3595-3599
DOI: 10.1109/ICIP.2015.7351474
BibTeX@inproceedings{Peng2015e, author = {Peng, A. and Zeng, H. and Lin, X. and Kang, X.}, title = {Countering anti-forensics of image resampling}, booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)}, year = {2015}, pages = {3595--3599}}
-
Detection of Computer Generated Faces in Videos Based on Pulse Signal
Proc. IEEE China Summit and Int Signal and Information Processing (ChinaSIP) Conf
2015, pp. 841-845
DOI: 10.1109/ChinaSIP.2015.7230523
BibTeX@inproceedings{Peng2015a, author = {Peng, Bo and Wang, Wei and Dong, Jing and Tan, Tieniu}, title = {Detection of Computer Generated Faces in Videos Based on Pulse Signal}, booktitle = {Proc. IEEE China Summit and Int Signal and Information Processing (ChinaSIP) Conf}, year = {2015}, pages = {841--845}}
-
Improved 3D Lighting Environment Estimation for Image Forgery Detection
Information Forensics and Security (WIFS), 2015 IEEE International Workshop on
2015, pp. 1-6
DOI: 10.1109/WIFS.2015.7368587
BibTeX@inproceedings{Peng2015d, author = {Peng, Bo and Wang, Wei and Dong, Jing and Tan, Tieniu}, title = {Improved 3D Lighting Environment Estimation for Image Forgery Detection}, booktitle = {Information Forensics and Security (WIFS), 2015 IEEE International Workshop on}, year = {2015}, pages = {1--6}}
-
Identification of Natural Images and Computer Generated Graphics Using Multi-fractal Differences of PRNU
Algorithms and Architectures for Parallel Processing, Springer, 2015
DOI: 10.1007/978-3-319-27122-4_15
BibTeX@article{Peng2015c, author = {Peng, Fei and Zhu, Yin and Long, Min}, title = {Identification of Natural Images and Computer Generated Graphics Using Multi-fractal Differences of PRNU}, journal = {Algorithms and Architectures for Parallel Processing}, publisher = {Springer}, year = {2015}}
-
Fast Sequential Forensic Camera Identification
arxiv, 2015
BibTeX@article{Perez-Gonzalez2015, author = {Perez-Gonzalez, F. and Gonzalez-Iglesias, I. and Masciopinto, M. and Comesana, P.}, title = {Fast Sequential Forensic Camera Identification}, journal = {arxiv}, year = {2015}}
-
A 3-D Stability Analysis of Lee Harvey Oswald in the Backyard Photo
JDFSL, 2015, Vol. 10(3), pp. 87-98
BibTeX@article{Pittala2015, author = {Pittala, Srivamshi and Whiting, Emily and Farid, Hany}, title = {A 3-D Stability Analysis of Lee Harvey Oswald in the Backyard Photo}, journal = {JDFSL}, year = {2015}, volume = {10}, number = {3}, pages = {87--98}}
-
Forensic Identification of Printed Documents
Ho/Handbook of Digital Forensics of Multimedia Data and Devices
Wiley-Blackwell, 2015, pp. 442-479
DOI: 10.1002/9781118705773.ch12
BibTeX@incollection{Pollard2015, author = {Pollard, Stephen and Adams, Guy and Simske, Steven}, title = {Forensic Identification of Printed Documents}, booktitle = {Ho/Handbook of Digital Forensics of Multimedia Data and Devices}, publisher = {Wiley-Blackwell}, year = {2015}, pages = {442--479}}
-
Automatic Reflection Removal Using Reflective Layer Image Information
Consumer Electronics (ICCE), 2015 IEEE International Conference on
2015, pp. 548-551
DOI: 10.1109/ICCE.2015.7066520
BibTeX@inproceedings{Prakash2015, author = {Prakash, Divya and Kalwad, Pramati and Peddigari, Venkat and Srinivasa, Phanish}, title = {Automatic Reflection Removal Using Reflective Layer Image Information}, booktitle = {Consumer Electronics (ICCE), 2015 IEEE International Conference on}, year = {2015}, pages = {548--551}}
-
Detection of Duplicate Region and Hybrid Non-local Means Filtering for Denoising with Quantization Matrix Estimation for JPEG Error Analysis
Indian Journal of Science and Technology, 2015, Vol. 8(28)
DOI: 10.17485/ijst/2015/v8i28/70923
BibTeX@article{Priyan2015, author = {Priyan, S. Vishnu and Srivatsa, S. K.}, title = {Detection of Duplicate Region and Hybrid Non-local Means Filtering for Denoising with Quantization Matrix Estimation for JPEG Error Analysis}, journal = {Indian Journal of Science and Technology}, year = {2015}, volume = {8}, number = {28}}
-
Image Forgery Detection Using Adaptive Over-segmentation and Feature Points Matching
Information Forensics and Security, IEEE Transactions on, 2015(99)
DOI: 10.1109/TIFS.2015.2423261
BibTeX@article{Pun2015, author = {Pun, Chi-Man and Yuan, Xiao-Chen and Bi, Xiu-Li}, title = {Image Forgery Detection Using Adaptive Over-segmentation and Feature Points Matching}, journal = {Information Forensics and Security, IEEE Transactions on}, year = {2015}, number = {99}}
-
Image Splicing Detection Based on Demosaicking and Wavelet Transformation
Jurnal Ilmu Komputer dan Informasi, 2015
BibTeX@article{Purwandari2015, author = {Purwandari, Endina Putri}, title = {Image Splicing Detection Based on Demosaicking and Wavelet Transformation}, journal = {Jurnal Ilmu Komputer dan Informasi}, year = {2015}}
-
Source Camera Device Identification Based on Raw Images
2015
DOI: 10.1109/icip.2015.7351518
BibTeX@electronic{Qiao2015, author = {Qiao, Tong and Retraint, Florent and Cogranne, Rémi and Thai, Thanh Hai}, title = {Source Camera Device Identification Based on Raw Images}, year = {2015}}
-
Fragile Sensor Fingerprint Camera Identification
Proc. of the 7th IEEE International Workshop on Information Forensics and Security 2015 (WIFS)
2015
DOI: 10.1109/wifs.2015.7368580
BibTeX@inproceedings{Quiring2015, author = {Quiring, Erwin and Kirchner, Matthias}, title = {Fragile Sensor Fingerprint Camera Identification}, booktitle = {Proc. of the 7th IEEE International Workshop on Information Forensics and Security 2015 (WIFS)}, year = {2015}}
-
A Bibliography of Pixel-based Blind Image Forgery Detection Techniques
Signal Processing: Image Communication, 2015, Vol. 39, Part A, pp. 46-74
DOI: 10.1016/j.image.2015.08.008
BibTeX@article{Qureshi2015, author = {Qureshi, Muhammad Ali and Deriche, Mohamed}, title = {A Bibliography of Pixel-based Blind Image Forgery Detection Techniques}, journal = {Signal Processing: Image Communication}, year = {2015}, volume = {39, Part A}, pages = {46--74}}
-
Digital Image Forgery Detection by Edge Analysis
Proc. IEEE Int Consumer Electronics - Taiwan (ICCE-TW) Conf
2015, pp. 19-20
DOI: 10.1109/ICCE-TW.2015.7216848
BibTeX@inproceedings{Rad2015, author = {Rad, R. M. and Wong, Koksheik}, title = {Digital Image Forgery Detection by Edge Analysis}, booktitle = {Proc. IEEE Int Consumer Electronics - Taiwan (ICCE-TW) Conf}, year = {2015}, pages = {19--20}}
-
Digital Image Forgery Detection Using SIFT Feature
Proc. Int Advanced Computing and Communication (ISACC) Symp
2015, pp. 186-191
DOI: 10.1109/ISACC.2015.7377340
BibTeX@inproceedings{Rajkumar2015, author = {Rajkumar, R. and Singh, K. M.}, title = {Digital Image Forgery Detection Using SIFT Feature}, booktitle = {Proc. Int Advanced Computing and Communication (ISACC) Symp}, year = {2015}, pages = {186--191}}
-
Forensic Analysis of Linear and Non Linear Image Filtering Using Quantization Noise
2015 IEEE International Conference on Image Processing (ICIP)
Institute of Electrical & Electronics Engineers (IEEE), 2015
DOI: 10.1109/icip.2015.7350986
BibTeX@inproceedings{Ravi2015, author = {Ravi, Hareesh and Subramanyam, A. V. and Emmanuel, Sabu}, title = {Forensic Analysis of Linear and Non Linear Image Filtering Using Quantization Noise}, booktitle = {2015 IEEE International Conference on Image Processing (ICIP)}, publisher = {Institute of Electrical & Electronics Engineers (IEEE)}, year = {2015}}
-
Novel Video Camera Authentication Based on Peak to Correlation Energy of Clustered Sensor Pattern Noise
Proc. IEEE Int Engineering and Technology (ICETECH) Conf
2015, pp. 1-5
DOI: 10.1109/ICETECH.2015.7274998
BibTeX@inproceedings{Remya2015, author = {Remya, R. S. and Beevi, A. B.}, title = {Novel Video Camera Authentication Based on Peak to Correlation Energy of Clustered Sensor Pattern Noise}, booktitle = {Proc. IEEE Int Engineering and Technology (ICETECH) Conf}, year = {2015}, pages = {1--5}}
-
Image Forgery Detection Using SVM Classifier
Proc. Int Innovations in Information, Embedded and Communication Systems (ICIIECS) Conf
2015, pp. 1-5
DOI: 10.1109/ICIIECS.2015.7193202
BibTeX@inproceedings{Reshma2015, author = {Reshma, P. D. and Arunvinodh, C.}, title = {Image Forgery Detection Using SVM Classifier}, booktitle = {Proc. Int Innovations in Information, Embedded and Communication Systems (ICIIECS) Conf}, year = {2015}, pages = {1--5}}
-
Median Filtering Detection Using Latent Growth Modeling
Journal of the Institute of Electrolnic Engineers of Korea, 2015(1), pp. 61-68
BibTeX@article{Rhee2015, author = {Rhee, Kang Hyeon}, title = {Median Filtering Detection Using Latent Growth Modeling}, journal = {Journal of the Institute of Electrolnic Engineers of Korea}, year = {2015}, number = {1}, pages = {61--68}}
-
Median Filtering Detection of Digital Images Using Pixel Gradients
IEIE Transactions on Smart Processing & Computing, 2015, Vol. 4(4), pp. 195-201
DOI: 10.5573/ieiespc.2015.4.4.195
BibTeX@article{Rhee2015a, author = {Rhee, Kang Hyeon}, title = {Median Filtering Detection of Digital Images Using Pixel Gradients}, journal = {IEIE Transactions on Smart Processing & Computing}, year = {2015}, volume = {4}, number = {4}, pages = {195--201}}
-
Reflectance Normalization in Illumination-based Image Manipulation Detection
New Trends in Image Analysis and Processing, 2015
BibTeX@article{Riess2015, author = {Riess, Christian and Pfaller, Sven and Angelopoulou, Elli}, title = {Reflectance Normalization in Illumination-based Image Manipulation Detection}, journal = {New Trends in Image Analysis and Processing}, year = {2015}}
-
Use of Specialized Security Techniques to Enhance the Authenticity of Surveillance
Book of Abstracts, Presentations and Papers of the 12 th Symposium on International Safeguards: Linking Strategy, Implementation and People, Vienna (Austria), 20-24 Oct 2014
2015, pp. 491
BibTeX@inproceedings{Rocchi2015, author = {Rocchi, S. and Simlinger, R. and Moeslinger, M. and Murray, J. and Hadfi, G. and John, M.}, title = {Use of Specialized Security Techniques to Enhance the Authenticity of Surveillance}, booktitle = {Book of Abstracts, Presentations and Papers of the 12 th Symposium on International Safeguards: Linking Strategy, Implementation and People, Vienna (Austria), 20-24 Oct 2014}, year = {2015}, pages = {491}}
-
Practical implementation of a methodology for digital images authentication using forensics techniques
CSIJ Advances in Computer Science: an International Journal, 2015, Vol. 4(18)
BibTeX@article{Rodriguez-Santos2015, author = {Rodríguez-Santos, Francisco and Delgado-Gutierréz, Guillermo and Palacios-Luengas, Leonardo and Vazquéz-Medina, Rubén}, title = {Practical implementation of a methodology for digital images authentication using forensics techniques}, journal = {CSIJ Advances in Computer Science: an International Journal}, year = {2015}, volume = {4}, number = {18}}
-
The MAVEN Project: Management and Authenticity Verification of Multimedia Contents
Proc. IEEE Int Multimedia Expo Workshops (ICMEW) Conf
Institute of Electrical & Electronics Engineers (IEEE), 2015, pp. 1-4
DOI: 10.1109/icmew.2015.7169825
BibTeX@inproceedings{Ruiz2015, author = {Ruiz, C. and Arroyo, S. and Krsteski, I. and Dago, P. and Sanchez, J. and Perez-Freire, L. and De Rosa, A. and Fontani, M. and Costanzo, A. and Piva, A. and Ariu, D. and Piras, L. and Ahumada, R. and Jerian, M.}, title = {The MAVEN Project: Management and Authenticity Verification of Multimedia Contents}, booktitle = {Proc. IEEE Int Multimedia Expo Workshops (ICMEW) Conf}, publisher = {Institute of Electrical & Electronics Engineers (IEEE)}, year = {2015}, pages = {1--4}}
-
Forensic Examination of Computer-manipulated Documents Using Image Processing Techniques
Egyptian Journal of Forensic Sciences, 2015(0), pp. -
DOI: 10.1016/j.ejfs.2015.03.001
BibTeX@article{Saini2015, author = {Saini, Komal and Shabnampreet Kaur, Forensic document examination, Image processing Computer manipulated documents Alterations of documents}, title = {Forensic Examination of Computer-manipulated Documents Using Image Processing Techniques}, journal = {Egyptian Journal of Forensic Sciences}, year = {2015}, number = {0}, pages = {-}}
-
Region Duplication Forgery Detection in Digital Images Using 2D-DWT and SVD
Proc. Int. Conf. Applied and Theoretical Computing and Communication Technology (iCATccT)
2015, pp. 599-604
DOI: 10.1109/ICATCCT.2015.7456955
BibTeX@inproceedings{Sanap2015, author = {Sanap, V. K. and Mane, V. M.}, title = {Region Duplication Forgery Detection in Digital Images Using 2D-DWT and SVD}, booktitle = {Proc. Int. Conf. Applied and Theoretical Computing and Communication Technology (iCATccT)}, year = {2015}, pages = {599--604}}
-
Image Recapture Discovery Algorithms: A Survey
IJSR, International Journal of Science and Research, 2015, Vol. 4(11), pp. 926-929
DOI: 10.21275/v4i11.nov151302
BibTeX@article{Sanas2015, author = {Sanas, P. and Gupta, P.}, title = {Image Recapture Discovery Algorithms: A Survey}, journal = {IJSR}, publisher = {International Journal of Science and Research}, year = {2015}, volume = {4}, number = {11}, pages = {926--929}}
-
Image Source Acquisition Identification of Mobile Devices Based on the Use of Features
Multimedia Tools and Applications, Springer US, 2015, pp. 1-25
DOI: 10.1007/s11042-015-2633-2
BibTeX@article{SandovalOrozco2015, author = {Sandoval Orozco, AnaLucila and Corripio, JocelinRosales and García Villalba, LuisJavier and Hernández Castro, JulioCésar}, title = {Image Source Acquisition Identification of Mobile Devices Based on the Use of Features}, journal = {Multimedia Tools and Applications}, publisher = {Springer US}, year = {2015}, pages = {1--25}}
-
Analysis of Errors in EXIF Metadata on Mobile Devices
Multimedia Tools and Applications, Springer, 2015, Vol. 74(13), pp. 4735
DOI: 10.1007/s11042-013-1837-6
BibTeX@article{SandovalOrozco2015a, author = {Sandoval Orozco, Ana Lucila and Arenas González, David Manuel and GarcÃa Villalba, Luis Javier and Hernández-Castro, Julio}, title = {Analysis of Errors in EXIF Metadata on Mobile Devices}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2015}, volume = {74}, number = {13}, pages = {4735}}
-
Super-resolution of facial images in forensics scenarios
Proc. Tools and Applications (IPTA) 2015 Int. Conf. Image Processing Theory
2015, pp. 55-60
DOI: 10.1109/IPTA.2015.7367096
BibTeX@inproceedings{Satiro2015, author = {Satiro, J. and Nasrollahi, K. and Correia, P. L. and Moeslund, T. B.}, title = {Super-resolution of facial images in forensics scenarios}, booktitle = {Proc. Tools and Applications (IPTA) 2015 Int. Conf. Image Processing Theory}, year = {2015}, pages = {55--60}}
-
Sensor Pattern Noise Matching Based on Reliability Map for Source Camera Identification
electronic, 2015
BibTeX@misc{Satta2015, author = {Satta, Riccardo}, title = {Sensor Pattern Noise Matching Based on Reliability Map for Source Camera Identification}, year = {2015}}
-
Sensor Pattern Noise and Image Similarity for Picture-to-identity Linking
IET Comput Vision, 2015, Vol. 9(5), pp. 711-722
DOI: 10.1049/iet-cvi.2014.0320
BibTeX@article{Satta2015a, author = {Satta, R. and Ciardulli, A.}, title = {Sensor Pattern Noise and Image Similarity for Picture-to-identity Linking}, journal = {IET Comput Vision}, year = {2015}, volume = {9}, number = {5}, pages = {711--722}}
-
Video Inpainting Detection Using Inconsistencies in Optical Flow
Indraprastha Institute of Information Technology, Delhi (IIIT-D), India, Indraprastha Institute of Information Technology, Delhi (IIIT-D), India, 2015
BibTeX@mastersthesis{Saxena2015, author = {Saxena, Shobhita}, title = {Video Inpainting Detection Using Inconsistencies in Optical Flow}, school = {Indraprastha Institute of Information Technology, Delhi (IIIT-D), India}, year = {2015}}
-
Humans Are Easily Fooled by Digital Images
arxiv, 2015
BibTeX@article{Schetinger2015, author = {Schetinger, Victor and MM Oliveira, R da Silva, T. J. Carvalho}, title = {Humans Are Easily Fooled by Digital Images}, journal = {arxiv}, year = {2015}}
-
The Imagej Ecosystem: An Open Platform for Biomedical Image Analysis.
Mol Reprod Dev, Laboratory for Optical and Computational Instrumentation, University of Wisconsin at Madison, Madison, Wisconsin., Laboratory for Optical and Computational Instrumentation, University of Wisconsin at Madison, Madison, Wisconsin., 2015, Vol. 82(7-8), pp. 518-529
DOI: 10.1002/mrd.22489
BibTeX@article{Schindelin2015, author = {Schindelin, Johannes and Rueden, Curtis T. and Hiner, Mark C. and Eliceiri, Kevin W.}, title = {The Imagej Ecosystem: An Open Platform for Biomedical Image Analysis.}, journal = {Mol Reprod Dev}, school = {Laboratory for Optical and Computational Instrumentation, University of Wisconsin at Madison, Madison, Wisconsin.}, year = {2015}, volume = {82}, number = {7-8}, pages = {518--529}}
-
A Study on Segmentation-based Copy-move Forgery Detection Using DAISY Descriptor
Proceedings of the International Conference on Soft Computing Systems
Springer Science mathplus Business Media, 2015, pp. 223-233
DOI: 10.1007/978-81-322-2674-1_23
BibTeX@incollection{Sekhar2015, author = {Sekhar, Resmi and Shaji, R. S.}, title = {A Study on Segmentation-based Copy-move Forgery Detection Using DAISY Descriptor}, booktitle = {Proceedings of the International Conference on Soft Computing Systems}, publisher = {Springer Science mathplus Business Media}, year = {2015}, pages = {223--233}}
-
Detection of Geometric Transformations in Copy-move Forgery of Digital Images
Proc. Annual IEEE India Conf. (INDICON)
2015, pp. 1-6
DOI: 10.1109/INDICON.2015.7443141
BibTeX@inproceedings{Shandilya2015, author = {Shandilya, M. and Naskar, R. and Dixit, R.}, title = {Detection of Geometric Transformations in Copy-move Forgery of Digital Images}, booktitle = {Proc. Annual IEEE India Conf. (INDICON)}, year = {2015}, pages = {1--6}}
-
Printer and Scanner Forensics
Ho, A. T. S. & Li, S. (ed.)
Handbook of Digital Forensics of Multimedia Data and Devices
Chapter 10
Wiley-IEEE Press, 2015, pp. 704-
DOI: 10.1002/9781118705773.ch10
BibTeX@inbook{Shang2015, author = {Shang, Shize and Kong, Xiangwei}, title = {Printer and Scanner Forensics}, booktitle = {Handbook of Digital Forensics of Multimedia Data and Devices}, publisher = {Wiley-IEEE Press}, year = {2015}, pages = {704-}}
-
A Comparative Study of Frequency Domain Based Approaches for Image Tamper Detection
Proc. TENCON 2015 - 2015 IEEE Region 10 Conf
2015, pp. 1-4
DOI: 10.1109/TENCON.2015.7372903
BibTeX@inproceedings{Sharma2015a, author = {Sharma, A. and Singh, P.}, title = {A Comparative Study of Frequency Domain Based Approaches for Image Tamper Detection}, booktitle = {Proc. TENCON 2015 - 2015 IEEE Region 10 Conf}, year = {2015}, pages = {1--4}}
-
A Rotationally Invariant Texture Descriptor to Detect Copy Move Forgery in Medical Images
Computational Intelligence & Communication Technology (CICT), 2015 IEEE International Conference on
2015, pp. 795-798
DOI: 10.1109/CICT.2015.88
BibTeX@inproceedings{Sharma2015, author = {Sharma, Surbhi and Ghanekar, Umesh}, title = {A Rotationally Invariant Texture Descriptor to Detect Copy Move Forgery in Medical Images}, booktitle = {Computational Intelligence & Communication Technology (CICT), 2015 IEEE International Conference on}, year = {2015}, pages = {795--798}}
-
Blind Detection of Image Splicing Based on Fuzzy Run-length
Proc. IEEE Int Computer and Information Technology, Ubiquitous Computing and Communications, Dependable, Autonomic and Secure Computing, Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM) Conf
2015, pp. 915-920
DOI: 10.1109/CIT/IUCC/DASC/PICOM.2015.137
BibTeX@inproceedings{Shi2015, author = {Shi, Z. and Shen, X. and Chen, H. and Li, X.}, title = {Blind Detection of Image Splicing Based on Fuzzy Run-length}, booktitle = {Proc. IEEE Int Computer and Information Technology, Ubiquitous Computing and Communications, Dependable, Autonomic and Secure Computing, Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM) Conf}, year = {2015}, pages = {915--920}}
-
Copy-cover Image Forgery Detection in Parallel Processing
Int. J. Patt. Recogn. Artif. Intell., 2015
BibTeX@article{Shih2015a, author = {Shih, Frank Y. and Jackson, Jason K.}, title = {Copy-cover Image Forgery Detection in Parallel Processing}, journal = {Int. J. Patt. Recogn. Artif. Intell.}, year = {2015}}
-
Reflection Removal Using Ghosting Cues
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2015
The IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2015
BibTeX@inproceedings{Shih2015, author = {Shih, YiChang and Krishnan, Dilip and Durand, Fredo and Freeman, William T.}, title = {Reflection Removal Using Ghosting Cues}, booktitle = {Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2015}, journal = {The IEEE Conference on Computer Vision and Pattern Recognition (CVPR)}, year = {2015}}
-
Survey on Recapture Detection Algorithms
International Journal of Advanced Research in Computer and Communication Engineering, 2015, Vol. 4(12)
BibTeX@article{Shingote2015a, author = {Shingote, Mr Vinayak K. and Kumar, Ashish}, title = {Survey on Recapture Detection Algorithms}, journal = {International Journal of Advanced Research in Computer and Communication Engineering}, year = {2015}, volume = {4}, number = {12}}
-
Image Authentication by Detecting Demosaicing
International Journal of Advanced Research in Computer and Communication Engineering, 2015, Vol. 4(5), pp. 256-259
BibTeX@article{Shingote2015, author = {Shingote, Vinayak K. and Kabara, Ruhi}, title = {Image Authentication by Detecting Demosaicing}, journal = {International Journal of Advanced Research in Computer and Communication Engineering}, year = {2015}, volume = {4}, number = {5}, pages = {256--259}}
-
Going Deeper into Copy-move Forgery Detection: Exploring Image Telltales Via Multi-scale Analysis and Voting Processes
Journal of Visual Communication and Image Representation, Elsevier BV, 2015, Vol. 29(0), pp. 16-32
DOI: 10.1016/j.jvcir.2015.01.016
BibTeX@article{Silva2015, author = {Silva, Ewerton and Carvalho, Tiago and Ferreira, Anselmo and Rocha, Anderson}, title = {Going Deeper into Copy-move Forgery Detection: Exploring Image Telltales Via Multi-scale Analysis and Voting Processes}, journal = {Journal of Visual Communication and Image Representation}, publisher = {Elsevier BV}, year = {2015}, volume = {29}, number = {0}, pages = {16--32}}
-
Analysis of Benford´s Law in Digital Image Forensics
Proc. Int Signal Processing and Communication (ICSC) Conf
2015, pp. 413-418
DOI: 10.1109/ICSPCom.2015.7150688
BibTeX@inproceedings{Singh2015b, author = {Singh, N. and Bansal, R.}, title = {Analysis of Benford´s Law in Digital Image Forensics}, booktitle = {Proc. Int Signal Processing and Communication (ICSC) Conf}, year = {2015}, pages = {413--418}}
-
Analysis of Benford's law in digital image forensics
Proc. Int. Conf. Signal Processing and Communication (ICSC)
2015, pp. 413-418
DOI: 10.1109/ICSPCom.2015.7150688
BibTeX@inproceedings{Singh2015c, author = {Singh, N. and Bansal, R.}, title = {Analysis of Benford's law in digital image forensics}, booktitle = {Proc. Int. Conf. Signal Processing and Communication (ICSC)}, year = {2015}, pages = {413--418}}
-
Detection of Frame Duplication Type of Forgery in Digital Video Using Sub-block Based Features
James, J. & Breitinger, F. (ed.)
Digital Forensics and Cyber Crime
Springer International Publishing, 2015, Vol. 157, pp. 29-38
DOI: 10.1007/978-3-319-25512-5_3
BibTeX@incollection{Singh2015, author = {Singh, VivekKumar and Pant, Pallav and Tripathi, RameshChandra}, title = {Detection of Frame Duplication Type of Forgery in Digital Video Using Sub-block Based Features}, booktitle = {Digital Forensics and Cyber Crime}, publisher = {Springer International Publishing}, year = {2015}, volume = {157}, pages = {29--38}}
-
Fast Rotation Invariant Detection of Region Duplication Attacks Even on Uniform Background Containing Digital Images
Procedia Computer Science, 2015, Vol. 54, pp. 772-780
DOI: 10.1016/j.procs.2015.06.091
BibTeX@article{Singh2015a, author = {Singh, Vivek Kumar and Tripathi, R. C.}, title = {Fast Rotation Invariant Detection of Region Duplication Attacks Even on Uniform Background Containing Digital Images}, journal = {Procedia Computer Science}, year = {2015}, volume = {54}, pages = {772--780}}
-
Revealing Image Forgery on Digital Images by a Pplying Contrast Enhancement
International Journal of Computer Applications, 2015
BibTeX@article{Sonu2015, author = {Sonu, John Jacob and Krishnalal, G. and Jagathy, Raj V. P.}, title = {Revealing Image Forgery on Digital Images by a Pplying Contrast Enhancement}, journal = {International Journal of Computer Applications}, year = {2015}}
-
Mobile Camera Source Identification with SVD
Innovations and Advances in Computing, Informatics, Systems Sciences, Networking and Engineering
Springer, 2015
DOI: 10.1007/978-3-319-06773-5_18
BibTeX@incollection{Soobhany2015, author = {Soobhany, A. R. and Lam, K. P. and Fletcher, P. and Collins, D. J.}, title = {Mobile Camera Source Identification with SVD}, booktitle = {Innovations and Advances in Computing, Informatics, Systems Sciences, Networking and Engineering}, publisher = {Springer}, year = {2015}}
-
Detecting Contrast Enhancement Based Image Forgeries by Parallel Approach
Proc. 2nd Int Electronics and Communication Systems (ICECS) Conf
2015, pp. 1162-1167
DOI: 10.1109/ECS.2015.7124767
BibTeX@inproceedings{Sornalatha2015, author = {Sornalatha, S. T. S. and Mahalakshmi, S. D. and Vijayalakshmi, K.}, title = {Detecting Contrast Enhancement Based Image Forgeries by Parallel Approach}, booktitle = {Proc. 2nd Int Electronics and Communication Systems (ICECS) Conf}, year = {2015}, pages = {1162--1167}}
-
Soziale Medien Und Journalistische Berichterstattung
Digitale Politikvermittlung, Springer, 2015
DOI: 10.1007/978-3-658-06571-3_8
BibTeX@article{Spangenberg2015, author = {Spangenberg, Jochen}, title = {Soziale Medien Und Journalistische Berichterstattung}, journal = {Digitale Politikvermittlung}, publisher = {Springer}, year = {2015}}
-
Advanced Multimedia File Carving
Ho/Handbook of Digital Forensics of Multimedia Data and Devices
Wiley-Blackwell, 2015, pp. 219-269
DOI: 10.1002/9781118705773.ch6
BibTeX@incollection{Steinebach2015, author = {Steinebach, Martin and Yannikos, York and Zmudzinski, Sascha and Winter, Christian}, title = {Advanced Multimedia File Carving}, booktitle = {Ho/Handbook of Digital Forensics of Multimedia Data and Devices}, publisher = {Wiley-Blackwell}, year = {2015}, pages = {219--269}}
-
Forensic and Anti-forensic Techniques for Video Shot Editing in H.264/AVC
Journal of Visual Communication and Image Representation, 2015(0), pp. -
DOI: 10.1016/j.jvcir.2015.02.006
BibTeX@article{Su2015, author = {Su, Po-Chyi and Suei, Pei-Lun and Chang, Min-Kuan and Lain, Jie}, title = {Forensic and Anti-forensic Techniques for Video Shot Editing in H.264/AVC}, journal = {Journal of Visual Communication and Image Representation}, year = {2015}, number = {0}, pages = {-}}
-
The Detecting System of Image Forgeries with Noise Features and EXIF Information
Journal of Systems Science and Complexity, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, 2015, Vol. 28(5), pp. 1164-1176
DOI: 10.1007/s11424-015-4023-2
BibTeX@article{Sun2015, author = {Sun, Xiaoting and Li, Yezhou and Niu, Shaozhang and Huang, Yanli}, title = {The Detecting System of Image Forgeries with Noise Features and EXIF Information}, journal = {Journal of Systems Science and Complexity}, publisher = {Academy of Mathematics and Systems Science, Chinese Academy of Sciences}, year = {2015}, volume = {28}, number = {5}, pages = {1164--1176}}
-
Measuring the Noise of Digital Imaging Sensors by Stacking Raw Images Affected by Vibrations and Illumination Flickering
SIAM Journal on Imaging Sciences, 2015, Vol. 8(1), pp. 611-643
DOI: 10.1137/140977035
BibTeX@article{Sur2015, author = {Sur, Frédéric and Grédiac, Michel}, title = {Measuring the Noise of Digital Imaging Sensors by Stacking Raw Images Affected by Vibrations and Illumination Flickering}, journal = {SIAM Journal on Imaging Sciences}, year = {2015}, volume = {8}, number = {1}, pages = {611--643}}
-
Forensic Methods for Detecting Image Manipulation - Copy Move
Electrical Engineering and Computer Sciences University of California at Berkeley, Electrical Engineering and Computer Sciences University of California at Berkeley, 2015
BibTeX@techreport{Sutardja2015, author = {Sutardja, Anthony and Ramadan, Omar and Zhao, Yan}, title = {Forensic Methods for Detecting Image Manipulation - Copy Move}, school = {Electrical Engineering and Computer Sciences University of California at Berkeley}, year = {2015}}
-
Digital Image Manipulation Forensics
Electrical Engineering and Computer Sciences University of California at Berkeley, Electrical Engineering and Computer Sciences University of California at Berkeley, 2015
BibTeX@techreport{Sutardja2015a, author = {Sutardja, Anthony and Zhao, Yan}, title = {Digital Image Manipulation Forensics}, school = {Electrical Engineering and Computer Sciences University of California at Berkeley}, year = {2015}}
-
Quantization-unaware Double JPEG Compression Detection
Journal of Mathematical Imaging and Vision, Springer US, 2015, pp. 1-18
DOI: 10.1007/s10851-015-0602-z
BibTeX@article{Taimori2015, author = {Taimori, Ali and Razzazi, Farbod and Behrad, Alireza and Ahmadi, Ali and Babaie-Zadeh, Massoud}, title = {Quantization-unaware Double JPEG Compression Detection}, journal = {Journal of Mathematical Imaging and Vision}, publisher = {Springer US}, year = {2015}, pages = {1--18}}
-
Patch-based Sensor Pattern Noise for Camera Source Identification
School of Information and Communication Engineering Dalian University of Technology Dalian, Liaoning, 116024, P. R. China, School of Information and Communication Engineering Dalian University of Technology Dalian, Liaoning, 116024, P. R. China, 2015
DOI: 10.1109/chinasip.2015.7230528
BibTeX@techreport{Tan2015, author = {Tan, Yue and Wang, Bo and Zhao, Meijuan and Kong, Xiangwei and Li, Ming}, title = {Patch-based Sensor Pattern Noise for Camera Source Identification}, school = {School of Information and Communication Engineering Dalian University of Technology Dalian, Liaoning, 116024, P. R. China}, year = {2015}}
-
Fusion of SIFT and Hue Moments Features for Cloning Tamper Detection
Proc. Int. Conf. Applied and Theoretical Computing and Communication Technology (iCATccT)
2015, pp. 409-414
DOI: 10.1109/ICATCCT.2015.7456918
BibTeX@inproceedings{Tatkare2015, author = {Tatkare, K. A. and Mane, V.}, title = {Fusion of SIFT and Hue Moments Features for Cloning Tamper Detection}, booktitle = {Proc. Int. Conf. Applied and Theoretical Computing and Communication Technology (iCATccT)}, year = {2015}, pages = {409--414}}
-
Enhancment of Image Tampering Detection Using JPEG's Quantization and Re-interpolation Processes
Proc. IEEE 39th Annual Computer Software and Applications Conf. (COMPSAC)
2015, Vol. 3, pp. 35-39
DOI: 10.1109/COMPSAC.2015.167
BibTeX@inproceedings{Teerakanok2015, author = {Teerakanok, S. and Tetsutaro, U.}, title = {Enhancment of Image Tampering Detection Using JPEG's Quantization and Re-interpolation Processes}, booktitle = {Proc. IEEE 39th Annual Computer Software and Applications Conf. (COMPSAC)}, year = {2015}, volume = {3}, pages = {35--39}}
-
Generalized Signal-dependent Noise Model and Parameter Estimation for Natural Images
Signal Processing, 2015(0), pp. -
DOI: 10.1016/j.sigpro.2015.02.020
BibTeX@article{Thai2015, author = {Thai, Thanh Hai and Retraint, Florent and Cogranne, Rémi}, title = {Generalized Signal-dependent Noise Model and Parameter Estimation for Natural Images}, journal = {Signal Processing}, year = {2015}, number = {0}, pages = {-}}
-
Camera Model Identification Based on DCT\ Coefficient Statistics
Digital Signal Processing, 2015(0), pp. -
DOI: 10.1016/j.dsp.2015.01.002
BibTeX@article{Thai2015a, author = {Thai, Thanh Hai and Retraint, Florent and Cogranne, Rémi}, title = {Camera Model Identification Based on DCT\ Coefficient Statistics}, journal = {Digital Signal Processing}, year = {2015}, number = {0}, pages = {-}}
-
An Image Recapture Detection Algorithm Based on Learning Dictionaries of Edge Profiles
IEEE Transactions on Information Forensics and Security, 2015, Vol. 10(5), pp. 953-968
DOI: 10.1109/TIFS.2015.2392566
BibTeX@article{Thongkamwitoon2015, author = {Thongkamwitoon, T. and Muammar, H. and Dragotti, P. L.}, title = {An Image Recapture Detection Algorithm Based on Learning Dictionaries of Edge Profiles}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2015}, volume = {10}, number = {5}, pages = {953--968}}
-
Reducing Forged Features Using Tampered and Inconsistent Image Detection Techniques in Digital Image Processing
Proc. Fifth Int Communication Systems and Network Technologies (CSNT) Conf
2015, pp. 564-567
DOI: 10.1109/CSNT.2015.286
BibTeX@inproceedings{Tiwari2015, author = {Tiwari, N. and Dubey, D. and Goyal, A.}, title = {Reducing Forged Features Using Tampered and Inconsistent Image Detection Techniques in Digital Image Processing}, booktitle = {Proc. Fifth Int Communication Systems and Network Technologies (CSNT) Conf}, year = {2015}, pages = {564--567}}
-
Combining Cellular Automata and Local Binary Patterns for Copy-move Forgery Detection
Multimedia Tools and Applications, Springer, 2015, pp. 1
DOI: 10.1007/s11042-015-2961-2
BibTeX@article{Tralic2015, author = {Tralic, Dijana and Grgic, Sonja and Sun, Xianfang and Rosin, Paul L.}, title = {Combining Cellular Automata and Local Binary Patterns for Copy-move Forgery Detection}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2015}, pages = {1}}
-
Source Camera Model Identification Using Features from Contaminated Sensor Noise
The 14th International Workshop on Digital-forensics and Watermarking IWDW 2015, 2015
BibTeX@article{Tuama2015, author = {Tuama, Amel and Comby, Frederic and Chaumont, Marc}, title = {Source Camera Model Identification Using Features from Contaminated Sensor Noise}, journal = {The 14th International Workshop on Digital-forensics and Watermarking IWDW 2015}, year = {2015}}
-
Detection of Copy-move Forgery Using Dogcode
Proc. 23th Signal Processing and Communications Applications Conf. (SIU)
2015, pp. 2366-2369
DOI: 10.1109/SIU.2015.7130356
BibTeX@inproceedings{Turk2015, author = {Turk, Salih and Bingol, Ozkan and Ulutas, Guzin}, title = {Detection of Copy-move Forgery Using Dogcode}, booktitle = {Proc. 23th Signal Processing and Communications Applications Conf. (SIU)}, year = {2015}, pages = {2366--2369}}
-
Copy Move Image Forgery Detection Using Hessian and Center Symmetric Local Binary Pattern
Proc. IEEE Confernece Open Systems (ICOS)
2015, pp. 7-11
DOI: 10.1109/ICOS.2015.7377269
BibTeX@inproceedings{Uliyan2015, author = {Uliyan, D. M. and Jalab, H. A. and Wahab, A. W. A.}, title = {Copy Move Image Forgery Detection Using Hessian and Center Symmetric Local Binary Pattern}, booktitle = {Proc. IEEE Confernece Open Systems (ICOS)}, year = {2015}, pages = {7--11}}
-
Image Forgery Detection Based on Colour SIFT
Proc. 23th Signal Processing and Communications Applications Conf. (SIU)
2015, pp. 1741-1744
DOI: 10.1109/SIU.2015.7130189
BibTeX@inproceedings{Ustubioglu2015, author = {Ustubioglu, Beste and Ayas, Selen and Dogan, Hulya and Ulutas, Guzin}, title = {Image Forgery Detection Based on Colour SIFT}, booktitle = {Proc. 23th Signal Processing and Communications Applications Conf. (SIU)}, year = {2015}, pages = {1741--1744}}
-
A novel keypoint based forgery detection method based on local phase quantization and SIFT
Proc. 9th Int. Conf. Electrical and Electronics Engineering (ELECO)
2015, pp. 185-189
DOI: 10.1109/ELECO.2015.7394438
BibTeX@inproceedings{Ustubioglu2015c, author = {Ustubioglu, B. and Muzaffer, G. and Ulutas, G. and Nabiyev, V. and Ulutas, M.}, title = {A novel keypoint based forgery detection method based on local phase quantization and SIFT}, booktitle = {Proc. 9th Int. Conf. Electrical and Electronics Engineering (ELECO)}, year = {2015}, pages = {185--189}}
-
Image Forgery Detection Using Colour Moments
Proc. 38th Int Telecommunications and Signal Processing (TSP) Conf
2015, pp. 540-544
DOI: 10.1109/TSP.2015.7296321
BibTeX@inproceedings{Ustubioglu2015b, author = {Ustubioglu, B. and Nabiyev, V. and Ulutas, G. and Ulutas, M.}, title = {Image Forgery Detection Using Colour Moments}, booktitle = {Proc. 38th Int Telecommunications and Signal Processing (TSP) Conf}, year = {2015}, pages = {540--544}}
-
Image Forgery Detection Based on Energy Probability
Proc. 23th Signal Processing and Communications Applications Conf. (SIU)
2015, pp. 919-922
DOI: 10.1109/SIU.2015.7129980
BibTeX@inproceedings{Ustubioglu2015a, author = {Ustubioglu, Beste and Ulutas, Guzin and Nabiyev, Vasif and Ulutas, Mustafa}, title = {Image Forgery Detection Based on Energy Probability}, booktitle = {Proc. 23th Signal Processing and Communications Applications Conf. (SIU)}, year = {2015}, pages = {919--922}}
-
Anti-Forensics of Multimedia Data and Countermeasures
Ho/Handbook of Digital Forensics of Multimedia Data and Devices
Wiley-Blackwell, 2015, pp. 612-651
DOI: 10.1002/9781118705773.ch16
BibTeX@incollection{Valenzise2015, author = {Valenzise, Giuseppe and Tubaro, Stefano and Tagliasacchi, Marco}, title = {Anti-Forensics of Multimedia Data and Countermeasures}, booktitle = {Ho/Handbook of Digital Forensics of Multimedia Data and Devices}, publisher = {Wiley-Blackwell}, year = {2015}, pages = {612--651}}
-
Compressed Fingerprint Matching and Camera Identification Via Random Projections
IEEE Transactions on Information Forensics and Security, 2015, Vol. 10(7), pp. 1472-1485
DOI: 10.1109/TIFS.2015.2415461
BibTeX@article{Valsesia2015, author = {Valsesia, D. and Coluccia, G. and Bianchi, T. and Magli, E.}, title = {Compressed Fingerprint Matching and Camera Identification Via Random Projections}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2015}, volume = {10}, number = {7}, pages = {1472--1485}}
-
Image Retrieval Based on Compressed Camera Sensor Fingerprints
Proc. IEEE Int Multimedia and Expo (ICME) Conf
2015, pp. 1-6
DOI: 10.1109/ICME.2015.7177454
BibTeX@inproceedings{Valsesia2015a, author = {Valsesia, D. and Coluccia, G. and Bianchi, T. and Magli, E.}, title = {Image Retrieval Based on Compressed Camera Sensor Fingerprints}, booktitle = {Proc. IEEE Int Multimedia and Expo (ICME) Conf}, year = {2015}, pages = {1--6}}
-
Large-scale Image Retrieval Based on Compressed Camera Identification
IEEE Transactions on Multimedia, 2015, Vol. 17(9), pp. 1439-1449
DOI: 10.1109/TMM.2015.2455417
BibTeX@article{Valsesia2015b, author = {Valsesia, D. and Coluccia, G. and Bianchi, T. and Magli, E.}, title = {Large-scale Image Retrieval Based on Compressed Camera Identification}, journal = {IEEE Transactions on Multimedia}, year = {2015}, volume = {17}, number = {9}, pages = {1439--1449}}
-
Scale-robust Compressive Camera Fingerprint Matching with Random Projections
Proc. IEEE Int Acoustics, Speech and Signal Processing (ICASSP) Conf
2015, pp. 1697-1701
DOI: 10.1109/ICASSP.2015.7178260
BibTeX@inproceedings{Valsesia2015c, author = {Valsesia, D. and Coluccia, G. and Bianchi, T. and Magli, E.}, title = {Scale-robust Compressive Camera Fingerprint Matching with Random Projections}, booktitle = {Proc. IEEE Int Acoustics, Speech and Signal Processing (ICASSP) Conf}, year = {2015}, pages = {1697--1701}}
-
Detection of Image Resampling and Video Encoding Footprints for Forensic Applications
University of Vigo, Universida de Vigo, 2015
BibTeX@phdthesis{Vazquez-Padin2015a, author = {Vázquez-Padín, David}, title = {Detection of Image Resampling and Video Encoding Footprints for Forensic Applications}, school = {University of Vigo}, year = {2015}}
-
An SVD Approach to Forensic Image Resampling Detection
Proceedings of the 23th European Signal Processing Conference (EUSIPCO 2015)
Proceedings of the 16th European Signal Processing Conference (EUSIPCO 2008), 2015
DOI: 10.1109/eusipco.2015.7362748
BibTeX@inproceedings{Vazquez-Padin2015, author = {Vazquez-Padın, David and Comesana, Pedro and Perez-Gonzalez, Fernando}, title = {An SVD Approach to Forensic Image Resampling Detection}, booktitle = {Proceedings of the 23th European Signal Processing Conference (EUSIPCO 2015)}, journal = {Proceedings of the 16th European Signal Processing Conference (EUSIPCO 2008)}, year = {2015}}
-
Brightness Distribution Based Image Tampering Detection
Signal Processing, Informatics, Communication and Energy Systems (SPICES), 2015 IEEE International Conference on
2015, pp. 1-5
DOI: 10.1109/SPICES.2015.7091555
BibTeX@inproceedings{Vidyadharan2015, author = {Vidyadharan, D. S. and Thampi, S. M.}, title = {Brightness Distribution Based Image Tampering Detection}, booktitle = {Signal Processing, Informatics, Communication and Energy Systems (SPICES), 2015 IEEE International Conference on}, year = {2015}, pages = {1--5}}
-
Image classifier based digital image forensic detection-a review and simulations
Proc. Computer Science and Technology (ICERECT) 2015 Int. Conf. Emerging Research in Electronics
2015, pp. 23-28
DOI: 10.1109/ERECT.2015.7498981
BibTeX@inproceedings{VijayalakshmiV2015, author = {Vijayalakshmi V, S. and Shwetha, B. and Sathyanarayana, S. V.}, title = {Image classifier based digital image forensic detection-a review and simulations}, booktitle = {Proc. Computer Science and Technology (ICERECT) 2015 Int. Conf. Emerging Research in Electronics}, year = {2015}, pages = {23--28}}
-
Classifier Combination Based Source Identification for Cell Phone Images
KSII Transactions on Internet and Information Systems (TIIS), 2015, Vol. 9(12), pp. 5087-5102
DOI: 10.1109/chinasip.2015.7230528
BibTeX@article{Wang2015b, author = {Wang, Bo and Tan, Yue and Zhao, Meijuan and Guo, Yanqing and Kong, Xiangwei}, title = {Classifier Combination Based Source Identification for Cell Phone Images}, journal = {KSII Transactions on Internet and Information Systems (TIIS)}, year = {2015}, volume = {9}, number = {12}, pages = {5087--5102}}
-
A Survey of Digital Image Blind Detection Based on Tampering Trace
Electronic Science and Technology, 2015
BibTeX@article{Wang2015, author = {Wang, Chenlu and Zhu, Tingge}, title = {A Survey of Digital Image Blind Detection Based on Tampering Trace}, journal = {Electronic Science and Technology}, year = {2015}}
-
Blind Detection of JPEG Composite Images Based on Quantization Noise Analysis
Information, Computer and Application Engineering, 2015
BibTeX@article{Wang2015a, author = {Wang, Zhi Hong}, title = {Blind Detection of JPEG Composite Images Based on Quantization Noise Analysis}, journal = {Information, Computer and Application Engineering}, year = {2015}}
-
An Evaluation of Error Level Analysis in Image Forensics
Proc. 5th IEEE Int. Conf. System Engineering and Technology (ICSET)
2015, pp. 23-28
DOI: 10.1109/ICSEngT.2015.7412439
BibTeX@inproceedings{Warif2015, author = {Warif, N. B. A. and Idris, M. Y. I. and Wahab, A. W. A. and Salleh, R.}, title = {An Evaluation of Error Level Analysis in Image Forensics}, booktitle = {Proc. 5th IEEE Int. Conf. System Engineering and Technology (ICSET)}, year = {2015}, pages = {23--28}}
-
An evaluation of Error Level Analysis in image forensics
Proc. 5th IEEE Int. Conf. System Engineering and Technology (ICSET)
2015, pp. 23-28
DOI: 10.1109/ICSEngT.2015.7412439
BibTeX@inproceedings{Warif2015a, author = {Warif, N. B. A. and Idris, M. Y. I. and Wahab, A. W. A. and Salleh, R.}, title = {An evaluation of Error Level Analysis in image forensics}, booktitle = {Proc. 5th IEEE Int. Conf. System Engineering and Technology (ICSET)}, year = {2015}, pages = {23--28}}
-
Multimedia Analytics for Image Collection Forensics
Ho/Handbook of Digital Forensics of Multimedia Data and Devices
Wiley-Blackwell, 2015, pp. 305-327
DOI: 10.1002/9781118705773.ch8
BibTeX@incollection{Worring2015, author = {Worring, Marcel}, title = {Multimedia Analytics for Image Collection Forensics}, booktitle = {Ho/Handbook of Digital Forensics of Multimedia Data and Devices}, publisher = {Wiley-Blackwell}, year = {2015}, pages = {305--327}}
-
A Printer Forensics Method Using Halftone Dot Arrangement Model
Proc. IEEE China Summit and Int Signal and Information Processing (ChinaSIP) Conf
2015, pp. 861-865
DOI: 10.1109/ChinaSIP.2015.7230527
BibTeX@inproceedings{Wu2015, author = {Wu, Han and Kong, Xiangwei and Shang, Shize}, title = {A Printer Forensics Method Using Halftone Dot Arrangement Model}, booktitle = {Proc. IEEE China Summit and Int Signal and Information Processing (ChinaSIP) Conf}, year = {2015}, pages = {861--865}}
-
Active tamper detection of digital images using VQ compression
Proc. IEEE Int Consumer Electronics - Taiwan (ICCE-TW) Conf
2015, pp. 508-509
DOI: 10.1109/ICCE-TW.2015.7217025
BibTeX@inproceedings{Wu2015b, author = {Wu, W. C. and Hsu, H. F. and Lin, P. Y.}, title = {Active tamper detection of digital images using VQ compression}, booktitle = {Proc. IEEE Int Consumer Electronics - Taiwan (ICCE-TW) Conf}, year = {2015}, pages = {508--509}}
-
New Developments in Image Tampering Detection
Digital-Forensics and Watermarking, Springer, 2015
DOI: 10.1007/978-3-319-19321-2_1
BibTeX@article{Xu2015, author = {Xu, Guanshuo and Ye, Jingyu and Shi, Yun-Qing}, title = {New Developments in Image Tampering Detection}, journal = {Digital-Forensics and Watermarking}, publisher = {Springer}, year = {2015}}
-
Forensic Detection of Gaussian Low-pass Filtering in Digital Images
Proc. 8th Int. Congress Image and Signal Processing (CISP)
2015, pp. 819-823
DOI: 10.1109/CISP.2015.7407990
BibTeX@inproceedings{Xu2015a, author = {Xu, J. and Ling, Y. and Zheng, X.}, title = {Forensic Detection of Gaussian Low-pass Filtering in Digital Images}, booktitle = {Proc. 8th Int. Congress Image and Signal Processing (CISP)}, year = {2015}, pages = {819--823}}
-
Copy move forgery detection using SIFT and GMM
Proc. 5th Nirma University Int. Conf. Engineering (NUiCONE)
2015, pp. 1-4
DOI: 10.1109/NUICONE.2015.7449647
BibTeX@inproceedings{Yadav2015, author = {Yadav, N. and Kapdi, R.}, title = {Copy move forgery detection using SIFT and GMM}, booktitle = {Proc. 5th Nirma University Int. Conf. Engineering (NUiCONE)}, year = {2015}, pages = {1--4}}
-
Exposing Photographic Splicing by Detecting the Inconsistencies in Shadows
The Computer Journal, 2015, Vol. 58(4), pp. 588-600
DOI: 10.1093/comjnl/bxu146
BibTeX@article{Yang2015e, author = {Yang, B. and Sun, X. and Chen, X. and Zhang, J. and Li, X.}, title = {Exposing Photographic Splicing by Detecting the Inconsistencies in Shadows}, journal = {The Computer Journal}, year = {2015}, volume = {58}, number = {4}, pages = {588--600}}
-
Image Copy-move Forgery Detection Based on Sped-up Robust Features Descriptor and Adaptive Minimal-maximal Suppression
Journal of Electronic Imaging, 2015, Vol. 24(6), pp. 063016
DOI: 10.1117/1.JEI.24.6.063016
BibTeX@article{Yang2015d, author = {Yang, Bin and Sun, Xingming and Xin, Xiangyang and Hu, Weifeng and Wu, Youxin}, title = {Image Copy-move Forgery Detection Based on Sped-up Robust Features Descriptor and Adaptive Minimal-maximal Suppression}, journal = {Journal of Electronic Imaging}, year = {2015}, volume = {24}, number = {6}, pages = {063016}}
-
Erratum to: A Novel Image Splicing Forensic Algorithm Based on Generalized Dct Coefficient-pair Histogram
Advances in Image and Graphics Technologies
Springer, 2015
DOI: 10.1007/978-3-662-47791-5_51
BibTeX@incollection{Yang2015c, author = {Yang, Fusheng and Gao, Tiegang}, title = {Erratum to: A Novel Image Splicing Forensic Algorithm Based on Generalized Dct Coefficient-pair Histogram}, booktitle = {Advances in Image and Graphics Technologies}, publisher = {Springer}, year = {2015}}
-
Estimating JPEG Compression History of Bitmaps Based on Factor Histogram
Digital Signal Processing, 2015, Vol. 41, pp. 90-97
DOI: 10.1016/j.dsp.2015.03.014
BibTeX@article{Yang2015b, author = {Yang, Jianquan and Zhu, Guopu and Huang, Jiwu and Zhao, Xi}, title = {Estimating JPEG Compression History of Bitmaps Based on Factor Histogram}, journal = {Digital Signal Processing}, year = {2015}, volume = {41}, pages = {90--97}}
-
Image Tamper Detection Based on Noise Estimation and Lacunarity Texture
Multimedia Tools and Applications, Springer, 2015, pp. 1
DOI: 10.1007/s11042-015-3079-2
BibTeX@article{Yang2015a, author = {Yang, Qiuwei and Peng, Fei and Li, Jiao-Ting and Long, Min}, title = {Image Tamper Detection Based on Noise Estimation and Lacunarity Texture}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2015}, pages = {1}}
-
Detecting of Copy-move Forgery in Digital Images Using Fractional Fourier Transform
Falco, C. M. & Jiang, X. (ed.)
Proc. of the Seventh International Conference on Digital Image Processing: ICDIP 2015
Proc. SPIE, SPIE-Intl Soc Optical Eng, 2015, Vol. 9631, pp. 96310B-96310B-6
DOI: 10.1117/12.2197146
BibTeX@inproceedings{Yang2015, author = {Yang, Renqing and Bai, Zhengyao and Yin, Liguo and Gao, Hao}, title = {Detecting of Copy-move Forgery in Digital Images Using Fractional Fourier Transform}, booktitle = {Proc. of the Seventh International Conference on Digital Image Processing: ICDIP 2015}, journal = {Proc. SPIE}, publisher = {SPIE-Intl Soc Optical Eng}, year = {2015}, volume = {9631}, pages = {96310B-96310B-6}}
-
Detecting Seam Carving Based Image Resizing Using Local Binary Patterns
Computers & Security, Elsevier BV, 2015, Vol. 55, pp. 130-141
DOI: 10.1016/j.cose.2015.09.003
BibTeX@article{Yin2015, author = {Yin, Ting and Yang, Gaobo and Li, Leida and Zhang, Dengyong and Sun, Xingming}, title = {Detecting Seam Carving Based Image Resizing Using Local Binary Patterns}, journal = {Computers & Security}, publisher = {Elsevier BV}, year = {2015}, volume = {55}, pages = {130--141}}
-
Pixel and Edge Based Illuminant Color Estimation for Image Forgery Detection
Procedia Computer Science, 2015, Vol. 46(0), pp. 1635-1642
DOI: 10.1016/j.procs.2015.02.099
BibTeX@article{Youseph2015, author = {Youseph, Shahana N. and Cherian, Rajesh Roy}, title = {Pixel and Edge Based Illuminant Color Estimation for Image Forgery Detection}, journal = {Procedia Computer Science}, year = {2015}, volume = {46}, number = {0}, pages = {1635--1642}}
-
An Improved Parameter Estimation Scheme for Image Modification Detection Based on DCT Coefficient Analysis
Forensic Science International, 2015
DOI: 10.1016/j.forsciint.2015.10.024
BibTeX@article{Yu2015, author = {Yu, Liyang and Han, Qi and Yao, S. M. and Fang, Junbin}, title = {An Improved Parameter Estimation Scheme for Image Modification Detection Based on DCT Coefficient Analysis}, journal = {Forensic Science International}, year = {2015}}
-
Detecting Image Splicing in the Wild (web)
Proc. IEEE Int Multimedia & Expo Workshops (ICMEW) Conf
2015, pp. 1-6
DOI: 10.1109/ICMEW.2015.7169839
BibTeX@inproceedings{Zampoglou2015, author = {Zampoglou, M. and Papadopoulos, S. and Kompatsiaris, Y.}, title = {Detecting Image Splicing in the Wild (web)}, booktitle = {Proc. IEEE Int Multimedia & Expo Workshops (ICMEW) Conf}, year = {2015}, pages = {1--6}}
-
Exposing Blurred Image Forgeries through Blind Image Restoration
Proc. Cloud and Internet Computing (3PGCIC) 2015 10th Int. Conf. P2P, Parallel, Grid
2015, pp. 466-469
DOI: 10.1109/3PGCIC.2015.50
BibTeX@inproceedings{Zeng2015b, author = {Zeng, F. and Wang, W. and Tang, M. and Cao, Z.}, title = {Exposing Blurred Image Forgeries through Blind Image Restoration}, booktitle = {Proc. Cloud and Internet Computing (3PGCIC) 2015 10th Int. Conf. P2P, Parallel, Grid}, year = {2015}, pages = {466--469}}
-
Rebuilding the Credibility of Sensor-based Camera Source Identification
Multimedia Tools and Applications, Springer, 2015, pp. 1
DOI: 10.1007/s11042-015-3072-9
BibTeX@article{Zeng2015a, author = {Zeng, Hui}, title = {Rebuilding the Credibility of Sensor-based Camera Source Identification}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2015}, pages = {1}}
-
Removing Camera Fingerprint to Disguise Photograph Source
Proc. IEEE Int Image Processing (ICIP) Conf
2015, pp. 1687-1691
DOI: 10.1109/ICIP.2015.7351088
BibTeX@inproceedings{Zeng2015, author = {Zeng, Hui and Chen, Jiansheng and Kang, Xiangui and Zeng, Wenjun}, title = {Removing Camera Fingerprint to Disguise Photograph Source}, booktitle = {Proc. IEEE Int Image Processing (ICIP) Conf}, year = {2015}, pages = {1687--1691}}
-
Passive Forensics for Image Splicing Based on PCA Noise Estimation
Proc. 10th Int. Conf. for Internet Technology and Secured Transactions (ICITST)
2015, pp. 78-83
DOI: 10.1109/ICITST.2015.7412062
BibTeX@inproceedings{Zhan2015, author = {Zhan, L. and Zhu, Y.}, title = {Passive Forensics for Image Splicing Based on PCA Noise Estimation}, booktitle = {Proc. 10th Int. Conf. for Internet Technology and Secured Transactions (ICITST)}, year = {2015}, pages = {78--83}}
-
Passive forensics for image splicing based on PCA noise estimation
Proc. 10th Int. Conf. for Internet Technology and Secured Transactions (ICITST)
2015, pp. 78-83
DOI: 10.1109/ICITST.2015.7412062
BibTeX@inproceedings{Zhan2015a, author = {Zhan, L. and Zhu, Y.}, title = {Passive forensics for image splicing based on PCA noise estimation}, booktitle = {Proc. 10th Int. Conf. for Internet Technology and Secured Transactions (ICITST)}, year = {2015}, pages = {78--83}}
-
Identifying Image Splicing Based on Local Statistical Features in DCT and DWT Domain
Mu, J., Liang, Q., Wang, W., Zhang, B. & Pi, Y. (ed.)
The Proceedings of the Third International Conference on Communications, Signal Processing, and Systems
Springer International Publishing, 2015, Vol. 322, pp. 723-731
DOI: 10.1007/978-3-319-08991-1_75
BibTeX@incollection{Zhang2015, author = {Zhang, Yujin and Li, Shenghong and Wang, Shilin and Zhao, Xudong}, title = {Identifying Image Splicing Based on Local Statistical Features in DCT and DWT Domain}, booktitle = {The Proceedings of the Third International Conference on Communications, Signal Processing, and Systems}, publisher = {Springer International Publishing}, year = {2015}, volume = {322}, pages = {723--731}}
-
Effective Digital Image Copy-move Location Algorithm Robust to Geometric Transformations
Proc. IEEE Int Signal Processing, Communications and Computing (ICSPCC) Conf
2015, pp. 1-5
DOI: 10.1109/ICSPCC.2015.7338958
BibTeX@inproceedings{Zhao2015c, author = {Zhao, Fuxing and Zhang, Rong and Guo, Haolong and Zhang, Yanhua}, title = {Effective Digital Image Copy-move Location Algorithm Robust to Geometric Transformations}, booktitle = {Proc. IEEE Int Signal Processing, Communications and Computing (ICSPCC) Conf}, year = {2015}, pages = {1--5}}
-
Research on Image Passive Forensics Based on ASIFT and Circle Projection Features
JSCUT(Natural Science Edition), 2015, Vol. 42(3)
BibTeX@article{Zhao2015, author = {Zhao, Jun-Hong}, title = {Research on Image Passive Forensics Based on ASIFT and Circle Projection Features}, journal = {JSCUT(Natural Science Edition)}, year = {2015}, volume = {42}, number = {3}}
-
Passive Image-splicing Detection by a 2-D Noncausal Markov Model
Circuits and Systems for Video Technology, IEEE Transactions on, 2015, Vol. 25(2), pp. 185-199
DOI: 10.1109/TCSVT.2014.2347513
BibTeX@article{Zhao2015a, author = {Zhao, Xudong and Wang, Shilin and Li, Shenghong and Li, Jianhua}, title = {Passive Image-splicing Detection by a 2-D Noncausal Markov Model}, journal = {Circuits and Systems for Video Technology, IEEE Transactions on}, year = {2015}, volume = {25}, number = {2}, pages = {185--199}}
-
Exposing Image Sharpen Forgeries Based on Dyadic Contrast Contourlet
nternational Journal of Multimedia and Ubiquitous Engineering, 2015, Vol. 10(7)
DOI: 10.14257/ijmue.2015.10.7.25
BibTeX@article{Zhen2015, author = {Zhen, Hua and Jinjiang, Li}, title = {Exposing Image Sharpen Forgeries Based on Dyadic Contrast Contourlet}, journal = {nternational Journal of Multimedia and Ubiquitous Engineering}, year = {2015}, volume = {10}, number = {7}}
-
Exposing Image Forgery by Detecting Traces of Feather Operation
Journal of Visual Languages & Computing, 2015, Vol. 27, pp. 9-18
DOI: 10.1016/j.jvlc.2015.02.002
BibTeX@article{Zheng2015, author = {Zheng, Jiangbin and Zhu, Tingge and Li, Zhe and Xing, Weiwei and Ren, JinChang}, title = {Exposing Image Forgery by Detecting Traces of Feather Operation}, journal = {Journal of Visual Languages & Computing}, year = {2015}, volume = {27}, pages = {9--18}}
-
Detection of Copy--move Forgery Using Discrete Analytical Fourier--mellin Transform
Nonlinear Dynamics, Springer Netherlands, 2015, pp. 1-14
DOI: 10.1007/s11071-015-2374-9
BibTeX@article{Zhong2015a, author = {Zhong, Junliu and Gan, Yanfen}, title = {Detection of Copy--move Forgery Using Discrete Analytical Fourier--mellin Transform}, journal = {Nonlinear Dynamics}, publisher = {Springer Netherlands}, year = {2015}, pages = {1--14}}
-
Discrete Polar Complex Exponential Transform for Image Rotation Duplication Detection
Advanced Science and Technology Letters, 2015
DOI: 10.14257/astl.2015.81.05
BibTeX@article{Zhong2015b, author = {Zhong, Junliu and Gan, Yanfen}, title = {Discrete Polar Complex Exponential Transform for Image Rotation Duplication Detection}, journal = {Advanced Science and Technology Letters}, year = {2015}}
-
Radon Odd Radial Harmonic Fourier Moments in Detecting Cloned Forgery Image
Chaos, Solitons & Fractals, 2015, pp. -
DOI: 10.1016/j.chaos.2015.10.010
BibTeX@article{Zhong2015, author = {Zhong, Junliu and Gan, Yanfen and Xie, Shuai}, title = {Radon Odd Radial Harmonic Fourier Moments in Detecting Cloned Forgery Image}, journal = {Chaos, Solitons & Fractals}, year = {2015}, pages = {-}}
-
Mobile Camera Source Identification Based on CFA Interpolation and Large Components of Sensor Pattern Noise
Zheng, D. (ed.)
Proceedings of the International Conference on Control, Mechatronics and Automation Technology (ICCMAT 2014)
Control, Mechatronics and Automation Technology, 2015, pp. 239243
BibTeX@inproceedings{Zhou2015, author = {Zhou, Z. . P. . and Hu, C. . Y. . and Zhou, C. . J. .}, title = {Mobile Camera Source Identification Based on CFA Interpolation and Large Components of Sensor Pattern Noise}, booktitle = {Proceedings of the International Conference on Control, Mechatronics and Automation Technology (ICCMAT 2014)}, journal = {Control, Mechatronics and Automation Technology}, year = {2015}, pages = {239243}}
-
Digital-Forensics and Watermarking
Shi, Y.-Q., Kim, H. J., Pérez-González, F. & Yang, C.-N. (ed.)
Springer International Publishing, 2015
BibTeX@book{Shi2015a,, title = {Digital-Forensics and Watermarking}, publisher = {Springer International Publishing}, year = {2015}}
2014
-
Image Forgery Detection Exploiting Image Randomness
King Saud University College of Computer & Information Sciences Department of Computer Science, King Saud University College of Computer & Information Sciences Department of Computer Science, 2014
DOI: 10.1109/cisp.2014.7003901
BibTeX@mastersthesis{AlAhmadi2014, author = {Al-Ahmadi, Amani, Ahmad}, title = {Image Forgery Detection Exploiting Image Randomness}, school = {King Saud University College of Computer & Information Sciences Department of Computer Science}, year = {2014}}
-
A Review on Copy Move Image Forgery Detection Techniques
Multi-Conference on Systems, Signals & Devices (SSD), 2014 11th International
2014, pp. 1-5
DOI: 10.1109/SSD.2014.6808907
BibTeX@inproceedings{AliQureshi2014, author = {Ali Qureshi, M. and Deriche, M.}, title = {A Review on Copy Move Image Forgery Detection Techniques}, booktitle = {Multi-Conference on Systems, Signals & Devices (SSD), 2014 11th International}, year = {2014}, pages = {1--5}}
-
Exploiting Perceptual Quality Issues in Countering SIFT-based Forensic Methods
Acoustics, Speech and Signal Processing (ICASSP), 2014 IEEE International Conference on
2014, pp. 2664-2668
DOI: 10.1109/ICASSP.2014.6854083
BibTeX@inproceedings{Amerini2014b, author = {Amerini, Irene and Battisti, F. and Caldelli, R. and Carli, M. and Costanzo, A.}, title = {Exploiting Perceptual Quality Issues in Countering SIFT-based Forensic Methods}, booktitle = {Acoustics, Speech and Signal Processing (ICASSP), 2014 IEEE International Conference on}, year = {2014}, pages = {2664--2668}}
-
Splicing Forgeries Localization through the Use of First Digit Features
2014 IEEE International Workshop on Information Forensics and Security (WIFS)
Institute of Electrical & Electronics Engineers (IEEE), 2014, pp. 143-148
DOI: 10.1109/WIFS.2014.7084318
BibTeX@inproceedings{Amerini2014c, author = {Amerini, Irene and Becarelli, Rudy and Caldelli, Roberto and Mastio, Andrea Del}, title = {Splicing Forgeries Localization through the Use of First Digit Features}, booktitle = {2014 IEEE International Workshop on Information Forensics and Security (WIFS)}, publisher = {Institute of Electrical & Electronics Engineers (IEEE)}, year = {2014}, pages = {143--148}}
-
Blind Image Clustering Based on the Normalized Cuts Criterion for Camera Identification
Signal Processing: Image Communication, 2014(0), pp. -
DOI: 10.1016/j.image.2014.07.003
BibTeX@article{Amerini2014a, author = {Amerini, Irene and Caldelli, R. and Crescenzi, P. and Mastio, A. Del and Marino, A.}, title = {Blind Image Clustering Based on the Normalized Cuts Criterion for Camera Identification}, journal = {Signal Processing: Image Communication}, year = {2014}, number = {0}, pages = {-}}
-
Copy-move Forgery Detection from Printed Images
Alattar, A. M., Memon, N. D. & Heitzenrater, C. D. (ed.)
Proc. SPIE 9028, Media Watermarking, Security, and Forensics 2014
Proc. SPIE, 2014, Vol. 9028, pp. 90280Y-90280Y-10
DOI: 10.1117/12.2039509
BibTeX@inproceedings{Amerini2014, author = {Amerini, Irene and Caldelli, Roberto and Del Bimbo, Alberto and Di Fuccia, Andrea and Saravo, Luigi and Rizzo, Anna Paola}, title = {Copy-move Forgery Detection from Printed Images}, booktitle = {Proc. SPIE 9028, Media Watermarking, Security, and Forensics 2014}, journal = {Proc. SPIE}, year = {2014}, volume = {9028}, pages = {90280Y-90280Y-10}}
-
Passive Image Forensic Method to Detect Copy Move Forgery in Digital Images
IOSR Journal of Computer Engineering (IOSR-JCE), 2014, Vol. 16(2), pp. 96-104
DOI: 10.9790/0661-1621296104
BibTeX@article{Amtullah2014, author = {Amtullah, Salma and Koul, Ajay}, title = {Passive Image Forensic Method to Detect Copy Move Forgery in Digital Images}, journal = {IOSR Journal of Computer Engineering (IOSR-JCE)}, year = {2014}, volume = {16}, number = {2}, pages = {96--104}}
-
A Copy Move Forgery Detection to Overcome Sustained Attacks Using Dyadic Wavelet Transform and SIFT Methods
Nguyen, N., Attachoo, B., Trawiński, B. & Somboonviwat, K. (ed.)
Intelligent Information and Database Systems
Springer International Publishing, 2014, Vol. 8397, pp. 530-542
DOI: 10.1007/978-3-319-05476-6_54
BibTeX@incollection{Anand2014, author = {Anand, Vijay and Hashmi, Mohammad Farukh and Keskar, Avinash G.}, title = {A Copy Move Forgery Detection to Overcome Sustained Attacks Using Dyadic Wavelet Transform and SIFT Methods}, booktitle = {Intelligent Information and Database Systems}, publisher = {Springer International Publishing}, year = {2014}, volume = {8397}, pages = {530--542}}
-
Exposing Digital Image Forgeries by Illumination Color Classification
International Journal of Engineering Trends and Technology, 2014, Vol. 18(6), pp. 269-271
DOI: 10.14445/22315381/IJETT-V18P255
BibTeX@article{Asati2014, author = {Asati, Ms. Shraddha R. and P.R.Pardhi, Mr.}, title = {Exposing Digital Image Forgeries by Illumination Color Classification}, journal = {International Journal of Engineering Trends and Technology}, year = {2014}, volume = {18}, number = {6}, pages = {269--271}}
-
JPEG Copy Paste Forgery Detection Using Bag Optimized for Complex Images
Advanced Communication Technology (ICACT), 2014 16th International Conference on
2014, pp. 181-185
DOI: 10.1109/ICACT.2014.6778945
BibTeX@inproceedings{Ayalneh2014, author = {Ayalneh, Dessalegn Atnafu and Kim, Hyoung Joong and Choi, Yong Soo}, title = {JPEG Copy Paste Forgery Detection Using Bag Optimized for Complex Images}, booktitle = {Advanced Communication Technology (ICACT), 2014 16th International Conference on}, year = {2014}, pages = {181--185}}
-
Image Tampering Detection by Exposing Blur Type Inconsistency
Acoustics, Speech and Signal Processing (ICASSP), 2014 IEEE International Conference on
Institute of Electrical & Electronics Engineers (IEEE), 2014, pp. 2654-2658
DOI: 10.1109/ICASSP.2014.6854081
BibTeX@inproceedings{Bahrami2014, author = {Bahrami, K. and Kot, A. C.}, title = {Image Tampering Detection by Exposing Blur Type Inconsistency}, booktitle = {Acoustics, Speech and Signal Processing (ICASSP), 2014 IEEE International Conference on}, publisher = {Institute of Electrical & Electronics Engineers (IEEE)}, year = {2014}, pages = {2654--2658}}
-
Image Forgery Detection Using Feature Based Clustering in JPEG Images
Industrial and Information Systems (ICIIS), 2014 9th International Conference on
2014, pp. 1-5
DOI: 10.1109/ICIINFS.2014.7036583
BibTeX@inproceedings{Bhartiya2014, author = {Bhartiya, Gunjan and Jalal, Anand Singh}, title = {Image Forgery Detection Using Feature Based Clustering in JPEG Images}, booktitle = {Industrial and Information Systems (ICIIS), 2014 9th International Conference on}, year = {2014}, pages = {1--5}}
-
Blind Method for Rescaling Detection and Rescale Factor Estimation in Digital Images Using Periodic Properties of Interpolation
AEU - International Journal of Electronics and Communications, 2014(0), pp. -
DOI: 10.1016/j.aeue.2014.01.013
BibTeX@article{Birajdar2014, author = {Birajdar, Gajanan K. and Mankar, Vijay H.}, title = {Blind Method for Rescaling Detection and Rescale Factor Estimation in Digital Images Using Periodic Properties of Interpolation}, journal = {AEU - International Journal of Electronics and Communications}, year = {2014}, number = {0}, pages = {-}}
-
Image Splicing Detection Based on Improved Markov Model
Zhang, B., Mu, J., Wang, W., Liang, Q. & Pi, Y. (ed.)
The Proceedings of the Second International Conference on Communications, Signal Processing, and Systems
Springer International Publishing, 2014, Vol. 246, pp. 127-135
DOI: 10.1007/978-3-319-00536-2_15
BibTeX@incollection{Bo2014, author = {Bo, Su and Quan-qiao, Yuan and Shi-lin, Wang and Cheng-lin, Zhao and Shen-ghong, Li}, title = {Image Splicing Detection Based on Improved Markov Model}, booktitle = {The Proceedings of the Second International Conference on Communications, Signal Processing, and Systems}, publisher = {Springer International Publishing}, year = {2014}, volume = {246}, pages = {127--135}}
-
Mobile Device Identification Via Sensor Fingerprinting
2014
BibTeX@electronic{Bojinov2014, author = {Bojinov, Hristo and Boneh, Dan and Michakevsky, Yan and Nakibly, Gabi}, title = {Mobile Device Identification Via Sensor Fingerprinting}, year = {2014}}
-
Contrast Enhancement Based Forensics in Digital Images
Information Forensics and Security, IEEE Transactions on, Institute of Electrical & Electronics Engineers (IEEE), 2014, Vol. 9(99), pp. 515-525
DOI: 10.1109/TIFS.2014.2300937
BibTeX@article{Cao2014a, author = {Cao, G. and Zhao, Y. and Ni, R. and Li, X.}, title = {Contrast Enhancement Based Forensics in Digital Images}, journal = {Information Forensics and Security, IEEE Transactions on}, publisher = {Institute of Electrical & Electronics Engineers (IEEE)}, year = {2014}, volume = {9}, number = {99}, pages = {515--525}}
-
Contrast Enhancement-Based Forensics in Digital Images
#IEEE_J_IFS#, 2014, Vol. 9(3), pp. 515-525
DOI: 10.1109/TIFS.2014.2300937
BibTeX@article{Cao2014c, author = {Cao, G. and Zhao, Y. and Ni, R. and Li, X.}, title = {Contrast Enhancement-Based Forensics in Digital Images}, journal = {#IEEE_J_IFS#}, year = {2014}, volume = {9}, number = {3}, pages = {515--525}}
-
Forensic Detection of Noise Addition in Digital Images
Journal of Electronic Imaging, SPIE-Intl Soc Optical Eng, 2014, Vol. 23(2), pp. 023004
DOI: 10.1117/1.JEI.23.2.023004
BibTeX@article{Cao2014b, author = {Cao, Gang and Zhao, Yao and Ni, Rongrong and Ou, Bo and Wang, Yongbin}, title = {Forensic Detection of Noise Addition in Digital Images}, journal = {Journal of Electronic Imaging}, publisher = {SPIE-Intl Soc Optical Eng}, year = {2014}, volume = {23}, number = {2}, pages = {023004}}
-
Attacking Contrast Enhancement Forensics in Digital Images
Science China Information Sciences, Springer Berlin Heidelberg, 2014, Vol. 57(5), pp. 1-13
DOI: 10.1007/s11432-013-4928-0
BibTeX@article{Cao2014, author = {Cao, Gang and Zhao, Yao and Ni, RongRong and Tian, HuaWei and Yu, LiFang}, title = {Attacking Contrast Enhancement Forensics in Digital Images}, journal = {Science China Information Sciences}, publisher = {Springer Berlin Heidelberg}, year = {2014}, volume = {57}, number = {5}, pages = {1--13}}
-
A Possible Pitfall in the Experimental Analysis of Tampering Detection Algorithms
Network-Based Information Systems (NBiS), 2014 17th International Conference on
2014, pp. 279-286
DOI: 10.1109/NBiS.2014.82
BibTeX@inproceedings{Cattaneo2014a, author = {Cattaneo, G. and Roscigno, G.}, title = {A Possible Pitfall in the Experimental Analysis of Tampering Detection Algorithms}, booktitle = {Network-Based Information Systems (NBiS), 2014 17th International Conference on}, year = {2014}, pages = {279--286}}
-
A Scalable Approach to Source Camera Identification Over Hadoop
Advanced Information Networking and Applications (AINA), 2014 IEEE 28th International Conference on
2014, pp. 366-373
DOI: 10.1109/AINA.2014.47
BibTeX@inproceedings{Cattaneo2014, author = {Cattaneo, G. and Roscigno, G. and Petrillo, U. F.}, title = {A Scalable Approach to Source Camera Identification Over Hadoop}, booktitle = {Advanced Information Networking and Applications (AINA), 2014 IEEE 28th International Conference on}, year = {2014}, pages = {366--373}}
-
A Passive Multi-purpose Scheme Based on Periodicity Analysis of CFA Artifacts for Image Forensics
Journal of Visual Communication and Image Representation, 2014(0), pp. -
DOI: 10.1016/j.jvcir.2014.04.010
BibTeX@article{Chang2014, author = {Chang, Tang-You and Tai, Shen-Chuan and Lin, Guo-Shiang}, title = {A Passive Multi-purpose Scheme Based on Periodicity Analysis of CFA Artifacts for Image Forensics}, journal = {Journal of Visual Communication and Image Representation}, year = {2014}, number = {0}, pages = {-}}
-
Digital Forgery
The Encyclopedia of Criminology and Criminal Justice
Blackwell Publishing Ltd, 2014
DOI: 10.1002/9781118517383.wbeccj132
BibTeX@inbook{Cheddad2014, author = {Cheddad, Abbas}, title = {Digital Forgery}, booktitle = {The Encyclopedia of Criminology and Criminal Justice}, publisher = {Blackwell Publishing Ltd}, year = {2014}}
-
Anti-forensics of JPEG Detectors Via Adaptive Quantization Table Replacement
Proc. 22nd Int Pattern Recognition (ICPR) Conf
2014, pp. 672-677
DOI: 10.1109/ICPR.2014.126
BibTeX@inproceedings{Chen2014a, author = {Chen, C. and Li, H. and Luo, W. and Yang, R. and Huang, J.}, title = {Anti-forensics of JPEG Detectors Via Adaptive Quantization Table Replacement}, booktitle = {Proc. 22nd Int Pattern Recognition (ICPR) Conf}, year = {2014}, pages = {672--677}}
-
Effective Estimation of Image Rotation Angle Using Spectral Method
IEEE Signal Processing Letters, 2014, Vol. 21(7), pp. 890-894
DOI: 10.1109/LSP.2014.2320503
BibTeX@article{Chen2014b, author = {Chen, C. and Ni, J. and Shen, Z.}, title = {Effective Estimation of Image Rotation Angle Using Spectral Method}, journal = {IEEE Signal Processing Letters}, year = {2014}, volume = {21}, number = {7}, pages = {890--894}}
-
Detecting the operation chain in digital images by type and order fingerprint
Proc. 12th Int. Conf. Signal Processing (ICSP)
2014, pp. 1837-1842
DOI: 10.1109/ICOSP.2014.7015310
BibTeX@inproceedings{Chen2014, author = {Chen, Z. and Zhao, Y. and Ni, R.}, title = {Detecting the operation chain in digital images by type and order fingerprint}, booktitle = {Proc. 12th Int. Conf. Signal Processing (ICSP)}, year = {2014}, pages = {1837--1842}}
-
Guided Filtering for PRNU-based Localization of Small-size Image Forgeries
2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Institute of Electrical & Electronics Engineers (IEEE), 2014
DOI: 10.1109/icassp.2014.6854802
BibTeX@article{Chierchia2014a, author = {Chierchia, G. and Cozzolino, D. and Poggi, G. and Sansone, C. and Verdoliva, L.}, title = {Guided Filtering for PRNU-based Localization of Small-size Image Forgeries}, booktitle = {2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)}, journal = {International Conference on Acoustics, Speech, and Signal Processing (ICASSP)}, publisher = {Institute of Electrical & Electronics Engineers (IEEE)}, year = {2014}}
-
Guided Filtering for PRNU-based Localization of Small-size Image Forgeries
Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics
2014, pp. 6231-6235
DOI: 10.1109/ICASSP.2014.6854802
BibTeX@inproceedings{Chierchia2014b, author = {Chierchia, G. and Cozzolino, D. and Poggi, G. and Sansone, C. and Verdoliva, L.}, title = {Guided Filtering for PRNU-based Localization of Small-size Image Forgeries}, booktitle = {Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics}, year = {2014}, pages = {6231--6235}}
-
A Bayesian-mrf Approach for PRNU-based Image Forgery Detection
IEEE Trans.Inform.Forensic Secur., Institute of Electrical & Electronics Engineers (IEEE), 2014, Vol. 9(4), pp. 554-567
DOI: 10.1109/TIFS.2014.2302078
BibTeX@article{Chierchia2014, author = {Chierchia, Giovanni and Poggi, Giovanni and Sansone, Carlo and Verdoliva, Luisa}, title = {A Bayesian-mrf Approach for PRNU-based Image Forgery Detection}, journal = {IEEE Trans.Inform.Forensic Secur.}, publisher = {Institute of Electrical & Electronics Engineers (IEEE)}, year = {2014}, volume = {9}, number = {4}, pages = {554--567}}
-
Copy-move Image Forgery Detection Based on SIFT Descriptors and SVD-matching
Advanced Technologies for Signal and Image Processing (ATSIP), 2014 1st International Conference on
2014, pp. 125-129
DOI: 10.1109/ATSIP.2014.6834590
BibTeX@inproceedings{Chihaoui2014, author = {Chihaoui, T. and Bourouis, S. and Hamrouni, K.}, title = {Copy-move Image Forgery Detection Based on SIFT Descriptors and SVD-matching}, booktitle = {Advanced Technologies for Signal and Image Processing (ATSIP), 2014 1st International Conference on}, year = {2014}, pages = {125--129}}
-
Exposing Digital Forgery in Video by Mean Frame Comparison Techniques
Emerging Research in Electronics, Computer Science and Technology
Springer, 2014
DOI: 10.1007/978-81-322-1157-0_57
BibTeX@incollection{Chittapur2014, author = {Chittapur, Govindraj B. and Murali, S. and Prabhakara, H. S. and Anami, Basavaraj S.}, title = {Exposing Digital Forgery in Video by Mean Frame Comparison Techniques}, booktitle = {Emerging Research in Electronics, Computer Science and Technology}, publisher = {Springer}, year = {2014}}
-
Information theoretical limit of compression forensics
Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics
2014, pp. 2689-2693
DOI: 10.1109/ICASSP.2014.6854088
BibTeX@inproceedings{Chu2014, author = {Chu, X. and Chen, Y. and Stamm, M. C. and Liu, K. J. R.}, title = {Information theoretical limit of compression forensics}, booktitle = {Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics}, year = {2014}, pages = {2689--2693}}
-
Physiologically-based Detection of Computer Generated Faces in Video
Proc. IEEE Int Image Processing (ICIP) Conf
2014, pp. 248-252
DOI: 10.1109/ICIP.2014.7025049
BibTeX@inproceedings{Conotter2014, author = {Conotter, V. and Bodnari, E. and Boato, G. and Farid, H.}, title = {Physiologically-based Detection of Computer Generated Faces in Video}, booktitle = {Proc. IEEE Int Image Processing (ICIP) Conf}, year = {2014}, pages = {248--252}}
-
Techniques for Digital Image Forensics and Counter-forensics
Università degli studi di siena, Università degli studi di siena, 2014
BibTeX@phdthesis{Costanzo2014a, author = {Costanzo Piccinnano, Andrea}, title = {Techniques for Digital Image Forensics and Counter-forensics}, school = {Università degli studi di siena}, year = {2014}}
-
Forensic Analysis of SIFT Keypoint Removal and Injection
Information Forensics and Security, IEEE Transactions on, 2014, Vol. 9(9), pp. 1450-1464
DOI: 10.1109/TIFS.2014.2337654
BibTeX@article{Costanzo2014, author = {Costanzo, A. and Amerini, Irene and Caldelli, R. and Barni, Mauro}, title = {Forensic Analysis of SIFT Keypoint Removal and Injection}, journal = {Information Forensics and Security, IEEE Transactions on}, year = {2014}, volume = {9}, number = {9}, pages = {1450--1464}}
-
Image Forgery Detection through Residual-based Local Descriptors and Block-matching
Image Processing (ICIP), 2014 IEEE International Conference on
2014, pp. 5297-5301
DOI: 10.1109/ICIP.2014.7026072
BibTeX@inproceedings{Cozzolino2014a, author = {Cozzolino, D. and Gragnaniello, D. and Verdoliva, L.}, title = {Image Forgery Detection through Residual-based Local Descriptors and Block-matching}, booktitle = {Image Processing (ICIP), 2014 IEEE International Conference on}, year = {2014}, pages = {5297--5301}}
-
Image Forgery Localization through the Fusion of Camera-based, Feature-based and Pixel-based Techniques
Image Processing (ICIP), 2014 IEEE International Conference on
2014, pp. 5302-5306
DOI: 10.1109/ICIP.2014.7026073
BibTeX@inproceedings{Cozzolino2014b, author = {Cozzolino, D. and Gragnaniello, D. and Verdoliva, L.}, title = {Image Forgery Localization through the Fusion of Camera-based, Feature-based and Pixel-based Techniques}, booktitle = {Image Processing (ICIP), 2014 IEEE International Conference on}, year = {2014}, pages = {5302--5306}}
-
Copy-move Forgery Detection Based on Patchmatch
Image Processing (ICIP), 2014 IEEE International Conference on
2014, pp. 5312-5316
DOI: 10.1109/ICIP.2014.7026075
BibTeX@inproceedings{Cozzolino2014, author = {Cozzolino, D. and Poggi, G. and Verdoliva, L.}, title = {Copy-move Forgery Detection Based on Patchmatch}, booktitle = {Image Processing (ICIP), 2014 IEEE International Conference on}, year = {2014}, pages = {5312--5316}}
-
Efficient Image Authentication and Tamper Localization Algorithm Using Active Watermarking
Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations
Springer, 2014
DOI: 10.1007/978-3-662-43616-5_5
BibTeX@incollection{Dadkhah2014, author = {Dadkhah, Sajjad and Manaf, Azizah Abd and Sadeghi, Somayeh}, title = {Efficient Image Authentication and Tamper Localization Algorithm Using Active Watermarking}, booktitle = {Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations}, publisher = {Springer}, year = {2014}}
-
Video forensics based on expression dynamics
Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)
2014, pp. 161-166
DOI: 10.1109/WIFS.2014.7084321
BibTeX@inproceedings{Dang-Nguyen2014a, author = {Dang-Nguyen, D. T. and Conotter, V. and Boato, G. and Natale, F. G. B. De}, title = {Video forensics based on expression dynamics}, booktitle = {Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)}, year = {2014}, pages = {161--166}}
-
Discrimination of Computer Generated Versus Natural Human Faces
University of Trento, UNITN, University of Trento, UNITN, 2014
BibTeX@phdthesis{Dang-Nguyen2014, author = {Dang-Nguyen, Duc-Tien}, title = {Discrimination of Computer Generated Versus Natural Human Faces}, school = {University of Trento, UNITN}, year = {2014}}
-
Investigating Multimedia Contents
Security Technology (ICCST), 2014 International Carnahan Conference on
2014, pp. 1-6
DOI: 10.1109/CCST.2014.6986976
BibTeX@inproceedings{DeRosa2014, author = {De Rosa, A. and Piva, A. and Fontani, M. and Iuliani, M.}, title = {Investigating Multimedia Contents}, booktitle = {Security Technology (ICCST), 2014 International Carnahan Conference on}, year = {2014}, pages = {1--6}}
-
Keypoints Based Copy-move Forgery Detection of Digital Images
Proc. Int Informatics, Electronics Vision (ICIEV) Conf
2014, pp. 1-5
DOI: 10.1109/ICIEV.2014.7135994
BibTeX@inproceedings{Debbarma2014, author = {Debbarma, S. and Singh, A. B. and Singh, K. M.}, title = {Keypoints Based Copy-move Forgery Detection of Digital Images}, booktitle = {Proc. Int Informatics, Electronics Vision (ICIEV) Conf}, year = {2014}, pages = {1--5}}
-
Generation of Iris Sensor PRNU Fingerprints from Uncorrelated Data
Biometrics and Forensics (IWBF), 2014 International Workshop on
2014, pp. 1-6
DOI: 10.1109/IWBF.2014.6914262
BibTeX@inproceedings{Debiasi2014, author = {Debiasi, Luca and Uhl, Andreas and Sun, Zhenan}, title = {Generation of Iris Sensor PRNU Fingerprints from Uncorrelated Data}, booktitle = {Biometrics and Forensics (IWBF), 2014 International Workshop on}, year = {2014}, pages = {1--6}}
-
A Survey of Partition-based Techniques for Copy-move Forgery Detection
The Scientific World Journal, 2014
DOI: 10.1155/2014/975456
BibTeX@article{Diane2014, author = {Diane, Wandji Nanda Nathalie and Xingming, Sun and KueMoise, Fah}, title = {A Survey of Partition-based Techniques for Copy-move Forgery Detection}, journal = {The Scientific World Journal}, year = {2014}}
-
Out-of-focus Point Spread Functions
Proc. SPIE 9023, Digital Photography X, 90230J (March 7, 2014)
Proc. SPIE, 2014, Vol. 9023, pp. 90230J-90230J-11
DOI: 10.1117/12.2040490
BibTeX@inproceedings{Dietz2014, author = {Dietz, Henry Gordon}, title = {Out-of-focus Point Spread Functions}, booktitle = {Proc. SPIE 9023, Digital Photography X, 90230J (March 7, 2014)}, journal = {Proc. SPIE}, year = {2014}, volume = {9023}, pages = {90230J-90230J-11}}
-
A Novel Method for Detecting Image Sharpening Based on Local Binary Pattern
Digital-Forensics and Watermarking, Springer, 2014
DOI: 10.1007/978-3-662-43886-2_13
BibTeX@article{Ding2014, author = {Ding, Feng and Zhu, Guopu and Shi, Yun Qing}, title = {A Novel Method for Detecting Image Sharpening Based on Local Binary Pattern}, journal = {Digital-Forensics and Watermarking}, publisher = {Springer}, year = {2014}}
-
Forensic Use of Photo Response Non-uniformity of Imaging Sensors and a Counter Method
Optics Express, 2014, Vol. 22(1), pp. -
DOI: 10.1364/oe.22.000470
BibTeX@article{Dirik2014, author = {Dirik, Ahmet Emir and Karakücük, Ahmet}, title = {Forensic Use of Photo Response Non-uniformity of Imaging Sensors and a Counter Method}, journal = {Optics Express}, year = {2014}, volume = {22}, number = {1}, pages = {-}}
-
Analysis of Seam-carving-based Anonymization of Images against PRNU Noise Pattern-based Source Attribution
Information Forensics and Security, IEEE Transactions on, 2014, Vol. 9(12), pp. 2277-2290
DOI: 10.1109/TIFS.2014.2361200
BibTeX@article{Dirik2014a, author = {Dirik, A. E. and Sencar, H. T. and Memon, N.}, title = {Analysis of Seam-carving-based Anonymization of Images against PRNU Noise Pattern-based Source Attribution}, journal = {Information Forensics and Security, IEEE Transactions on}, year = {2014}, volume = {9}, number = {12}, pages = {2277--2290}}
-
Robust Copy-move Forgery Detection Based on Dual-transform
Digital Forensics and Cyber Crime
Digital Forensics and Cyber Crime, Springer, 2014
DOI: 10.1007/978-3-319-14289-0_1
BibTeX@incollection{Doyoddorj2014, author = {Doyoddorj, Munkhbaatar and Rhee, Kyung-Hyune}, title = {Robust Copy-move Forgery Detection Based on Dual-transform}, booktitle = {Digital Forensics and Cyber Crime}, journal = {Digital Forensics and Cyber Crime}, publisher = {Springer}, year = {2014}}
-
Information Extraction from Multimedia Web Documents: An Open-source Platform and Testbed
International Journal of Multimedia Information Retrieval, Springer London, 2014, pp. 1-15
DOI: 10.1007/s13735-014-0051-2
BibTeX@article{Dupplaw2014, author = {Dupplaw, DavidPaul and Matthews, Michael and Johansson, Richard and Boato, Giulia and Costanzo, Andrea and Fontani, Marco and Minack, Enrico and Demidova, Elena and Blanco, Roi and Griffiths, Thomas and Lewis, Paul and Hare, Jonathon and Moschitti, Alessandro}, title = {Information Extraction from Multimedia Web Documents: An Open-source Platform and Testbed}, journal = {International Journal of Multimedia Information Retrieval}, publisher = {Springer London}, year = {2014}, pages = {1--15}}
-
Combining Spatial and DCT Based Markov Features for Enhanced Blind Detection of Image Splicing
Pattern Analysis and Applications, Springer London, 2014, pp. 1-11
DOI: 10.1007/s10044-014-0396-4
BibTeX@article{El-Alfy2014, author = {El-Alfy, E.-Sayed M. and Qureshi, Muhammad Ali}, title = {Combining Spatial and DCT Based Markov Features for Enhanced Blind Detection of Image Splicing}, journal = {Pattern Analysis and Applications}, publisher = {Springer London}, year = {2014}, pages = {1--11}}
-
Printer Identification Using Supervised Learning for Document Forgery Detection
2014
DOI: 10.1109/das.2014.48
BibTeX@misc{Elkasrawi2014, author = {Elkasrawi, Sara and Shafait, Faisal}, title = {Printer Identification Using Supervised Learning for Document Forgery Detection}, year = {2014}}
-
A Proposed Accelerated Image Copy-move Forgery Detection
Visual Communications and Image Processing Conference, 2014 IEEE
2014, pp. 253-257
DOI: 10.1109/VCIP.2014.7051552
BibTeX@inproceedings{Fadl2014a, author = {Fadl, S. M. and Semary, N. A.}, title = {A Proposed Accelerated Image Copy-move Forgery Detection}, booktitle = {Visual Communications and Image Processing Conference, 2014 IEEE}, year = {2014}, pages = {253--257}}
-
Copy-rotate-move Forgery Detection Based on Spatial Domain
Computer Engineering & Systems (ICCES), 2014 9th International Conference on
2014, pp. 136-141
DOI: 10.1109/ICCES.2014.7030944
BibTeX@inproceedings{Fadl2014, author = {Fadl, S. M. and Semary, N. A. and Hadhoud, M. M.}, title = {Copy-rotate-move Forgery Detection Based on Spatial Domain}, booktitle = {Computer Engineering & Systems (ICCES), 2014 9th International Conference on}, year = {2014}, pages = {136--141}}
-
Fan Search for Image Copy-move Forgery Detection
Advanced Machine Learning Technologies and Applications
Springer, 2014
DOI: 10.1007/978-3-319-13461-1_18
BibTeX@incollection{Fadl2014b, author = {Fadl, Sondos M. and Semary, Noura A. and Hadhoud, Mohiy M.}, title = {Fan Search for Image Copy-move Forgery Detection}, booktitle = {Advanced Machine Learning Technologies and Applications}, publisher = {Springer}, year = {2014}}
-
Nonorthogonal DCT Implementation for JPEG Forensics
Hybrid Intelligent Systems (HIS), 2014 14th International Conference on
2014, pp. 7-11
DOI: 10.1109/HIS.2014.7086195
BibTeX@inproceedings{Fahmy2014, author = {Fahmy, G.}, title = {Nonorthogonal DCT Implementation for JPEG Forensics}, booktitle = {Hybrid Intelligent Systems (HIS), 2014 14th International Conference on}, year = {2014}, pages = {7--11}}
-
Nonorthogonal DCT Block Convergence for JPEG-75 Forensics
Proc. IEEE Int. Symp. Signal Processing and Information Technology (ISSPIT)
2014, pp. 000349-000353
DOI: 10.1109/ISSPIT.2014.7300613
BibTeX@inproceedings{Fahmy2014a, author = {Fahmy, G.}, title = {Nonorthogonal DCT Block Convergence for JPEG-75 Forensics}, booktitle = {Proc. IEEE Int. Symp. Signal Processing and Information Technology (ISSPIT)}, year = {2014}, pages = {000349--000353}}
-
JPEG Anti-forensics with Improved Tradeoff between Forensic Undetectability and Image Quality
Information Forensics and Security, IEEE Transactions on, 2014, Vol. 9(8), pp. 1211-1226
DOI: 10.1109/TIFS.2014.2317949
BibTeX@article{Fan2014, author = {Fan, Wei and Wang, Kai and Cayre, F. and Xiong, Zhang}, title = {JPEG Anti-forensics with Improved Tradeoff between Forensic Undetectability and Image Quality}, journal = {Information Forensics and Security, IEEE Transactions on}, year = {2014}, volume = {9}, number = {8}, pages = {1211--1226}}
-
JPEG Anti-Forensics With Improved Tradeoff Between Forensic Undetectability and Image Quality
#IEEE_J_IFS#, 2014, Vol. 9(8), pp. 1211-1226
DOI: 10.1109/TIFS.2014.2317949
BibTeX@article{Fan2014a, author = {Fan, W. and Wang, K. and Cayre, F. and Xiong, Z.}, title = {JPEG Anti-Forensics With Improved Tradeoff Between Forensic Undetectability and Image Quality}, journal = {#IEEE_J_IFS#}, year = {2014}, volume = {9}, number = {8}, pages = {1211--1226}}
-
A Scheme for Copy-move Forgery Detection in Digital Images Based on 2D-DWT
Circuits and Systems (MWSCAS), 2014 IEEE 57th International Midwest Symposium on
2014, pp. 801-804
DOI: 10.1109/MWSCAS.2014.6908536
BibTeX@inproceedings{Fattah2014, author = {Fattah, S. A. and Ullah, M. M. I. and Ahmed, M. and Ahmmed, I. and Shahnaz, C.}, title = {A Scheme for Copy-move Forgery Detection in Digital Images Based on 2D-DWT}, booktitle = {Circuits and Systems (MWSCAS), 2014 IEEE 57th International Midwest Symposium on}, year = {2014}, pages = {801--804}}
-
A Multiscale and Multi-perturbation Blind Forensic Technique for Median Detecting
Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications
Springer Science mathplus Business Media, 2014, pp. 302-310
DOI: 10.1007/978-3-319-12568-8_37
BibTeX@incollection{Ferreira2014, author = {Ferreira, Anselmo and Rocha, Anderson}, title = {A Multiscale and Multi-perturbation Blind Forensic Technique for Median Detecting}, booktitle = {Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications}, publisher = {Springer Science mathplus Business Media}, year = {2014}, pages = {302--310}}
-
Digital Forensic Techniques for Splicing Detection in Multimedia Contents
UNIVERSITÀ DEGLI STUDI DI SIENA Dipartimento di Ingegneria dell'Informazione e Scienze Matematiche, UNIVERSITÀ DEGLI STUDI DI SIENA Dipartimento di Ingegneria dell'Informazione e Scienze Matematiche, 2014
BibTeX@phdthesis{Fontani2014a, author = {Fontani, Marco}, title = {Digital Forensic Techniques for Splicing Detection in Multimedia Contents}, school = {UNIVERSITÀ DEGLI STUDI DI SIENA Dipartimento di Ingegneria dell'Informazione e Scienze Matematiche}, year = {2014}}
-
Countering Anti-forensics by Means of Data Fusion
Alattar, A. M., Memon, N. D. & Heitzenrater, C. D. (ed.)
Proc. SPIE 9028, Media Watermarking, Security, and Forensics 2014
Proc. SPIE, 2014, Vol. 9028, pp. 90280Z-90280Z-15
DOI: 10.1117/12.2039569
BibTeX@inproceedings{Fontani2014, author = {Fontani, Marco and Bonchi, Alessandro and Piva, Alessandro and Barni, Mauro}, title = {Countering Anti-forensics by Means of Data Fusion}, booktitle = {Proc. SPIE 9028, Media Watermarking, Security, and Forensics 2014}, journal = {Proc. SPIE}, year = {2014}, volume = {9028}, pages = {90280Z-90280Z-15}}
-
Illuminant Colour Based Image Forensics Using Mismatch in Human Skin Highlights
Communications (NCC), 2014 Twentieth National Conference on
2014, pp. 1-6
DOI: 10.1109/NCC.2014.6811349
BibTeX@inproceedings{Francis2014, author = {Francis, Kiran and Gholap, Sandeep and Bora, P. K.}, title = {Illuminant Colour Based Image Forensics Using Mismatch in Human Skin Highlights}, booktitle = {Communications (NCC), 2014 Twentieth National Conference on}, year = {2014}, pages = {1--6}}
-
Illuminant colour based image forensics using mismatch in human skin highlights
Proc. Twentieth National Conf. Communications (NCC)
2014, pp. 1-6
DOI: 10.1109/NCC.2014.6811349
BibTeX@inproceedings{Francis2014a, author = {Francis, K. and Gholap, S. and Bora, P. K.}, title = {Illuminant colour based image forensics using mismatch in human skin highlights}, booktitle = {Proc. Twentieth National Conf. Communications (NCC)}, year = {2014}, pages = {1--6}}
-
Image Tampering Detection and Localization
Politecnico di Milano, Politecnico di Milano, 2014
BibTeX@mastersthesis{Gaborini2014, author = {Gaborini, Lorenzo}, title = {Image Tampering Detection and Localization}, school = {Politecnico di Milano}, year = {2014}}
-
Multi-clue Image Tampering Localization
Information Forensics and Security (WIFS), 2014 IEEE International Workshop on
2014, pp. 125-130
DOI: 10.1109/WIFS.2014.7084315
BibTeX@inproceedings{Gaborini2014a, author = {Gaborini, L. and Bestagini, P. and Milani, S. and Tagliasacchi, M. and Tubaro, S.}, title = {Multi-clue Image Tampering Localization}, booktitle = {Information Forensics and Security (WIFS), 2014 IEEE International Workshop on}, year = {2014}, pages = {125--130}}
-
First Quantization Matrix Estimation from Double Compressed JPEG Images
Information Forensics and Security, IEEE Transactions on, 2014, Vol. 9(8), pp. 1299-1310
DOI: 10.1109/TIFS.2014.2330312
BibTeX@article{Galvan2014, author = {Galvan, F. and Puglisi, Giovanni and Bruna, A. R. and Battiato, Sebastiano}, title = {First Quantization Matrix Estimation from Double Compressed JPEG Images}, journal = {Information Forensics and Security, IEEE Transactions on}, year = {2014}, volume = {9}, number = {8}, pages = {1299--1310}}
-
Image Copy-move Tamper Blind Detection Algorithm Based on Integrated Feature Vectors
Journal of Chemical and Pharmaceutical Research, 2014, Vol. 6(6), pp. 1584-1590
BibTeX@article{Gan2014, author = {Gan, Yanfen and Zhong, Junli}, title = {Image Copy-move Tamper Blind Detection Algorithm Based on Integrated Feature Vectors}, journal = {Journal of Chemical and Pharmaceutical Research}, year = {2014}, volume = {6}, number = {6}, pages = {1584--1590}}
-
A Hybrid Feature Based Method for Distinguishing Computer Graphics and Photographic Image
Digital-Forensics and Watermarking, Springer, 2014
DOI: 10.1007/978-3-662-43886-2_22
BibTeX@article{Gao2014, author = {Gao, Shang and Zhang, Cong and Wu, Chan-Le and Ye, Gang and Huang, Lei}, title = {A Hybrid Feature Based Method for Distinguishing Computer Graphics and Photographic Image}, journal = {Digital-Forensics and Watermarking}, publisher = {Springer}, year = {2014}}
-
Exposing image forgery using inconsistent reflection vanishing point
Proc. Int Audio, Language and Image Processing (ICALIP) Conf
2014, pp. 282-286
DOI: 10.1109/ICALIP.2014.7009801
BibTeX@inproceedings{Ge2014a, author = {Ge, H. and Malik, H.}, title = {Exposing image forgery using inconsistent reflection vanishing point}, booktitle = {Proc. Int Audio, Language and Image Processing (ICALIP) Conf}, year = {2014}, pages = {282--286}}
-
Image Perspective Invariant Features Algorithm Based on Particle Swarm Optimization
Journal of Multimedia, 2014, Vol. 9(3)
BibTeX@article{Ge2014, author = {Ge, Lu}, title = {Image Perspective Invariant Features Algorithm Based on Particle Swarm Optimization}, journal = {Journal of Multimedia}, year = {2014}, volume = {9}, number = {3}}
-
A Hybrid Image Authentication Method Robust to JPEG Attacks
Proc. 22nd Signal Processing and Communications Applications Conf. (SIU)
Institute of Electrical & Electronics Engineers (IEEE), 2014, pp. 1596-1599
DOI: 10.1109/SIU.2014.6830549
BibTeX@inproceedings{Gencturk2014, author = {Gencturk, Beste and Nabiyev, Vasif and Ulutas, Guzin and Ulutas, Mustafa}, title = {A Hybrid Image Authentication Method Robust to JPEG Attacks}, booktitle = {Proc. 22nd Signal Processing and Communications Applications Conf. (SIU)}, publisher = {Institute of Electrical & Electronics Engineers (IEEE)}, year = {2014}, pages = {1596--1599}}
-
Search Optimization through JPEG Quantization Tables
University of Amsterdam Faculty of Science, University of Amsterdam Faculty of Science, 2014
BibTeX@mastersthesis{Gieske2014, author = {Gieske, Shanron A.}, title = {Search Optimization through JPEG Quantization Tables}, school = {University of Amsterdam Faculty of Science}, year = {2014}}
-
A Video Forensic Technique for Detecting Frame Deletion and Insertion
Acoustics, Speech and Signal Processing (ICASSP), 2014 IEEE International Conference on
2014, pp. 6226-6230
DOI: 10.1109/ICASSP.2014.6854801
BibTeX@inproceedings{Gironi2014, author = {Gironi, A. and Fontani, M. and Bianchi, T. and Piva, A. and Barni, Mauro}, title = {A Video Forensic Technique for Detecting Frame Deletion and Insertion}, booktitle = {Acoustics, Speech and Signal Processing (ICASSP), 2014 IEEE International Conference on}, year = {2014}, pages = {6226--6230}}
-
Common Source Identification of Images in Large Databases
Forensic Science International, Elsevier BV, 2014, Vol. 244, pp. 222-230
DOI: 10.1016/j.forsciint.2014.08.034
BibTeX@article{Gisolf2014, author = {Gisolf, Floris and Barens, Pelle and Snel, Ewald and Malgoezar, Anwar and Vos, Mark and Mieremet, Arjan and Geradts, Zeno}, title = {Common Source Identification of Images in Large Databases}, journal = {Forensic Science International}, publisher = {Elsevier BV}, year = {2014}, volume = {244}, pages = {222--230}}
-
Forensic Analysis of Video File Formats
Digital Investigation, 2014, Vol. 11, Supplement 1(0), pp. 68-76
DOI: 10.1016/j.diin.2014.03.009
BibTeX@article{Gloe2014, author = {Gloe, Thomas and Fischer, André and Kirchner, Matthias}, title = {Forensic Analysis of Video File Formats}, journal = {Digital Investigation}, year = {2014}, volume = {11, Supplement 1}, number = {0}, pages = {68--76}}
-
Estimation of Lens Distortion Correction from Single Images
Department of ECE, SUNY Binghamton, NY, USA, Department of ECE, SUNY Binghamton, NY, USA, 2014
DOI: 10.1117/12.2036804
BibTeX@techreport{Goljan2014, author = {Goljan, Miroslav and Fridrich, Jessica}, title = {Estimation of Lens Distortion Correction from Single Images}, school = {Department of ECE, SUNY Binghamton, NY, USA}, year = {2014}}
-
Blind Median Filtering Detection Based on Histogram Features
Proc. Asia-Pacific Signal and Information Processing Association Annual Summit and Conf. (APSIPA)
2014, pp. 1-4
DOI: 10.1109/APSIPA.2014.7041536
BibTeX@inproceedings{Gui2014, author = {Gui, X. and Li, X. and Qi, W. and Yang, B.}, title = {Blind Median Filtering Detection Based on Histogram Features}, booktitle = {Proc. Asia-Pacific Signal and Information Processing Association Annual Summit and Conf. (APSIPA)}, year = {2014}, pages = {1--4}}
-
On Compensating Unknown Pixel Behaviors for Image Sensors with Embedded Processing
Signals, Systems and Computers, 2014 48th Asilomar Conference on
2014, pp. 933-937
DOI: 10.1109/ACSSC.2014.7094590
BibTeX@inproceedings{Guicquero2014, author = {Guicquero, W. and Benetti, M. and Peizerat, A. and Dupret, A. and Vandergheynst, P.}, title = {On Compensating Unknown Pixel Behaviors for Image Sensors with Embedded Processing}, booktitle = {Signals, Systems and Computers, 2014 48th Asilomar Conference on}, year = {2014}, pages = {933--937}}
-
A Copy-move Image Forgery Detection Based on Speeded up Robust Feature Transform and Wavelet Transforms
Computer and Communication Technology (ICCCT), 2014 International Conference on
2014, pp. 147-152
DOI: 10.1109/ICCCT.2014.7001483
BibTeX@inproceedings{Hashmi2014, author = {Hashmi, M. F. and Anand, V. and Keskar, A. G.}, title = {A Copy-move Image Forgery Detection Based on Speeded up Robust Feature Transform and Wavelet Transforms}, booktitle = {Computer and Communication Technology (ICCCT), 2014 International Conference on}, year = {2014}, pages = {147--152}}
-
Copy-move Image Forgery Detection Using an Efficient and Robust Method Combining Un-decimated Wavelet Transform and Scale Invariant Feature Transform
AASRI Procedia, Elsevier BV, 2014, Vol. 9, pp. 84-91
DOI: 10.1016/j.aasri.2014.09.015
BibTeX@article{Hashmi2014a, author = {Hashmi, Mohammad Farukh and Anand, Vijay and Keskar, Avinas G.}, title = {Copy-move Image Forgery Detection Using an Efficient and Robust Method Combining Un-decimated Wavelet Transform and Scale Invariant Feature Transform}, journal = {AASRI Procedia}, publisher = {Elsevier BV}, year = {2014}, volume = {9}, pages = {84--91}}
-
Hue Modification Estimation Using Sensor Pattern Noise
Image Processing (ICIP), 2014 IEEE International Conference on
2014, pp. 5287-5291
DOI: 10.1109/ICIP.2014.7026070
BibTeX@inproceedings{Hou2014, author = {Hou, Jong-Uk and Jang, Han-Ul and Lee, Heung-Kyu}, title = {Hue Modification Estimation Using Sensor Pattern Noise}, booktitle = {Image Processing (ICIP), 2014 IEEE International Conference on}, year = {2014}, pages = {5287--5291}}
-
Fast Source Camera Identification Using Matching Signs between Query and Reference Fingerprints
Multimedia Tools and Applications, Springer US, 2014, pp. 1-24
DOI: 10.1007/s11042-014-1985-3
BibTeX@article{Hu2014, author = {Hu, Yongjian and Li, Chang-Tsun and Lai, Zhimao}, title = {Fast Source Camera Identification Using Matching Signs between Query and Reference Fingerprints}, journal = {Multimedia Tools and Applications}, publisher = {Springer US}, year = {2014}, pages = {1--24}}
-
Boosting Scheme for Detecting Region Duplication Forgery in Digital Images
Pan, J.-S., Krömer, P. & Snášel, V. (ed.)
Genetic and Evolutionary Computing
Springer International Publishing, 2014, Vol. 238, pp. 125-133
DOI: 10.1007/978-3-319-01796-9_13
BibTeX@incollection{Huang2014, author = {Huang, Deng-Yuan and Lin, Ta-Wei and Hu, Wu-Chih and Chou, Chih-Hung}, title = {Boosting Scheme for Detecting Region Duplication Forgery in Digital Images}, booktitle = {Genetic and Evolutionary Computing}, publisher = {Springer International Publishing}, year = {2014}, volume = {238}, pages = {125--133}}
-
Evaluation of Image Forgery Detect Ion Using Multi - Scale Weber Local Descript Ors
International Journal on Artificial Intelligence Tools, 2014, Vol. XX(X), pp. 1-27
BibTeX@article{Hussain2014a, author = {Hussain, Muhammad and Qasem, Sahar and Bebis, George and Muhammad, Ghulam and Aboalsamh, Hatim and Mathkour, Hassan}, title = {Evaluation of Image Forgery Detect Ion Using Multi - Scale Weber Local Descript Ors}, journal = {International Journal on Artificial Intelligence Tools}, year = {2014}, volume = {XX}, number = {X}, pages = {1--27}}
-
Comparison between Wld and LBP Descriptors for Non-intrusive Image Forgery Detection
Innovations in Intelligent Systems and Applications (INISTA) Proceedings, 2014 IEEE International Symposium on
2014, pp. 197-204
DOI: 10.1109/INISTA.2014.6873618
BibTeX@inproceedings{Hussain2014, author = {Hussain, Muhammad and Saleh, Sahar Q. and Aboalsamh, Hatim and Muhammad, Ghulam and Bebis, George}, title = {Comparison between Wld and LBP Descriptors for Non-intrusive Image Forgery Detection}, booktitle = {Innovations in Intelligent Systems and Applications (INISTA) Proceedings, 2014 IEEE International Symposium on}, year = {2014}, pages = {197--204}}
-
State-of-the-art in Block Based Copy Move Forgery Detection
Proc of the itl. Conf. on Cryptography and Security 2014 (ICCS)
2014
BibTeX@inproceedings{Indumathi2014, author = {Indumathi, J. and Amala, S. P.}, title = {State-of-the-art in Block Based Copy Move Forgery Detection}, booktitle = {Proc of the itl. Conf. on Cryptography and Security 2014 (ICCS)}, year = {2014}}
-
Image Counter-forensics Based on Feature Injection
Alattar, A. M., Memon, N. D. & Heitzenrater, C. D. (ed.)
Proc. SPIE 9028, Media Watermarking, Security, and Forensics 2014
Proc. SPIE, 2014, Vol. 9028, pp. 902810-902810-15
DOI: 10.1117/12.2042234
BibTeX@inproceedings{Iuliani2014, author = {Iuliani, M. and Rossetto, S. and Bianchi, T. and De Rosa, Alessia and Piva, A. and Barni, Mauro}, title = {Image Counter-forensics Based on Feature Injection}, booktitle = {Proc. SPIE 9028, Media Watermarking, Security, and Forensics 2014}, journal = {Proc. SPIE}, year = {2014}, volume = {9028}, pages = {902810-902810-15}}
-
Image manipulation detection using Edge-based segmentation and statistical property of wavelet coefficients
Proc. Int Electronics, Information and Communications (ICEIC) Conf
2014, pp. 1-2
DOI: 10.1109/ELINFOCOM.2014.6914358
BibTeX@inproceedings{Jeong2014, author = {Jeong, B. G. and Eom, I. K.}, title = {Image manipulation detection using Edge-based segmentation and statistical property of wavelet coefficients}, booktitle = {Proc. Int Electronics, Information and Communications (ICEIC) Conf}, year = {2014}, pages = {1--2}}
-
Copy-paste Image Forgery Blind Detection Based on Mean Shift
Journal of Computer Applications, 2014, Vol. 34(3), pp. 806-809
BibTeX@article{Jiao2014, author = {Jiao, Lixin and Du, Zhenglong}, title = {Copy-paste Image Forgery Blind Detection Based on Mean Shift}, journal = {Journal of Computer Applications}, year = {2014}, volume = {34}, number = {3}, pages = {806--809}}
-
A Context-adaptive Spn Predictor for Trustworthy Source Camera Identification
EURASIP Journal on Image and Video Processing, 2014, Vol. 2014(1), pp. 19
DOI: 10.1186/1687-5281-2014-19
BibTeX@article{Kang2014, author = {Kang, Xiangui and Chen, Jiansheng and Lin, Kerui and Anjie, Peng}, title = {A Context-adaptive Spn Predictor for Trustworthy Source Camera Identification}, journal = {EURASIP Journal on Image and Video Processing}, year = {2014}, volume = {2014}, number = {1}, pages = {19}}
-
Boundary Detection of Altered Region by Differential Features on Camera Response Function
International Journal of Signal Processing Systems, 2014, Vol. 2(1), pp. 31-36
BibTeX@article{Kato2014, author = {Kato, Hirokazu and Nagao, Toshiyuki and Fujiwara, Hideaki and Kondo, Katsuya}, title = {Boundary Detection of Altered Region by Differential Features on Camera Response Function}, journal = {International Journal of Signal Processing Systems}, year = {2014}, volume = {2}, number = {1}, pages = {31--36}}
-
Image Forgery Detection Based on Semantics
International Journal of Hybrid Information Technology, 2014, Vol. 1(7), pp. 109-124
DOI: 10.14257/ijhit.2014.7.1.09
BibTeX@article{Ke2014, author = {Ke, Yongzhen and Min, Weidong and Qin, Fan and Shang, Junjun}, title = {Image Forgery Detection Based on Semantics}, journal = {International Journal of Hybrid Information Technology}, year = {2014}, volume = {1}, number = {7}, pages = {109--124}}
-
Exposing Image Forgery by Detecting Consistency of Shadow
The Scientific World Journal, 2014, Vol. 2014
DOI: 10.1155/2014/364501
BibTeX@article{Ke2014a, author = {Ke, Yongzhen and Qin, Fan and Min, Weidong and Zhangws, Guiling}, title = {Exposing Image Forgery by Detecting Consistency of Shadow}, journal = {The Scientific World Journal}, year = {2014}, volume = {2014}}
-
Exposing Photo Manipulation from Shading and Shadows
ACM Transactions on Graphics, Association for Computing Machinery (ACM), 2014, Vol. 33(5), pp. 1-21
DOI: 10.1145/2629646
BibTeX@article{Kee2014, author = {Kee, Eric and O'brien, James F. and Farid, Hany}, title = {Exposing Photo Manipulation from Shading and Shadows}, journal = {ACM Transactions on Graphics}, publisher = {Association for Computing Machinery (ACM)}, year = {2014}, volume = {33}, number = {5}, pages = {1--21}}
-
Replication Regions Detection in Images Based on Frequency Analysis of Blocks
Proc. 22nd Signal Processing and Communications Applications Conf. (SIU)
2014, pp. 461-464
DOI: 10.1109/SIU.2014.6830265
BibTeX@inproceedings{Ketenci2014a, author = {Ketenci, S. and Uluta&x015F, G.}, title = {Replication Regions Detection in Images Based on Frequency Analysis of Blocks}, booktitle = {Proc. 22nd Signal Processing and Communications Applications Conf. (SIU)}, year = {2014}, pages = {461--464}}
-
Replication Regions Detection in Images Based on Frequency Analysis of Blocks
Signal Processing and Communications Applications Conference (SIU), 2014 22nd
2014, pp. 461-464
DOI: 10.1109/SIU.2014.6830265
BibTeX@inproceedings{Ketenci2014b, author = {Ketenci, S. and Ulutas, G.}, title = {Replication Regions Detection in Images Based on Frequency Analysis of Blocks}, booktitle = {Signal Processing and Communications Applications Conference (SIU), 2014 22nd}, year = {2014}, pages = {461--464}}
-
Replication Regions Detection in Images Based on Frequency Analysis of Blocks
Proc. 22nd Signal Processing and Communications Applications Conf. (SIU)
2014, pp. 461-464
DOI: 10.1109/SIU.2014.6830265
BibTeX@inproceedings{Ketenci2014d, author = {Ketenci, S. and Ulutaş, G.}, title = {Replication Regions Detection in Images Based on Frequency Analysis of Blocks}, booktitle = {Proc. 22nd Signal Processing and Communications Applications Conf. (SIU)}, year = {2014}, pages = {461--464}}
-
Detection of Duplicated Regions in Images Using 1D-Fourier Transform
Systems, Signals and Image Processing (IWSSIP), 2014 International Conference on
2014, pp. 171-174
BibTeX@inproceedings{Ketenci2014, author = {Ketenci, S. and Ulutas, G. and Ulutas, M.}, title = {Detection of Duplicated Regions in Images Using 1D-Fourier Transform}, booktitle = {Systems, Signals and Image Processing (IWSSIP), 2014 International Conference on}, year = {2014}, pages = {171--174}}
-
Exposing Digital Image Forgeries from near Duplicate Images
Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on
2014, pp. 924-928
DOI: 10.1109/CSNT.2014.190
BibTeX@inproceedings{Khamankar2014, author = {Khamankar, S. M. and Madankar, M. S.}, title = {Exposing Digital Image Forgeries from near Duplicate Images}, booktitle = {Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on}, year = {2014}, pages = {924--928}}
-
CT-scanner Identification Based on Sensor Noise Analysis
Visual Information Processing (EUVIP), 2014 5th European Workshop on
2014, pp. 1-5
DOI: 10.1109/EUVIP.2014.7018385
BibTeX@inproceedings{Kharboutly2014, author = {Kharboutly, A. and Puech, W. and Subsol, G. and Hoa, D.}, title = {CT-scanner Identification Based on Sensor Noise Analysis}, booktitle = {Visual Information Processing (EUVIP), 2014 5th European Workshop on}, year = {2014}, pages = {1--5}}
-
Color Laser Printer Identification Using Photographed Halftone Images
Proceedings of the 17th European Signal Processing Conference (EUSIPCO 2014)
2014
BibTeX@inproceedings{Kim2014, author = {Kim, Do-Guk and Lee, Heung-Kyu}, title = {Color Laser Printer Identification Using Photographed Halftone Images}, booktitle = {Proceedings of the 17th European Signal Processing Conference (EUSIPCO 2014)}, year = {2014}}
-
Low-complexity Camera Tamper Detection Based on Edge Information
Consumer Electronics - Taiwan (ICCE-TW), 2014 IEEE International Conference on
2014, pp. 155-156
DOI: 10.1109/ICCE-TW.2014.6904034
BibTeX@inproceedings{Lee2014, author = {Lee, Gil-Beom and Shin, Youn-chul and Park, Joo-heon and Lee, Myeong-jin}, title = {Low-complexity Camera Tamper Detection Based on Edge Information}, booktitle = {Consumer Electronics - Taiwan (ICCE-TW), 2014 IEEE International Conference on}, year = {2014}, pages = {155--156}}
-
Blurred image region detection and segmentation
Proc. IEEE Int. Conf. Image Processing (ICIP)
2014, pp. 4427-4431
DOI: 10.1109/ICIP.2014.7025898
BibTeX@inproceedings{Lee2014a, author = {Lee, H. and Kim, C.}, title = {Blurred image region detection and segmentation}, booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)}, year = {2014}, pages = {4427--4431}}
-
JPEG Noises beyond the First Compression Cycle
arXiv:1405.7571, 2014
BibTeX@article{Li2014f, author = {Li, Bin and Ng, Tian-Tsong and Li, Xiaolong and Tan, Shunquan and Huang, Jiwu}, title = {JPEG Noises beyond the First Compression Cycle}, journal = {arXiv:1405.7571}, year = {2014}}
-
Video Copy-move Forgery Detection and Localization Based on Structural Similarity
Farag, A. A., Yang, J. & Jiao, F. (ed.)
Proceedings of the 3rd International Conference on Multimedia Technology (ICMT 2013)
Springer Berlin Heidelberg, 2014, Vol. 278, pp. 63-76
DOI: 10.1007/978-3-642-41407-7_7
BibTeX@incollection{Li2014, author = {Li, Fugui and Huang, Tianqiang}, title = {Video Copy-move Forgery Detection and Localization Based on Structural Similarity}, booktitle = {Proceedings of the 3rd International Conference on Multimedia Technology (ICMT 2013)}, publisher = {Springer Berlin Heidelberg}, year = {2014}, volume = {278}, pages = {63--76}}
-
Anti-forensics of Double JPEG Compression with the Same Quantization Matrix
Multimedia Tools and Applications, Springer US, 2014, pp. 1-16
DOI: 10.1007/s11042-014-1927-0
BibTeX@article{Li2014c, author = {Li, Haodong and Luo, Weiqi and Huang, Jiwu}, title = {Anti-forensics of Double JPEG Compression with the Same Quantization Matrix}, journal = {Multimedia Tools and Applications}, publisher = {Springer US}, year = {2014}, pages = {1--16}}
-
Detection of Image Forgery Based on Improved PCA-SIFT
Wong, W. E. & Zhu, T. (ed.)
Computer Engineering and Networking
Springer International Publishing, 2014, Vol. 277, pp. 679-686
DOI: 10.1007/978-3-319-01766-2_78
BibTeX@incollection{Li2014a, author = {Li, Kunlun and Li, Hexin and Yang, Bo and Meng, Qi and Luo, Shangzong}, title = {Detection of Image Forgery Based on Improved PCA-SIFT}, booktitle = {Computer Engineering and Networking}, publisher = {Springer International Publishing}, year = {2014}, volume = {277}, pages = {679--686}}
-
Detecting Copy-move Forgery under Affine Transforms for Image Forensics
Computers & Electrical Engineering, Elsevier BV, 2014, Vol. 40(6), pp. 1951-1962
DOI: 10.1016/j.compeleceng.2013.11.034
BibTeX@article{Li2014h, author = {Li, Leida and Li, Shushang and Zhu, Hancheng and Wu, Xiaoyue}, title = {Detecting Copy-move Forgery under Affine Transforms for Image Forensics}, journal = {Computers & Electrical Engineering}, publisher = {Elsevier BV}, year = {2014}, volume = {40}, number = {6}, pages = {1951--1962}}
-
PCA-based Denoising of Sensor Pattern Noise for Source Camera Identification
Signal and Information Processing (ChinaSIP), 2014 IEEE China Summit & International Conference on
2014, pp. 436-440
DOI: 10.1109/ChinaSIP.2014.6889280
BibTeX@inproceedings{Li2014d, author = {Li, Ruizhe and Guan, Yu and Li, Chang-Tsun}, title = {PCA-based Denoising of Sensor Pattern Noise for Source Camera Identification}, booktitle = {Signal and Information Processing (ChinaSIP), 2014 IEEE China Summit & International Conference on}, year = {2014}, pages = {436--440}}
-
A Reference Estimator Based on Composite Sensor Pattern Noise for Source Device Identification
Alattar, A. M., Memon, N. D. & Heitzenrater, C. D. (ed.)
Proc. SPIE 9028, Media Watermarking, Security, and Forensics 2014
Proc. SPIE, 2014, Vol. 9028, pp. 90280O-90280O-7
DOI: 10.1117/12.2038651
BibTeX@inproceedings{Li2014b, author = {Li, Ruizhe and Li, Chang-Tsun and Guan, Yu}, title = {A Reference Estimator Based on Composite Sensor Pattern Noise for Source Device Identification}, booktitle = {Proc. SPIE 9028, Media Watermarking, Security, and Forensics 2014}, journal = {Proc. SPIE}, year = {2014}, volume = {9028}, pages = {90280O-90280O-7}}
-
Exposing Photo Manipulation with Inconsistent Perspective Geometry
The Journal of China Universities of Posts and Telecommunications, 2014, Vol. 21(4), pp. 83-104
DOI: 10.1016/S1005-8885(14)60320-4
BibTeX@article{Li2014e, author = {Li, Yan and Zhou, Ya-jian and Yuan, Kai-guo and Guo, Yu-cui and Niu, Xin-xin}, title = {Exposing Photo Manipulation with Inconsistent Perspective Geometry}, journal = {The Journal of China Universities of Posts and Telecommunications}, year = {2014}, volume = {21}, number = {4}, pages = {83--104}}
-
Distinguishing Computer Graphics from Photographic Images Using a Multiresolution Approach Based on Local Binary Patterns
Security and Communication Networks, 2014
DOI: 10.1002/sec.929
BibTeX@article{Li2014g, author = {Li, Zhaohong and Zhang, Zhenzhen and Shi, Yunqing}, title = {Distinguishing Computer Graphics from Photographic Images Using a Multiresolution Approach Based on Local Binary Patterns}, journal = {Security and Communication Networks}, year = {2014}}
-
HSV Based Image Forgery Detection for Copy-move Attack
Material Science and Engeneering, 2014, Vol. 556-562, pp. 2825-2828
DOI: 10.4028/www.scientific.net/AMM.556-562.2825
BibTeX@article{Liu2014a, author = {Liu, Bo and Pun, Chi Man}, title = {HSV Based Image Forgery Detection for Copy-move Attack}, journal = {Material Science and Engeneering}, year = {2014}, volume = {556-562}, pages = {2825--2828}}
-
Digital Image Forgery Detection Using JPEG Features and Local Noise Discrepancies
The Scientific World Journal, 2014
BibTeX@article{Liu2014, author = {Liu, Bo and Pun, C.-M. and Yuan, Xiao-Chen}, title = {Digital Image Forgery Detection Using JPEG Features and Local Noise Discrepancies}, journal = {The Scientific World Journal}, year = {2014}}
-
Enhanced Perceptual Image Authentication with Tamper Localization and Self-restoration
Multimedia and Expo (ICME), 2014 IEEE International Conference on
2014, pp. 1-6
DOI: 10.1109/ICME.2014.6890128
BibTeX@inproceedings{Liu2014c, author = {Liu, Fang and Wang, Hui and Cheng, Lee-Ming and Ho, Anthony T. S. and Li, Shujun}, title = {Enhanced Perceptual Image Authentication with Tamper Localization and Self-restoration}, booktitle = {Multimedia and Expo (ICME), 2014 IEEE International Conference on}, year = {2014}, pages = {1--6}}
-
Anti-forensics of Video Frame Deletion
paper.edu.cn, 2014
BibTeX@electronic{Liu2014b, author = {Liu, Jingxian and Kang, Xiangui}, title = {Anti-forensics of Video Frame Deletion}, journal = {paper.edu.cn}, year = {2014}}
-
Improved SIFT-based Copy-move Detection Using Bfsn Clustering and CFA Features
Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2014 Tenth International Conference on
2014, pp. 626-629
DOI: 10.1109/IIH-MSP.2014.162
BibTeX@inproceedings{Liu2014d, author = {Liu, Lu and Ni, Rongrong and Zhao, Yao and Li, Siran}, title = {Improved SIFT-based Copy-move Detection Using Bfsn Clustering and CFA Features}, booktitle = {Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2014 Tenth International Conference on}, year = {2014}, pages = {626--629}}
-
Forensics of Image Blurring and Sharpening History Based on NSCT Domain
Proc. Asia-Pacific Signal and Information Processing Association Annual Summit and Conf. (APSIPA)
2014, pp. 1-4
DOI: 10.1109/APSIPA.2014.7041728
BibTeX@inproceedings{Liu2014e, author = {Liu, Y. and Zhao, Y. and Ni, R.}, title = {Forensics of Image Blurring and Sharpening History Based on NSCT Domain}, booktitle = {Proc. Asia-Pacific Signal and Information Processing Association Annual Summit and Conf. (APSIPA)}, year = {2014}, pages = {1--4}}
-
Forensics of image blurring and sharpening history based on NSCT domain
Proc. Asia-Pacific Signal and Information Processing Association Annual Summit and Conf. (APSIPA)
2014, pp. 1-4
DOI: 10.1109/APSIPA.2014.7041728
BibTeX@inproceedings{Liu2014f, author = {Liu, Y. and Zhao, Y. and Ni, R.}, title = {Forensics of image blurring and sharpening history based on NSCT domain}, booktitle = {Proc. Asia-Pacific Signal and Information Processing Association Annual Summit and Conf. (APSIPA)}, year = {2014}, pages = {1--4}}
-
Detecting double compressed AMR audio using deep learning
Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics
2014, pp. 2669-2673
DOI: 10.1109/ICASSP.2014.6854084
BibTeX@inproceedings{Luo2014, author = {Luo, D. and Yang, R. and Huang, J.}, title = {Detecting double compressed AMR audio using deep learning}, booktitle = {Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics}, year = {2014}, pages = {2669--2673}}
-
Harnessing Motion Blur to Unveil Splicing
Information Forensics and Security, IEEE Transactions on, 2014, Vol. PP(99), pp. 1-1
DOI: 10.1109/TIFS.2014.2302895
BibTeX@article{Makkena2014, author = {Makkena, P. and Rajagopalan, A. and Seetharaman, G.}, title = {Harnessing Motion Blur to Unveil Splicing}, journal = {Information Forensics and Security, IEEE Transactions on}, year = {2014}, volume = {PP}, number = {99}, pages = {1--1}}
-
Digital Forensic Technique for Double Compression Based JPEG Image Forgery Detection
Information Systems Security
Springer, 2014
DOI: 10.1007/978-3-319-13841-1_25
BibTeX@incollection{Malviya2014, author = {Malviya, Pankaj and Naskar, Ruchira}, title = {Digital Forensic Technique for Double Compression Based JPEG Image Forgery Detection}, booktitle = {Information Systems Security}, publisher = {Springer}, year = {2014}}
-
Attacking the Triangle Test in Sensor-based Camera Identification
Image Processing (ICIP), 2014 IEEE International Conference on
2014, pp. 5307-5311
DOI: 10.1109/ICIP.2014.7026074
BibTeX@inproceedings{Marra2014, author = {Marra, F. and Roli, F. and Cozzolino, D. and Sansone, C. and Verdoliva, L.}, title = {Attacking the Triangle Test in Sensor-based Camera Identification}, booktitle = {Image Processing (ICIP), 2014 IEEE International Conference on}, year = {2014}, pages = {5307--5311}}
-
Device Classification in Digital Forensics Triage
Universita Degli Studi Di Roma Tor Vergata Dipartimento Di Ingegneria Civile E Ingegneria Informatica, Universita Degli Studi Di Roma Tor Vergata Dipartimento Di Ingegneria Civile E Ingegneria Informatica, 2014
BibTeX@phdthesis{Marturana2014, author = {Marturana, Fabio}, title = {Device Classification in Digital Forensics Triage}, school = {Universita Degli Studi Di Roma Tor Vergata Dipartimento Di Ingegneria Civile E Ingegneria Informatica}, year = {2014}}
-
Image Phylogeny through Dissimilarity Metrics Fusion
Proc. 5th European Workshop Visual Information Processing (EUVIP)
2014, pp. 1-6
DOI: 10.1109/EUVIP.2014.7018370
BibTeX@inproceedings{Melloni2014, author = {Melloni, A. and Bestagini, P. and Milani, S. and Tagliasacchi, M. and Rocha, A. and Tubaro, S.}, title = {Image Phylogeny through Dissimilarity Metrics Fusion}, booktitle = {Proc. 5th European Workshop Visual Information Processing (EUVIP)}, year = {2014}, pages = {1--6}}
-
Demosaicing Strategy Identification Via Eigenalgorithms
2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Institute of Electrical and Electronics Engineers (IEEE), 2014
DOI: 10.1109/icassp.2014.6854082
BibTeX@inproceedings{Milani2014, author = {Milani, Simone and Bestagini, Paolo and Tagliasacchi, Marco and Tubaro, Stefano}, title = {Demosaicing Strategy Identification Via Eigenalgorithms}, booktitle = {2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)}, journal = {2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)}, publisher = {Institute of Electrical and Electronics Engineers (IEEE)}, year = {2014}}
-
Antiforensic synthesis of motion vectors using template algorithms
Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics
2014, pp. 2709-2713
DOI: 10.1109/ICASSP.2014.6854092
BibTeX@inproceedings{Milani2014c, author = {Milani, S. and Bestagini, P. and Tagliasacchi, M. and Tubaro, S.}, title = {Antiforensic synthesis of motion vectors using template algorithms}, booktitle = {Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics}, year = {2014}, pages = {2709--2713}}
-
Demosaicing strategy identification via eigenalgorithms
Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics
2014, pp. 2659-2663
DOI: 10.1109/ICASSP.2014.6854082
BibTeX@inproceedings{Milani2014d, author = {Milani, S. and Bestagini, P. and Tagliasacchi, M. and Tubaro, S.}, title = {Demosaicing strategy identification via eigenalgorithms}, booktitle = {Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics}, year = {2014}, pages = {2659--2663}}
-
Video Camera Identification Using Audio-visual Features
Visual Information Processing (EUVIP), 2014 5th European Workshop on
2014, pp. 1-6
DOI: 10.1109/EUVIP.2014.7018382
BibTeX@inproceedings{Milani2014a, author = {Milani, S. and Cuccovillo, L. and Tagliasacchi, M. and Tubaro, S. and Aichroth, P.}, title = {Video Camera Identification Using Audio-visual Features}, booktitle = {Visual Information Processing (EUVIP), 2014 5th European Workshop on}, year = {2014}, pages = {1--6}}
-
Discriminating Multiple JPEG Compressions Using First Digit Features
APSIPA Transactions on Signal and Information Processing, 2014, Vol. 3
DOI: 10.1017/atsip.2014.19
BibTeX@article{Milani2014b, author = {Milani, S. and Tagliasacchi, M. and Tubaro, S.}, title = {Discriminating Multiple JPEG Compressions Using First Digit Features}, journal = {APSIPA Transactions on Signal and Information Processing}, year = {2014}, volume = {3}}
-
Digital Forensic of JPEG Images
Signal and Image Processing (ICSIP), 2014 Fifth International Conference on
2014, pp. 131-136
DOI: 10.1109/ICSIP.2014.26
BibTeX@inproceedings{Mire2014, author = {Mire, A. V. and Dhok, S. B. and Porey, P. D. and Mistry, N. J.}, title = {Digital Forensic of JPEG Images}, booktitle = {Signal and Image Processing (ICSIP), 2014 Fifth International Conference on}, year = {2014}, pages = {131--136}}
-
Detection of Clones in Digital Images
International Journal of Computer Science and Business Informatics, 2014, Vol. 9(1)
BibTeX@article{Mishra2014, author = {Mishra, Minati and Adhikary, M. C.}, title = {Detection of Clones in Digital Images}, journal = {International Journal of Computer Science and Business Informatics}, year = {2014}, volume = {9}, number = {1}}
-
SVD-based Image Splicing Detection
Information Technology and Multimedia (ICIMU), 2014 International Conference on
2014, pp. 27-30
DOI: 10.1109/ICIMU.2014.7066598
BibTeX@inproceedings{Moghaddasi2014, author = {Moghaddasi, Zahra and Jalab, Hamid A. and Noor, Rafidah Md}, title = {SVD-based Image Splicing Detection}, booktitle = {Information Technology and Multimedia (ICIMU), 2014 International Conference on}, year = {2014}, pages = {27--30}}
-
Localization and Building Identification in Outdoor Environment for Smartphone Using Integrated GPS and Camera
Proc. Fourth Int Digital Information and Communication Technology and it's Applications (DICTAP) Conf
2014, pp. 327-332
DOI: 10.1109/DICTAP.2014.6821705
BibTeX@inproceedings{Moun2014, author = {Moun, C. and Netramai, C.}, title = {Localization and Building Identification in Outdoor Environment for Smartphone Using Integrated GPS and Camera}, booktitle = {Proc. Fourth Int Digital Information and Communication Technology and it's Applications (DICTAP) Conf}, year = {2014}, pages = {327--332}}
-
Forgery Detection Using Statistical Features
Computational Intelligence on Power, Energy and Controls with their impact on Humanity (CIPECH), 2014 Innovative Applications of
2014, pp. 92-97
DOI: 10.1109/CIPECH.2014.7019062
BibTeX@inproceedings{Mushtaq2014, author = {Mushtaq, S. and Mir, A. H.}, title = {Forgery Detection Using Statistical Features}, booktitle = {Computational Intelligence on Power, Energy and Controls with their impact on Humanity (CIPECH), 2014 Innovative Applications of}, year = {2014}, pages = {92--97}}
-
Novel Method for Image Splicing Detection
Advances in Computing, Communications and Informatics (ICACCI, 2014 International Conference on
2014, pp. 2398-2403
DOI: 10.1109/ICACCI.2014.6968386
BibTeX@inproceedings{Mushtaq2014a, author = {Mushtaq, S. and Mir, A. H.}, title = {Novel Method for Image Splicing Detection}, booktitle = {Advances in Computing, Communications and Informatics (ICACCI, 2014 International Conference on}, year = {2014}, pages = {2398--2403}}
-
Image Forgery Detection Based on Illumination Inconsistencies & Intrinsic Resampling Properties
Emerging Research Areas: Magnetics, Machines and Drives (AICERA/iCMMD), 2014 Annual International Conference on
2014, pp. 1-6
DOI: 10.1109/AICERA.2014.6908192
BibTeX@inproceedings{Neenu2014, author = {Neenu, H. U. and Cheriyan, J.}, title = {Image Forgery Detection Based on Illumination Inconsistencies & Intrinsic Resampling Properties}, booktitle = {Emerging Research Areas: Magnetics, Machines and Drives (AICERA/iCMMD), 2014 Annual International Conference on}, year = {2014}, pages = {1--6}}
-
A Novel Method for Detecting Double Compressed Facebook JPEG Images
Batten, L., Li, G., Niu, W. & Warren, M. (ed.)
Applications and Techniques in Information Security
Springer Science mathplus Business Media, 2014, Vol. 490, pp. 191-198
DOI: 10.1007/978-3-662-45670-5_18
BibTeX@incollection{Ng2014, author = {Ng, Allan and Pan, Lei and Xiang, Yang}, title = {A Novel Method for Detecting Double Compressed Facebook JPEG Images}, booktitle = {Applications and Techniques in Information Security}, publisher = {Springer Science mathplus Business Media}, year = {2014}, volume = {490}, pages = {191--198}}
-
Vorsicht Falle! Scripted Reality, Retouchierte Fotos, Pseudonyme -- Täuschung Als Medienethische Herausforderung
Communicatio Socialis, 2014, Vol. 46(3-4)
BibTeX@article{Nothelle2014, author = {Nothelle, Claudia}, title = {Vorsicht Falle! Scripted Reality, Retouchierte Fotos, Pseudonyme -- Täuschung Als Medienethische Herausforderung}, journal = {Communicatio Socialis}, year = {2014}, volume = {46}, number = {3--4}}
-
Image Phylogeny Forests Reconstruction
IEEE Transactions on Information Forensics and Security, 2014, Vol. 9(10), pp. 1533-1546
DOI: 10.1109/TIFS.2014.2340017
BibTeX@article{O.Costa2014, author = {de O. Costa, F. and Oikawa, M. A. and Dias, Z. and Goldenstein, S. and de Rocha, A. R.}, title = {Image Phylogeny Forests Reconstruction}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2014}, volume = {9}, number = {10}, pages = {1533--1546}}
-
Analysis of Errors in EXIF Metadata on Mobile Devices
Multimedia Tools and Applications, Springer US, 2014, pp. 1-29
DOI: 10.1007/s11042-013-1837-6
BibTeX@article{Orozco2014, author = {Orozco, Sandoval and AnaLucila and González, Arenas and DavidManuel and Villalba, García and Javier, Luis and Hernández-Castro, Julio}, title = {Analysis of Errors in EXIF Metadata on Mobile Devices}, journal = {Multimedia Tools and Applications}, publisher = {Springer US}, year = {2014}, pages = {1--29}}
-
Towards Detection of Image Tampering Over Diverse Information Security Schemata: A State of the art
International Journal of Information and Network Security (IJINS), 2014, Vol. 3(1)
BibTeX@article{Pande2014, author = {Pande, Deepali}, title = {Towards Detection of Image Tampering Over Diverse Information Security Schemata: A State of the art}, journal = {International Journal of Information and Network Security (IJINS)}, year = {2014}, volume = {3}, number = {1}}
-
Passive Copy-move Forgery Detection in Videos
Computer and Communication Technology (ICCCT), 2014 International Conference on
2014, pp. 301-306
DOI: 10.1109/ICCCT.2014.7001509
BibTeX@inproceedings{Pandey2014a, author = {Pandey, R. C. and Singh, S. K. and Shukla, K. K.}, title = {Passive Copy-move Forgery Detection in Videos}, booktitle = {Computer and Communication Technology (ICCCT), 2014 International Conference on}, year = {2014}, pages = {301--306}}
-
Fast and Robust Passive Copy-move Forgery Detection Using SURF and SIFT Image Features
Industrial and Information Systems (ICIIS), 2014 9th International Conference on
2014, pp. 1-6
DOI: 10.1109/ICIINFS.2014.7036519
BibTeX@inproceedings{Pandey2014, author = {Pandey, Ramesh Chand and Singh, Sanjay Kumar and Shukla, K. K. and Agrawal, Rishabh}, title = {Fast and Robust Passive Copy-move Forgery Detection Using SURF and SIFT Image Features}, booktitle = {Industrial and Information Systems (ICIIS), 2014 9th International Conference on}, year = {2014}, pages = {1--6}}
-
Multiple JPEG compression detection by means of Benford-Fourier coefficients
Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)
2014, pp. 113-118
DOI: 10.1109/WIFS.2014.7084313
BibTeX@inproceedings{Pasquini2014b, author = {Pasquini, C. and Boato, G. and Perez-Gonzalez, F.}, title = {Multiple JPEG compression detection by means of Benford-Fourier coefficients}, booktitle = {Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)}, year = {2014}, pages = {113--118}}
-
Transportation-theoretic image counterforensics to First Significant Digit histogram forensics
Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics
2014, pp. 2699-2703
DOI: 10.1109/ICASSP.2014.6854090
BibTeX@inproceedings{Pasquini2014a, author = {Pasquini, C. and Comesaña-Alfaro, P. and Pérez-González, F. and Boato, G.}, title = {Transportation-theoretic image counterforensics to First Significant Digit histogram forensics}, booktitle = {Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics}, year = {2014}, pages = {2699--2703}}
-
Transportation-theoretic image counterforensics to First Significant Digit histogram forensics
Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics
2014, pp. 2699-2703
DOI: 10.1109/ICASSP.2014.6854090
BibTeX@inproceedings{Pasquini2014c, author = {Pasquini, C. and Comesaña-Alfaro, P. and Pérez-González, F. and Boato, G.}, title = {Transportation-theoretic image counterforensics to First Significant Digit histogram forensics}, booktitle = {Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics}, year = {2014}, pages = {2699--2703}}
-
A Benford-Fourier JPEG compression detector
Proc. IEEE Int. Conf. Image Processing (ICIP)
2014, pp. 5322-5326
DOI: 10.1109/ICIP.2014.7026077
BibTeX@inproceedings{Pasquini2014, author = {Pasquini, C. and Pérez-González, F. and Boato, G.}, title = {A Benford-Fourier JPEG compression detector}, booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)}, year = {2014}, pages = {5322--5326}}
-
A Robust Median Filtering Detector Based on Filter Residual
paper.edu.cn, 2014
BibTeX@electronic{Peng2014a, author = {Peng, Anjie and Kang, Xiangui}, title = {A Robust Median Filtering Detector Based on Filter Residual}, journal = {paper.edu.cn}, year = {2014}}
-
Identifying Photographic Images and Photorealistic Computer Graphics Using Multifractal Spectrum Features of PRNU
Multimedia and Expo (ICME), 2014 IEEE International Conference on
2014, pp. 1-6
DOI: 10.1109/ICME.2014.6890296
BibTeX@inproceedings{Peng2014b, author = {Peng, Fei and Shi, Jiaoling and Long, Min}, title = {Identifying Photographic Images and Photorealistic Computer Graphics Using Multifractal Spectrum Features of PRNU}, booktitle = {Multimedia and Expo (ICME), 2014 IEEE International Conference on}, year = {2014}, pages = {1--6}}
-
Discriminating Natural Images and Computer Generated Graphics Based on the Impact of CFA Interpolation on the Correlation of PRNU
Digital Investigation, 2014(0), pp. -
DOI: 10.1016/j.diin.2014.04.002
BibTeX@article{Peng2014, author = {Peng, Fei and Zhou, Die-lan}, title = {Discriminating Natural Images and Computer Generated Graphics Based on the Impact of CFA Interpolation on the Correlation of PRNU}, journal = {Digital Investigation}, year = {2014}, number = {0}, pages = {-}}
-
Video Analysis Tool Box for Digital Video Forensics
University of Moratuwa, University of Moratuwa, 2014
BibTeX@phdthesis{Perer2014, author = {Perera, Halloluwage Susinda Deemantha}, title = {Video Analysis Tool Box for Digital Video Forensics}, school = {University of Moratuwa}, year = {2014}}
-
Improved Anti-forensics of JPEG\ Compression
Journal of Systems and Software, 2014(0), pp. -
DOI: 10.1016/j.jss.2013.12.043
BibTeX@article{Qian2014, author = {Qian, Zhenxing and Zhang, Xinpeng}, title = {Improved Anti-forensics of JPEG\ Compression}, journal = {Journal of Systems and Software}, year = {2014}, number = {0}, pages = {-}}
-
A Universal Image Forensic Strategy Based on Steganalytic Model
Proceedings of the 2Nd ACM Workshop on Information Hiding and Multimedia Security
ACM, 2014, pp. 165-170
DOI: 10.1145/2600918.2600941
BibTeX@inproceedings{Qiu2014, author = {Qiu, Xiaoqing and Li, Haodong and Luo, Weiqi and Huang, Jiwu}, title = {A Universal Image Forensic Strategy Based on Steganalytic Model}, booktitle = {Proceedings of the 2Nd ACM Workshop on Information Hiding and Multimedia Security}, publisher = {ACM}, year = {2014}, pages = {165--170}}
-
A Framework for Identifying Shifted Double JPEG Compression Artifacts with Application to Non-intrusive Digital Image Forensics
Science China Information Sciences, Science China Press, 2014, Vol. 57(2), pp. 1-18
DOI: 10.1007/s11432-013-5046-8
BibTeX@article{Qu2014, author = {Qu, ZhenHua and Luo, WeiQi and Huang, JiWu}, title = {A Framework for Identifying Shifted Double JPEG Compression Artifacts with Application to Non-intrusive Digital Image Forensics}, journal = {Science China Information Sciences}, publisher = {Science China Press}, year = {2014}, volume = {57}, number = {2}, pages = {1--18}}
-
A Review on Copy Move Image Forgery Detection Techniques
Proc. 11th Int Systems, Signals Devices (SSD) Multi-Conf
2014, pp. 1-5
DOI: 10.1109/SSD.2014.6808907
BibTeX@inproceedings{Qureshi2014, author = {Qureshi, M. Ali and Deriche, M.}, title = {A Review on Copy Move Image Forgery Detection Techniques}, booktitle = {Proc. 11th Int Systems, Signals Devices (SSD) Multi-Conf}, year = {2014}, pages = {1--5}}
-
Harnessing Motion Blur to Unveil Splicing
Information Forensics and Security, IEEE Transactions on, 2014, Vol. 9(4), pp. 583-595
DOI: 10.1109/TIFS.2014.2302895
BibTeX@article{Rao2014, author = {Rao, M. P. and Rajagopalan, A. N. and Seetharaman, G.}, title = {Harnessing Motion Blur to Unveil Splicing}, journal = {Information Forensics and Security, IEEE Transactions on}, year = {2014}, volume = {9}, number = {4}, pages = {583--595}}
-
Detection of Object-based Manipulation by the Statistical Features of Object Contour
Forensic Science International, 2014
BibTeX@article{Richao2014, author = {Richao, Chen and Gaobo, Yang and Ningbo, Zhu}, title = {Detection of Object-based Manipulation by the Statistical Features of Object Contour}, journal = {Forensic Science International}, year = {2014}}
-
Estimation of Linear Transformation by Analyzing the Periodicity of Interpolation
Pattern Recognition Letters, 2014, Vol. 36(0), pp. 89-99
DOI: 10.1016/j.patrec.2013.09.028
BibTeX@article{Ryu2014, author = {Ryu, Seung-Jin and Lee, Heung-Kyu}, title = {Estimation of Linear Transformation by Analyzing the Periodicity of Interpolation}, journal = {Pattern Recognition Letters}, year = {2014}, volume = {36}, number = {0}, pages = {89--99}}
-
Detecting Trace of Seam Carving for Forensic Analysis
IEICE TRANSACTIONS on Information and Systems, 2014, Vol. E97-D(5), pp. 1304-1311
BibTeX@article{Ryu2014a, author = {Ryu, Seung-Jin and Lee, Hae-Yeoun and Lee, Heung-kyu}, title = {Detecting Trace of Seam Carving for Forensic Analysis}, journal = {IEICE TRANSACTIONS on Information and Systems}, year = {2014}, volume = {E97-D}, number = {5}, pages = {1304--1311}}
-
A Key-point Based Robust Algorithm for Detecting Cloning Forgery
International Journal of Current Engineering and Technology, 2014
BibTeX@article{Saleem2014, author = {Saleem, Mariam}, title = {A Key-point Based Robust Algorithm for Detecting Cloning Forgery}, journal = {International Journal of Current Engineering and Technology}, year = {2014}}
-
A Comparative Analysis on Pixel-based Blind Cloning Techniques
Control System, Computing and Engineering (ICCSCE), 2014 IEEE International Conference on
2014, pp. 130-135
DOI: 10.1109/ICCSCE.2014.7072702
BibTeX@inproceedings{Saleem2014a, author = {Saleem, M. and Altaf, M. Q. and Chaudry, Q.}, title = {A Comparative Analysis on Pixel-based Blind Cloning Techniques}, booktitle = {Control System, Computing and Engineering (ICCSCE), 2014 IEEE International Conference on}, year = {2014}, pages = {130--135}}
-
Source Identification for Mobile Devices, Based on Wavelet Transforms Combined with Sensor Imperfections
Computing, Springer, 2014, Vol. 96(9), pp. 829
DOI: 10.1007/s00607-013-0313-5
BibTeX@article{SandovalOrozco2014, author = {Sandoval Orozco, A. L. and Arenas González, D. M. and Rosales Corripio, J. and GarcÃa Villalba, L. J. and Hernandez-Castro, J. C.}, title = {Source Identification for Mobile Devices, Based on Wavelet Transforms Combined with Sensor Imperfections}, journal = {Computing}, publisher = {Springer}, year = {2014}, volume = {96}, number = {9}, pages = {829}}
-
Copy-move Forgery Detection Using Orthogonal Wavelet Transforms.
International Journal of Computer Applications, 2014, Vol. 88, pp. 41-45
BibTeX@article{Sarode2014, author = {Sarode, Tanuja K. and Vaswani, Naveen}, title = {Copy-move Forgery Detection Using Orthogonal Wavelet Transforms.}, journal = {International Journal of Computer Applications}, year = {2014}, volume = {88}, pages = {41--45}}
-
On the Usage of Sensor Pattern Noise for Picture-to-identity Linking through Social Network Accounts
Proceeding of the International Conference on Computer Vision Theory and Applications Lisbon, Portugal
2014
BibTeX@inproceedings{Satta2014, author = {Satta, Riccardo and Stirparo, Pasquale}, title = {On the Usage of Sensor Pattern Noise for Picture-to-identity Linking through Social Network Accounts}, booktitle = {Proceeding of the International Conference on Computer Vision Theory and Applications Lisbon, Portugal}, year = {2014}}
-
Detecting Documents Forged by Printing and Copying
EURASIP Journal on Advances in Signal Processing, Springer, 2014, Vol. 2014(1), pp. 140
BibTeX@article{Shang2014, author = {Shang, Shize and Memon, Nasir and Kong, Xiangwei}, title = {Detecting Documents Forged by Printing and Copying}, journal = {EURASIP Journal on Advances in Signal Processing}, publisher = {Springer}, year = {2014}, volume = {2014}, number = {1}, pages = {140}}
-
Digital Image Forensics Using Orthogonal 1-D Objects
Chinese Journal of Electronics, 2014, Vol. 23(3)
BibTeX@article{Shaozhang201, author = {Shaozhang, Niu and Xianzhe, Meng and Haoliang, Cui}, title = {Digital Image Forensics Using Orthogonal 1-D Objects}, journal = {Chinese Journal of Electronics}, year = {2014}, volume = {23}, number = {3}}
-
Computationally Efficient Copy-move Image Forgery Detection Based on DCT and SVD
Advanced Research in Electrical and Electronic Engineering, 2014, Vol. 1(3), pp. 79-81
BibTeX@article{Sharma2014, author = {Sharma, Kavya}, title = {Computationally Efficient Copy-move Image Forgery Detection Based on DCT and SVD}, journal = {Advanced Research in Electrical and Electronic Engineering}, year = {2014}, volume = {1}, number = {3}, pages = {79--81}}
-
Forgery Detection Based on Blur Inconsistencies: A Review
International Journal of Engineering and Technical Research (IJETR), 2014, Vol. 2(12), pp. 198-201
BibTeX@article{Shehnaz2014, author = {Shehnaz and Kaur, Mandeep}, title = {Forgery Detection Based on Blur Inconsistencies: A Review}, journal = {International Journal of Engineering and Technical Research (IJETR)}, year = {2014}, volume = {2}, number = {12}, pages = {198--201}}
-
Blind Detection of Median Filtering Using Linear and Nonlinear Descriptors
Multimedia Tools and Applications, Springer, 2014, pp. 1
DOI: 10.1007/s11042-014-2407-2
BibTeX@article{Shen2014, author = {Shen, Zhaoyi and Ni, Jiangqun and Chen, Chenglong}, title = {Blind Detection of Median Filtering Using Linear and Nonlinear Descriptors}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2014}, pages = {1}}
-
Weighting Optimization with Neural Network for Photo-response-non-uniformity-based Source Camera Identification
Asia-Pacific Signal and Information Processing Association, 2014 Annual Summit and Conference (APSIPA)
2014, pp. 1-7
DOI: 10.1109/APSIPA.2014.7041642
BibTeX@inproceedings{Shi2014, author = {Shi, Chao and Law, Ngai-Fong and Leung, Hung-Fat and Siu, Wan-Chi}, title = {Weighting Optimization with Neural Network for Photo-response-non-uniformity-based Source Camera Identification}, booktitle = {Asia-Pacific Signal and Information Processing Association, 2014 Annual Summit and Conference (APSIPA)}, year = {2014}, pages = {1--7}}
-
Forgery Image Detection of Scale up and down Image Using Discrete Cosine Transform
Journal of Next Generation Information Technology (JNIT), 2014, Vol. 5(2)
BibTeX@article{Shin2014, author = {Shin, Yong-Dal}, title = {Forgery Image Detection of Scale up and down Image Using Discrete Cosine Transform}, journal = {Journal of Next Generation Information Technology (JNIT)}, year = {2014}, volume = {5}, number = {2}}
-
Natural Image Splicing Detection Based on Defocus Blur at Edges
Communications in China (ICCC), 2014 IEEE/CIC International Conference on
2014, pp. 225-230
DOI: 10.1109/ICCChina.2014.7008276
BibTeX@inproceedings{Song2014, author = {Song, Chunhe and Lin, Xiaodong}, title = {Natural Image Splicing Detection Based on Defocus Blur at Edges}, booktitle = {Communications in China (ICCC), 2014 IEEE/CIC International Conference on}, year = {2014}, pages = {225--230}}
-
Enhanced State Selection Markov Model for Image Splicing Detection
EURASIP Journal on Wireless Communications and Networking, 2014, Vol. 2014(1), pp. 7
DOI: 10.1186/1687-1499-2014-7
BibTeX@article{Su2014, author = {Su, Bo and Yuan, Quanqiao and Wang, Shilin and Zhao, Chenglin and Li, Shenghong}, title = {Enhanced State Selection Markov Model for Image Splicing Detection}, journal = {EURASIP Journal on Wireless Communications and Networking}, year = {2014}, volume = {2014}, number = {1}, pages = {7}}
-
A Video Forgery Detection Algorithm Based on Compressive Sensing
Multimedia Tools and Applications, Springer US, 2014, pp. 1-16
DOI: 10.1007/s11042-014-1915-4
BibTeX@article{Su2014a, author = {Su, Lichao and Huang, Tianqiang and Yang, Jianmei}, title = {A Video Forgery Detection Algorithm Based on Compressive Sensing}, journal = {Multimedia Tools and Applications}, publisher = {Springer US}, year = {2014}, pages = {1--16}}
-
Speeding-up SIFT Based Copy Move Forgery Detection Using Level Set Approach
Advances in Electronics, Computers and Communications (ICAECC), 2014 International Conference on
2014, pp. 1-6
DOI: 10.1109/ICAECC.2014.7002407
BibTeX@inproceedings{Sudhakar2014, author = {Sudhakar, K. and Sandeep, V. M. and Kulkarni, S.}, title = {Speeding-up SIFT Based Copy Move Forgery Detection Using Level Set Approach}, booktitle = {Advances in Electronics, Computers and Communications (ICAECC), 2014 International Conference on}, year = {2014}, pages = {1--6}}
-
Shape Based Copy Move Forgery Detection Using Level Set Approach
Signal and Image Processing (ICSIP), 2014 Fifth International Conference on
2014, pp. 213-217
DOI: 10.1109/ICSIP.2014.40
BibTeX@inproceedings{Sudhakar2014a, author = {Sudhakar, K. and Sandeep, V. M. and Kulkarni, S.}, title = {Shape Based Copy Move Forgery Detection Using Level Set Approach}, booktitle = {Signal and Image Processing (ICSIP), 2014 Fifth International Conference on}, year = {2014}, pages = {213--217}}
-
Processing Raw Images in Matlab
Department of Electrical Engineering, UC Santa Cruz, Department of Electrical Engineering, UC Santa Cruz, 2014
BibTeX@other{Sumner2014, author = {Sumner, Rob}, title = {Processing Raw Images in Matlab}, school = {Department of Electrical Engineering, UC Santa Cruz}, year = {2014}}
-
DCT-PCA Based Method for Copy-move Forgery Detection
Satapathy, S. C., Avadhani, P. S., Udgata, S. K. & Lakshminarayana, S. (ed.)
ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol II
Springer International Publishing, 2014, Vol. 249, pp. 577-583
DOI: 10.1007/978-3-319-03095-1_62
BibTeX@incollection{Sunil2014, author = {Sunil, Kumar and Jagan, Desai and Shaktidev, Mukherjee}, title = {DCT-PCA Based Method for Copy-move Forgery Detection}, booktitle = {ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol II}, publisher = {Springer International Publishing}, year = {2014}, volume = {249}, pages = {577--583}}
-
Statistical Modeling and Detection for Digital Image Forensics
University of Technology of Troyes, University of Technology of Troyes, 2014
BibTeX@phdthesis{Tai2014, author = {Tai, Than Hai}, title = {Statistical Modeling and Detection for Digital Image Forensics}, school = {University of Technology of Troyes}, year = {2014}}
-
Optimal Detector for Camera Model Identification Based on an Accurate Model of DCT Coefficients
Proc. IEEE 16th Int Multimedia Signal Processing (MMSP) Workshop
2014, pp. 1-6
DOI: 10.1109/MMSP.2014.6958810
BibTeX@inproceedings{Thai2014, author = {Thai, Thanh Hai and Cogranne, R. and Retraint, F.}, title = {Optimal Detector for Camera Model Identification Based on an Accurate Model of DCT Coefficients}, booktitle = {Proc. IEEE 16th Int Multimedia Signal Processing (MMSP) Workshop}, year = {2014}, pages = {1--6}}
-
Camera Model Identification Based on the Heteroscedastic Noise Model
IEEE Transactions on Image Processing, 2014, Vol. 23(1), pp. 250-263
DOI: 10.1109/TIP.2013.2290596
BibTeX@article{Thai2014b, author = {Thai, T. H. and Cogranne, R. and Retraint, F.}, title = {Camera Model Identification Based on the Heteroscedastic Noise Model}, journal = {IEEE Transactions on Image Processing}, year = {2014}, volume = {23}, number = {1}, pages = {250--263}}
-
Robust Image Recapture Detection Using a K-SVD Learning Approach to Train Dictionaries of Edge Profiles
Proc. IEEE Int. Conf. Image Processing (ICIP)
2014, pp. 5317-5321
DOI: 10.1109/ICIP.2014.7026076
BibTeX@inproceedings{Thongkamwitoon2014, author = {Thongkamwitoon, T. and Muammar, H. and Dragotti, P. L.}, title = {Robust Image Recapture Detection Using a K-SVD Learning Approach to Train Dictionaries of Edge Profiles}, booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)}, year = {2014}, pages = {5317--5321}}
-
Video Frame Copy-move Forgery Detection Based on Cellular Automata and Local Binary Patterns
Telecommunications (BIHTEL), 2014 X International Symposium on
2014, pp. 1-4
DOI: 10.1109/BIHTEL.2014.6987651
BibTeX@inproceedings{Tralic2014a, author = {Tralic, D. and Grgic, S. and Zovko-Cihlar, B.}, title = {Video Frame Copy-move Forgery Detection Based on Cellular Automata and Local Binary Patterns}, booktitle = {Telecommunications (BIHTEL), 2014 X International Symposium on}, year = {2014}, pages = {1--4}}
-
Copy-move Forgery Detection Using Cellular Automata
Rosin, P., Adamatzky, A. & Sun, X. (ed.)
Cellular Automata in Image Processing and Geometry
Chapter Copy-Move Forgery Detection Using Cellular Automata
Springer, 2014, pp. 105-125
DOI: 10.1007/978-3-319-06431-4_6
BibTeX@inbook{Tralic2014, author = {Tralic, Dijana and Rosin, Paul and Sun, Xianfang and Grgic, Sonja}, title = {Copy-move Forgery Detection Using Cellular Automata}, booktitle = {Cellular Automata in Image Processing and Geometry}, publisher = {Springer}, year = {2014}, pages = {105--125}}
-
Detection of Duplicated Image Regions Using Cellular Automata
Systems, Signals and Image Processing (IWSSIP), 2014 International Conference on
2014, pp. 167-170
BibTeX@inproceedings{Tralic2014b, author = {Tralic, D. and Rosin, P. L. and Sun, Xianfang and Grgic, S.}, title = {Detection of Duplicated Image Regions Using Cellular Automata}, booktitle = {Systems, Signals and Image Processing (IWSSIP), 2014 International Conference on}, year = {2014}, pages = {167--170}}
-
Blind Inpainting Forgery Detection
Signal and Information Processing (GlobalSIP), 2014 IEEE Global Conference on
2014, pp. 1019-1023
DOI: 10.1109/GlobalSIP.2014.7032275
BibTeX@inproceedings{Trung2014, author = {Trung, Dang Thanh and Beghdadi, A. and Larabi, M.-C.}, title = {Blind Inpainting Forgery Detection}, booktitle = {Signal and Information Processing (GlobalSIP), 2014 IEEE Global Conference on}, year = {2014}, pages = {1019--1023}}
-
Detectability-quality Trade-off in JPEG Counter-forensics
Proc. IEEE Int. Conf. Image Processing (ICIP)
2014, pp. 5337-5341
DOI: 10.1109/ICIP.2014.7026080
BibTeX@inproceedings{Valenzise2014, author = {Valenzise, G. and Tagliasacchi, M. and Tubaro, S.}, title = {Detectability-quality Trade-off in JPEG Counter-forensics}, booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)}, year = {2014}, pages = {5337--5341}}
-
Detectability-quality trade-off in JPEG counter-forensics
Proc. IEEE Int. Conf. Image Processing (ICIP)
2014, pp. 5337-5341
DOI: 10.1109/ICIP.2014.7026080
BibTeX@inproceedings{Valenzise2014a, author = {Valenzise, G. and Tagliasacchi, M. and Tubaro, S.}, title = {Detectability-quality trade-off in JPEG counter-forensics}, booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)}, year = {2014}, pages = {5337--5341}}
-
A Feature-based Approach for Image Tampering Detection and Localization
Information Forensics and Security (WIFS), 2014 IEEE International Workshop on
2014, pp. 149-154
DOI: 10.1109/WIFS.2014.7084319
BibTeX@inproceedings{Verdoliva2014, author = {Verdoliva, L. and Cozzolino, D. and Poggi, G.}, title = {A Feature-based Approach for Image Tampering Detection and Localization}, booktitle = {Information Forensics and Security (WIFS), 2014 IEEE International Workshop on}, year = {2014}, pages = {149--154}}
-
A Fast Plain Copy-move Detection Algorithm Based on Structural Pattern and 2d Rabin-karp Rolling Hash
Image Analysis and Recognition, Springer, 2014
DOI: 10.1007/978-3-319-11758-4_50
BibTeX@article{Vladimirovich2014, author = {Vladimirovich, Kuznetsov Andrey and Valerievich, Myasnikov Vladislav}, title = {A Fast Plain Copy-move Detection Algorithm Based on Structural Pattern and 2d Rabin-karp Rolling Hash}, journal = {Image Analysis and Recognition}, publisher = {Springer}, year = {2014}}
-
Passive Video Forgery Detection Techniques: A Survey
Information Assurance and Security (IAS), 2014 10th International Conference on
2014, pp. 29-34
DOI: 10.1109/ISIAS.2014.7064616
BibTeX@inproceedings{Wahab2014, author = {Wahab, Ainuddin Wahid Abdul and Bagiwa, Mustapha Aminu and Idris, Mohd Yamani Idna and Khan, Suleman and Razak, Zaidi and Ariffin, Muhammad Rezal Kamel}, title = {Passive Video Forgery Detection Techniques: A Survey}, booktitle = {Information Assurance and Security (IAS), 2014 10th International Conference on}, year = {2014}, pages = {29--34}}
-
Countering anti-forensics to wavelet-based compression
Proc. IEEE Int. Conf. Image Processing (ICIP)
2014, pp. 5382-5386
DOI: 10.1109/ICIP.2014.7026089
BibTeX@inproceedings{Wang2014c, author = {Wang, M. and Chen, Z. and Fan, W. and Xiong, Z.}, title = {Countering anti-forensics to wavelet-based compression}, booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)}, year = {2014}, pages = {5382--5386}}
-
Detection of Shifted Double JPEG Compression by an Adaptive DCT Coefficient Model
EURASIP Journal on Advances in Signal Processing, 2014, Vol. 2014(1), pp. 101
DOI: 10.1186/1687-6180-2014-101
BibTeX@article{Wang2014, author = {Wang, Shi-Lin and Liew, Alan Wee-Chung and Li, Sheng-Hong and Zhang, Yu-Jin and Li, Jian-Hua}, title = {Detection of Shifted Double JPEG Compression by an Adaptive DCT Coefficient Model}, journal = {EURASIP Journal on Advances in Signal Processing}, year = {2014}, volume = {2014}, number = {1}, pages = {101}}
-
Exploring DCT Coefficient Quantization Effects for Local Tampering Detection
Information Forensics and Security, IEEE Transactions on, 2014, Vol. 9(10), pp. 1653-1666
DOI: 10.1109/TIFS.2014.2345479
BibTeX@article{Wang2014a, author = {Wang, Wei and Dong, Jing and Tan, Tieniu}, title = {Exploring DCT Coefficient Quantization Effects for Local Tampering Detection}, journal = {Information Forensics and Security, IEEE Transactions on}, year = {2014}, volume = {9}, number = {10}, pages = {1653--1666}}
-
Identifying Video Forgery Process Using Optical Flow
Digital-Forensics and Watermarking, Springer, 2014
DOI: 10.1007/978-3-662-43886-2_18
BibTeX@article{Wang2014b, author = {Wang, Wan and Jiang, Xinghao and Wang, Shilin and Wan, Meng and Sun, Tanfeng}, title = {Identifying Video Forgery Process Using Optical Flow}, journal = {Digital-Forensics and Watermarking}, publisher = {Springer}, year = {2014}}
-
A Patch Analysis Method to Detect Seam Carved Images
Pattern Recognition Letters, 2014, Vol. 36(0), pp. 100-106
DOI: 10.1016/j.patrec.2013.09.026
BibTeX@article{Wei2014, author = {Wei, Jyh-Da and Lin, Yu-Ju and Wu, Yi-Jing}, title = {A Patch Analysis Method to Detect Seam Carved Images}, journal = {Pattern Recognition Letters}, year = {2014}, volume = {36}, number = {0}, pages = {100--106}}
-
Dual Tree Complex Wavelet Transform Approach to Copy-rotate-move Forgery Detection
Science China Information Sciences, Springer Berlin Heidelberg, 2014, Vol. 57(1), pp. 1-12
DOI: 10.1007/s11432-013-4823-8
BibTeX@article{Wu2014, author = {Wu, YunJie and Deng, Yu and Duan, HaiBin and Zhou, LinNa}, title = {Dual Tree Complex Wavelet Transform Approach to Copy-rotate-move Forgery Detection}, journal = {Science China Information Sciences}, publisher = {Springer Berlin Heidelberg}, year = {2014}, volume = {57}, number = {1}, pages = {1--12}}
-
Exposing video inter-frame forgery based on velocity field consistency
Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics
2014, pp. 2674-2678
DOI: 10.1109/ICASSP.2014.6854085
BibTeX@inproceedings{Wu2014a, author = {Wu, Y. and Jiang, X. and Sun, T. and Wang, W.}, title = {Exposing video inter-frame forgery based on velocity field consistency}, booktitle = {Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics}, year = {2014}, pages = {2674--2678}}
-
Image Splicing Detection Based on Machine Learning Algorithm
Wong, W. E. & Zhu, T. (ed.)
Computer Engineering and Networking
Springer International Publishing, 2014, Vol. 277, pp. 601-608
DOI: 10.1007/978-3-319-01766-2_69
BibTeX@incollection{Xiao2014, author = {Xiao, Yan}, title = {Image Splicing Detection Based on Machine Learning Algorithm}, booktitle = {Computer Engineering and Networking}, publisher = {Springer International Publishing}, year = {2014}, volume = {277}, pages = {601--608}}
-
Digital Image Identification Based on Generalized Gaussian Model
Proc. SPIE 9233, International Symposium on Photonics and Optoelectronics 2014
Proc. SPIE, 2014, Vol. 9233, pp. 923303-923303-6
DOI: 10.1117/12.2069695
BibTeX@inproceedings{Xing2014, author = {Xing, Nan and Wang, Jing and Zhang, Xiaolei and Zhang, Jingbo}, title = {Digital Image Identification Based on Generalized Gaussian Model}, booktitle = {Proc. SPIE 9233, International Symposium on Photonics and Optoelectronics 2014}, journal = {Proc. SPIE}, year = {2014}, volume = {9233}, pages = {923303-923303-6}}
-
Detecting Image Splicing Using Merged Features in Chroma Space
The Scientific World Journal, 2014, Vol. 2014
DOI: 10.1155/2014/262356
BibTeX@article{Xu2014, author = {Xu, Bo and Liu, Guangjie and Dai, Yuewei}, title = {Detecting Image Splicing Using Merged Features in Chroma Space}, journal = {The Scientific World Journal}, year = {2014}, volume = {2014}}
-
Feature Fusion for Blurring Detection in Image Forensics
IEICE TRANSACTIONS on Information and Systems, 2014, Vol. E97-D(6), pp. 1690-1693
BibTeX@article{Yang2014a, author = {Yang, Benjuan and Liu, Benyong}, title = {Feature Fusion for Blurring Detection in Image Forensics}, journal = {IEICE TRANSACTIONS on Information and Systems}, year = {2014}, volume = {E97-D}, number = {6}, pages = {1690--1693}}
-
Hiding the Trace of JPEG Compression History
Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on
2014, pp. 909-913
DOI: 10.1109/CSNT.2014.187
BibTeX@inproceedings{Yang2014, author = {Yang, Hong and Zhou, Zhiping}, title = {Hiding the Trace of JPEG Compression History}, booktitle = {Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on}, year = {2014}, pages = {909--913}}
-
An Effective Method for Detecting Double JPEG Compression with the Same Quantization Matrix
Information Forensics and Security, IEEE Transactions on, 2014, Vol. 9(11), pp. 1933-1942
DOI: 10.1109/TIFS.2014.2359368
BibTeX@article{Yang2014b, author = {Yang, Jianquan and Xie, Jin and Zhu, Guopu and Kwong, Sam and Shi, Yun-Qing}, title = {An Effective Method for Detecting Double JPEG Compression with the Same Quantization Matrix}, journal = {Information Forensics and Security, IEEE Transactions on}, year = {2014}, volume = {9}, number = {11}, pages = {1933--1942}}
-
Additive Noise Detection and Its Application to Audio Forensics
Asia-Pacific Signal and Information Processing Association, 2014 Annual Summit and Conference (APSIPA)
2014, pp. 1-5
DOI: 10.1109/APSIPA.2014.7041688
BibTeX@inproceedings{Yang2014c, author = {Yang, Rui}, title = {Additive Noise Detection and Its Application to Audio Forensics}, booktitle = {Asia-Pacific Signal and Information Processing Association, 2014 Annual Summit and Conference (APSIPA)}, year = {2014}, pages = {1--5}}
-
Tampering Detection and Content Recovery for Digital Images Using Halftone Mechanism
Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2014 Tenth International Conference on
2014, pp. 130-133
DOI: 10.1109/IIH-MSP.2014.39
BibTeX@inproceedings{Yang2014d, author = {Yang, Shanshan and Qin, Chuan and Qian, Zhenxing and Xu, Boqing}, title = {Tampering Detection and Content Recovery for Digital Images Using Halftone Mechanism}, booktitle = {Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2014 Tenth International Conference on}, year = {2014}, pages = {130--133}}
-
Forensics of Image Tampering Based on the Consistency of Illuminant Chromaticity
Asia-Pacific Signal and Information Processing Association, 2014 Annual Summit and Conference (APSIPA)
2014, pp. 1-4
DOI: 10.1109/APSIPA.2014.7041551
BibTeX@inproceedings{Yan-Li2014, author = {Yan-Li, Huang and Shao-Zhang, Niu and Jian-Cheng, Zou and Lin-Na, Zhou}, title = {Forensics of Image Tampering Based on the Consistency of Illuminant Chromaticity}, booktitle = {Asia-Pacific Signal and Information Processing Association, 2014 Annual Summit and Conference (APSIPA)}, year = {2014}, pages = {1--4}}
-
Forensics of image tampering based on the consistency of illuminant chromaticity
Proc. Asia-Pacific Signal and Information Processing Association Annual Summit and Conf. (APSIPA)
2014, pp. 1-4
DOI: 10.1109/APSIPA.2014.7041551
BibTeX@inproceedings{Yan-li2014, author = {Yan-li, H. and Shao-Zhang, N. and Jian-Cheng, Z. and Lin-Na, Z.}, title = {Forensics of image tampering based on the consistency of illuminant chromaticity}, booktitle = {Proc. Asia-Pacific Signal and Information Processing Association Annual Summit and Conf. (APSIPA)}, year = {2014}, pages = {1--4}}
-
Simplification and Analysis of Counter-attack Algorithm for Image Source Identification
JSCUT(Natural Science Edition), 2014
BibTeX@article{Yongjian2014, author = {Yong-Jian, Hu and Hua, Guan and Jing, Zhao and Bei-Bei, Liu}, title = {Simplification and Analysis of Counter-attack Algorithm for Image Source Identification}, journal = {JSCUT(Natural Science Edition)}, year = {2014}}
-
Copy-rotation-move Forgery Detection Using the MROGH Descriptor
Cloud Engineering (IC2E), 2014 IEEE International Conference on
2014, pp. 510-513
DOI: 10.1109/IC2E.2014.54
BibTeX@inproceedings{Yu2014b, author = {Yu, Liyang and Han, Qi and Niu, Xiamu}, title = {Copy-rotation-move Forgery Detection Using the MROGH Descriptor}, booktitle = {Cloud Engineering (IC2E), 2014 IEEE International Conference on}, year = {2014}, pages = {510--513}}
-
Camera Identification for Very Low Bit Rate Time Varying Quantization Noise Videos
Communication Systems, Networks & Digital Signal Processing (CSNDSP), 2014 9th International Symposium on
2014, pp. 208-212
DOI: 10.1109/CSNDSP.2014.6923826
BibTeX@inproceedings{Yu2014a, author = {Yu, Zitong and Lin, Lianshi and Ling, B. W.-K. and Ho, C. Y.-F. and Qing, Chunmei and Xu, Hailiang and Dai, Weihang and Liang, Yuming and Chen, Jiameng and Dai, Qingyun}, title = {Camera Identification for Very Low Bit Rate Time Varying Quantization Noise Videos}, booktitle = {Communication Systems, Networks & Digital Signal Processing (CSNDSP), 2014 9th International Symposium on}, year = {2014}, pages = {208--212}}
-
Single-view Recaptured Photo Detection Based on Hsv Color Space
Journal of Computational Information Systems, 2014, Vol. 10(8), pp. 3229-3236
BibTeX@article{Yu2014, author = {Yu, Zan and Wang, Rangding and Xin, Shiqing and Li, Wei and Wang, Jiaji}, title = {Single-view Recaptured Photo Detection Based on Hsv Color Space}, journal = {Journal of Computational Information Systems}, year = {2014}, volume = {10}, number = {8}, pages = {3229--3236}}
-
Adaptive Matching for Copy-move Forgery Detection
Information Forensics and Security (WIFS), 2014 IEEE International Workshop on
2014, pp. 119-124
DOI: 10.1109/WIFS.2014.7084314
BibTeX@inproceedings{Zandi2014, author = {Zandi, M. and Mahmoudi-Aznaveh, A. and Mansouri, A.}, title = {Adaptive Matching for Copy-move Forgery Detection}, booktitle = {Information Forensics and Security (WIFS), 2014 IEEE International Workshop on}, year = {2014}, pages = {119--124}}
-
Camera Source Identification Game with Incomplete Information
Digital-Forensics and Watermarking, Springer, 2014
DOI: 10.1007/978-3-662-43886-2_14
BibTeX@article{Zeng2014a, author = {Zeng, Hui and Kang, Xiangui}, title = {Camera Source Identification Game with Incomplete Information}, journal = {Digital-Forensics and Watermarking}, publisher = {Springer}, year = {2014}}
-
Countering Anti-forensics of Median Filtering
Acoustics, Speech and Signal Processing (ICASSP), 2014 IEEE International Conference on
2014, pp. 2704-2708
DOI: 10.1109/ICASSP.2014.6854091
BibTeX@inproceedings{Zeng2014, author = {Zeng, Hui and Qin, Tengfei and Kang, Xiangui and Liu, Li}, title = {Countering Anti-forensics of Median Filtering}, booktitle = {Acoustics, Speech and Signal Processing (ICASSP), 2014 IEEE International Conference on}, year = {2014}, pages = {2704--2708}}
-
Combined SIFT and Bi-coherence Features to Detect Image Forgery
Signal Processing (ICSP), 2014 12th International Conference on
2014, pp. 1859-1863
DOI: 10.1109/ICOSP.2014.7015314
BibTeX@inproceedings{Zhang2014d, author = {Zhang, Ju and Ruan, Qiuqi and Jin, Yi}, title = {Combined SIFT and Bi-coherence Features to Detect Image Forgery}, booktitle = {Signal Processing (ICSP), 2014 12th International Conference on}, year = {2014}, pages = {1859--1863}}
-
In-camera JPEG Compression Detection for Doubly Compressed Images
Multimedia Tools and Applications, Springer US, 2014, pp. 1-19
DOI: 10.1007/s11042-014-1868-7
BibTeX@article{Zhang2014a, author = {Zhang, Rong and Wang, Rang-Ding}, title = {In-camera JPEG Compression Detection for Doubly Compressed Images}, journal = {Multimedia Tools and Applications}, publisher = {Springer US}, year = {2014}, pages = {1--19}}
-
Blind Detection of Copy-move Forgery in Digital Images Based on Dyadic Wavelet Transform
Cai, S. Z., Zhang, Q. F., Xu, X. P., Hu, D. H. & Qu, Y. M. (ed.)
Chapter Chapter 7: Communication, Signal and Image Processing, Data Acquisition and Recognation Technologies
Advanced Materials Research, Trans Tech Publications, 2014, Vol. 989-994, pp. 4127-4131
DOI: 10.4028/www.scientific.net/AMR.989-994.4127
BibTeX@article{Zhang2014c, author = {Zhang, Rui Fang and Ye, Han Min and Song, Zi Hang and Wang, Min}, title = {Blind Detection of Copy-move Forgery in Digital Images Based on Dyadic Wavelet Transform}, journal = {Advanced Materials Research}, publisher = {Trans Tech Publications}, year = {2014}, volume = {989-994}, pages = {4127--4131}}
-
Revealing the Traces of Median Filtering Using High-order Local Ternary Patterns
IEEE Signal Processing Letters, 2014, Vol. 21(3), pp. 275-279
DOI: 10.1109/LSP.2013.2295858
BibTeX@article{Zhang2014e, author = {Zhang, Y. and Li, S. and Wang, S. and Shi, Y. Q.}, title = {Revealing the Traces of Median Filtering Using High-order Local Ternary Patterns}, journal = {IEEE Signal Processing Letters}, year = {2014}, volume = {21}, number = {3}, pages = {275--279}}
-
Blind Forensics of Median Filtering Based on Markov Statistics in Median-filtered Residual Domain
Zhang, B., Mu, J., Wang, W., Liang, Q. & Pi, Y. (ed.)
The Proceedings of the Second International Conference on Communications, Signal Processing, and Systems
Springer International Publishing, 2014, Vol. 246, pp. 179-186
DOI: 10.1007/978-3-319-00536-2_21
BibTeX@incollection{Zhang2014, author = {Zhang, Yujin and Zhao, Chenglin and Zhao, Feng and Li, Shenghong}, title = {Blind Forensics of Median Filtering Based on Markov Statistics in Median-filtered Residual Domain}, booktitle = {The Proceedings of the Second International Conference on Communications, Signal Processing, and Systems}, publisher = {Springer International Publishing}, year = {2014}, volume = {246}, pages = {179--186}}
-
Efficient Video Frame Insertion and Deletion Detection Based on Inconsistency of Correlations between Local Binary Pattern Coded Frames
Security and Communication Networks, 2014, pp. n/a-n/a
DOI: 10.1002/sec.981
BibTeX@article{Zhang2014b, author = {Zhang, Zhenzhen and Hou, Jianjun and Ma, Qinglong and Li, Zhaohong}, title = {Efficient Video Frame Insertion and Deletion Detection Based on Inconsistency of Correlations between Local Binary Pattern Coded Frames}, journal = {Security and Communication Networks}, year = {2014}, pages = {n/a--n/a}}
-
A Distributed Local Margin Learning Based Scheme for High-dimensional Feature Processing in Image Tampering Detection
Multimedia and Expo (ICME), 2014 IEEE International Conference on
2014, pp. 1-6
DOI: 10.1109/ICME.2014.6890238
BibTeX@inproceedings{Zhao2014a, author = {Zhao, Xudong and Li, Jianhua and Wang, Shilin and Li, Shenghong}, title = {A Distributed Local Margin Learning Based Scheme for High-dimensional Feature Processing in Image Tampering Detection}, booktitle = {Multimedia and Expo (ICME), 2014 IEEE International Conference on}, year = {2014}, pages = {1--6}}
-
Passive Image Splicing Detection by 2-D Noncausal Markov Model
Circuits and Systems for Video Technology, IEEE Transactions on, 2014(99)
DOI: 10.1109/TCSVT.2014.2347513
BibTeX@article{Zhao2014, author = {Zhao, X. and Wang, S. and Li, S. and Li, J.}, title = {Passive Image Splicing Detection by 2-D Noncausal Markov Model}, journal = {Circuits and Systems for Video Technology, IEEE Transactions on}, year = {2014}, number = {99}}
-
A Distributed Scheme for Image Splicing Detection
Digital-Forensics and Watermarking, Springer, 2014
DOI: 10.1007/978-3-662-43886-2_23
BibTeX@article{Zhao2014b, author = {Zhao, Xudong and Wang, Shilin and Li, Shenghong and Li, Jianhua and Lin, Xiang}, title = {A Distributed Scheme for Image Splicing Detection}, journal = {Digital-Forensics and Watermarking}, publisher = {Springer}, year = {2014}}
-
Detection Technology of Tampering Image Based on Harris Corner Points
Journal of Computational Information Systems, 2014, Vol. 10(4), pp. 1481-1488
BibTeX@article{Zheng2014, author = {Zheng, Jiming and Chang, Liping}, title = {Detection Technology of Tampering Image Based on Harris Corner Points}, journal = {Journal of Computational Information Systems}, year = {2014}, volume = {10}, number = {4}, pages = {1481--1488}}
-
Detection of Region-duplication Forgery in Image Based on Key Points' Binary Descriptors
Journal of Information & Computational Scien, 2014, Vol. 11, pp. 3959-3966
BibTeX@article{Zheng2014c, author = {Zheng, Jiming and Chang, Liping}, title = {Detection of Region-duplication Forgery in Image Based on Key Points' Binary Descriptors}, journal = {Journal of Information & Computational Scien}, year = {2014}, volume = {11}, pages = {3959--3966}}
-
Exposing Photo Manipulation Using Geometry and Shadows
Proc. SPIE 9159, Sixth International Conference on Digital Image Processing (ICDIP 2014)
Proc. SPIE, 2014, Vol. 9159, pp. 91591W-91591W-6
DOI: 10.1117/12.2064531
BibTeX@inproceedings{Zheng2014a, author = {Zheng, Jiangbin and Song, Xuemei and Ren, Jinchang and Zhu, Tingge}, title = {Exposing Photo Manipulation Using Geometry and Shadows}, booktitle = {Proc. SPIE 9159, Sixth International Conference on Digital Image Processing (ICDIP 2014)}, journal = {Proc. SPIE}, year = {2014}, volume = {9159}, pages = {91591W-91591W-6}}
-
Exposing Image Forgery by Detecting Traces of Feather Operation
2014
BibTeX@misc{Zheng2014b, author = {Zheng, Jiangbin and Zhu, Tingge and Li, Zhe and Xing, Weiwei and Ren, JinChang}, title = {Exposing Image Forgery by Detecting Traces of Feather Operation}, year = {2014}}
-
Resampling Tamper Detection Based on JPEG Double Compression
Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on
2014, pp. 914-918
DOI: 10.1109/CSNT.2014.188
BibTeX@inproceedings{Zhu2014, author = {Zhu, Dan and Zhou, Zhiping}, title = {Resampling Tamper Detection Based on JPEG Double Compression}, booktitle = {Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on}, year = {2014}, pages = {914--918}}
-
Image scaling factor estimation based on normalized energy density and learning to rank
Proc. Int Security, Pattern Analysis, and Cybernetics (SPAC) Conf
2014, pp. 197-202
DOI: 10.1109/SPAC.2014.6982684
BibTeX@inproceedings{Zhu2014a, author = {Zhu, N. and Gao, X. and Deng, C.}, title = {Image scaling factor estimation based on normalized energy density and learning to rank}, booktitle = {Proc. Int Security, Pattern Analysis, and Cybernetics (SPAC) Conf}, year = {2014}, pages = {197--202}}
-
DWT-SATs Based Detection of Image Region Cloning
International Journal of Physical, Natural Science and Engineering, 2014, Vol. 8(2)
BibTeX@article{Zimba2014, author = {Zimba, Michael}, title = {DWT-SATs Based Detection of Image Region Cloning}, journal = {International Journal of Physical, Natural Science and Engineering}, year = {2014}, volume = {8}, number = {2}}
-
Digital-Forensics and Watermarking
Shi, Y. Q., Kim, H. J. & Pérez-González, F. (ed.)
Springer Berlin Heidelberg, 2014
BibTeX@book{Shi2014a,, title = {Digital-Forensics and Watermarking}, publisher = {Springer Berlin Heidelberg}, year = {2014}}
2013
-
How Bright Is the Moon? Recovering and Using Absolute Luminance Values from Internet Images
Tominaga, S., Schettini, R. & Trémeau, A. (ed.)
Computational Color Imaging
Springer Berlin Heidelberg, 2013, Vol. 7786, pp. 90-104
DOI: 10.1007/978-3-642-36700-7_8
BibTeX@incollection{Ackermann2013, author = {Ackermann, Jens and Goesele, Michael}, title = {How Bright Is the Moon? Recovering and Using Absolute Luminance Values from Internet Images}, booktitle = {Computational Color Imaging}, publisher = {Springer Berlin Heidelberg}, year = {2013}, volume = {7786}, pages = {90--104}}
-
Counter-forensics of SIFT-based copy-move detection by means of keypoint classification
EURASIP Journal on Image and Video Processing, 2013, Vol. 2013(1), pp. 18
DOI: 10.1186/1687-5281-2013-18
BibTeX@article{Amerini2013b, author = {Amerini, Irene and Barni, Mauro and Caldelli, Roberto and Costanzo, Andrea}, title = {Counter-forensics of SIFT-based copy-move detection by means of keypoint classification}, journal = {EURASIP Journal on Image and Video Processing}, year = {2013}, volume = {2013}, number = {1}, pages = {18}}
-
Blind Fake Image detection
IJCSI International Journal of Computer Science Issues, 2013, Vol. 10(4-1), pp. 180-186
DOI: 10.1093/ietcom/e89-b.5.1726
BibTeX@article{Abbadi2013, author = {Abbadi}, title = {Blind Fake Image detection}, journal = {IJCSI International Journal of Computer Science Issues}, year = {2013}, volume = {10}, number = {4-1}, pages = {180--186}}
-
Temporal ICA based source extraction from dynamic image sequences with visual interference under noise
Industrial and Information Systems (ICIIS), 2013 8th IEEE International Conference on
2013, pp. 671-675
DOI: 10.1109/ICIInfS.2013.6732065
BibTeX@inproceedings{Abcyrathne2013, author = {Abcyrathne, K.A.B.S. and Wijesinghe, W.V.D. and Godaliyadda, G.M.R.I. and Ekanayake, M.P.B. and Wijayakulasooriya, J.V.}, title = {Temporal ICA based source extraction from dynamic image sequences with visual interference under noise}, booktitle = {Industrial and Information Systems (ICIIS), 2013 8th IEEE International Conference on}, year = {2013}, pages = {671--675}}
-
Digital Camera Image Formation: Introduction and Hardware
Sencar, H. T. & Memon, N. (ed.)
Digital Image Forensics
Springer New York, 2013, pp. 3-44
DOI: 10.1007/978-1-4614-0757-7_1
BibTeX@incollection{AdamsJr2013, author = {Adams Jr, James E. and Pillman, Bruce}, title = {Digital Camera Image Formation: Introduction and Hardware}, booktitle = {Digital Image Forensics}, publisher = {Springer New York}, year = {2013}, pages = {3--44}}
-
A Forensic Method for Detecting Image Forgery Using Codebook
International Journal of Advanced Research in Computer Science and Software Engineering, 2013
DOI: 10.1109/ice-ccn.2013.6528568
BibTeX@article{Agnes2013, author = {E. Agnes and S. Devi Mahalakshmi and K. Vijayalakshmi}, title = {A Forensic Method for Detecting Image Forgery Using Codebook}, journal = {International Journal of Advanced Research in Computer Science and Software Engineering}, year = {2013}}
-
Splicing image forgery detection based on DCT and Local Binary Pattern
Global Conference on Signal and Information Processing (GlobalSIP), 2013 IEEE
2013, pp. 253-256
DOI: 10.1109/GlobalSIP.2013.6736863
BibTeX@inproceedings{AlAhmadi2013, author = {Al Ahmadi, A.A. and Hussain, M. and Aboalsamh, H. and Muhammad, G. and Bebis, G.}, title = {Splicing image forgery detection based on DCT and Local Binary Pattern}, booktitle = {Global Conference on Signal and Information Processing (GlobalSIP), 2013 IEEE}, year = {2013}, pages = {253--256}}
-
Copy-Move Image Forgery Detection Using Local Binary Pattern and Neighborhood Clustering
Proceedings of the European Modeling Symposium (EMS), Manchester, UK, November 2013.
2013
DOI: 10.1109/ems.2013.43
BibTeX@inproceedings{AlSawadi2013, author = {Al Sawadi, Motasem and Ghulam Muhammad and Muhammad Hussain}, title = {Copy-Move Image Forgery Detection Using Local Binary Pattern and Neighborhood Clustering}, booktitle = {Proceedings of the European Modeling Symposium (EMS), Manchester, UK, November 2013.}, year = {2013}}
-
Splicing image forgery detection based on DCT and Local Binary Pattern
Proc. IEEE Global Conf. Signal and Information Processing (GlobalSIP)
2013, pp. 253-256
DOI: 10.1109/GlobalSIP.2013.6736863
BibTeX@inproceedings{Alahmadi2013, author = {A. A. Alahmadi and M. Hussain and H. Aboalsamh and G. Muhammad and G. Bebis}, title = {Splicing image forgery detection based on DCT and Local Binary Pattern}, booktitle = {Proc. IEEE Global Conf. Signal and Information Processing (GlobalSIP)}, year = {2013}, pages = {253--256}}
-
Curvelet Transform and Local Texture Based Image Forgery Detection
Advances in Visual Computing, Springer, 2013
DOI: 10.1007/978-3-642-41939-3_49
BibTeX@article{Al-Hammadi2013, author = {Al-Hammadi, Muneer H. and Muhammad, Ghulam and Hussain, Muhammad and Bebis, George}, title = {Curvelet Transform and Local Texture Based Image Forgery Detection}, journal = {Advances in Visual Computing}, publisher = {Springer}, year = {2013}}
-
Passive detection of copy-move forgery in digital images: State-of-the-art
Forensic Science International, 2013, Vol. 231(1-3), pp. 284-295
DOI: 10.1016/j.forsciint.2013.05.027
BibTeX@article{Al-Qershi2013, author = {Osamah M. Al-Qershi and Bee Ee Khoo}, title = {Passive detection of copy-move forgery in digital images: State-of-the-art}, journal = {Forensic Science International}, year = {2013}, volume = {231}, number = {1--3}, pages = {284--295}}
-
Copy-move forgery detection and localization by means of robust clustering with J-linkage
Signal Processing: Image Communication, Elsevier, 2013
DOI: 10.1016/j.image.2013.03.006
BibTeX@article{Amerini2013, author = {Amerini, Irene and Ballan, Lamberto and Caldelli, Roberto and Del Bimbo, Alberto and Del Tongo, Luca and Serra, Giuseppe}, title = {Copy-move forgery detection and localization by means of robust clustering with J-linkage}, journal = {Signal Processing: Image Communication}, publisher = {Elsevier}, year = {2013}}
-
SIFT keypoint removal and injection for countering matching-based image forensics
Proceedings of the first ACM workshop on Information hiding and multimedia security
ACM, 2013, pp. 123-130
DOI: 10.1145/2482513.2482524
BibTeX@inproceedings{Amerini2013a, author = {Amerini, Irene and Barni, Mauro and Caldelli, Roberto and Costanzo, Andrea}, title = {SIFT keypoint removal and injection for countering matching-based image forensics}, booktitle = {Proceedings of the first ACM workshop on Information hiding and multimedia security}, publisher = {ACM}, year = {2013}, pages = {123--130}}
-
Removal and Injection of Keypoints for Sift-based Copy-move Counter-forensics
EURASIP Journal on Information Security, 2013
DOI: 10.1186/1687-417x-2013-8
BibTeX@article{Amerini2013c, author = {Irene Amerini and Mauro Barni and Roberto Caldelli and Andrea Costanzo}, title = {Removal and Injection of Keypoints for Sift-based Copy-move Counter-forensics}, journal = {EURASIP Journal on Information Security}, year = {2013}}
-
CHILD: A robust Computationally-Efficient Histogram-based Image Local Descriptor
Proc. Fourth National Conf. Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG)
2013, pp. 1-5
DOI: 10.1109/NCVPRIPG.2013.6776154
BibTeX@inproceedings{Anamandra2013, author = {S. H. Anamandra and V. Chandrasekaran}, title = {CHILD: A robust Computationally-Efficient Histogram-based Image Local Descriptor}, booktitle = {Proc. Fourth National Conf. Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG)}, year = {2013}, pages = {1--5}}
-
Auto White Balancing and comparison of Support Vector Machine and neural network classifiers in prediction of source camera
Control Communication and Computing (ICCC), 2013 International Conference on
2013, pp. 96-101
DOI: 10.1109/ICCC.2013.6731631
BibTeX@inproceedings{Arathy2013, author = {S Arathy and Vidyadharan, Divya S and Balan C and Sobha T}, title = {Auto White Balancing and comparison of Support Vector Machine and neural network classifiers in prediction of source camera}, booktitle = {Control Communication and Computing (ICCC), 2013 International Conference on}, year = {2013}, pages = {96--101}}
-
Method for detection of image tampering and partial recovery
Computer Science and Information Technologies (CSIT), 2013
2013, pp. 1-6
DOI: 10.1109/CSITechnol.2013.6710350
BibTeX@inproceedings{Asatryan2013, author = {Asatryan, D. and Asatryan, N. and Lanina, N. and Petrosyan, A.}, title = {Method for detection of image tampering and partial recovery}, booktitle = {Computer Science and Information Technologies (CSIT), 2013}, year = {2013}, pages = {1--6}}
-
AP News Values & Principles
2013
BibTeX@electronic{AssociatedPress2013, author = {Associated-Press, }, title = {AP News Values & Principles}, year = {2013}}
-
Analysis of DQT and DHT in JPEG Files
International Journal of Information Technology and Computer Science ( IJITCS ), 2013
BibTeX@article{Azhan2013, author = {Nor Amira Nor Azhan and Ikuesan R. Adeyemi and Shukor Abd Razak}, title = {Analysis of DQT and DHT in JPEG Files}, journal = {International Journal of Information Technology and Computer Science ( IJITCS )}, year = {2013}}
-
Counter-Forensics: Attacking Image Forensics
Sencar, H. T. & Memon, N. (ed.)
Digital Image Forensics
Springer Science mathplus Business Media, 2013, pp. 327-366
DOI: 10.1007/978-1-4614-0757-7_12
BibTeX@incollection{Boehme2013, author = {Rainer Böhme and Matthias Kirchner}, title = {Counter-Forensics: Attacking Image Forensics}, booktitle = {Digital Image Forensics}, publisher = {Springer Science mathplus Business Media}, year = {2013}, pages = {327--366}}
-
A jump patch-block match algorithm for multiple forgery detection
Automation, Computing, Communication, Control and Compressed Sensing (iMac4s), 2013 International Multi-Conference on
2013, pp. 723-728
DOI: 10.1109/iMac4s.2013.6526502
BibTeX@inproceedings{Department2013, author = {Bacchuwar, Ketan S and Ramakrishnan, K.R}, title = {A jump patch-block match algorithm for multiple forgery detection}, booktitle = {Automation, Computing, Communication, Control and Compressed Sensing (iMac4s), 2013 International Multi-Conference on}, year = {2013}, pages = {723--728}}
-
Splicing detection in out-of-focus blurred images
Information Forensics and Security (WIFS), 2013 IEEE International Workshop on
2013, pp. 144-149
DOI: 10.1109/WIFS.2013.6707809
BibTeX@inproceedings{Bahrami2013, author = {Bahrami, Khosro and Kot, Alex C. and Fan, Jiayuan}, title = {Splicing detection in out-of-focus blurred images}, booktitle = {Information Forensics and Security (WIFS), 2013 IEEE International Workshop on}, year = {2013}, pages = {144--149}}
-
A Universal Attack Against Histogram-Based Image Forensics
International Journal of Digital Crime and Forensics (IJDCF), 2013
DOI: 10.4018/jdcf.2013070103
BibTeX@article{Barni2013a, author = {Mauro Barni and Marco Fontani and Benedetta Tondi}, title = {A Universal Attack Against Histogram-Based Image Forensics}, journal = {International Journal of Digital Crime and Forensics (IJDCF)}, year = {2013}}
-
The Source Identification Game:an Information-Theoretic Perspective
IEEE Transactions on Information Forensics and Security, 2013
DOI: 10.1109/TIFS.2012.2237397
BibTeX@article{Barni2013, author = {Barni, Mauro and Tondi, Benedetta}, title = {The Source Identification Game:an Information-Theoretic Perspective}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2013}}
-
Detection of Temporal Interpolation In Video Sequences
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013, 2013
BibTeX@inproceedings{Bestagini2013, author = {Paolo Bestagini and Simone Battaglia and Simone Milani and Marco Tagliasacchi and Stefano Tubaro}, title = {Detection of Temporal Interpolation In Video Sequences}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013}, journal = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013}, year = {2013}}
-
Detecting video frame-rate up-conversion based on periodic properties of inter-frame similarity
Multimedia Tools and Applications, Springer US, 2013, Vol. -, pp. 1-15
DOI: 10.1007/s11042-013-1364-5
BibTeX@article{Bian2013, author = {Bian, Shan and Luo, Weiqi and Huang, Jiwu}, title = {Detecting video frame-rate up-conversion based on periodic properties of inter-frame similarity}, journal = {Multimedia Tools and Applications}, publisher = {Springer US}, year = {2013}, volume = {-}, pages = {1--15}}
-
Near optimal detection of quantized signals and application to JPEG forensics
Information Forensics and Security (WIFS), 2013 IEEE International Workshop on
2013, pp. 168-173
DOI: 10.1109/WIFS.2013.6707813
BibTeX@inproceedings{Bianchi2013, author = {Bianchi, Tiziano and Piva, Alessandro and Perez-Gonzalez, Fernando}, title = {Near optimal detection of quantized signals and application to JPEG forensics}, booktitle = {Information Forensics and Security (WIFS), 2013 IEEE International Workshop on}, year = {2013}, pages = {168--173}}
-
Analysis of Smartphone Model Identification using Digital Images
Proc. IEEE International Conference on Image Processing ICIP 2013
2013, pp. 4487-4491
BibTeX@inproceedings{Biney2013, author = {Akua Biney and Harin Sellahewa}, title = {Analysis of Smartphone Model Identification using Digital Images}, booktitle = {Proc. IEEE International Conference on Image Processing ICIP 2013}, year = {2013}, pages = {4487--4491}}
-
Digital image forgery detection using passive techniques: A survey
Digital Investigation, 2013, Vol. 10(3), pp. 226-245
DOI: 10.1016/j.diin.2013.04.007
BibTeX@article{Birajdar2013, author = {Gajanan K. Birajdar and Vijay H. Mankar}, title = {Digital image forgery detection using passive techniques: A survey}, journal = {Digital Investigation}, year = {2013}, volume = {10}, number = {3}, pages = {226--245}}
-
Blind Authentication of Resampled Images and Rescaling Factor Estimation
Cloud Ubiquitous Computing Emerging Technologies (CUBE), 2013 International Conference on
2013, pp. 112-116
DOI: 10.1109/CUBE.2013.28
BibTeX@inproceedings{Birajdar2013a, author = {Birajdar, Gajanan K. and Mankar, Vijay H.}, title = {Blind Authentication of Resampled Images and Rescaling Factor Estimation}, booktitle = {Cloud Ubiquitous Computing Emerging Technologies (CUBE), 2013 International Conference on}, year = {2013}, pages = {112--116}}
-
Camera Identification Algorithm Based on Sensor Pattern Noise Using Wavelet Transform, SVD / PCA and SVM Classifier
Journal of Information Systems and Telecommunication, 2013
BibTeX@article{Bolouri2013, author = {Kimia Bolouri and Mehdi Javanmard and Mohammad Firouzmand}, title = {Camera Identification Algorithm Based on Sensor Pattern Noise Using Wavelet Transform, SVD / PCA and SVM Classifier}, journal = {Journal of Information Systems and Telecommunication}, year = {2013}}
-
Bayesian learning of finite generalized inverted Dirichlet mixtures: Application to object classification and forgery detection
Expert Systems with Applications, 2013(0), pp. -
DOI: 10.1016/j.eswa.2013.09.030
BibTeX@article{Bourouis2013, author = {Sami Bourouis and Mohamed Al Mashrgy and Nizar Bouguila}, title = {Bayesian learning of finite generalized inverted Dirichlet mixtures: Application to object classification and forgery detection}, journal = {Expert Systems with Applications}, year = {2013}, number = {0}, pages = {-}}
-
Applied Image Processing Algorithms for Forensic Applications
Universita’ Degli Studi Di Catania, Universita’ Degli Studi Di Catania, 2013
BibTeX@phdthesis{Bruna2013, author = {Bruna, A.R.}, title = {Applied Image Processing Algorithms for Forensic Applications}, school = {Universita’ Degli Studi Di Catania}, year = {2013}}
-
Estimating EXIF Parameters Based on Noise Features for Image Manipulation Detection
IEEE Transactions on Information Forensics and Security, 2013, Vol. 8, pp. 608-618
DOI: 10.1109/TIFS.2013.2249064
BibTeX@article{Cao2013, author = {Cao, H. and Kot, A.C.}, title = {Estimating EXIF Parameters Based on Noise Features for Image Manipulation Detection}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2013}, volume = {8}, pages = {608--618}}
-
Exposing Digital Image Forgeries by Illumination Color Classification
IEEE Transactions on Information Forensics and Security, 2013, Vol. 8(7), pp. 1182-1194
DOI: 10.1109/TIFS.2013.2265677
BibTeX@article{Carvalho2013, author = {de Carvalho, T. and Riess, C. and Angelopoulou, E. and Pedrini, H. and Rocha, A. R.}, title = {Exposing Digital Image Forgeries by Illumination Color Classification}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2013}, volume = {8}, number = {7}, pages = {1182--1194}}
-
Copy move image forgery detection using mutual information
Computing, Communications and Networking Technologies (ICCCNT),2013 Fourth International Conference on
2013, pp. 1-4
DOI: 10.1109/ICCCNT.2013.6726743
BibTeX@inproceedings{Chakraborty2013, author = {Chakraborty, Somnath}, title = {Copy move image forgery detection using mutual information}, booktitle = {Computing, Communications and Networking Technologies (ICCCNT),2013 Fourth International Conference on}, year = {2013}, pages = {1--4}}
-
A confidence map and pixel-based weighted correlation for PRNU-based camera identification
Digital Investigation, Elsevier, 2013
BibTeX@article{Chan2013, author = {Chan, Lit-Hung and Law, Ngai-Fong and Siu, Wan-Chi}, title = {A confidence map and pixel-based weighted correlation for PRNU-based camera identification}, journal = {Digital Investigation}, publisher = {Elsevier}, year = {2013}}
-
Identifying Device Brand by Using Characteristics of Color Filter Array
Pan, J.-S., Yang, C.-N. & Lin, C.-C. (ed.)
Advances in Intelligent Systems and Applications - Volume 2
Springer Berlin Heidelberg, 2013, Vol. 21, pp. 349-358
DOI: 10.1007/978-3-642-35473-1_35
BibTeX@incollection{Chang2013, author = {Chang, Tang-You and Lin, Guo-Shiang and Tai, Shen-Chuan}, title = {Identifying Device Brand by Using Characteristics of Color Filter Array}, booktitle = {Advances in Intelligent Systems and Applications - Volume 2}, publisher = {Springer Berlin Heidelberg}, year = {2013}, volume = {21}, pages = {349--358}}
-
Blind Detection of Median Filtering in Digital Images: A Difference Domain Based Approach
Image Processing, IEEE Transactions on, 2013, Vol. PP(99), pp. 1-1
DOI: 10.1109/TIP.2013.2277814
BibTeX@article{Chen2013c, author = {Chen, C. and Ni, J. and Huang, J.}, title = {Blind Detection of Median Filtering in Digital Images: A Difference Domain Based Approach}, journal = {Image Processing, IEEE Transactions on}, year = {2013}, volume = {PP}, number = {99}, pages = {1--1}}
-
Blind Detection of Median Filtering in Digital Images: A Difference Domain Based Approach
IEEE_J_IP, 2013, Vol. 22(12), pp. 4699-4710
DOI: 10.1109/TIP.2013.2277814
BibTeX@article{Chen2013g, author = {C. Chen and J. Ni and J. Huang}, title = {Blind Detection of Median Filtering in Digital Images: A Difference Domain Based Approach}, journal = {IEEE_J_IP}, year = {2013}, volume = {22}, number = {12}, pages = {4699--4710}}
-
3 An Image region Description Method Based on Stap Sector Statistics and its Application in Image Copy-Rotate/Flip-Move Forgery Detection
Li, C.-T. (ed.)
Emerging Digital Forensics Application for Crime Detection, Prevention and Security
Chapter 3 An Image region Description Method Based on Stap Sector Statistics and its Application in Image Copy-Rotate/Flip-Move Forgery Detection
IGI Global, 2013, pp. 35-49
DOI: 10.4018/978-1-4666-4006-1.ch003
BibTeX@inbook{Chen2013d, author = {Likai Chen and Wei Lu and Jianqun Ni}, title = {3 An Image region Description Method Based on Stap Sector Statistics and its Application in Image Copy-Rotate/Flip-Move Forgery Detection}, booktitle = {Emerging Digital Forensics Application for Crime Detection, Prevention and Security}, publisher = {IGI Global}, year = {2013}, pages = {35--49}}
-
Region duplication detection based on Harris corner points and step sector statistics
Journal of Visual Communication and Image Representation, Elsevier, 2013, Vol. 24(3), pp. 244-254
DOI: 10.1016/j.jvcir.2013.01.008
BibTeX@article{Chen2013a, author = {Chen, Likai and Lu, Wei and Ni, Jiangqun and Sun, Wei and Huang, Jiwu}, title = {Region duplication detection based on Harris corner points and step sector statistics}, journal = {Journal of Visual Communication and Image Representation}, publisher = {Elsevier}, year = {2013}, volume = {24}, number = {3}, pages = {244--254}}
-
Countering Universal Image Tampering Detection with Histogram Restoration
Shi, Y., Kim, H.-J. & Pérez-González, F. (ed.)
Digital Forensics and Watermaking
Springer Berlin Heidelberg, 2013, Vol. 7809, pp. 282-289
DOI: 10.1007/978-3-642-40099-5_23
BibTeX@incollection{Chen2013b, author = {Chen, Luyi and Wang, Shilin and Li, Shenghong and Li, Jianhua}, title = {Countering Universal Image Tampering Detection with Histogram Restoration}, booktitle = {Digital Forensics and Watermaking}, publisher = {Springer Berlin Heidelberg}, year = {2013}, volume = {7809}, pages = {282--289}}
-
Video Source Identification in Lossy Wireless Networks
Department of Computer Science, University of California, Davis, CA 95616, Department of Computer Science, University of California, Davis, CA 95616, 2013
BibTeX@techreport{Chen2013, author = {Chen, S. and Pande, A. and Zeng, K. and Mohapatra, P.}, title = {Video Source Identification in Lossy Wireless Networks}, school = {Department of Computer Science, University of California, Davis, CA 95616}, year = {2013}}
-
What has been tampered? From a sparse manipulation perspective
Multimedia Signal Processing (MMSP), 2013 IEEE 15th International Workshop on
2013, pp. 123-128
DOI: 10.1109/MMSP.2013.6659275
BibTeX@inproceedings{Chen2013e, author = {Chen, Yi-Lei and Hsu, Chiou-Ting}, title = {What has been tampered? From a sparse manipulation perspective}, booktitle = {Multimedia Signal Processing (MMSP), 2013 IEEE 15th International Workshop on}, year = {2013}, pages = {123--128}}
-
Forensics of blurred images based on no-reference image quality assessment
Signal and Information Processing (ChinaSIP), 2013 IEEE China Summit & International Conference on
2013, pp. 437-441
DOI: 10.1109/ChinaSIP.2013.6625377
BibTeX@inproceedings{Chen2013f, author = {Zhipeng Chen and Yao Zhao and Rongrong Ni}, title = {Forensics of blurred images based on no-reference image quality assessment}, booktitle = {Signal and Information Processing (ChinaSIP), 2013 IEEE China Summit & International Conference on}, year = {2013}, pages = {437--441}}
-
PRNU-based forgery detection with regularity constraints and global optimization
Multimedia Signal Processing (MMSP), 2013 IEEE 15th International Workshop on
2013, pp. 236-241
DOI: 10.1109/MMSP.2013.6659294
BibTeX@inproceedings{Chierchia2013, author = {Giovann Chierchia and Poggi, Giovanni and Sansone, Carlo and Verdoliva, Luisa}, title = {PRNU-based forgery detection with regularity constraints and global optimization}, booktitle = {Multimedia Signal Processing (MMSP), 2013 IEEE 15th International Workshop on}, year = {2013}, pages = {236--241}}
-
Geo-positional Image Forensics through Scene-terrain Registration
Proceedings of the International Conference on Computer Vision Theory and Applications (VISIGRAPP 2013)
Scitepress, 2013
DOI: 10.5220/0004282300410047
BibTeX@conference{Chippendale2013, author = {Chippendale}, title = {Geo-positional Image Forensics through Scene-terrain Registration}, booktitle = {Proceedings of the International Conference on Computer Vision Theory and Applications (VISIGRAPP 2013)}, publisher = {Scitepress}, year = {2013}}
-
Estimation of color modification in digital images by CFA pattern change
Forensic Science International, 2013, Vol. -(0), pp. -
DOI: 10.1016/j.forsciint.2012.12.014
BibTeX@article{Choi2013, author = {Chang-Hee Choi and Hae-Yeoun Lee and Heung-Kyu Lee}, title = {Estimation of color modification in digital images by CFA pattern change}, journal = {Forensic Science International}, year = {2013}, volume = {-}, number = {0}, pages = {-}}
-
Concealability-rate-distortion Tradeoff In Image Compression Anti-forensics
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013
Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013, 2013, pp. 3063-3067
DOI: 10.1109/ICASSP.2013.6638221
BibTeX@inproceedings{Chu2013a, author = {Xiaoyu Chu and Matthew C. Stamm and Yan Chen, K. J. Ray Liu}, title = {Concealability-rate-distortion Tradeoff In Image Compression Anti-forensics}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013}, journal = {Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013}, year = {2013}, pages = {3063--3067}}
-
Exploiting reference images in exposing geometrical distortions
International Journal of Multimedia & Its Applications (IJMA), 2013, Vol. 5(3)
BibTeX@article{Ciptasari2013, author = {Ciptasari}, title = {Exploiting reference images in exposing geometrical distortions}, journal = {International Journal of Multimedia & Its Applications (IJMA)}, year = {2013}, volume = {5}, number = {3}}
-
Image Splicing Verification Based on Pixel-Based Alignment Method
Shi, Y., Kim, H.-J. & Pérez-González, F. (ed.)
Digital Forensics and Watermaking
Springer Berlin Heidelberg, 2013, Vol. 7809, pp. 198-212
DOI: 10.1007/978-3-642-40099-5_17
BibTeX@incollection{Ciptasari2013a, author = {Ciptasari, RimbaWhidiana and Rhee, Kyung-Hyune and Sakurai, Kouichi}, title = {Image Splicing Verification Based on Pixel-Based Alignment Method}, booktitle = {Digital Forensics and Watermaking}, publisher = {Springer Berlin Heidelberg}, year = {2013}, volume = {7809}, pages = {198--212}}
-
Quantization Lattice Estimation for Multimedia Forensics
Proc. IEEE International Conference on Image Processing ICIP 2013
2013, pp. 4462 - 4466
BibTeX@inproceedings{Comesana2013, author = {Pedro Comesana and Fernando Perez-Gonzalez and and Noelia Liste}, title = {Quantization Lattice Estimation for Multimedia Forensics}, booktitle = {Proc. IEEE International Conference on Image Processing ICIP 2013}, year = {2013}, pages = {4462 -- 4466}}
-
Optimal Counterforensics For Histogram-based Forensics
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013
Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013, 2013
DOI: 10.1109/icassp.2013.6638218
BibTeX@inproceedings{Comesana-Alfaro2013, author = {Pedro Comesaña-Alfaro and Fernando Pérez-González}, title = {Optimal Counterforensics For Histogram-based Forensics}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013}, journal = {Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013}, year = {2013}}
-
Joint detection of full-frame linear filtering and JPEG compression in digital images
2013
BibTeX@electronic{Conotter2013a, author = {Conotter, V and Comesana, P and Pérez-González, F}, title = {Joint detection of full-frame linear filtering and JPEG compression in digital images}, year = {2013}}
-
Forensic Analysis Of Full-frame Linearly Filtered Jpeg Images
Proc. IEEE International Conference on Image Processing ICIP 2013
2013, pp. 4517 - 4521
BibTeX@inproceedings{Conotter2013, author = {Valentina Conotter and Pedro Comesaña-Alfaro and Fernando Pérez-González}, title = {Forensic Analysis Of Full-frame Linearly Filtered Jpeg Images}, booktitle = {Proc. IEEE International Conference on Image Processing ICIP 2013}, year = {2013}, pages = {4517 -- 4521}}
-
Improved photo response non-uniformity (PRNU) based source camera identification
Forensic Science International, 2013, Vol. -(0), pp. -
DOI: 10.1016/j.forsciint.2012.12.018
BibTeX@article{Cooper2013, author = {Alan J. Cooper}, title = {Improved photo response non-uniformity (PRNU) based source camera identification}, journal = {Forensic Science International}, year = {2013}, volume = {-}, number = {0}, pages = {-}}
-
Source Smartphone Identification Using Sensor Pattern Noise and Wavelet Transform
The 5th International Conference on Imaging for Crime Detection and Prevention, 16th-17th December 2013, London, UK., 2013
BibTeX@article{Corripio2013, author = {Jocelin Rosales Corripio and Ana Lucila Sandoval Orozco and Luis Javier Garcıa Villalba and Julio Hernandez-Castro and Stuart James Gibson}, title = {Source Smartphone Identification Using Sensor Pattern Noise and Wavelet Transform}, journal = {The 5th International Conference on Imaging for Crime Detection and Prevention, 16th-17th December 2013, London, UK.}, year = {2013}}
-
Open Set Source Camera Attribution and Device Linking
Pattern Recognition Letters, 2013(0), pp. -
DOI: 10.1016/j.patrec.2013.09.006
BibTeX@article{deCosta2013, author = {Filipe O. de Costa and Ewerton Silva and Michael Eckmann and Walter J. Scheirer and Anderson Rocha}, title = {Open Set Source Camera Attribution and Device Linking}, journal = {Pattern Recognition Letters}, year = {2013}, number = {0}, pages = {-}}
-
Multiple Classifier Systems for Image Forgery Detection
Proc. of the International Conference on Image Analysis and Processing (ICIAP)
International Conference on Image Analysis and Processing (ICIAP), 2013
DOI: 10.1007/978-3-642-41184-7_27
BibTeX@inproceedings{Cozzolino2013, author = {D. Cozzolino and F. Gargiulo and C. Sansone and L. Verdoliva}, title = {Multiple Classifier Systems for Image Forgery Detection}, booktitle = {Proc. of the International Conference on Image Analysis and Processing (ICIAP)}, journal = {International Conference on Image Analysis and Processing (ICIAP)}, year = {2013}}
-
A novel framework for image forgery localization
arXiv.org, 2013
BibTeX@article{Cozzolino2013a, author = {Davide Cozzolino and Diego Gragnaniello and Luisa Verdoliva}, title = {A novel framework for image forgery localization}, journal = {arXiv.org}, year = {2013}}
-
Image forgery detection based on the fusion of machine learning and block-matching methods
arXiv.org, 2013
BibTeX@article{Cozzolino2013b, author = {Davide Cozzolino and Diego Gragnaniello and Luisa Verdoliva}, title = {Image forgery detection based on the fusion of machine learning and block-matching methods}, journal = {arXiv.org}, year = {2013}}
-
Rotation-Tolerant Camera Identification Using Optimal Tradeoff Circular Harmonic Function Correlation Filter
IEICE TRANSACTIONS on Information and Systems, 2013, Vol. E96-D(6), pp. 1394-1397
DOI: 10.1587/transinf.e96.d.1394
BibTeX@article{HYUN2013, author = {Dai-Kyung HYUN and Dae-Jin JUNG and Hae-Yeoun LEE and Heung-Kyu LEE}, title = {Rotation-Tolerant Camera Identification Using Optimal Tradeoff Circular Harmonic Function Correlation Filter}, journal = {IEICE TRANSACTIONS on Information and Systems}, year = {2013}, volume = {E96-D}, number = {6}, pages = {1394--1397}}
-
Counter-forensics of median filtering
Proc. IEEE 15th Int Multimedia Signal Processing (MMSP) Workshop
2013, pp. 260-265
DOI: 10.1109/MMSP.2013.6659298
BibTeX@inproceedings{Dang-Nguyen2013, author = {D. T. Dang-Nguyen and I. D. Gebru and V. Conotter and G. Boato and F. G. B. De Natale}, title = {Counter-forensics of median filtering}, booktitle = {Proc. IEEE 15th Int Multimedia Signal Processing (MMSP) Workshop}, year = {2013}, pages = {260--265}}
-
Analysis of Copy-Move Image Forgery Detection
IInternational Journal of Advanced Research in Computer Science and Electroic Engineering(IJARCSEE), 2013, Vol. 2(2)
BibTeX@article{Datta2013, author = {Unmukh Datta and Chetna Sharma}, title = {Analysis of Copy-Move Image Forgery Detection}, journal = {IInternational Journal of Advanced Research in Computer Science and Electroic Engineering(IJARCSEE)}, year = {2013}, volume = {2}, number = {2}}
-
Copy-move forgery detection using multiresolution local binary patterns
Forensic Science International, 2013, Vol. 231(1-3), pp. 61-72
DOI: 10.1016/j.forsciint.2013.04.023
BibTeX@article{Davarzani2013, author = {Reza Davarzani and Khashayar Yaghmaie and Saeed Mozaffari and Meysam Tapak}, title = {Copy-move forgery detection using multiresolution local binary patterns}, journal = {Forensic Science International}, year = {2013}, volume = {231}, number = {1--3}, pages = {61--72}}
-
Digital Camera Image Formation: Processing and Storage
Sencar, H. T. & Memon, N. (ed.)
Digital Image Forensics
Springer New York, 2013, pp. 45-78
BibTeX@incollection{Deever2013, author = {Aaron Deever and Mrityunjay Kumar and Bruce Pillman}, title = {Digital Camera Image Formation: Processing and Storage}, booktitle = {Digital Image Forensics}, publisher = {Springer New York}, year = {2013}, pages = {45--78}}
-
Image Splicing Detection via Demosaicking Inconsistency
2013
BibTeX@electronic{Deng2013, author = {Zhonghai Deng and Jingyuan Zhang and Yuguang Zeng}, title = {Image Splicing Detection via Demosaicking Inconsistency}, year = {2013}}
-
Digital Forensic Trends and Future
International Journal of Cyber-Security and Digital Forensics (IJCSDF), 2013, Vol. 2(2), pp. 48-76
BibTeX@article{Dezfoli2013, author = {Farhood Norouzizadeh Dezfoli and Ali Dehghantanha and Ramlan Mahmoud and Nor Fazlida Binti Mohd Sani and Farid Daryaba}, title = {Digital Forensic Trends and Future}, journal = {International Journal of Cyber-Security and Digital Forensics (IJCSDF)}, year = {2013}, volume = {2}, number = {2}, pages = {48--76}}
-
CASIA Image Tampering Detection Evaluation Database
2013 IEEE China Summit and International Conference on Signal and Information Processing
Institute of Electrical and Electronics Engineers (IEEE), 2013, pp. 422-426
DOI: 10.1109/chinasip.2013.6625374
BibTeX@inproceedings{Dong2013, author = {Jing Dong and Wei Wang}, title = {CASIA Image Tampering Detection Evaluation Database}, booktitle = {2013 IEEE China Summit and International Conference on Signal and Information Processing}, publisher = {Institute of Electrical and Electronics Engineers (IEEE)}, year = {2013}, pages = {422--426}}
-
A blind forgery detection scheme using image compatibility metrics
Industrial Electronics (ISIE), 2013 IEEE International Symposium on
2013, pp. 1-6
DOI: 10.1109/ISIE.2013.6563873
BibTeX@inproceedings{Doyoddorj2013, author = {M. Doyoddorj and Rhee, Kyung-Hyune}, title = {A blind forgery detection scheme using image compatibility metrics}, booktitle = {Industrial Electronics (ISIE), 2013 IEEE International Symposium on}, year = {2013}, pages = {1--6}}
-
Accurate and Robust Identifying Forged Region Method in Scanned Images
International Journal of Computer Applications, 2013, Vol. 83, pp. 40-47
BibTeX@article{Elsharkawy2013, author = {Elsharkawy, Zeinab F., Abdelwahab, Safey A., Elaraby, Sayed M., Dessouky, Moawad I., Abd El-Samie, Fathi E.}, title = {Accurate and Robust Identifying Forged Region Method in Scanned Images}, journal = {International Journal of Computer Applications}, year = {2013}, volume = {83}, pages = {40--47}}
-
Estimating EXIF Parameters Based on Noise Features for Image Manipulation Detection
Information Forensics and Security, IEEE Transactions on, IEEE, 2013, Vol. 8(4), pp. 608-618
DOI: 10.1109/TIFS.2013.2249064
BibTeX@article{Fan2013a, author = {Fan, Jiayuan and Cao, Hong and Kot, A}, title = {Estimating EXIF Parameters Based on Noise Features for Image Manipulation Detection}, journal = {Information Forensics and Security, IEEE Transactions on}, publisher = {IEEE}, year = {2013}, volume = {8}, number = {4}, pages = {608--618}}
-
A variational approach to JPEG anti-forensics
2013 IEEE International Conference on Acoustics, Speech and Signal Processing
Institute of Electrical & Electronics Engineers (IEEE), 2013
DOI: 10.1109/ICASSP.2013.6638220
BibTeX@inproceedings{Fan2013, author = {Fan, Wei and Wang, Kai and Cayre, François and Xiong, Zhang}, title = {A variational approach to JPEG anti-forensics}, booktitle = {2013 IEEE International Conference on Acoustics, Speech and Signal Processing}, publisher = {Institute of Electrical & Electronics Engineers (IEEE)}, year = {2013}}
-
Active Content Fingerprinting: Shrinkage And Lattice Based Modulations
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013
Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013, 2013
DOI: 10.1109/icassp.2013.6638223
BibTeX@inproceedings{Farhadzadeh2013, author = {Farzad Farhadzadeh and Sviatoslav Voloshynovskiy and Taras Holotyak and Fokko Beekhof}, title = {Active Content Fingerprinting: Shrinkage And Lattice Based Modulations}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013}, journal = {Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013}, year = {2013}}
-
Detection and estimation of contrast enhancement in double compressed images
Proceedings of the 2013 IEEE International Workshop on Multimedia Signal Processing (MMSP 2013)
2013
BibTeX@inproceedings{Ferrara2013, author = {Ferrara, Pasquale and Bianchi, Tiziano and De Rosa, Alessia and Piva, Alessandro}, title = {Detection and estimation of contrast enhancement in double compressed images}, booktitle = {Proceedings of the 2013 IEEE International Workshop on Multimedia Signal Processing (MMSP 2013)}, year = {2013}}
-
Reverse engineering of double compressed images in the presence of contrast enhancement
Multimedia Signal Processing (MMSP), 2013 IEEE 15th International Workshop on
2013, pp. 141-146
DOI: 10.1109/MMSP.2013.6659278
BibTeX@inproceedings{Ferrara2013a, author = {Ferrara, Pasquale and Bianchi, Tiziano and De Rosa, Alessia and Piva, Alessandro}, title = {Reverse engineering of double compressed images in the presence of contrast enhancement}, booktitle = {Multimedia Signal Processing (MMSP), 2013 IEEE 15th International Workshop on}, year = {2013}, pages = {141--146}}
-
Forensic analysis of interdependencies between vignetting and radial lens distortion
IS&T/SPIE Electronic Imaging
2013, pp. 86650D-86650D
BibTeX@inproceedings{Fischer2013, author = {Fischer, André and Gloe, Thomas}, title = {Forensic analysis of interdependencies between vignetting and radial lens distortion}, booktitle = {IS&T/SPIE Electronic Imaging}, year = {2013}, pages = {86650D--86650D}}
-
A Forensic Tool for Investigating Image Forgeries
International Journal of Digital Crime and Forensics (IJDCF), IGI Global, 2013, Vol. 5(4), pp. 15-33
DOI: 10.4018/ijdcf.2013100102
BibTeX@article{Fontani2013a, author = {Marco Fontani}, title = {A Forensic Tool for Investigating Image Forgeries}, journal = {International Journal of Digital Crime and Forensics (IJDCF)}, publisher = {IGI Global}, year = {2013}, volume = {5}, number = {4}, pages = {15--33}}
-
The watchful forensic analyst: Multi-clue information fusion with background knowledge
Information Forensics and Security (WIFS), 2013 IEEE International Workshop on
2013, pp. 120-125
DOI: 10.1109/WIFS.2013.6707805
BibTeX@inproceedings{Fontani2013b, author = {Fontani, M. and Argones-Rua, E. and Troncoso, C. and Barni, M.}, title = {The watchful forensic analyst: Multi-clue information fusion with background knowledge}, booktitle = {Information Forensics and Security (WIFS), 2013 IEEE International Workshop on}, year = {2013}, pages = {120--125}}
-
A Framework for Decision Fusion in Image Forensics based on Dempster-Shafer Theory of Evidence
IEEE Transactions on Information Forensics and Security, 2013, Vol. -, pp. -
DOI: 10.1109/TIFS.2013.2248727
BibTeX@article{Fontani2013, author = {Fontani, M and Bianchi, Tiziano and De Rosa, Alessia and Piva, Alessandro and Barni, M.}, title = {A Framework for Decision Fusion in Image Forensics based on Dempster-Shafer Theory of Evidence}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2013}, volume = {-}, pages = {-}}
-
Sensor Defects in Digital Image Forensic
Sencar, H. T. & Memon, N. (ed.)
Digital Image Forensics
Springer Science mathplus Business Media, 2013, pp. 179-218
DOI: 10.1007/978-1-4614-0757-7_6
BibTeX@incollection{Fridrich2013, author = {Jessica Fridrich}, title = {Sensor Defects in Digital Image Forensic}, booktitle = {Digital Image Forensics}, publisher = {Springer Science mathplus Business Media}, year = {2013}, pages = {179--218}}
-
First Quantization Coefficient Extraction from Double Compressed JPEG Images
Petrosino, A. (ed.)
Image Analysis and Processing -- ICIAP 2013
Springer Berlin Heidelberg, 2013, Vol. 8156, pp. 783-792
DOI: 10.1007/978-3-642-41181-6_79
BibTeX@incollection{Galvan2013, author = {Galvan, Fausto and Puglisi, Giovanni and Bruna, ArcangeloR. and Battiato, Sebastiano}, title = {First Quantization Coefficient Extraction from Double Compressed JPEG Images}, booktitle = {Image Analysis and Processing -- ICIAP 2013}, publisher = {Springer Berlin Heidelberg}, year = {2013}, volume = {8156}, pages = {783--792}}
-
A Detection Algorithm for Image Copy-move Forgery Based on Improved Circular Projection Matching and PCA
Sensors & Transducers, 2013, Vol. 159(11), pp. 19-25
BibTeX@article{Gan2013, author = {Yanfen Gan and Jing Cang}, title = {A Detection Algorithm for Image Copy-move Forgery Based on Improved Circular Projection Matching and PCA}, journal = {Sensors & Transducers}, year = {2013}, volume = {159}, number = {11}, pages = {19--25}}
-
Automatic Tampering Detection in Spliced Images with Different Compression Levels
Sanches, J., Micó, L. & Cardoso, J. (ed.)
Pattern Recognition and Image Analysis
Springer Science mathplus Business Media, 2013, Vol. 7887, pp. 416-423
DOI: 10.1007/978-3-642-38628-2_49
BibTeX@incollection{Garcia-Ordas2013, author = {Diego Garc\ia-Ordás and Laura Fernández-Robles and Enrique Alegre and Mar\ia Teresa Garc\ia-Ordás and Oscar Garc\ia-Olalla}, title = {Automatic Tampering Detection in Spliced Images with Different Compression Levels}, booktitle = {Pattern Recognition and Image Analysis}, publisher = {Springer Science mathplus Business Media}, year = {2013}, volume = {7887}, pages = {416--423}}
-
Automatic Tampering Detection in Spliced Images with Different Compression Levels
Pattern Recognition and Image Analysis
Springer, 2013, pp. 416-423
DOI: 10.1007/978-3-642-38628-2_49
BibTeX@incollection{Garcia-Ordas2013a, author = {Diego Garc\ia-Ordás and Laura Fernández-Robles and Enrique Alegre and Mar\ia Teresa Garc\ia-Ordás and Oscar Garc\ia-Olalla}, title = {Automatic Tampering Detection in Spliced Images with Different Compression Levels}, booktitle = {Pattern Recognition and Image Analysis}, publisher = {Springer}, year = {2013}, pages = {416--423}}
-
Automatic Tampering Detection in Spliced Images with Different Compression Levels
Pattern Recognition and Image Analysis
Pattern Recognition and Image Analysis, Springer, 2013, pp. 416-423
DOI: 10.1007/978-3-642-38628-2_49
BibTeX@article{Garcia-Ordas2013b, author = {Diego Garc\ia-Ordás and Laura Fernández-Robles and Enrique Alegre and Mar\ia Teresa Garc\ia-Ordás and Oscar Garc\ia-Olalla}, title = {Automatic Tampering Detection in Spliced Images with Different Compression Levels}, booktitle = {Pattern Recognition and Image Analysis}, journal = {Pattern Recognition and Image Analysis}, publisher = {Springer}, year = {2013}, pages = {416--423}}
-
The effects of switching the camera module from BlackBerry Curve 9360 devices
Digital Investigation, 2013, Vol. -(0), pp. -
DOI: 10.1016/j.diin.2013.01.007
BibTeX@article{Gisolf2013a, author = {Floris Gisolf and Zeno Geradts and Dennie Verhoeven and Coert Klaver}, title = {The effects of switching the camera module from BlackBerry Curve 9360 devices}, journal = {Digital Investigation}, year = {2013}, volume = {-}, number = {0}, pages = {-}}
-
Improving source camera identification using a simplified total variation based noise removal algorithm
Digital Investigation, 2013(0), pp. -
DOI: 10.1016/j.diin.2013.08.002
BibTeX@article{Gisolf2013, author = {Floris Gisolf and Anwar Malgoezar and Teun Baar and Zeno Geradts}, title = {Improving source camera identification using a simplified total variation based noise removal algorithm}, journal = {Digital Investigation}, year = {2013}, number = {0}, pages = {-}}
-
Noise Estimation Using Filtering and SVD for Image Tampering Detection
International Journal of Engineering Science and Innovative Technology (IJESIT), 2013
BibTeX@article{Gokhale2013, author = {U. M. Gokhale and Y.V.Joshi}, title = {Noise Estimation Using Filtering and SVD for Image Tampering Detection}, journal = {International Journal of Engineering Science and Innovative Technology (IJESIT)}, year = {2013}}
-
Sensor Fingerprint Digests for Fast Camera Identification from Geometrically Distorted Images
Department of ECE, SUNY Binghamton, NY, USA, Department of ECE, SUNY Binghamton, NY, USA, 2013
BibTeX@techreport{Goljan2013, author = {Goljan, Miroslav and Fridrich, Jessica}, title = {Sensor Fingerprint Digests for Fast Camera Identification from Geometrically Distorted Images}, school = {Department of ECE, SUNY Binghamton, NY, USA}, year = {2013}}
-
Forensic Video Analysis
Proceedings of the17th Interpol International Forensic Science Managers Symposium, Lyon
2013, pp. 638-651
BibTeX@inproceedings{Graves2013, author = {Matthew E. Graves}, title = {Forensic Video Analysis}, booktitle = {Proceedings of the17th Interpol International Forensic Science Managers Symposium, Lyon}, year = {2013}, pages = {638--651}}
-
Detecting Copy Move Forgery In Digital Images
International Journal of Engineering Research and Applications (IJERA), 2013, Vol. 3(4), pp. 94-97
BibTeX@article{Gupta2013, author = {Ashima Gupta and Nisheeth Saxena and S.K. Vasistha}, title = {Detecting Copy Move Forgery In Digital Images}, journal = {International Journal of Engineering Research and Applications (IJERA)}, year = {2013}, volume = {3}, number = {4}, pages = {94--97}}
-
Detecting Copy move Forgery using DCT
International Journal of Scientific and Research Publications, 2013
BibTeX@article{Gupta2013a, author = {Ashima Gupta and Nisheeth Saxena and S.K Vasistha}, title = {Detecting Copy move Forgery using DCT}, journal = {International Journal of Scientific and Research Publications}, year = {2013}}
-
Document Forgery: The State of Art
International Journal of Research in Engineering and Technology (IJRET), 2013
BibTeX@article{Gupta2013b, author = {Surbhi Gupta and Parvinder S. Sandhu}, title = {Document Forgery: The State of Art}, journal = {International Journal of Research in Engineering and Technology (IJRET)}, year = {2013}}
-
Generalized Mixture Ratio Based Blind Image Separation
Signal Processing Letters, IEEE, 2013, Vol. 20(8), pp. 743-746
DOI: 10.1109/LSP.2013.2265274
BibTeX@article{Hara2013, author = {Hara, K. and Inoue, K. and Urahama, K.}, title = {Generalized Mixture Ratio Based Blind Image Separation}, journal = {Signal Processing Letters, IEEE}, year = {2013}, volume = {20}, number = {8}, pages = {743--746}}
-
Copy move forgery detection using DWT and SIFT features
Intelligent Systems Design and Applications (ISDA), 2013 13th International Conference on
2013, pp. 188-193
DOI: 10.1109/ISDA.2013.6920733
BibTeX@inproceedings{Hashmi2013, author = {Hashmi, M.F. and Hambarde, A.R. and Keskar, A.G.}, title = {Copy move forgery detection using DWT and SIFT features}, booktitle = {Intelligent Systems Design and Applications (ISDA), 2013 13th International Conference on}, year = {2013}, pages = {188--193}}
-
Exposing Copy-move Forgeries Based on a Dimension-reduced Sift Method
Information Technology Journal, 2013, Vol. 12(14), pp. 2975-2979
BibTeX@article{He2013, author = {He}, title = {Exposing Copy-move Forgeries Based on a Dimension-reduced Sift Method}, journal = {Information Technology Journal}, year = {2013}, volume = {12}, number = {14}, pages = {2975--2979}}
-
Measuring Luminance with a Digital Camera: Case History
Syscomp Electronic Design Limited, Syscomp Electronic Design Limited, 2013
BibTeX@techreport{Hiscocks2013, author = {Peter D. Hiscocks}, title = {Measuring Luminance with a Digital Camera: Case History}, school = {Syscomp Electronic Design Limited}, year = {2013}}
-
Fogery image splicing detection by abnormal prediction features
Mechatronics and Automation (ICMA), 2013 IEEE International Conference on
2013, pp. 1394-1398
DOI: 10.1109/ICMA.2013.6618117
BibTeX@inproceedings{Hou2013a, author = {Jun Hou and Shi, Haojie and Cheng, Yan and Li, Ran}, title = {Fogery image splicing detection by abnormal prediction features}, booktitle = {Mechatronics and Automation (ICMA), 2013 IEEE International Conference on}, year = {2013}, pages = {1394--1398}}
-
Image resampling detection based on texture classification
Multimedia Tools and Applications, Springer US, 2013, pp. 1-28
DOI: 10.1007/s11042-013-1466-0
BibTeX@article{Hou2013, author = {Hou, Xiaodan and Zhang, Tao and Xiong, Gang and Zhang, Yan and Ping, Xin}, title = {Image resampling detection based on texture classification}, journal = {Multimedia Tools and Applications}, publisher = {Springer US}, year = {2013}, pages = {1--28}}
-
Digital image forgery detection on artificially blurred images
Emerging Trends in Communication, Control, Signal Processing & Computing Applications (C2SPCA), 2013 International Conference on
2013, pp. 1-5
DOI: 10.1109/C2SPCA.2013.6749392
BibTeX@inproceedings{Hrudya2013, author = {Hrudya, P. and Nair, L.S. and Adithya, S.M. and Unni, R. and Priya, V.H. and Poornachandran, P.}, title = {Digital image forgery detection on artificially blurred images}, booktitle = {Emerging Trends in Communication, Control, Signal Processing & Computing Applications (C2SPCA), 2013 International Conference on}, year = {2013}, pages = {1--5}}
-
JPEG forensics scheme for signature embedding and packet-level detection
International Journal of Communication Systems, 2013, pp. n/a-n/a
DOI: 10.1002/dac.2547
BibTeX@article{Hsieh2013, author = {Hsieh, Che-Jen and Weng, Chi-Tien and Li, Jung-Shian}, title = {JPEG forensics scheme for signature embedding and packet-level detection}, journal = {International Journal of Communication Systems}, year = {2013}, pages = {n/a--n/a}}
-
An Improved RANSAC Algorithm of Color Image Stitching
Proceedings of 2013 Chinese Intelligent Automation Conference
Springer, 2013
DOI: 10.1007/978-3-642-38466-0_3
BibTeX@incollection{Huang2013, author = {Huang, Weijie and Han, Xiaowei}, title = {An Improved RANSAC Algorithm of Color Image Stitching}, booktitle = {Proceedings of 2013 Chinese Intelligent Automation Conference}, publisher = {Springer}, year = {2013}}
-
Image forgery detection using multi-resolution Weber local descriptors
EUROCON, 2013 IEEE
2013, pp. 1570-1577
DOI: 10.1109/EUROCON.2013.6625186
BibTeX@inproceedings{Hussain2013, author = {Hussain, M. and Muhammad, G. and Saleh, S. Q. and Mirza, A. M. and Bebis, G.}, title = {Image forgery detection using multi-resolution Weber local descriptors}, booktitle = {EUROCON, 2013 IEEE}, year = {2013}, pages = {1570--1577}}
-
Source camera identification based on interpolation via lens distortion correction
Australian Journal of Forensic Sciences, 2013, Vol. 0(0), pp. 1-13
DOI: 10.1080/00450618.2013.804946
BibTeX@article{Hwang2013, author = {Hwang, Min Gu and Park, Hyung Ju and Har, Dong Hwan}, title = {Source camera identification based on interpolation via lens distortion correction}, journal = {Australian Journal of Forensic Sciences}, year = {2013}, volume = {0}, number = {0}, pages = {1--13}}
-
Forgery Detection for Surveillance Video
The Era of Interactive Media
Springer New York, 2013, pp. 25-36
DOI: 10.1007/978-1-4614-3501-3_3
BibTeX@incollection{Hyun2013, author = {Hyun, Dai-Kyung and Lee, Min-Jeong and Ryu, Seung-Jin and Lee, Hae-Yeoun and Lee, Heung-Kyu}, title = {Forgery Detection for Surveillance Video}, booktitle = {The Era of Interactive Media}, publisher = {Springer New York}, year = {2013}, pages = {25--36}}
-
Detection of Upscale-Crop and Partial Manipulation in Surveillance Video Based on Sensor Pattern Noise
Sensors, 2013, pp. 12605-12631
DOI: 10.3390/s130912605
BibTeX@article{Hyun2013a, author = {Dai-Kyung Hyun and Seung-Jin Ryu and Hae-Yeoun Lee and Heung-Kyu Lee}, title = {Detection of Upscale-Crop and Partial Manipulation in Surveillance Video Based on Sensor Pattern Noise}, journal = {Sensors}, year = {2013}, pages = {12605--12631}}
-
Detection of copy-move forgery using Krawtchouk moment
Electrical and Electronics Engineering (ELECO), 2013 8th International Conference on
2013, pp. 311-314
DOI: 10.1109/ELECO.2013.6713851
BibTeX@inproceedings{Imamoglu2013, author = {Imamoglu, Mustafa Bilgehan and Ulutas, Guzin and Ulutas, Mustafa}, title = {Detection of copy-move forgery using Krawtchouk moment}, booktitle = {Electrical and Electronics Engineering (ELECO), 2013 8th International Conference on}, year = {2013}, pages = {311--314}}
-
Accurate and Robust Localization of Duplicated Region In Copy-move Image Forgery
Machine Vision and Applications, 2013, Vol. 25(2), pp. 451-457
DOI: 10.1007/s00138-013-0522-0
BibTeX@article{Jaberi2013, author = {Maryam Jaberi and George Bebis and Muhammad Hussain and Ghulam Muhammad}, title = {Accurate and Robust Localization of Duplicated Region In Copy-move Image Forgery}, journal = {Machine Vision and Applications}, year = {2013}, volume = {25}, number = {2}, pages = {451--457}}
-
Improving the detection and localization of duplicated regions in copy-move image forgery
Digital Signal Processing (DSP), 2013 18th International Conference on
2013, pp. 1-6
DOI: 10.1109/ICDSP.2013.6622700
BibTeX@inproceedings{Jaberi2013a, author = {Jaberi, M. and Bebis, G. and Hussain, M. and Muhammad, G.}, title = {Improving the detection and localization of duplicated regions in copy-move image forgery}, booktitle = {Digital Signal Processing (DSP), 2013 18th International Conference on}, year = {2013}, pages = {1--6}}
-
The Game of Countering JPEG Anti-forensics Based on the Noise Level Estimation
Proceedings of the APSIPA
2013
BibTeX@inproceedings{Jiang2013, author = {Yunwen Jiang and Hui Zeng and Xiangui Kang and Li Liu}, title = {The Game of Countering JPEG Anti-forensics Based on the Noise Level Estimation}, booktitle = {Proceedings of the APSIPA}, year = {2013}}
-
Detecting Doctored Images
Sencar, H. T. & Memon, N. (ed.)
Digital Image Forensics
Springer New York, 2013, pp. 257-274
BibTeX@incollection{Johnson2013, author = {Johnson, Micah K}, title = {Detecting Doctored Images}, booktitle = {Digital Image Forensics}, publisher = {Springer New York}, year = {2013}, pages = {257--274}}
-
Fuzzy based Image Forgery Localization Using Blocking Artifacts
International Journal of New Trends in Electronics and Communication (IJNTEC), 2013, Vol. 1(1), pp. 18 - 20
BibTeX@article{Karthikeyan2013, author = {K.Karthikeyan and R.Sowmya Lakshmi}, title = {Fuzzy based Image Forgery Localization Using Blocking Artifacts}, journal = {International Journal of New Trends in Electronics and Communication (IJNTEC)}, year = {2013}, volume = {1}, number = {1}, pages = {18 -- 20}}
-
A modified anti-forensic technique for removing detectable traces from digital images
Proc. Int Computer Communication and Informatics (ICCCI) Conf
2013, pp. 1-4
DOI: 10.1109/ICCCI.2013.6466109
BibTeX@inproceedings{Kaimal2013, author = {Kaimal, Athira B. and Manimurugan, S. and Anitha, J.}, title = {A modified anti-forensic technique for removing detectable traces from digital images}, booktitle = {Proc. Int Computer Communication and Informatics (ICCCI) Conf}, year = {2013}, pages = {1--4}}
-
A new technique for removing forensically detectable traces from digital images
Proc. 7th Int Intelligent Systems and Control (ISCO) Conf
2013, pp. 321-324
DOI: 10.1109/ISCO.2013.6481171
BibTeX@inproceedings{Kaimal2013a, author = {Kaimal, Athira B. and Manimurugan, S. and Rajivkumar, J. and Anitha}, title = {A new technique for removing forensically detectable traces from digital images}, booktitle = {Proc. 7th Int Intelligent Systems and Control (ISCO) Conf}, year = {2013}, pages = {321--324}}
-
Robust Median Filtering Forensics Using an Autoregressive Model
Information Forensics and Security, IEEE Transactions on, 2013, Vol. 8(9), pp. 1456-1468
DOI: 10.1109/TIFS.2013.2273394
BibTeX@article{Kang2013, author = {Kang, X. and Stamm, M.C. and Peng, A. and Liu, K.J.R.}, title = {Robust Median Filtering Forensics Using an Autoregressive Model}, journal = {Information Forensics and Security, IEEE Transactions on}, year = {2013}, volume = {8}, number = {9}, pages = {1456--1468}}
-
Detection of copy-move forgery using wavelet decomposition
Signal Processing and Communication (ICSC), 2013 International Conference on
2013, pp. 396-400
DOI: 10.1109/ICSPCom.2013.6719820
BibTeX@inproceedings{Kashyap2013, author = {Kashyap, Abhishek and Joshi, Shiv Dutt}, title = {Detection of copy-move forgery using wavelet decomposition}, booktitle = {Signal Processing and Communication (ICSC), 2013 International Conference on}, year = {2013}, pages = {396--400}}
-
Image Recapture Detection Using Multiple Features
International Journal of Multimedia and Ubiquitous Engineering, 2013
BibTeX@article{Ke2013, author = {Yongzhen Ke and Qingqing Shan and Fan Qin and Weidong Min}, title = {Image Recapture Detection Using Multiple Features}, journal = {International Journal of Multimedia and Ubiquitous Engineering}, year = {2013}}
-
Exposing photo manipulation with inconsistent shadows
ACM Trans. Graph., ACM, 2013, Vol. 32(3), pp. 28:1-28:12
DOI: 10.1145/2487228.2487236
BibTeX@article{Kee2013, author = {Kee, Eric and O'brien, James and Farid, Hany}, title = {Exposing photo manipulation with inconsistent shadows}, journal = {ACM Trans. Graph.}, publisher = {ACM}, year = {2013}, volume = {32}, number = {3}, pages = {28:1--28:12}}
-
Copy-move forgery detection in images via 2D-Fourier Transform
Telecommunications and Signal Processing (TSP), 2013 36th International Conference on
2013, pp. 813-816
DOI: 10.1109/TSP.2013.6614051
BibTeX@inproceedings{Ketenci2013, author = {Ketenci, S. and Ulutas, G.}, title = {Copy-move forgery detection in images via 2D-Fourier Transform}, booktitle = {Telecommunications and Signal Processing (TSP), 2013 36th International Conference on}, year = {2013}, pages = {813--816}}
-
Impeding forgers at photo inception
IS&T/SPIE Electronic Imaging
2013, pp. 866504-866504
BibTeX@inproceedings{Kirchner2013, author = {Kirchner, Matthias and Winkler, Peter and Farid, Hany}, title = {Impeding forgers at photo inception}, booktitle = {IS&T/SPIE Electronic Imaging}, year = {2013}, pages = {866504--866504}}
-
Image and Video Source Class Identi�?cation
Sencar, H. T. & Memon, N. (ed.)
Digital Image Forensics
Springer New York, 2013, pp. 157-179
BibTeX@incollection{Kot2013, author = {Alex C. Kot and Hong Cao}, title = {Image and Video Source Class Identi�?cation}, booktitle = {Digital Image Forensics}, publisher = {Springer New York}, year = {2013}, pages = {157--179}}
-
A fast DCT based method for copy move forgery detection
Image Information Processing (ICIIP), 2013 IEEE Second International Conference on
2013, pp. 649-654
DOI: 10.1109/ICIIP.2013.6707675
BibTeX@inproceedings{Kumar2013a, author = {Kumar, Sunil and Desai, Jagannath and Mukherjee, Shaktidev}, title = {A fast DCT based method for copy move forgery detection}, booktitle = {Image Information Processing (ICIIP), 2013 IEEE Second International Conference on}, year = {2013}, pages = {649--654}}
-
Suitability of Independent Component Analysis in Digital Image Forgery Detection
International Journal of Engineering and Technology, 2013, Vol. 5, pp. -
BibTeX@article{Kumar2013, author = {Kumar, Sunil and Desai, JV and Mukherjee, S and Das, PK}, title = {Suitability of Independent Component Analysis in Digital Image Forgery Detection}, journal = {International Journal of Engineering and Technology}, year = {2013}, volume = {5}, pages = {-}}
-
Image forgery detection for region duplication tampering
Multimedia and Expo (ICME), 2013 IEEE International Conference on
2013, pp. 1-6
DOI: 10.1109/ICME.2013.6607452
BibTeX@inproceedings{Kuo2013, author = {Tien-Ying Kuo and Yi-Chung Lo and Ssu-Neng Huang}, title = {Image forgery detection for region duplication tampering}, booktitle = {Multimedia and Expo (ICME), 2013 IEEE International Conference on}, year = {2013}, pages = {1--6}}
-
Case studies and further improvements on source camera identification
IS&T/SPIE Electronic Imaging
2013, pp. 86650C-86650C
BibTeX@inproceedings{Kurosawa2013, author = {Kurosawa, Kenji and Kuroki, Kenro and Tsuchiya, Ken�ichi and Igarashi, Naoaki and Akiba, Norimitsu}, title = {Case studies and further improvements on source camera identification}, booktitle = {IS&T/SPIE Electronic Imaging}, year = {2013}, pages = {86650C--86650C}}
-
Localization of Forgeries in MPEG-2 Video through GOP Size and DQ Analysis
Proceedings of the 2013 IEEE International Workshop on Multimedia Signal Processing (MMSP 2013)
2013
DOI: 10.1109/mmsp.2013.6659338
BibTeX@inproceedings{Labartino2013, author = {D. Labartino and T. Bianchi and A. De Rosa and M. Fontani and D. Vazquez-Padın and A. Piva and M. Barni}, title = {Localization of Forgeries in MPEG-2 Video through GOP Size and DQ Analysis}, booktitle = {Proceedings of the 2013 IEEE International Workshop on Multimedia Signal Processing (MMSP 2013)}, year = {2013}}
-
Block convergence in repeated transform coding: jpeg-100 forensics, carbon dating, and tamper detection
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013
Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013, 2013, pp. 3028-3032
DOI: 10.1109/icassp.2013.6638214
BibTeX@inproceedings{Lai2013, author = {Lai, ShiYue and Böhme, Rainer}, title = {Block convergence in repeated transform coding: jpeg-100 forensics, carbon dating, and tamper detection}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013}, journal = {Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013}, year = {2013}, pages = {3028--3032}}
-
Anti-Forensics for Unsharp Masking Sharpening in Digital Images
International Journal of Digital Crime and Forensics (IJDCF), 2013, Vol. 5(3)
DOI: 10.4018/jdcf.2013070104
BibTeX@article{Laijie2013, author = {Lu Laijie and Yang Gaobo and Xia Ming}, title = {Anti-Forensics for Unsharp Masking Sharpening in Digital Images}, journal = {International Journal of Digital Crime and Forensics (IJDCF)}, year = {2013}, volume = {5}, number = {3}}
-
A classifier framework for the detection of doctored images
Proc. Fourth National Conf. Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG)
2013, pp. 1-4
DOI: 10.1109/NCVPRIPG.2013.6776155
BibTeX@inproceedings{Lalitha2013a, author = {Lalitha M and H. Holalad and S. Rajput and Muktanidhi S D and U. Mudenagudi}, title = {A classifier framework for the detection of doctored images}, booktitle = {Proc. Fourth National Conf. Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG)}, year = {2013}, pages = {1--4}}
-
A classifier framework for the detection of doctored images
Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG), 2013 Fourth National Conference on
2013, pp. 1-4
DOI: 10.1109/NCVPRIPG.2013.6776155
BibTeX@inproceedings{Lalitha2013, author = {Lalitha, M. and Holalad, H. and Rajput, S. and Muktanidhi, S.D. and Mudenagudi, U.}, title = {A classifier framework for the detection of doctored images}, booktitle = {Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG), 2013 Fourth National Conference on}, year = {2013}, pages = {1--4}}
-
Image Sharpening for Efficient Source Camera Identification Based on Sensor Pattern Noise Estimation
Emerging Security Technologies (EST), 2013 Fourth International Conference on
2013, pp. 113-116
DOI: 10.1109/EST.2013.25
BibTeX@inproceedings{Lawgaly2013, author = {Lawgaly, A. and Khelifi, F. and Bouridane, A.}, title = {Image Sharpening for Efficient Source Camera Identification Based on Sensor Pattern Noise Estimation}, booktitle = {Emerging Security Technologies (EST), 2013 Fourth International Conference on}, year = {2013}, pages = {113--116}}
-
An Efficient Scheme for Detecting Copy-move Forged Images by Local Binary Patterns
Journal of Information Hiding and Multimedia Signal Processing, 2013, Vol. 4(1)
BibTeX@article{Li2013e, author = {Leida Li and Shushang Li and Hancheng Zhu and Shu-Chuan Chu and John F. Roddick and Jeng-Shyang Pan}, title = {An Efficient Scheme for Detecting Copy-move Forged Images by Local Binary Patterns}, journal = {Journal of Information Hiding and Multimedia Signal Processing}, year = {2013}, volume = {4}, number = {1}}
-
A robust approach to detect digital forgeries by exploring correlation patterns
Pattern Analysis and Applications, Springer-Verlag, 2013, Vol. -, pp. 1-15
DOI: 10.1007/s10044-013-0319-9
BibTeX@article{Li2013, author = {Li, Lu and Xue, Jianru and Wang, Xiaofeng and Tian, Lihua}, title = {A robust approach to detect digital forgeries by exploring correlation patterns}, journal = {Pattern Analysis and Applications}, publisher = {Springer-Verlag}, year = {2013}, volume = {-}, pages = {1--15}}
-
Detection of Region Duplication Forgery in Images under Affine Transforms
Proc. Ninth Int Intelligent Information Hiding and Multimedia Signal Processing Conf
2013, pp. 543-546
DOI: 10.1109/IIH-MSP.2013.140
BibTeX@inproceedings{Li2013f, author = {L. Li and W. Zhang and S. Li and J. S. Pan}, title = {Detection of Region Duplication Forgery in Images under Affine Transforms}, booktitle = {Proc. Ninth Int Intelligent Information Hiding and Multimedia Signal Processing Conf}, year = {2013}, pages = {543--546}}
-
Searching and Extracting Digital Image Evidence
Sencar, H. T. & Memon, N. (ed.)
Digital Image Forensics
Springer New York, 2013, pp. 123-156
BibTeX@incollection{Li2013a, author = {Qiming Li}, title = {Searching and Extracting Digital Image Evidence}, booktitle = {Digital Image Forensics}, publisher = {Springer New York}, year = {2013}, pages = {123--156}}
-
Visual Saliency and Extended Hidden Markov Model Based Approach for Image Splicing Detection
Applied Mechanics and Materials, 2013, Vol. 385 - 386, pp. 1466-1469
BibTeX@article{Li2013c, author = {Xiang Li and Xuan Jing Shen and Ying Da Lv and Hai Peng Chen}, title = {Visual Saliency and Extended Hidden Markov Model Based Approach for Image Splicing Detection}, journal = {Applied Mechanics and Materials}, year = {2013}, volume = {385 - 386}, pages = {1466--1469}}
-
Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching
Forensic Science International, Elsevier BV, 2013, Vol. 224(1-3), pp. 59-67
DOI: 10.1016/j.forsciint.2012.10.031
BibTeX@article{Li2013d, author = {Yuenan Li}, title = {Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching}, journal = {Forensic Science International}, publisher = {Elsevier BV}, year = {2013}, volume = {224}, number = {1-3}, pages = {59--67}}
-
Distinguishing Computer Graphics from Photographic Images Using Local Binary Patterns
Shi, Y., Kim, H.-J. & Pérez-González, F. (ed.)
Digital Forensics and Watermaking
Springer Berlin Heidelberg, 2013, Vol. 7809, pp. 228-241
DOI: 10.1007/978-3-642-40099-5_19
BibTeX@incollection{Li2013b, author = {Li, Zhaohong and Ye, Jingyu and Shi, YunQing}, title = {Distinguishing Computer Graphics from Photographic Images Using Local Binary Patterns}, booktitle = {Digital Forensics and Watermaking}, publisher = {Springer Berlin Heidelberg}, year = {2013}, volume = {7809}, pages = {228--241}}
-
A splicing image detecting metheod based on original image estimation
Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013)
2013
DOI: 10.2991/iccsee.2013.143
BibTeX@inproceedings{Liang2013, author = {Yun Yi Liang and Ying Wang}, title = {A splicing image detecting metheod based on original image estimation}, booktitle = {Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013)}, year = {2013}}
-
Video copy-move forgery detection and localization based on Tamura texture features
Image and Signal Processing (CISP), 2013 6th International Congress on
2013, Vol. 2, pp. 864-868
DOI: 10.1109/CISP.2013.6745286
BibTeX@inproceedings{Liao2013, author = {Sheng-Yang Liao and Tian-Qiang Huang}, title = {Video copy-move forgery detection and localization based on Tamura texture features}, booktitle = {Image and Signal Processing (CISP), 2013 6th International Congress on}, year = {2013}, volume = {2}, pages = {864--868}}
-
Passive Approach for Video Forgery Detection and Localization
Proc of the second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec2013) - Xianggang/Hong Kong
2013, pp. 107-112
BibTeX@inproceedings{Lin2013, author = {Cheng-Shain Lin and Jyh-Jong Tsay}, title = {Passive Approach for Video Forgery Detection and Localization}, booktitle = {Proc of the second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec2013) - Xianggang/Hong Kong}, year = {2013}, pages = {107--112}}
-
Exposing Image Forgery Through the Detection of Contrast Enhancement
ICIP
2013
BibTeX@inproceedings{Lin2013a, author = {X Lin and CT Li and Y Hu}, title = {Exposing Image Forgery Through the Detection of Contrast Enhancement}, booktitle = {ICIP}, year = {2013}}
-
A SIFT and local features based integrated method for copy-move attack detection in digital image
Information and Automation (ICIA), 2013 IEEE International Conference on
2013, pp. 865-869
DOI: 10.1109/ICInfA.2013.6720415
BibTeX@inproceedings{Liu2013b, author = {Bo Liu and Chi-Man Pun}, title = {A SIFT and local features based integrated method for copy-move attack detection in digital image}, booktitle = {Information and Automation (ICIA), 2013 IEEE International Conference on}, year = {2013}, pages = {865--869}}
-
Detection of JPEG double compression and identification of smartphone image source and post-capture manipulation
Applied Intelligence, Springer US, 2013, pp. 1-22
DOI: 10.1007/s10489-013-0430-z
BibTeX@article{Liu2013a, author = {Liu, Qingzhong and Cooper, PeterA. and Chen, Lei and Cho, Hyuk and Chen, Zhongxue and Qiao, Mengyu and Su, Yuting and Wei, Mingzhen and Sung, AndrewH.}, title = {Detection of JPEG double compression and identification of smartphone image source and post-capture manipulation}, journal = {Applied Intelligence}, publisher = {Springer US}, year = {2013}, pages = {1--22}}
-
Copy-Move Forgery Detection Using the MROGH
Journal of Computational Information Systems, 2013, Vol. 9(3), pp. 1071-1078
BibTeX@article{Liu2013, author = {Liu, Xiaoxia and Li, Feng and Xiang, Lingyun}, title = {Copy-Move Forgery Detection Using the MROGH}, journal = {Journal of Computational Information Systems}, year = {2013}, volume = {9}, number = {3}, pages = {1071--1078}}
-
Multiple Light Source Estimation in a Single Image
Computer Graphics Forum, 2013, pp. n/a-n/a
DOI: 10.1111/cgf.12195
BibTeX@article{Lopez-Moreno2013, author = {Lopez-Moreno, Jorge and Garces, Elena and Hadap, Sunil and Reinhard, Erik and Gutierrez, Diego}, title = {Multiple Light Source Estimation in a Single Image}, journal = {Computer Graphics Forum}, year = {2013}, pages = {n/a--n/a}}
-
An Efficient Expanding Block Algorithm for Image Copy-Move Forgery Detection
Information Sciences, 2013(0), pp. -
DOI: 10.1016/j.ins.2013.03.028
BibTeX@article{Lynch2013, author = {Gavin Lynch and Frank Y. Shih and Hong-Yuan Mark Liao}, title = {An Efficient Expanding Block Algorithm for Image Copy-Move Forgery Detection}, journal = {Information Sciences}, year = {2013}, number = {0}, pages = {-}}
-
Natural Image Statistics in Digital Image Forensics
Sencar, H. T. & Memon, N. (ed.)
Digital Image Forensics
Springer New York, 2013, pp. 239-256
BibTeX@incollection{Lyu2013, author = {Siwei Lyu}, title = {Natural Image Statistics in Digital Image Forensics}, booktitle = {Digital Image Forensics}, publisher = {Springer New York}, year = {2013}, pages = {239--256}}
-
Exposing Region Splicing Forgeries with Blind Local Noise Estimation
International Journal of Computer Vision, Springer US, 2013, pp. 1-20
DOI: 10.1007/s11263-013-0688-y
BibTeX@article{Lyu2013a, author = {Lyu, Siwei and Pan, Xunyu and Zhang, Xing}, title = {Exposing Region Splicing Forgeries with Blind Local Noise Estimation}, journal = {International Journal of Computer Vision}, publisher = {Springer US}, year = {2013}, pages = {1--20}}
-
A forensic method for detecting image forgery
Emerging Trends in Computing, Communication and Nanotechnology (ICE-CCN), 2013 International Conference on
2013, pp. 590-594
DOI: 10.1109/ICE-CCN.2013.6528568
BibTeX@inproceedings{Mahalakshmi2013, author = {Devi Mahalakshmi and Vijayalakshmi, K. and Agnes, E.}, title = {A forensic method for detecting image forgery}, booktitle = {Emerging Trends in Computing, Communication and Nanotechnology (ICE-CCN), 2013 International Conference on}, year = {2013}, pages = {590--594}}
-
Blind Verification of Digital Image Originality: A Statistical Approach
Information Forensics and Security, IEEE Transactions on, 2013, Vol. 8(9), pp. 1531-1540
DOI: 10.1109/TIFS.2013.2276000
BibTeX@article{Mahdian2013, author = {Mahdian, B. and Nedbal, R. and Saic, S.}, title = {Blind Verification of Digital Image Originality: A Statistical Approach}, journal = {Information Forensics and Security, IEEE Transactions on}, year = {2013}, volume = {8}, number = {9}, pages = {1531--1540}}
-
A Novel Method for Identifying Exact Sensor Using Multiplicative Noise Component
Multimedia (ISM), 2013 IEEE International Symposium on
2013, pp. 241-247
DOI: 10.1109/ISM.2013.46
BibTeX@inproceedings{Mahdian2013a, author = {Mahdian, B. and Saic, S.}, title = {A Novel Method for Identifying Exact Sensor Using Multiplicative Noise Component}, booktitle = {Multimedia (ISM), 2013 IEEE International Symposium on}, year = {2013}, pages = {241--247}}
-
Robust Image Copy Move Forgery Detection
IJAIR, 2013
BibTeX@article{Maind2013, author = {Rohini R. Maind and Alka Khade and D.K. Chitre}, title = {Robust Image Copy Move Forgery Detection}, journal = {IJAIR}, year = {2013}}
-
Methodology for Evidence Reconstruction in Digital Image Forensics
International Journal of Engineering Research & Technology (IJERT), 2013, Vol. 2(11), pp. 1311-1318
BibTeX@article{Manudhane2013, author = {Kalpana Manudhane and M.M. Bartere}, title = {Methodology for Evidence Reconstruction in Digital Image Forensics}, journal = {International Journal of Engineering Research & Technology (IJERT)}, year = {2013}, volume = {2}, number = {11}, pages = {1311--1318}}
-
Detecting Photographic Cropping Based on Vanishing Points
Chinese Journal of Electronics, 2013
BibTeX@article{Meng2013, author = {Meng, X.. and Niu, S. and Yan, R. and Li, Y.}, title = {Detecting Photographic Cropping Based on Vanishing Points}, journal = {Chinese Journal of Electronics}, year = {2013}}
-
Research on Image Detection Algorithm with Markov Process
Intelligent Information Hiding and Multimedia Signal Processing, 2013 Ninth International Conference on
2013, pp. 238-241
DOI: 10.1109/IIH-MSP.2013.68
BibTeX@inproceedings{Meng-Jiao2013, author = {Li Meng-Jiao and Niu Shao-Zhang and Zou Jian-Cheng}, title = {Research on Image Detection Algorithm with Markov Process}, booktitle = {Intelligent Information Hiding and Multimedia Signal Processing, 2013 Ninth International Conference on}, year = {2013}, pages = {238--241}}
-
Courtroom Considerations in Digital Image Forensics
Sencar, H. T. & Memon, N. (ed.)
Digital Image Forensics
Springer New York, 2013, pp. 313-326
BibTeX@incollection{Mercuri2013, author = {Rebecca Mercuri}, title = {Courtroom Considerations in Digital Image Forensics}, booktitle = {Digital Image Forensics}, publisher = {Springer New York}, year = {2013}, pages = {313--326}}
-
Partial sharpness index for classifying digital camera and scanned images
Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON), 2013 10th International Conference on
2013, pp. 1-5
DOI: 10.1109/ECTICon.2013.6559643
BibTeX@inproceedings{Mettripun2013, author = {Mettripun, Narong and Khanna, Nitin and Amornraksa, Thumrongrat and Delp, Edward J.}, title = {Partial sharpness index for classifying digital camera and scanned images}, booktitle = {Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON), 2013 10th International Conference on}, year = {2013}, pages = {1--5}}
-
Antiforensics attacks to benford´s law for the detection of double compressed images
2013 IEEE International Conference on Acoustics, Speech and Signal Processing
Institute of Electrical & Electronics Engineers (IEEE), 2013
DOI: 10.1109/ICASSP.2013.6638219
BibTeX@inproceedings{Milani2013, author = {Milani, Simone and Tagliasacchi, Marco and Tubaro, Stefano}, title = {Antiforensics attacks to benford´s law for the detection of double compressed images}, booktitle = {2013 IEEE International Conference on Acoustics, Speech and Signal Processing}, publisher = {Institute of Electrical & Electronics Engineers (IEEE)}, year = {2013}}
-
Automation of JPEG Ghost Detection using Graph Based Segmentation
International Journal Of Computational Engineering Research, 2013, Vol. 3(12)
BibTeX@article{Mire2013, author = {AV Mire and SB Dhok and PD Porey and NJ Mistry}, title = {Automation of JPEG Ghost Detection using Graph Based Segmentation}, journal = {International Journal Of Computational Engineering Research}, year = {2013}, volume = {3}, number = {12}}
-
Digital Image Tamper Detection Techniques - A Comprehensive Study
International Journal of Computer Science and Business Informatics, 2013
BibTeX@article{Mishra2013a, author = {Minati Mishra and Flt. Lt. Dr. M. C. Adhikary}, title = {Digital Image Tamper Detection Techniques - A Comprehensive Study}, journal = {International Journal of Computer Science and Business Informatics}, year = {2013}}
-
Region Duplication Forgery Detection Technique based on SURF and HAC
International Journal of Computer Science and Business Informatics, 2013, Vol. 2(1), pp. 1 - 12
BibTeX@article{Mishra2013, author = {Minati Mishra and M. C. Adhikary}, title = {Region Duplication Forgery Detection Technique based on SURF and HAC}, journal = {International Journal of Computer Science and Business Informatics}, year = {2013}, volume = {2}, number = {1}, pages = {1 -- 12}}
-
Detection of Duplication Forgery in Digital Images in Uniform and Non-uniform Regions
Computer Modelling and Simulation (UKSim), 2013 UKSim 15th International Conference on
2013, pp. 455-460
DOI: 10.1109/UKSim.2013.94
BibTeX@inproceedings{Mohamadian2013, author = {Mohamadian, Z. and Pouyan, A. A.}, title = {Detection of Duplication Forgery in Digital Images in Uniform and Non-uniform Regions}, booktitle = {Computer Modelling and Simulation (UKSim), 2013 UKSim 15th International Conference on}, year = {2013}, pages = {455--460}}
-
An investigation into aliasing in images recaptured from an LCD monitor using a digital camera
Proc. Speech and Signal Processing 2013 IEEE Int. Conf. Acoustics
2013, pp. 2242-2246
DOI: 10.1109/ICASSP.2013.6638053
BibTeX@inproceedings{Muammar2013, author = {H. Muammar and P. L. Dragotti}, title = {An investigation into aliasing in images recaptured from an LCD monitor using a digital camera}, booktitle = {Proc. Speech and Signal Processing 2013 IEEE Int. Conf. Acoustics}, year = {2013}, pages = {2242--2246}}
-
Multi-scale local texture descriptor for image forgery detection
Industrial Technology (ICIT), 2013 IEEE International Conference on
2013, pp. 1146-1151
DOI: 10.1109/ICIT.2013.6505834
BibTeX@inproceedings{Muhammad2013, author = {Muhammad, Ghulam}, title = {Multi-scale local texture descriptor for image forgery detection}, booktitle = {Industrial Technology (ICIT), 2013 IEEE International Conference on}, year = {2013}, pages = {1146--1151}}
-
Image forgery detection using steerable pyramid transform and local binary pattern
Machine Vision and Applications, Springer Berlin Heidelberg, 2013, pp. 1-11
DOI: 10.1007/s00138-013-0547-4
BibTeX@article{Muhammad2013a, author = {Muhammad, Ghulam and Al-Hammadi, MunnerH. and Hussain, Muhammad and Bebis, George}, title = {Image forgery detection using steerable pyramid transform and local binary pattern}, journal = {Machine Vision and Applications}, publisher = {Springer Berlin Heidelberg}, year = {2013}, pages = {1--11}}
-
Copy move image forgery detection method using steerable pyramid transform and texture descriptor
EUROCON, 2013 IEEE
2013, pp. 1586-1592
DOI: 10.1109/EUROCON.2013.6625188
BibTeX@inproceedings{Muhammad2013b, author = {Muhammad, G and Al-Hammadi, M. H. and Hussain, M. and Mirza, A. M. and Bebis, G.}, title = {Copy move image forgery detection method using steerable pyramid transform and texture descriptor}, booktitle = {EUROCON, 2013 IEEE}, year = {2013}, pages = {1586--1592}}
-
Passive Detection of Copy - Move Image Forgery using Undecimated Wavelets and Zernike Moments
INFORMATION, 2013, Vol. 16(5), pp. 2957-2964
BibTeX@article{Muhammad2013c, author = {Ghulam Muhammad and Muhammad Hussain}, title = {Passive Detection of Copy - Move Image Forgery using Undecimated Wavelets and Zernike Moments}, journal = {INFORMATION}, year = {2013}, volume = {16}, number = {5}, pages = {2957--2964}}
-
Detection of Digital Photo Image Forgery Using Copy-Create Techniques
Mohan, S. & Kumar, S. S. (ed.)
Proceedings of the Fourth International Conference on Signal and Image Processing 2012 (ICSIP 2012)
Springer India, 2013, Vol. 221, pp. 281-290
DOI: 10.1007/978-81-322-0997-3_26
BibTeX@incollection{Murali2013, author = {Murali, S. and Chittapur, GovndrajB. and Prabhakara, H.S.}, title = {Detection of Digital Photo Image Forgery Using Copy-Create Techniques}, booktitle = {Proceedings of the Fourth International Conference on Signal and Image Processing 2012 (ICSIP 2012)}, publisher = {Springer India}, year = {2013}, volume = {221}, pages = {281--290}}
-
Comparision and analysis of photo image forgery detection techniques
International Journal on Computational Sciences & Applications (IJCSA), 2013, Vol. 2(6), pp. 45-56
BibTeX@article{Murali2013a, author = {Murali, S and Chittapur, Govindraj B and Anami, Basavaraj S and others}, title = {Comparision and analysis of photo image forgery detection techniques}, journal = {International Journal on Computational Sciences & Applications (IJCSA)}, year = {2013}, volume = {2}, number = {6}, pages = {45--56}}
-
Exposing copy-move image tampering using forensic method based on SURF
Electronics, Computers and Artificial Intelligence (ECAI), 2013 International Conference on
2013, pp. 1-4
DOI: 10.1109/ECAI.2013.6636173
BibTeX@inproceedings{Neamtu2013, author = {Neamtu, C. and Barca, C. and Achimescu, E. and Gavriloaia, B.}, title = {Exposing copy-move image tampering using forensic method based on SURF}, booktitle = {Electronics, Computers and Artificial Intelligence (ECAI), 2013 International Conference on}, year = {2013}, pages = {1--4}}
-
Towards Fast, Generic Video Inpainting
Proceedings of the 10th European Conference on Visual Media Production
ACM, 2013, pp. 7:1-7:8
DOI: 10.1145/2534008.2534019
BibTeX@inproceedings{Newson2013, author = {Newson, Alasdair and Almansa, Andrés and Fradet, Matthieu and Gousseau, Yann and Pérez, Patrick}, title = {Towards Fast, Generic Video Inpainting}, booktitle = {Proceedings of the 10th European Conference on Visual Media Production}, publisher = {ACM}, year = {2013}, pages = {7:1--7:8}}
-
Discrimination of Computer Synthesized or Recaptured Images from Real Images
Sencar, H. T. & Memon, N. (ed.)
Digital Image Forensics
Springer New York, 2013, pp. 275-312
BibTeX@incollection{Ng2013, author = {Tian-Tsong Ng and Shih-Fu Chang}, title = {Discrimination of Computer Synthesized or Recaptured Images from Real Images}, booktitle = {Digital Image Forensics}, publisher = {Springer New York}, year = {2013}, pages = {275--312}}
-
Security of Forensic Techniques for Digital Images
Technische Universität Darmstadt, Technische Universität Darmstadt, 2013
BibTeX@phdthesis{Nguyen2013, author = {Hieu Cuong Nguyen}, title = {Security of Forensic Techniques for Digital Images}, school = {Technische Universität Darmstadt}, year = {2013}}
-
Detecting Resized Double JPEG Compressed Images – Using Support Vector Machine
Communications and Multimedia Security
Springer, 2013
DOI: 10.1007/978-3-642-40779-6_9
BibTeX@incollection{Nguyen2013a, author = {Nguyen, Hieu Cuong and Katzenbeisser, Stefan}, title = {Detecting Resized Double JPEG Compressed Images – Using Support Vector Machine}, booktitle = {Communications and Multimedia Security}, publisher = {Springer}, year = {2013}}
-
NPPA Code of Ethics
2013
BibTeX@electronic{NPPA2013, author = {NPPA}, title = {NPPA Code of Ethics}, year = {2013}}
-
Techniques for Source Camera Identification
Proceedings of the ICIT 2013 -- The 6th International Conference on Information Technology
ICIT, 2013
BibTeX@inproceedings{Orozco2013, author = {Ana Lucila Sandoval Orozco and Jocelin Rosales Corripio and David Manuel Arenas González and Luis Javier García Villalba and Julio César Hernández Castro}, title = {Techniques for Source Camera Identification}, booktitle = {Proceedings of the ICIT 2013 -- The 6th International Conference on Information Technology}, journal = {ICIT}, year = {2013}}
-
Compact analog counting SPAD pixel with 1.9% PRNU and 530ps time gating
Proc. ESSCIRC (ESSCIRC)
2013, pp. 295-298
DOI: 10.1109/ESSCIRC.2013.6649131
BibTeX@inproceedings{Pancheri2013, author = {L. Pancheri and E. Panina and G. F. Dalla Betta and L. Gasparini and D. Stoppa}, title = {Compact analog counting SPAD pixel with 1.9% PRNU and 530ps time gating}, booktitle = {Proc. ESSCIRC (ESSCIRC)}, year = {2013}, pages = {295--298}}
-
Hardware Architecture for Video Authentication using Sensor Pattern Noise
Circuits and Systems for Video Technology, IEEE Transactions on, 2013, Vol. PP(99), pp. 1-1
DOI: 10.1109/TCSVT.2013.2276869
BibTeX@article{Pande2013, author = {Pande, A. and Chen, S. and Mohapatra, P. and Zambreno, J.}, title = {Hardware Architecture for Video Authentication using Sensor Pattern Noise}, journal = {Circuits and Systems for Video Technology, IEEE Transactions on}, year = {2013}, volume = {PP}, number = {99}, pages = {1--1}}
-
JPEG compression anti-forensics based on first significant digit distribution
Multimedia Signal Processing (MMSP), 2013 IEEE 15th International Workshop on
2013, pp. 500-505
DOI: 10.1109/MMSP.2013.6659339
BibTeX@inproceedings{Pasquini2013, author = {Pasquini, Cecilia and Boato, Giulia}, title = {JPEG compression anti-forensics based on first significant digit distribution}, booktitle = {Multimedia Signal Processing (MMSP), 2013 IEEE 15th International Workshop on}, year = {2013}, pages = {500--505}}
-
Robust Median Filtering Detection Based on Filtered Residual
Shi, Y., Kim, H.-J. & Pérez-González, F. (ed.)
Digital Forensics and Watermaking
Springer Berlin Heidelberg, 2013, Vol. 7809, pp. 344-357
DOI: 10.1007/978-3-642-40099-5_29
BibTeX@incollection{Peng2013b, author = {Peng, Anjie and Kang, Xiangui}, title = {Robust Median Filtering Detection Based on Filtered Residual}, booktitle = {Digital Forensics and Watermaking}, publisher = {Springer Berlin Heidelberg}, year = {2013}, volume = {7809}, pages = {344--357}}
-
Discriminating Natural Images and Computer Generated Graphics Based on Compound Fractal Features
Journal of Computational Information Systems, 2013, Vol. 9(13), pp. 101-5108
BibTeX@article{Peng2013a, author = {Fei Peng and Jiaoting Li and Min Long}, title = {Discriminating Natural Images and Computer Generated Graphics Based on Compound Fractal Features}, journal = {Journal of Computational Information Systems}, year = {2013}, volume = {9}, number = {13}, pages = {101--5108}}
-
Comparison and Analysis of the Performance of PRNU Extraction Methods in Source Camera Identification
Journal of Computational Information Systems, 2013, Vol. 9(14), pp. 585-5592
BibTeX@article{Peng2013, author = {Fei Peng and Jiaoling Shi and Min Long}, title = {Comparison and Analysis of the Performance of PRNU Extraction Methods in Source Camera Identification}, journal = {Journal of Computational Information Systems}, year = {2013}, volume = {9}, number = {14}, pages = {585--5592}}
-
Accurate estimation of primary quantisation table with applications to tampering detection
Institution of Engineering and Technology, Electronics Letters, 2013
DOI: 10.1049/el.2013.2218
BibTeX@article{Peng2013c, author = {Yuanyuan Peng and Benyong Liu}, title = {Accurate estimation of primary quantisation table with applications to tampering detection}, journal = {Institution of Engineering and Technology, Electronics Letters}, year = {2013}}
-
An Overview on Image Forensics
ISRN Signal Processing, 2013, Vol. 2013, pp. 1-22
DOI: 10.1155/2013/496701
BibTeX@article{Piva2013, author = {Piva, Alessandro}, title = {An Overview on Image Forensics}, journal = {ISRN Signal Processing}, year = {2013}, volume = {2013}, pages = {1--22}}
-
Publizistische Grundsätze (Pressekodex) -- Richtlinien für die publizistische Arbeit nach den Empfehlungen des Deutschen Presserats
2013
BibTeX@electronic{Presserat2013, author = {Presserat}, title = {Publizistische Grundsätze (Pressekodex) -- Richtlinien für die publizistische Arbeit nach den Empfehlungen des Deutschen Presserats}, year = {2013}}
-
First JPEG Quantization Matrix Estimation Based On Histogram Analysis
Proc. IEEE International Conference on Image Processing ICIP 2013
2013, pp. 4502 - 4506
BibTeX@inproceedings{Puglisi2013, author = {Giovanni Puglisi and Arcangelo Bruna and Fausto Galvan and Sebastiano Battiato}, title = {First JPEG Quantization Matrix Estimation Based On Histogram Analysis}, booktitle = {Proc. IEEE International Conference on Image Processing ICIP 2013}, year = {2013}, pages = {4502 -- 4506}}
-
Survey on blind image forgery detection
IET Image Processing, 2013
DOI: 10.1049/iet-ipr.2012.0388
BibTeX@article{Qazi2013, author = {Tanzeela Qazi and Khizar Hayat and Samee U. Khan and Sajjad A. Madani and Imran A. Khan and Joanna Kołodziej and Hongxiang Li and Weiyao Lin and Kin Choong Yow and Cheng-Zhong Xu}, title = {Survey on blind image forgery detection}, journal = {IET Image Processing}, year = {2013}}
-
High precision rotation angle estimation for rotated images
Multimedia and Expo Workshops (ICMEW), 2013 IEEE International Conference on
2013, pp. 1-4
DOI: 10.1109/ICMEW.2013.6618298
BibTeX@inproceedings{Qian2013a, author = {Ruohan Qian and Weihai Li and Nenghai Yu}, title = {High precision rotation angle estimation for rotated images}, booktitle = {Multimedia and Expo Workshops (ICMEW), 2013 IEEE International Conference on}, year = {2013}, pages = {1--4}}
-
High Precision Image Rotation Angle Estimation with Periodicity of Pixel Variance
Image and Graphics (ICIG), 2013 Seventh International Conference on
2013, pp. 106-111
DOI: 10.1109/ICIG.2013.27
BibTeX@inproceedings{Qian2013, author = {Ruohan Qian and Weihai Li and Nenghai Yu and Bin Liu}, title = {High Precision Image Rotation Angle Estimation with Periodicity of Pixel Variance}, booktitle = {Image and Graphics (ICIG), 2013 Seventh International Conference on}, year = {2013}, pages = {106--111}}
-
Simplified Anti-Forensics of JPEG Compression
Journal of Computers, ACADEMY PUBLISHER, 2013, Vol. 8(10), pp. 2483-2488
DOI: 10.4304/jcp.8.10.2483-2488
BibTeX@article{Qian2013b, author = {Zhenxing Qian and Tong Qiao}, title = {Simplified Anti-Forensics of JPEG Compression}, journal = {Journal of Computers}, publisher = {ACADEMY PUBLISHER}, year = {2013}, volume = {8}, number = {10}, pages = {2483--2488}}
-
Forensic sensor pattern noise extraction from large image data set
Proc. Speech and Signal Processing 2013 IEEE Int. Conf. Acoustics
2013, pp. 3023-3027
DOI: 10.1109/ICASSP.2013.6638213
BibTeX@inproceedings{Qu2013a, author = {Z. Qu and X. Kang and J. Huang and Y. Li}, title = {Forensic sensor pattern noise extraction from large image data set}, booktitle = {Proc. Speech and Signal Processing 2013 IEEE Int. Conf. Acoustics}, year = {2013}, pages = {3023--3027}}
-
Forensic Sensor Pattern Noise Extraction From Large Image Data Set
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013
Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013, 2013
DOI: 10.1109/icassp.2013.6638213
BibTeX@inproceedings{Qu2013, author = {Zhenhua Qu and Xiangui Kang and Jiwu Huang and Yinxiang Li, Sun Yat-Sen}, title = {Forensic Sensor Pattern Noise Extraction From Large Image Data Set}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013}, journal = {Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013}, year = {2013}}
-
Forensic collection of cloud storage data: Does the act of collection result in changes to the data or its metadata?
Digital Investigation, 2013(0), pp. -
DOI: 10.1016/j.diin.2013.07.001
BibTeX@article{Quick2013, author = {Darren Quick and Kim-Kwang Raymond Choo}, title = {Forensic collection of cloud storage data: Does the act of collection result in changes to the data or its metadata?}, journal = {Digital Investigation}, year = {2013}, number = {0}, pages = {-}}
-
A Method For Estimating Light Direction, Shape, And Reflection Parameters From A Single Image
Proc. IEEE International Conference on Image Processing ICIP 2013
2013, pp. 2034-2038
BibTeX@inproceedings{Rahman2013, author = {Sejuti Rahman and Antonio Robles-Kelly}, title = {A Method For Estimating Light Direction, Shape, And Reflection Parameters From A Single Image}, booktitle = {Proc. IEEE International Conference on Image Processing ICIP 2013}, year = {2013}, pages = {2034--2038}}
-
A Novel Approach for Forgery Detection of Images
International Journal of Application or Innovation in Engineering & Management (IJAIEM), 2013
BibTeX@article{Raj2013, author = {Vimal Raj and Lija Thomas}, title = {A Novel Approach for Forgery Detection of Images}, journal = {International Journal of Application or Innovation in Engineering & Management (IJAIEM)}, year = {2013}}
-
Harnessing Motion Blur To Uncover Splicing
Proc. IEEE International Conference on Image Processing ICIP 2013
2013, pp. 4507 - 4511
BibTeX@inproceedings{PurnachandraRao2013, author = {M. Purnachandra Rao and A.N. Rajagopalan}, title = {Harnessing Motion Blur To Uncover Splicing}, booktitle = {Proc. IEEE International Conference on Image Processing ICIP 2013}, year = {2013}, pages = {4507 -- 4511}}
-
Anti-Forensics of the Triangle Test by Random Fingerprint-Copy Attack
Computational Visual Media Conference, 2013
BibTeX@article{Rao2013, author = {Quanquan Rao and Haodong Li and Weiqi Luo and Jiwu Huang}, title = {Anti-Forensics of the Triangle Test by Random Fingerprint-Copy Attack}, journal = {Computational Visual Media Conference}, year = {2013}}
-
Physics-based and Statistical Features for Image Forensics -- Physikalische und statistische Merkmale in der Bildforensik
Der Technischen Fakultät der Universität Erlangen--Nürnberg, Der Technischen Fakultät der Universität Erlangen--Nürnberg, 2013
BibTeX@phdthesis{Riess2013, author = {Christian Riess}, title = {Physics-based and Statistical Features for Image Forensics -- Physikalische und statistische Merkmale in der Bildforensik}, school = {Der Technischen Fakultät der Universität Erlangen--Nürnberg}, year = {2013}}
-
Imaging
Proceedings of the17th Interpol International Forensic Science Managers Symposium, Lyon
2013, pp. 638-651
BibTeX@inproceedings{Ruifrok2013, author = {Arnout Ruifrok and Zeno Geradts and Jurrien Bijhold}, title = {Imaging}, booktitle = {Proceedings of the17th Interpol International Forensic Science Managers Symposium, Lyon}, year = {2013}, pages = {638--651}}
-
Rotation Invariant Localization of Duplicated Image Regions Based on Zernike Moments
IEEE Transactions on Information Forensics and Security, 2013, Vol. 8(8), pp. 1355-1370
DOI: 10.1109/TIFS.2013.2272377
BibTeX@article{Ryu2013, author = {S.-J. Ryu and Kirchner, M. and Lee, M.-J. and Lee, H.-K.}, title = {Rotation Invariant Localization of Duplicated Image Regions Based on Zernike Moments}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2013}, volume = {8}, number = {8}, pages = {1355--1370}}
-
A Survey on Passive-Blind Image Forensics
Proceedings of the second International Conference on Role of Technology in Nation Building (ICRTNB - 2013), 2013
BibTeX@article{Saini2013, author = {Anupama Saini}, title = {A Survey on Passive-Blind Image Forensics}, journal = {Proceedings of the second International Conference on Role of Technology in Nation Building (ICRTNB - 2013)}, year = {2013}}
-
Source identification for mobile devices, based on wavelet transforms combined with sensor imperfections
Computing, Springer Vienna, 2013, Vol. -, pp. 1-13
DOI: 10.1007/s00607-013-0313-5
BibTeX@article{SandovalOrozco2013, author = {Sandoval Orozco, A.L. and Arenas González, D.M. and Rosales Corripio, J. and García Villalba, L.J. and Hernandez-Castro, J.C.}, title = {Source identification for mobile devices, based on wavelet transforms combined with sensor imperfections}, journal = {Computing}, publisher = {Springer Vienna}, year = {2013}, volume = {-}, pages = {1--13}}
-
Picture-to-Identity linking of social network accounts based on Sensor Pattern Noise
Proceedings International Conference on Imaging for Crime Detection and Prevention (ICDP 2013), Kingston University London, UK
2013
DOI: 10.1049/ic.2013.0266
BibTeX@inproceedings{Satta2013, author = {Riccardo Satta and Pasquale Stirparo}, title = {Picture-to-Identity linking of social network accounts based on Sensor Pattern Noise}, booktitle = {Proceedings International Conference on Imaging for Crime Detection and Prevention (ICDP 2013), Kingston University London, UK}, year = {2013}}
-
Digital Image Forensics: There is More to a Picture than Meets the Eye
Springer, 2013
BibTeX@book{Sencar2013, author = {Husrev T. Sencar and Nasir D. Memon}, title = {Digital Image Forensics: There is More to a Picture than Meets the Eye}, publisher = {Springer}, year = {2013}}
-
Forensic detection of image manipulation using the Zernike moments and pixel-pair histogram
Institution of Engineering and Technology, Institution of Engineering and Technology, 2013, pp. -(0)
BibTeX@article{Shabanifard2013, author = {Mahmood Shabanifard and Mahrokh G. Shayesteh and Mohammad Ali Akhaee}, title = {Forensic detection of image manipulation using the Zernike moments and pixel-pair histogram}, journal = {Institution of Engineering and Technology}, publisher = {Institution of Engineering and Technology}, year = {2013}, pages = {-(0)}}
-
Detection of frame deletion for digital video forensics
Digital Investigation, 2013(0), pp. -
DOI: 10.1016/j.diin.2013.10.004
BibTeX@article{Shanableh2013, author = {Tamer Shanableh}, title = {Detection of frame deletion for digital video forensics}, journal = {Digital Investigation}, year = {2013}, number = {0}, pages = {-}}
-
Digital Image forensics using noise features
Department of Computer Science & Engineering, Indian Institute of Technology (IIT), Kanpur, Department of Computer Science & Engineering, Indian Institute of Technology (IIT), Kanpur, 2013
BibTeX@techreport{Sharang2013, author = {Abhijit Sharang and Pankaj Jindal}, title = {Digital Image forensics using noise features}, school = {Department of Computer Science & Engineering, Indian Institute of Technology (IIT), Kanpur}, year = {2013}}
-
Copy-Move Image Forgery Detection by DyWT and DCT using Euclidean distances
International Journal of Computer Technology and Electronics Communication, 2013
BibTeX@article{Sharma2013a, author = {Chetna Sharma and Unmukh Datta}, title = {Copy-Move Image Forgery Detection by DyWT and DCT using Euclidean distances}, journal = {International Journal of Computer Technology and Electronics Communication}, year = {2013}}
-
Digital Image Tampering -- A Threat to Security Management
International Journal of Advanced Research in Computer and Communication Engineering, 2013, Vol. 2(10), pp. 4120 - 4123
BibTeX@article{Sharma2013, author = {Deepika Sharma and Pawanesh Abrol}, title = {Digital Image Tampering -- A Threat to Security Management}, journal = {International Journal of Advanced Research in Computer and Communication Engineering}, year = {2013}, volume = {2}, number = {10}, pages = {4120 -- 4123}}
-
Image Copy-Move Forgery Detection Based on SIFT and Gray Level
Applied Mechanics and Materials, Trans Tech Publ, 2013, Vol. 263, pp. 3021-3024
BibTeX@article{Shen2013, author = {Shen, X.J. and Zhu, Y. and Lv, Y.D. and Chen, H.P.}, title = {Image Copy-Move Forgery Detection Based on SIFT and Gray Level}, journal = {Applied Mechanics and Materials}, publisher = {Trans Tech Publ}, year = {2013}, volume = {263}, pages = {3021--3024}}
-
Comparison and Analysis of Copy-Move Forgery Detection Algorithms for Electronic Image Processing
Jin, D. & Lin, S. (ed.)
Advances in Mechanical and Electronic Engineering
Springer Berlin Heidelberg, 2013, Vol. 178, pp. 343-348
BibTeX@incollection{Sheng2013, author = {Sheng, YunZhong and Wang, HangJun and Zhang, GuangQun}, title = {Comparison and Analysis of Copy-Move Forgery Detection Algorithms for Electronic Image Processing}, booktitle = {Advances in Mechanical and Electronic Engineering}, publisher = {Springer Berlin Heidelberg}, year = {2013}, volume = {178}, pages = {343--348}}
-
Source Identification Of Camera Phones Using Svd
Proc. IEEE International Conference on Image Processing ICIP 2013
2013, pp. 4487-4491
BibTeX@inproceedings{Soobhany2013, author = {Ahmad Ryad Soobhany and K. P. Lam and Peter Fletcher and David Collins}, title = {Source Identification Of Camera Phones Using Svd}, booktitle = {Proc. IEEE International Conference on Image Processing ICIP 2013}, year = {2013}, pages = {4487--4491}}
-
Image compression using anti-forensics method
CoRR, 2013, Vol. abs/1303.2330
BibTeX@article{Sreelakshmi2013, author = {M. S. Sreelakshmi and D. Venkataraman}, title = {Image compression using anti-forensics method}, journal = {CoRR}, year = {2013}, volume = {abs/1303.2330}}
-
Image compression using anti-forensics method
arxiv, 2013
BibTeX@article{Sreelakshmi2013a, author = {M. S. Sreelakshmi and D. Venkataraman}, title = {Image compression using anti-forensics method}, journal = {arxiv}, year = {2013}}
-
Information Forensics: An Overview of the First Decade
IEEE Access, 2013, Vol. 1, pp. 167-200
DOI: 10.1109/ACCESS.2013.2260814
BibTeX@article{Stamm2013, author = {Stamm, M and Wu, M. and Liu, K. J. R.}, title = {Information Forensics: An Overview of the First Decade}, journal = {IEEE Access}, year = {2013}, volume = {1}, pages = {167--200}}
-
Rapid Image Splicing Detection Based on Relevance Vector Machine
Shi, Y., Kim, H.-J. & Pérez-González, F. (ed.)
Digital Forensics and Watermaking
Springer Berlin Heidelberg, 2013, Vol. 7809, pp. 300-310
DOI: 10.1007/978-3-642-40099-5_25
BibTeX@incollection{Su2013, author = {Su, Bo and Yuan, Quanqiao and Zhang, Yujin and Zhai, Mengying and Wang, Shilin}, title = {Rapid Image Splicing Detection Based on Relevance Vector Machine}, booktitle = {Digital Forensics and Watermaking}, publisher = {Springer Berlin Heidelberg}, year = {2013}, volume = {7809}, pages = {300--310}}
-
Transform Coder Identification
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013
2013
BibTeX@inproceedings{Tagliasacchi2013, author = {Marco Tagliasacchi and Marco Visentini-Scarzanella and Pier Luigi Dragotti and Stefano Tubaro}, title = {Transform Coder Identification}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013}, year = {2013}}
-
Digital Image Forensics: A Two-Step Approach for Identifying Source and Detecting Forgeries
The Era of Interactive Media
Springer New York, 2013, pp. 37-51
DOI: 10.1007/978-1-4614-3501-3_4
BibTeX@incollection{Taktak2013, author = {Taktak, Wiem and Dugelay, Jean-Luc}, title = {Digital Image Forensics: A Two-Step Approach for Identifying Source and Detecting Forgeries}, booktitle = {The Era of Interactive Media}, publisher = {Springer New York}, year = {2013}, pages = {37--51}}
-
Study Of Different Techniques Of Image Forgery Detection
International Journal of Advanced Research in Computer Science, 2013, Vol. 4(1), pp. 8-13
BibTeX@article{Talmale2013, author = {Girish. R. Talmale and Yogesh Malode}, title = {Study Of Different Techniques Of Image Forgery Detection}, journal = {International Journal of Advanced Research in Computer Science}, year = {2013}, volume = {4}, number = {1}, pages = {8--13}}
-
State of The Art of Copy-move Forgery Detection Techniques: A Review
IJCSI International Journal of Computer Science, 2013, Vol. 10(6), pp. 174-183
BibTeX@article{Thajeel2013, author = {Thajeel, Salam A. and Ghazali Bin Sulong}, title = {State of The Art of Copy-move Forgery Detection Techniques: A Review}, journal = {IJCSI International Journal of Computer Science}, year = {2013}, volume = {10}, number = {6}, pages = {174--183}}
-
Computer Generated Images vs. Digital Photographs: A Synergetic Feature and Classifier Combination Approach
Journal of Visual Communication and Image Representation, 2013(0), pp. -
DOI: 10.1016/j.jvcir.2013.08.009
BibTeX@article{Tokuda2013, author = {Eric Tokuda and Helio Pedrini and Anderson Rocha}, title = {Computer Generated Images vs. Digital Photographs: A Synergetic Feature and Classifier Combination Approach}, journal = {Journal of Visual Communication and Image Representation}, year = {2013}, number = {0}, pages = {-}}
-
Robust Digital Camera Identification Based on Pairwise Magnitude Relations of Clustered Sensor Pattern Noise
IEEE Transactions on Information Forensics and Security, 2013, Vol. 8(12), pp. 1986-1995
DOI: 10.1109/TIFS.2013.2284761
BibTeX@article{Tomioka2013, author = {Y. Tomioka and Ito, Y. and Kitazawa, H.}, title = {Robust Digital Camera Identification Based on Pairwise Magnitude Relations of Clustered Sensor Pattern Noise}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2013}, volume = {8}, number = {12}, pages = {1986--1995}}
-
Image Splicing Detection Based on Statistical Properties of Benford Model
Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013)
2013
DOI: 10.2991/iccsee.2013.200
BibTeX@inproceedings{Tong2013, author = {Tong, Senfeng And Zhang, Zhen And Xie, Yongjie And Wu, Xiaodi}, title = {Image Splicing Detection Based on Statistical Properties of Benford Model}, booktitle = {Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013)}, year = {2013}}
-
Distinguishing Computer Graphics from Natural Images Based on Statistical Characteristics
Vehicle, Mechatronics and Information Technologies, 2013, Vol. 380 - 384, pp. 1306-1309
DOI: 10.4028/www.scientific.net/AMM.380-384.1306
BibTeX@article{Tong2013a, author = {Sen Feng Tong and Yu Hao Yang and Yong Jie Xie}, title = {Distinguishing Computer Graphics from Natural Images Based on Statistical Characteristics}, journal = {Vehicle, Mechatronics and Information Technologies}, year = {2013}, volume = {380 - 384}, pages = {1306--1309}}
-
CoMoFoD --- New database for copy-move forgery detection
ELMAR, 2013 55th International Symposium
2013, pp. 49-54
BibTeX@inproceedings{Tralic2013, author = {Tralic, Dijana and Zupancic, Ivan and Grgic, Sonja and Grgic, Mislay}, title = {CoMoFoD --- New database for copy-move forgery detection}, booktitle = {ELMAR, 2013 55th International Symposium}, year = {2013}, pages = {49--54}}
-
Image forgery detection using Color Coherence Vector
Electronics, Computer and Computation (ICECCO), 2013 International Conference on
2013, pp. 107-110
DOI: 10.1109/ICECCO.2013.6718240
BibTeX@inproceedings{Ulutas2013b, author = {Ulutas, G. and Ulutas, M.}, title = {Image forgery detection using Color Coherence Vector}, booktitle = {Electronics, Computer and Computation (ICECCO), 2013 International Conference on}, year = {2013}, pages = {107--110}}
-
Copy move forgery detection based on LBP
Signal Processing and Communications Applications Conference (SIU), 2013 21st
2013, pp. 1-4
DOI: 10.1109/SIU.2013.6531569
BibTeX@inproceedings{Ulutas2013, author = {Ulutas, G. and Ulutas, M. and Nabiyev, V. V.}, title = {Copy move forgery detection based on LBP}, booktitle = {Signal Processing and Communications Applications Conference (SIU), 2013 21st}, year = {2013}, pages = {1--4}}
-
Revealing the Traces of JPEG Compression Anti-Forensics
IEEE Transactions on Information Forensics and Security, 2013, Vol. 8(2), pp. 335-349
DOI: 10.1109/TIFS.2012.2234117
BibTeX@article{Valenzise2013, author = {Valenzise, Giuseppe and Tagliasacchi, Marco and Tubaro, Stefano}, title = {Revealing the Traces of JPEG Compression Anti-Forensics}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2013}, volume = {8}, number = {2}, pages = {335--349}}
-
Unambiguous interpolation rate estimation in uncompressed resized color digital images
Biometrics and Forensics (IWBF), 2013 International Workshop on
2013, pp. 1-4
DOI: 10.1109/IWBF.2013.6547314
BibTeX@inproceedings{Valera2013, author = {Jesus Valera and Narciso Garcia}, title = {Unambiguous interpolation rate estimation in uncompressed resized color digital images}, booktitle = {Biometrics and Forensics (IWBF), 2013 International Workshop on}, year = {2013}, pages = {1--4}}
-
Set-Membership Identification of Resampled Signals
2013 IEEE International Workshop on Information Forensics and Security (WIFS)
Institute of Electrical & Electronics Engineers (IEEE), 2013
DOI: 10.1109/WIFS.2013.6707810
BibTeX@inproceedings{Vazquez-Padin2013, author = {D. Vázquez-Padın and P. Comesana and F Pérez-González}, title = {Set-Membership Identification of Resampled Signals}, booktitle = {2013 IEEE International Workshop on Information Forensics and Security (WIFS)}, publisher = {Institute of Electrical & Electronics Engineers (IEEE)}, year = {2013}}
-
Pixel Estimation Based Video Forgery Detection
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013
Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013, 2013
DOI: 10.1109/icassp.2013.6638216
BibTeX@inproceedings{Venkata2013, author = {Subramanyam Venkata}, title = {Pixel Estimation Based Video Forgery Detection}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013}, journal = {Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013}, year = {2013}}
-
Robust Detection of Copy-Move Forgery in Color Images
2013
BibTeX@electronic{Wandji2013a, author = {Nathalie Diane Wandji and Sun Xingming}, title = {Robust Detection of Copy-Move Forgery in Color Images}, year = {2013}}
-
Detection of copy-move forgery in digital images based on DCT
Arxiv, 2013
BibTeX@article{Wandji2013, author = {Nathalie Diane Wandji and Sun Xingming and Moise Fah Kue}, title = {Detection of copy-move forgery in digital images based on DCT}, journal = {Arxiv}, year = {2013}}
-
Blind Detection of Region Duplication Forgery by Merging Blur and Affine Moment Invariants
Proc. Seventh Int Image and Graphics (ICIG) Conf
2013, pp. 258-264
DOI: 10.1109/ICIG.2013.61
BibTeX@inproceedings{Wang2013b, author = {T. Wang and J. Tang and B. Luo}, title = {Blind Detection of Region Duplication Forgery by Merging Blur and Affine Moment Invariants}, booktitle = {Proc. Seventh Int Image and Graphics (ICIG) Conf}, year = {2013}, pages = {258--264}}
-
Estimation of the primary quantization parameter in MPEG videos
Visual Communications and Image Processing (VCIP), 2013
2013, pp. 1-6
DOI: 10.1109/VCIP.2013.6706413
BibTeX@inproceedings{Wang2013, author = {Wang, Wan and Jiang, Xinghao and Wang, Shilin and Sun, Tanfeng}, title = {Estimation of the primary quantization parameter in MPEG videos}, booktitle = {Visual Communications and Image Processing (VCIP), 2013}, year = {2013}, pages = {1--6}}
-
Identifying Image Composites by Detecting Discrepancies in Defocus and Motion Blur
Journal of Computers, 2013, Vol. 8(11)
DOI: 10.4304/jcp.8.11.2789-2794
BibTeX@article{Wang2013a, author = {Wei Wang and Feng Zeng and Honglin Yuan and Xintao Duan}, title = {Identifying Image Composites by Detecting Discrepancies in Defocus and Motion Blur}, journal = {Journal of Computers}, year = {2013}, volume = {8}, number = {11}}
-
Sensor-Pattern-Noise Map Reconstruction in Source Camera Identification for Size-Reduced Images
IEICE TRANSACTIONS on Information and Systems, 2013, Vol. E96-D(8), pp. 1882-1885
BibTeX@article{Watanabe2013, author = {Joji Watanabe And Tadaaki Hosaka And Takayuki Hamamoto}, title = {Sensor-Pattern-Noise Map Reconstruction in Source Camera Identification for Size-Reduced Images}, journal = {IEICE TRANSACTIONS on Information and Systems}, year = {2013}, volume = {E96-D}, number = {8}, pages = {1882--1885}}
-
Duplicated Region Detection Using Robust Features
International Journal of Applied Mathematics and Statistics, 2013, Vol. 49(19)
BibTeX@article{Wen2013, author = {Jiang Wen}, title = {Duplicated Region Detection Using Robust Features}, journal = {International Journal of Applied Mathematics and Statistics}, year = {2013}, volume = {49}, number = {19}}
-
Image tampering localization via estimating the non-aligned double JPEG compression
Proc. SPIE 8665, Media Watermarking, Security, and Forensics, 2013, pp. 86650R-86650R-7
DOI: 10.1117/12.2003695
BibTeX@article{Wu2013b, author = {Wu, Lanying and Kong, Xiangwei and Wang, Bo and Shang, Shize}, title = {Image tampering localization via estimating the non-aligned double JPEG compression}, journal = {Proc. SPIE 8665, Media Watermarking, Security, and Forensics}, year = {2013}, pages = {86650R-86650R-7}}
-
Blind Detection of Tampered JPEG Image Based on Blocking Artifacts of Double Quantization
Applied Mechanics and Materials, Trans Tech Publ, 2013, Vol. 263, pp. 3104-3107
BibTeX@article{Wu2013, author = {Wu, S.B. and Shen, D.S.}, title = {Blind Detection of Tampered JPEG Image Based on Blocking Artifacts of Double Quantization}, journal = {Applied Mechanics and Materials}, publisher = {Trans Tech Publ}, year = {2013}, volume = {263}, pages = {3104--3107}}
-
Anti-forensics Of Median Filtering
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013
Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013, 2013
DOI: 10.1109/icassp.2013.6638217
BibTeX@inproceedings{Wu2013a, author = {Zhung-Han Wu and Matthew C. Stamm and K. J. Ray Liu}, title = {Anti-forensics Of Median Filtering}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013}, journal = {Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013}, year = {2013}}
-
Source Camera Identification Based on In-and-Inter Channel Traces
Applied Mechanics and Materials, 2013, Vol. 380-384, pp. 3754-3757
DOI: 10.4028/www.scientific.net/AMM.380-384.3754
BibTeX@article{Xie2013a, author = {Yong Jie Xie and Yi Bao and Sen Feng Tong and Yu Hao Yang}, title = {Source Camera Identification Based on In-and-Inter Channel Traces}, journal = {Applied Mechanics and Materials}, year = {2013}, volume = {380-384}, pages = {3754--3757}}
-
Source Digital Image Identification based on Cross-correlation
Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013)
2013, pp. 201
DOI: 10.2991/iccsee.2013.199
BibTeX@inproceedings{Xie2013, author = {Xie, Yong-jie and BAO, Yi and TONG, Sen-feng and YANG, Yu-hao}, title = {Source Digital Image Identification based on Cross-correlation}, booktitle = {Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013)}, year = {2013}, pages = {201}}
-
Camera calibration method based on a flexible spliced pattern of equilateral triangles
Chinese Automation Congress (CAC), 2013
2013, pp. 250-254
DOI: 10.1109/CAC.2013.6775737
BibTeX@inproceedings{Xiuping2013, author = {Wang Xiuping and Bai Ruilin and Guo Xinnian}, title = {Camera calibration method based on a flexible spliced pattern of equilateral triangles}, booktitle = {Chinese Automation Congress (CAC), 2013}, year = {2013}, pages = {250--254}}
-
Detect Image splicing using merged features in chroma space
The Scientific World Journal, 2013
BibTeX@article{Xu2013, author = {Bo Xu and Guangjie Liu and Yuewei Dai}, title = {Detect Image splicing using merged features in chroma space}, journal = {The Scientific World Journal}, year = {2013}}
-
Research on forensic identification of forged images
Proc. Int Mechatronic Sciences, Electric Engineering and Computer (MEC) Conf
2013, pp. 1152-1155
DOI: 10.1109/MEC.2013.6885238
BibTeX@inproceedings{Yan2013, author = {Cheng Yan}, title = {Research on forensic identification of forged images}, booktitle = {Proc. Int Mechatronic Sciences, Electric Engineering and Computer (MEC) Conf}, year = {2013}, pages = {1152--1155}}
-
Image Forgery Detection via Multifeature Classification
Journal of Pattern Recognition & Image Processing, 2013
BibTeX@article{Yang2013a, author = {Benjuan Yang and Benyong Liu}, title = {Image Forgery Detection via Multifeature Classification}, journal = {Journal of Pattern Recognition & Image Processing}, year = {2013}}
-
An Efficient Forensic Method for Copy-move Forgery Detection Based on DWT-FWHT.
Radioengineering, 2013, Vol. 22(4), pp. 1098-1105
BibTeX@article{Yang2013b, author = {Bin Yang And Xingming Sun And Xianyi Chen And Jianjun Zhang And Xu Li}, title = {An Efficient Forensic Method for Copy-move Forgery Detection Based on DWT-FWHT.}, journal = {Radioengineering}, year = {2013}, volume = {22}, number = {4}, pages = {1098--1105}}
-
Digital Image Forgery Forensics by Using Undecimated Dyadic Wavelet Transform and Zernike Moments
Journal of Computational Information Systems, 2013, Vol. 9(16), pp. 6399-6408
BibTeX@article{Yang2013, author = {Jiyun Yang And Ei Ran And Di Xiao And Inyong Tan}, title = {Digital Image Forgery Forensics by Using Undecimated Dyadic Wavelet Transform and Zernike Moments}, journal = {Journal of Computational Information Systems}, year = {2013}, volume = {9}, number = {16}, pages = {6399--6408}}
-
Game Theoretic Analysis of Camera Source Identification
Proceedings of the APSIPA
2013
DOI: 10.1109/apsipa.2013.6694150
BibTeX@inproceedings{Zeng2013a, author = {Hui Zeng and Yunwen Jiang and Xiangui Kang and Li Liu}, title = {Game Theoretic Analysis of Camera Source Identification}, booktitle = {Proceedings of the APSIPA}, year = {2013}}
-
Mixed-strategy Nash Equilibrium In The Camera Source Identification Game
Proc. IEEE International Conference on Image Processing ICIP 2013
2013, pp. 4472-4476
DOI: 10.1109/icip.2013.6738921
BibTeX@inproceedings{Zeng2013, author = {Hui Zeng and Xiangui Kang and Jiwu Huang}, title = {Mixed-strategy Nash Equilibrium In The Camera Source Identification Game}, booktitle = {Proc. IEEE International Conference on Image Processing ICIP 2013}, year = {2013}, pages = {4472--4476}}
-
Image-splicing forgery detection based on local binary patterns of DCT coefficients
Security and Communication Networks, 2013, Vol. -, pp. n/a-n/a
DOI: 10.1002/sec.721
BibTeX@article{Zhang2013, author = {Zhang, Yujin and Zhao, Chenglin and Pi, Yiming and Li, Shenghong and Wang, Shilin}, title = {Image-splicing forgery detection based on local binary patterns of DCT coefficients}, journal = {Security and Communication Networks}, year = {2013}, volume = {-}, pages = {n/a--n/a}}
-
Detecting shifted double JPEG compression tampering utilizing both intra-block and inter-block correlations
Journal of Shanghai Jiaotong University (Science), Shanghai Jiaotong University Press, 2013, Vol. 18, pp. 7-16
DOI: 10.1007/s12204-013-1362-9
BibTeX@article{Zhang2013a, author = {Zhang, Yu-jin and Li, Sheng-hong and Wang, Shi-lin}, title = {Detecting shifted double JPEG compression tampering utilizing both intra-block and inter-block correlations}, journal = {Journal of Shanghai Jiaotong University (Science)}, publisher = {Shanghai Jiaotong University Press}, year = {2013}, volume = {18}, pages = {7--16}}
-
Passive Forensics for Region Duplication Image Forgery Based on Harris Feature Points and Local Binary Patterns
Mathematical Problems in Engineering, 2013, Vol. 2013
BibTeX@article{Zhao2013a, author = {Jie Zhao and Weifeng Zhao}, title = {Passive Forensics for Region Duplication Image Forgery Based on Harris Feature Points and Local Binary Patterns}, journal = {Mathematical Problems in Engineering}, year = {2013}, volume = {2013}}
-
Image Splicing Detection Based on Noncausal Markov Model
Proc. IEEE International Conference on Image Processing ICIP 2013
2013, pp. 4462 - 4466
BibTeX@inproceedings{Zhao2013, author = {Xudong Zhao and Shilin Wang and Shenghong Li and Jianhua Li and Quanqiao Yuan}, title = {Image Splicing Detection Based on Noncausal Markov Model}, booktitle = {Proc. IEEE International Conference on Image Processing ICIP 2013}, year = {2013}, pages = {4462 -- 4466}}
-
A LBP-Based Method for Detecting Copy-Move Forgery with Rotation
Park, J. J. (J. H., Ng, J. K.-Y., Jeong, H. Y. & Waluyo, B. (ed.)
Multimedia and Ubiquitous Engineering
Springer Netherlands, 2013, Vol. 240, pp. 261-267
DOI: 10.1007/978-94-007-6738-6_33
BibTeX@incollection{Zheng2013, author = {Zheng, Ning and Wang, Yixing and Xu, Ming}, title = {A LBP-Based Method for Detecting Copy-Move Forgery with Rotation}, booktitle = {Multimedia and Ubiquitous Engineering}, publisher = {Springer Netherlands}, year = {2013}, volume = {240}, pages = {261--267}}
-
A robust image copy-move forgery detection based on mixed moments
Software Engineering and Service Science (ICSESS), 2013 4th IEEE International Conference on
2013, pp. 381-384
DOI: 10.1109/ICSESS.2013.6615329
BibTeX@inproceedings{Zhong2013, author = {Le Zhong and Weihong Xu}, title = {A robust image copy-move forgery detection based on mixed moments}, booktitle = {Software Engineering and Service Science (ICSESS), 2013 4th IEEE International Conference on}, year = {2013}, pages = {381--384}}
-
Proceedings of the 17th Interpol International Forensic Science Managers Symposium, Lyon
Daéid, N. N. (ed.)
2013, Vol. Centre for Forensic Science, University of Strathclyde, Glasgow, UK
DOI: 10.1109/isplc.2013.6525804
BibTeX@proceedings{Interpol2013,, title = {Proceedings of the 17th Interpol International Forensic Science Managers Symposium, Lyon}, year = {2013}, volume = {Centre for Forensic Science, University of Strathclyde, Glasgow, UK}}
2012
-
Unsupervised Estimation of Signal-Dependent CCD Camera Noise
EURASIP Journal on Advances in Signal Processing, Springer, 2012, Vol. 2012(1), pp. 231
BibTeX@article{Aiazzi2012, author = {Aiazzi, B. and Alparone, L. and Baronti, S. and Selva, M. and Stefani, L.}, title = {Unsupervised Estimation of Signal-Dependent CCD Camera Noise}, journal = {EURASIP Journal on Advances in Signal Processing}, publisher = {Springer}, year = {2012}, volume = {2012}, number = {1}, pages = {231}}
-
Estimate of PRNU Noise Based on Different Noise Models for Source Camera Identification
International Journal of Digital Crime and Forensics (IJDCF), 2012, Vol. 2(2), pp. 21-34
BibTeX@article{Amerini2012, author = {Irene Amerini and Roberto Caldelli and Vito Cappellini and Francesco Picchioni and and Alessandro Piva}, title = {Estimate of PRNU Noise Based on Different Noise Models for Source Camera Identification}, journal = {International Journal of Digital Crime and Forensics (IJDCF)}, year = {2012}, volume = {2}, number = {2}, pages = {21-34}}
-
Detection of doctored images using correlations of PSF
Proceedings of the Eighth Indian Conference on Computer Vision, Graphics and Image Processing
ACM, 2012, pp. 56:1-56:6
BibTeX@inproceedings{Ananya2012, author = {Ananya, U. and Muktanidhi, S. D. and Mudenagudi, Uma}, title = {Detection of doctored images using correlations of PSF}, booktitle = {Proceedings of the Eighth Indian Conference on Computer Vision, Graphics and Image Processing}, publisher = {ACM}, year = {2012}, pages = {56:1--56:6}}
-
Camera identification by grouping images from database, based on shared noise patterns
CoRR, 2012, Vol. abs/1207.2641, pp. -
BibTeX@article{Baar2012, author = {Teun Baar and Wiger van Houten and Zeno Geradts}, title = {Camera identification by grouping images from database, based on shared noise patterns}, journal = {CoRR}, year = {2012}, volume = {abs/1207.2641}, pages = {-}}
-
Dealing with uncertainty in image forensics: A fuzzy approach
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2012
2012, pp. 1753-1756
BibTeX@inproceedings{Barni2012, author = {Barni, M. and Costanzo, A. }, title = {Dealing with uncertainty in image forensics: A fuzzy approach}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2012}, year = {2012}, pages = {1753--1756}}
-
A universal technique to hide traces of histogram-based image manipulations
Proceedings of the on Multimedia and security
ACM, 2012, pp. 97-104
BibTeX@inproceedings{Barni2012b, author = {Barni, Mauro and Fontani, Marco and Tondi, Benedetta}, title = {A universal technique to hide traces of histogram-based image manipulations}, booktitle = {Proceedings of the on Multimedia and security}, publisher = {ACM}, year = {2012}, pages = {97--104}}
-
Optimum forensic and counter-forensic strategies for source identification with training data
Proc. IEEE Int Information Forensics and Security (WIFS) Workshop
2012, pp. 199-204
BibTeX@inproceedings{Barni2012a, author = {Barni, Mauro and Tondi, Benedetta}, title = {Optimum forensic and counter-forensic strategies for source identification with training data}, booktitle = {Proc. IEEE Int Information Forensics and Security (WIFS) Workshop}, year = {2012}, pages = {199--204}}
-
Shape, albedo, and illumination from a single image of an unknown object
Proc. IEEE Conf. Computer Vision and Pattern Recognition (CVPR)
2012, pp. 334-341
BibTeX@inproceedings{Barron2012, author = {Barron, J. T. and Malik, J.}, title = {Shape, albedo, and illumination from a single image of an unknown object}, booktitle = {Proc. IEEE Conf. Computer Vision and Pattern Recognition (CVPR)}, year = {2012}, pages = {334--341}}
-
Image Forensics of High Dynamic Range Imaging
Shi, Y., Kim, H.-J. & Perez-Gonzalez, F. (ed.)
Digital Forensics and Watermarking
Springer Berlin / Heidelberg, 2012, Vol. 7128, pp. 336-348
BibTeX@incollection{Bateman2012, author = {Bateman, Philip and Ho, Anthony and Briffa, Johann}, title = {Image Forensics of High Dynamic Range Imaging}, booktitle = {Digital Forensics and Watermarking}, publisher = {Springer Berlin / Heidelberg}, year = {2012}, volume = {7128}, pages = {336-348}}
-
Robust Image Alignment for Tampering Detection
IEEE Transactions on Information Forensics and Security, 2012, Vol. 7(4), pp. 1105-1117
BibTeX@article{Battiato2012a, author = {Battiato, S. and Farinella, G. M. and Messina, E. and Puglisi, G. }, title = {Robust Image Alignment for Tampering Detection}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2012}, volume = {7}, number = {4}, pages = {1105--1117}}
-
Image forgery detection by means of no-reference quality metrics
Memon, N. D., Alattar, A. M. & III, E. J. D. (ed.)
Proc. SPIE 8303
Media Watermarking, Security, and Forensics 2012, SPIE, 2012, Vol. 8303(1), pp. 83030K
BibTeX@inproceedings{Battisti2012, author = {F. Battisti and M. Carli and A. Neri}, title = {Image forgery detection by means of no-reference quality metrics}, booktitle = {Proc. SPIE 8303}, journal = {Media Watermarking, Security, and Forensics 2012}, publisher = {SPIE}, year = {2012}, volume = {8303}, number = {1}, pages = {83030K}}
-
Efficient Sensor Fingerprint Matching Through Fingerprint Binarization
IEEE Transactions on Information Forensics and Security, 2012, Vol. 7(4), pp. 1404-1413
BibTeX@article{Bayram2012, author = {Bayram, S. and Sencar, H. T. and Memon, N.}, title = {Efficient Sensor Fingerprint Matching Through Fingerprint Binarization}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2012}, volume = {7}, number = {4}, pages = {1404--1413}}
-
Video codec identification
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2012
2012, pp. 2257-2260
BibTeX@inproceedings{Bestagini2012a, author = {Bestagini, Paolo and Allam, Ahmed and Milani, Simone and Tagliasacchi, Marco and Tubaro, Stefano}, title = {Video codec identification}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2012}, year = {2012}, pages = {2257--2260}}
-
An Overview on Video Forensics
Poc. of the 20th European Signal Processing Conference (EUSIPCO 2012)
2012, pp. 1234-1238
BibTeX@inproceedings{Bestagini2012, author = {P. Bestagini and M. Fontani and S. Milani and M. Barni and A. Piva and M. Tagliasacchi and S. Tubaro}, title = {An Overview on Video Forensics}, booktitle = {Poc. of the 20th European Signal Processing Conference (EUSIPCO 2012)}, year = {2012}, pages = {1234-1238}}
-
Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts
IEEE Transactions on Information Forensics and Security, 2012, Vol. 7(3), pp. 1003 - 1017
BibTeX@article{Bianchi2012, author = {Bianchi, Tiziano and Piva, Alessandro}, title = {Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2012}, volume = {7}, number = {3}, pages = {1003 - 1017}}
-
Reverse engineering of double JPEG compression in the presence of image resizing
Information Forensics and Security (WIFS), 2012 IEEE International Workshop on
2012, pp. 127-132
BibTeX@inproceedings{Bianchi2012a, author = {Bianchi, Tiziano and Piva, Alessandro}, title = {Reverse engineering of double JPEG compression in the presence of image resizing}, booktitle = {Information Forensics and Security (WIFS), 2012 IEEE International Workshop on}, year = {2012}, pages = {127--132}}
-
Detection of Nonaligned Double JPEG Compression Based on Integer Periodicity Maps
Information Forensics and Security, IEEE Transactions on, 2012, Vol. 7(2), pp. 842-848
BibTeX@article{Bianchi2012b, author = {Bianchi, T. and Piva, A.}, title = {Detection of Nonaligned Double JPEG Compression Based on Integer Periodicity Maps}, journal = {Information Forensics and Security, IEEE Transactions on}, year = {2012}, volume = {7}, number = {2}, pages = {842-848}}
-
Digital Image Forensics
Sencar, H. T. & Memon, N. (ed.)
Chapter Counter-Forensics: Attacking Image Forensics
Springer, 2012, pp. -
BibTeX@inbook{Boehme2012, author = {Rainer Böhme and Matthias Kirchner}, title = {Digital Image Forensics}, publisher = {Springer}, year = {2012}, pages = {-}}
-
Image forgery detection through motion blur estimates
Computational Intelligence & Computing Research (ICCIC), 2012 IEEE International Conference on
2012, pp. 1-4
BibTeX@inproceedings{Bora2012, author = {Bora, R.M. and Shahane, N.M.}, title = {Image forgery detection through motion blur estimates}, booktitle = {Computational Intelligence & Computing Research (ICCIC), 2012 IEEE International Conference on}, year = {2012}, pages = {1--4}}
-
Detecting Primary,secondary and Triple Jpeg Compression Having Same Quantization Matrix
International Journal of Communications and Engineering, 2012, Vol. 3(3), pp. 8-14
BibTeX@article{Brindha2012, author = {S. Brindha and S Kumarganesh}, title = {Detecting Primary,secondary and Triple Jpeg Compression Having Same Quantization Matrix}, journal = {International Journal of Communications and Engineering}, year = {2012}, volume = {3}, number = {3}, pages = {8-14}}
-
A Tampered Image Detecting Method Based on Wavelet Analysis
International Journal of Information and Electronics Engineering, 2012, Vol. 2(2), pp. 38-43
BibTeX@article{Bu2012, author = {Wenqing Bu and Ming Xu and Ning Zheng}, title = {A Tampered Image Detecting Method Based on Wavelet Analysis}, journal = {International Journal of Information and Electronics Engineering}, year = {2012}, volume = {2}, number = {2}, pages = {38-43}}
-
Blind CFA Interpolation Detection Based on the Entropy
Advanced Materials Research, 2012, Vol. 532 - 533 Materials Science and Information Technology II, pp. 787-791
BibTeX@article{Cai2012, author = {Suozhang Cai and Mingli Li}, title = {Blind CFA Interpolation Detection Based on the Entropy}, journal = {Advanced Materials Research}, year = {2012}, volume = {532 - 533 Materials Science and Information Technology II}, pages = {787-791}}
-
On the effectiveness of local warping against SIFT-based copy-move detection
Proc. 5th Int Communications Control and Signal Processing (ISCCSP) Symp
2012, pp. 1-5
BibTeX@inproceedings{Caldelli2012, author = {Caldelli, R. and Amerini, I. and Ballan, L. and Serra, G. and Barni, M. and Costanzo, A.}, title = {On the effectiveness of local warping against SIFT-based copy-move detection}, booktitle = {Proc. 5th Int Communications Control and Signal Processing (ISCCSP) Symp}, year = {2012}, pages = {1--5}}
-
Measuring the Statistical Correlation Inconsistencies in Mobile Images for Tamper Detection
Shi, Y. (ed.)
Transactions on Data Hiding and Multimedia Security VII
Springer Berlin / Heidelberg, 2012, Vol. 7110, pp. 63-81
BibTeX@incollection{Cao2012, author = {Cao, Hong and Kot, Alex}, title = {Measuring the Statistical Correlation Inconsistencies in Mobile Images for Tamper Detection}, booktitle = {Transactions on Data Hiding and Multimedia Security VII}, publisher = {Springer Berlin / Heidelberg}, year = {2012}, volume = {7110}, pages = {63-81}}
-
Detection of Tampering Inconsistencies on Mobile Photos
Proc. Int. Workshop on Digital Watermarking
Lecture Notes in Computer Science, 2012, Vol. -, pp. 115-119
BibTeX@article{Cao2012c, author = {H. Cao and A.C. Kot}, title = {Detection of Tampering Inconsistencies on Mobile Photos}, booktitle = {Proc. Int. Workshop on Digital Watermarking}, journal = {Lecture Notes in Computer Science}, year = {2012}, volume = {-}, pages = {115--119}}
-
Measuring the statistical correlation inconsistencies in mobile images for tamper detection
Shi, Y. Q. (ed.)
Transactions on Data Hiding and Multimedia Security VII
Chapter Measuring the statistical correlation inconsistencies in mobile images for tamper detection
Springer-Verlag, 2012, pp. 63-81
BibTeX@incollection{Cao2012b, author = {Cao, Hong and Kot, Alex C.}, title = {Measuring the statistical correlation inconsistencies in mobile images for tamper detection}, booktitle = {Transactions on Data Hiding and Multimedia Security VII}, publisher = {Springer-Verlag}, year = {2012}, pages = {63--81}}
-
Manipulation Detection on Image Patches Using FusionBoost
IEEE Transactions on Information Forensics and Security, 2012, Vol. 7(3), pp. 992-1002
BibTeX@article{Cao2012a, author = {Cao, H. and Kot, A. C. }, title = {Manipulation Detection on Image Patches Using FusionBoost}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2012}, volume = {7}, number = {3}, pages = {992--1002}}
-
Improvement of Real-Time Image Splicing Method Basic on Gray Level
Computer Science & Service System (CSSS), 2012 International Conference on
2012, pp. 1555-1558
BibTeX@inproceedings{Cao2012d, author = {YueQin Cao}, title = {Improvement of Real-Time Image Splicing Method Basic on Gray Level}, booktitle = {Computer Science & Service System (CSSS), 2012 International Conference on}, year = {2012}, pages = {1555--1558}}
-
Experiments on Improving Sensor Pattern Noise Extraction for Source Camera Identification
Proc. Sixth Int Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS) Conf
2012, pp. 609-616
BibTeX@inproceedings{Cattaneo2012, author = {Giuseppe Cattaneo and Pompeo Faruolo and Umberto Ferraro Petrillo}, title = {Experiments on Improving Sensor Pattern Noise Extraction for Source Camera Identification}, booktitle = {Proc. Sixth Int Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS) Conf}, year = {2012}, pages = {609--616}}
-
A two dimensional camera identification method based on image sensor noise
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2012
2012, pp. 1741-1744
BibTeX@inproceedings{Chan2012, author = {Chan, Lit-Hung and Law, Ngai-Fong and Siu, Wan-Chi}, title = {A two dimensional camera identification method based on image sensor noise}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2012}, year = {2012}, pages = {1741--1744}}
-
Median Filtering Detection Using Edge Based Prediction Matrix
Shi, Y., Kim, H.-J. & Perez-Gonzalez, F. (ed.)
Digital Forensics and Watermarking
Springer Berlin / Heidelberg, 2012, Vol. 7128, pp. 361-375
BibTeX@incollection{Chen2012, author = {Chen, Chenglong and Ni, Jiangqun}, title = {Median Filtering Detection Using Edge Based Prediction Matrix}, booktitle = {Digital Forensics and Watermarking}, publisher = {Springer Berlin / Heidelberg}, year = {2012}, volume = {7128}, pages = {361-375}}
-
Blind Median Filtering Detection Using Statistics in Difference Domain
ihconference.org
2012
BibTeX@inproceedings{Chen2012b, author = {C Chen and J Ni and R Huang and, J Huang}, title = {Blind Median Filtering Detection Using Statistics in Difference Domain}, booktitle = {ihconference.org}, year = {2012}}
-
An Image Region Description Method Based on Step Sector Statistics and its Application in Image Copy-Rotate/Flip-Move Forgery Detection
International Journal of Digital Crime and Forensics (IJDCF), 2012, Vol. 4(1), pp. 49-53
BibTeX@article{Chen2012a, author = {Likai Chen and Wei Lu and Jiangqun Ni}, title = {An Image Region Description Method Based on Step Sector Statistics and its Application in Image Copy-Rotate/Flip-Move Forgery Detection}, journal = {International Journal of Digital Crime and Forensics (IJDCF)}, year = {2012}, volume = {4}, number = {1}, pages = {49--53}}
-
A Study an the Photo Response Non-uniformity Noise Pattern Based Image Forensics in Real-world Applications
Institute for Infocomm Research, 1 Fusionopolis Way, 138632, Singapore, Institute for Infocomm Research, 1 Fusionopolis Way, 138632, Singapore, 2012
BibTeX@techreport{Chen2012c, author = {Yu Chen and Vrizlynn L. L. Thing}, title = {A Study an the Photo Response Non-uniformity Noise Pattern Based Image Forensics in Real-world Applications}, school = {Institute for Infocomm Research, 1 Fusionopolis Way, 138632, Singapore}, year = {2012}}
-
A Novel Photographic and Computer Graphic Composites Detection Method
Proc. of the National Conference on Information Technology and Computer Science (CITCS 2012)
2012
BibTeX@inproceedings{Chen2012e, author = {Chen, Zhenwei. and Ke, Yongzhen}, title = {A Novel Photographic and Computer Graphic Composites Detection Method}, booktitle = {Proc. of the National Conference on Information Technology and Computer Science (CITCS 2012)}, year = {2012}}
-
Source camera identification based on nonsubsampled Contourlet transform denoising filter design
Journal of Computer Applications, 2012, Vol. 2, pp. 055
BibTeX@article{Chen2012d, author = {Chen, Z. and Zhou, Z.}, title = {Source camera identification based on nonsubsampled Contourlet transform denoising filter design}, journal = {Journal of Computer Applications}, year = {2012}, volume = {2}, pages = {055}}
-
Forged Region Detection for Scanned Images
J. (Jong Hyuk) Park, J., Chao, H.-C., S. Obaidat, M. & Kim, J. (ed.)
Computer Science and Convergence
Springer Netherlands, 2012, Vol. 114, pp. 687-694
BibTeX@incollection{Choi2012, author = {Choi, Chang-Hee and Lee, Min-Jeong and Hyun, Dai-Kyung and Lee, Heung-Kyu}, title = {Forged Region Detection for Scanned Images}, booktitle = {Computer Science and Convergence}, publisher = {Springer Netherlands}, year = {2012}, volume = {114}, pages = {687-694}}
-
An Evaluation of Popular Copy-Move Forgery Detection Approaches
ArXiv > Computer Science > Computer Vision and Pattern Recognition, 2012
BibTeX@electronic{Christlein2012, author = {Vincent Christlein and Christian Riess and Johannes Jordan and Corinna Riess and Elli Angelopoulou}, title = {An Evaluation of Popular Copy-Move Forgery Detection Approaches}, journal = {ArXiv > Computer Science > Computer Vision and Pattern Recognition}, year = {2012}}
-
An Evaluation of Popular Copy-Move Forgery Detection Approaches
IEEE Transactions on Information Forensics and Security, 2012, Vol. 7(6), pp. 1841-1854
BibTeX@article{Christlein2012a, author = {Christlein, V. and Riess, C. and Jordan, J. and Riess, C. and Angelopoulou, E.}, title = {An Evaluation of Popular Copy-Move Forgery Detection Approaches}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2012}, volume = {7}, number = {6}, pages = {1841--1854}}
-
Forensic identification of compressively sensed images
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2012
2012, pp. 1837-1840
BibTeX@inproceedings{Chu2012, author = {Xiaoyu Chu and Stamm, M. C. and Lin, W. S. and Liu, K. J. R.}, title = {Forensic identification of compressively sensed images}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2012}, year = {2012}, pages = {1837--1840}}
-
Resiliency Assessment and Enhancement of Intrinsic Fingerprinting
Faculty of the Graduate School of the University of Maryland, College Park, Faculty of the Graduate School of the University of Maryland, College Park, 2012
BibTeX@phdthesis{Chuang2012, author = {Wei-Hong Chuang}, title = {Resiliency Assessment and Enhancement of Intrinsic Fingerprinting}, school = {Faculty of the Graduate School of the University of Maryland, College Park}, year = {2012}}
-
An Anti-Forensic Algorithm of JPEG Double Compression Based Forgery Detection
Information Science and Engineering (ISISE), 2012 International Symposium on
2012, pp. 159-164
BibTeX@inproceedings{Chunhui2012, author = {Feng Chunhui and Xu Zhengquan and Zheng Xinghui}, title = {An Anti-Forensic Algorithm of JPEG Double Compression Based Forgery Detection}, booktitle = {Information Science and Engineering (ISISE), 2012 International Symposium on}, year = {2012}, pages = {159--164}}
-
An Image Splicing Detection Based on Interpolation Analysis
Lin, W., Xu, D., Ho, A., Wu, J., He, Y., Cai, J., Kankanhalli, M. & Sun, M.-T. (ed.)
Advances in Multimedia Information Processing -- PCM 2012
Springer Berlin Heidelberg, 2012, Vol. 7674, pp. 390-401
BibTeX@incollection{Ciptasari2012, author = {Ciptasari, RimbaW. and Rhee, Kyung-Hyune and Sakurai, Kouichi}, title = {An Image Splicing Detection Based on Interpolation Analysis}, booktitle = {Advances in Multimedia Information Processing -- PCM 2012}, publisher = {Springer Berlin Heidelberg}, year = {2012}, volume = {7674}, pages = {390-401}}
-
Exposing Digital Forgeries in Ballistic Motion
IEEE Transactions on Information Forensics and Security, 2012, Vol. 7(1), pp. 283-296
BibTeX@article{Conotter2012, author = {Conotter, V. and O'Brien, J. F. and Farid, H.}, title = {Exposing Digital Forgeries in Ballistic Motion}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2012}, volume = {7}, number = {1}, pages = {283--296}}
-
A Comparative Analysis of Forgery Detection Algorithms
International Workshops on Statistical Techniques in Pattern Recognition, LNCS 7626
2012
BibTeX@inproceedings{Cozzolino2012, author = {D. Cozzolino and G. Poggi and C. Sansone and L. Verdoliva}, title = {A Comparative Analysis of Forgery Detection Algorithms}, booktitle = {International Workshops on Statistical Techniques in Pattern Recognition, LNCS 7626}, year = {2012}}
-
Discrimination Between Computer Generated and Natural Human Faces Based on Asymmetry Information
Poc. of the 20th European Signal Processing Conference (EUSIPCO 2012)
2012, pp. 1234-1238
BibTeX@inproceedings{Dang-Nguyen2012, author = {D. T. Dang-Nguyen and G. Boato and F. D. N. De Natale}, title = {Discrimination Between Computer Generated and Natural Human Faces Based on Asymmetry Information}, booktitle = {Poc. of the 20th European Signal Processing Conference (EUSIPCO 2012)}, year = {2012}, pages = {1234-1238}}
-
Detection of Copy-Rotate-Move Forgery Using Dual Tree Complex Wavelet Transform
Advanced Science Letters, 2012, Vol. 16(1), pp. 32-38
BibTeX@article{Deng:2012:1936-6612:32, author = {Deng, Yu and Wu, Yunjie and Zhou, Linna}, title = {Detection of Copy-Rotate-Move Forgery Using Dual Tree Complex Wavelet Transform}, journal = {Advanced Science Letters}, year = {2012}, volume = {16}, number = {1}, pages = {32-38}}
-
Pixel Based Digital Image Forgery Detection Techniques
International Journal of Engineering Research and Applications (IJERA), 2012, Vol. 2(3), pp. 539-543
BibTeX@article{Deshpande2012, author = {Pradyumna Deshpande and Prashasti Kanikar}, title = {Pixel Based Digital Image Forgery Detection Techniques}, journal = {International Journal of Engineering Research and Applications (IJERA)}, year = {2012}, volume = {2}, number = {3}, pages = {539-543}}
-
Region duplication blind detection based on multiple feature combination
Machine Learning and Cybernetics (ICMLC), 2012 International Conference on
2012, Vol. 1, pp. 17-21
BibTeX@inproceedings{Du2012, author = {Zhen-Long Du and Xiao-Li Li and Li-Xin Jiao and Kangkang Shen}, title = {Region duplication blind detection based on multiple feature combination}, booktitle = {Machine Learning and Cybernetics (ICMLC), 2012 International Conference on}, year = {2012}, volume = {1}, pages = {17--21}}
-
Source Camera Classification and Clustering from Sensor Pattern Noise
2012
BibTeX@article{Eklann2012, author = {Eklann, J. and Lundberg, J.}, title = {Source Camera Classification and Clustering from Sensor Pattern Noise}, year = {2012}}
-
Detectable Tampering of JPEG Anti-Forensics
2012, pp. 1-4
BibTeX@misc{Fahmy2012, author = {Fahmy, Gamal}, title = {Detectable Tampering of JPEG Anti-Forensics}, year = {2012}, pages = {1--4}}
-
3D Lighting-Based Image Forgery Detection Using Shape-From-Shading
Poc. of the 20th European Signal Processing Conference (EUSIPCO 2012)
2012, pp. 1777-1781
BibTeX@inproceedings{Fan2012, author = {W. Fan and K. Wang and F. Cayre and Z. Xiong}, title = {3D Lighting-Based Image Forgery Detection Using Shape-From-Shading}, booktitle = {Poc. of the 20th European Signal Processing Conference (EUSIPCO 2012)}, year = {2012}, pages = {1777-1781}}
-
Perceptual discrimination of computer generated and photographic faces
Digital Investigation, 2012, Vol. 8(3-4), pp. 226 - 235
BibTeX@article{Farid2012, author = {Hany Farid and Mary J. Bravo}, title = {Perceptual discrimination of computer generated and photographic faces}, journal = {Digital Investigation}, year = {2012}, volume = {8}, number = {3--4}, pages = {226 - 235}}
-
Digital camera simulation
Applied Optics, 2012, Vol. 51(4), pp. A80-A90
BibTeX@article{Farrell2012, author = {Joyce E. Farrell and Peter B. Catrysse and Brian A. Wandell}, title = {Digital camera simulation}, journal = {Applied Optics}, year = {2012}, volume = {51}, number = {4}, pages = {A80-A90}}
-
Normalized Energy Density-Based Forensic Detection of Resampled Images
IEEE Transactions on Multimedia, 2012, Vol. 14(3), pp. 536-545
BibTeX@article{Feng2012, author = {Feng, X. and Cox, I. J. and Doerr, G. }, title = {Normalized Energy Density-Based Forensic Detection of Resampled Images}, journal = {IEEE Transactions on Multimedia}, year = {2012}, volume = {14}, number = {3}, pages = {536--545}}
-
Image Forgery Localization via Fine-Grained Analysis of CFA Artifacts
IEEE Transactions on Information Forensics and Security, 2012, Vol. 7(5), pp. 1566-1577
BibTeX@article{Ferrara2012, author = {Ferrara, Pasquale and Bianchi, Tiziano and De Rosa, Alessia and Piva, Alessandro }, title = {Image Forgery Localization via Fine-Grained Analysis of CFA Artifacts}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2012}, volume = {7}, number = {5}, pages = {1566--1577}}
-
Hiding Traces of Median Filtering in Digital Images
Poc. of the 20th European Signal Processing Conference (EUSIPCO 2012)
2012
BibTeX@inproceedings{Fontani2012, author = {M. Fontani and M. Barni}, title = {Hiding Traces of Median Filtering in Digital Images}, booktitle = {Poc. of the 20th European Signal Processing Conference (EUSIPCO 2012)}, year = {2012}}
-
Techniques of image manipulation and detection of copy-move attack
Telecommunications Forum (TELFOR), 2012 20th
2012, pp. 1625-1628
BibTeX@inproceedings{Franc2012, author = {Franc, I. and Stojmenovic, M.}, title = {Techniques of image manipulation and detection of copy-move attack}, booktitle = {Telecommunications Forum (TELFOR), 2012 20th}, year = {2012}, pages = {1625--1628}}
-
Sensor Defects in Digital Image Forensic
Chapter 1: Sensor Defects in Digital Image Forensic
2012
BibTeX@unpublished{Fridrich2012, author = {Jessica Fridrich}, title = {Sensor Defects in Digital Image Forensic}, year = {2012}}
-
Forgery Authentication in Extreme Wide-Angle Lens Using Distortion Cue and Fake Saliency Map
IEEE Transactions on Information Forensics and Security, 2012, Vol. 7(4), pp. 1301-1314
BibTeX@article{Fu2012, author = {Huazhu Fu and Xiaochun Cao}, title = {Forgery Authentication in Extreme Wide-Angle Lens Using Distortion Cue and Fake Saliency Map}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2012}, volume = {7}, number = {4}, pages = {1301--1314}}
-
Camera Response Function Estimation and Application with a Single Image
Yang, D. (ed.)
Informatics in Control, Automation and Robotics
Lecture Notes in Electrical Engineering, Springer Berlin Heidelberg, 2012, Vol. 133, pp. 149-156
BibTeX@incollection{Fu2012a, author = {Fu, Li and Qi, Yue}, title = {Camera Response Function Estimation and Application with a Single Image}, booktitle = {Informatics in Control, Automation and Robotics}, journal = {Lecture Notes in Electrical Engineering}, publisher = {Springer Berlin Heidelberg}, year = {2012}, volume = {133}, pages = {149-156}}
-
Using Multi-step Transition Matrices for Camera Model Identification
International Journal of Hybrid Information Technology, 2012, Vol. 5(2), pp. 275-288
BibTeX@article{Gao2012a, author = {Gao, S. and Hu, R.M. and Tian, G.}, title = {Using Multi-step Transition Matrices for Camera Model Identification}, journal = {International Journal of Hybrid Information Technology}, year = {2012}, volume = {5}, number = {2}, pages = {275--288}}
-
Camera Model Identification Based on the Characteristic of CFA and Interpolation
Shi, Y., Kim, H.-J. & Perez-Gonzalez, F. (ed.)
Digital Forensics and Watermarking
Springer Berlin / Heidelberg, 2012, Vol. 7128, pp. 268-280
BibTeX@incollection{Gao2012, author = {Gao, Shang and Xu, Guanshuo and Hu, Rui-Min}, title = {Camera Model Identification Based on the Characteristic of CFA and Interpolation}, booktitle = {Digital Forensics and Watermarking}, publisher = {Springer Berlin / Heidelberg}, year = {2012}, volume = {7128}, pages = {268-280}}
-
Research on PRNU
Nederlands Forensisch Instituut, Nederlands Forensisch Instituut, 2012
BibTeX@techreport{Gisolf2012, author = {Floris Gisolf}, title = {Research on PRNU}, school = {Nederlands Forensisch Instituut}, year = {2012}}
-
Forensic analysis of ordered data structures on the example of JPEG files
Proc. IEEE Int Information Forensics and Security (WIFS) Workshop
2012, pp. 139-144
BibTeX@inproceedings{Gloe2012, author = {Gloe, Thomas}, title = {Forensic analysis of ordered data structures on the example of JPEG files}, booktitle = {Proc. IEEE Int Information Forensics and Security (WIFS) Workshop}, year = {2012}, pages = {139--144}}
-
Unexpected artefacts in PRNU-based camera identification: a ´Dresden Image Database´ case-study
Proceedings of the on Multimedia and security
ACM, 2012, pp. 109-114
BibTeX@inproceedings{Gloe2012a, author = {Gloe, Thomas and Pfennig, Stefan and Kirchner, Matthias}, title = {Unexpected artefacts in PRNU-based camera identification: a ´Dresden Image Database´ case-study}, booktitle = {Proceedings of the on Multimedia and security}, publisher = {ACM}, year = {2012}, pages = {109--114}}
-
Analysis of images for local artificial changes with JPEG compression properties
Pattern Recognition and Image Analysis, MAIK Nauka/Interperiodica distributed exclusively by Springer Science+Business Media LLC., 2012, Vol. 22, pp. 210-214
BibTeX@article{Glumov2012, author = {Glumov, N. and Kuznetsov, A.}, title = {Analysis of images for local artificial changes with JPEG compression properties}, journal = {Pattern Recognition and Image Analysis}, publisher = {MAIK Nauka/Interperiodica distributed exclusively by Springer Science+Business Media LLC.}, year = {2012}, volume = {22}, pages = {210-214}}
-
Sensor-Fingerprint Based Identification of Images Corrected for Lens Distortion
Proceedings of SPIE, 2012
BibTeX@article{Goljan2012, author = {Miroslav Goljan and Jessica Fridrich}, title = {Sensor-Fingerprint Based Identification of Images Corrected for Lens Distortion}, journal = {Proceedings of SPIE}, year = {2012}}
-
Fakery Image Identifying Using Lighting Direction
Journal of Information & Computational Science, 2012, Vol. 9(7), pp. 1949-1955
BibTeX@article{Gong2012, author = {Wenyong Gong and Xinglong Wu and Tieru Wu}, title = {Fakery Image Identifying Using Lighting Direction}, journal = {Journal of Information & Computational Science}, year = {2012}, volume = {9}, number = {7}, pages = {1949-1955}}
-
Duplication Forgery Detection Using Improved DAISY Descriptor
Expert Systems with Applications, 2012, Vol. -(0), pp. -
BibTeX@article{Guo2012, author = {Jing-Ming Guo and Yun-Fu Liu and Zong-Jhe Wu}, title = {Duplication Forgery Detection Using Improved DAISY Descriptor}, journal = {Expert Systems with Applications}, year = {2012}, volume = {-}, number = {0}, pages = {-}}
-
Noise-Contrastive Estimation of Unnormalized Statistical Models, with Applications to Natural Image Statistics
Journal of Machine Learning Research, 2012, Vol. 13, pp. 307-361
BibTeX@article{Gutmann2012, author = {Michael U. Gutmann and Aapo Hyv¨ arinen}, title = {Noise-Contrastive Estimation of Unnormalized Statistical Models, with Applications to Natural Image Statistics}, journal = {Journal of Machine Learning Research}, year = {2012}, volume = {13}, pages = {307-361}}
-
Digital image splicing detection based on Markov features in DCT and DWT domain
Pattern Recognition, 2012(0), pp. -
BibTeX@article{He2012, author = {Zhongwei He and Wei Lu and Wei Sun and Jiwu Huang}, title = {Digital image splicing detection based on Markov features in DCT and DWT domain}, journal = {Pattern Recognition}, year = {2012}, number = {0}, pages = { - }}
-
A New Algorithm for Image Copy-Move Forgery Detection
Materials Science and Information Technology, 2012, Vol. 433-440, pp. 5930-5934
BibTeX@article{Hou2012, author = {Dong Mei Hou and Zheng Yao Bai and Shu Chun Liu}, title = {A New Algorithm for Image Copy-Move Forgery Detection}, journal = {Materials Science and Information Technology}, year = {2012}, volume = {433-440}, pages = {5930-5934}}
-
Using Anisotropic Diffusion for Efficient Extraction of Sensor Noise in Camera Identification
Journal of Forensic Sciences, 2012, Vol. 57(2), pp. 512-527
BibTeX@article{Houten2012, author = {Wiger van Houten and Zeno Geradts}, title = {Using Anisotropic Diffusion for Efficient Extraction of Sensor Noise in Camera Identification}, journal = {Journal of Forensic Sciences}, year = {2012}, volume = {57}, number = {2}, pages = {512-527}}
-
Digital evidence collection for web image access
Security and Communication Networks, Wiley Online Library, 2012
BibTeX@article{Hsieh2012, author = {Hsieh, Che-Jen and Li, Jung-Shian and Liu, Wei-Cheng}, title = {Digital evidence collection for web image access}, journal = {Security and Communication Networks}, publisher = {Wiley Online Library}, year = {2012}}
-
Detection of copy-move forgery image using Gabor descriptor
Proc. Int Anti-Counterfeiting, Security and Identification (ASID) Conf
2012, pp. 1-4
BibTeX@inproceedings{Hsu2012, author = {Hao-Chiang Hsu and Min-Shi Wang}, title = {Detection of copy-move forgery image using Gabor descriptor}, booktitle = {Proc. Int Anti-Counterfeiting, Security and Identification (ASID) Conf}, year = {2012}, pages = {1--4}}
-
Fast camera fingerprint search algorithm for source camera identification
Proc. 5th Int Communications Control and Signal Processing (ISCCSP) Symp
2012, pp. 1-5
BibTeX@inproceedings{Hu2012, author = {Yongjian Hu and Chang-Tsun Li and Zhimao Lai and Shangfan Zhang}, title = {Fast camera fingerprint search algorithm for source camera identification}, booktitle = {Proc. 5th Int Communications Control and Signal Processing (ISCCSP) Symp}, year = {2012}, pages = {1--5}}
-
An Improved Algorithm for Camera Model Identification Using Inter-channel Demosaicking Traces
Proc. Eighth Int Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) Conf
2012, pp. 325-330
BibTeX@inproceedings{Hu2012b, author = {Hu, Yongjian and Li, Chang-Tsun and Lin, Xufeng and Liu, Bei-bei}, title = {An Improved Algorithm for Camera Model Identification Using Inter-channel Demosaicking Traces}, booktitle = {Proc. Eighth Int Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) Conf}, year = {2012}, pages = {325--330}}
-
Blind Integrity Verification of Medical Images
IEEE Transactions on Information Technology in Biomedicine, 2012, Vol. 16(6), pp. 1122-1126
BibTeX@article{Huang2012, author = {Huang, H. and Coatrieux, G. and Shu, H. and Luo, L. and Roux, C. }, title = {Blind Integrity Verification of Medical Images}, journal = {IEEE Transactions on Information Technology in Biomedicine}, year = {2012}, volume = {16}, number = {6}, pages = {1122--1126}}
-
Copy-Move Image Forgery Detection Using Multi-Resolution Weber Descriptors
Proc. Eighth Int Signal Image Technology and Internet Based Systems (SITIS) Conf
2012, pp. 395-401
BibTeX@inproceedings{Hussain2012, author = {Hussain, Muhammad and Muhammad, Ghulam and Saleh, Sahar Q. and Mirza, Anwar M. and Bebis, George}, title = {Copy-Move Image Forgery Detection Using Multi-Resolution Weber Descriptors}, booktitle = {Proc. Eighth Int Signal Image Technology and Internet Based Systems (SITIS) Conf}, year = {2012}, pages = {395--401}}
-
A Novel Forged Image Detection Method Using the Characteristics of Interpolation
Journal of Forensic Sciences, 2012, Vol. -, pp. -
BibTeX@article{Hwang2012, author = {Hwang, Min-Gu and Har, Dong-Hwan}, title = {A Novel Forged Image Detection Method Using the Characteristics of Interpolation}, journal = {Journal of Forensic Sciences}, year = {2012}, volume = {-}, pages = {-}}
-
Camcorder Identification for Heavily Compressed Low Resolution Videos
J. (Jong Hyuk) Park, J. J. (J. H., Chao, H.-C., S. Obaidat, M. S. & Kim, J. (ed.)
Computer Science and Convergence
Springer Netherlands, 2012, Vol. 114, pp. 695-701
BibTeX@incollection{Hyun2012, author = {Hyun, Dai-Kyung and Choi, Chang-Hee and Lee, Heung-Kyu}, title = {Camcorder Identification for Heavily Compressed Low Resolution Videos}, booktitle = {Computer Science and Convergence}, publisher = {Springer Netherlands}, year = {2012}, volume = {114}, pages = {695-701}}
-
Image Copy-Move Forgery Detecting Based on Local Invariant Feature
Journal of Multimedia, 2012, Vol. 7(1), pp. 90-97
BibTeX@article{Jing2012, author = {Li Jing and Chao Shao}, title = {Image Copy-Move Forgery Detecting Based on Local Invariant Feature}, journal = {Journal of Multimedia}, year = {2012}, volume = {7}, number = {1}, pages = {90-97}}
-
Detecting Re-captured Videos Using Shot-Based Photo Response Non-Uniformity
Shi, Y., Kim, H.-J. & Perez-Gonzalez, F. (ed.)
Digital Forensics and Watermarking
Springer Berlin / Heidelberg, 2012, Vol. 7128, pp. 281-291
BibTeX@incollection{Jung2012, author = {Jung, Dae-Jin and Hyun, Dai-Kyung and Ryu, Seung-Jin and Lee, Ji-Won and Lee, Hae-Yeoun and Lee, Heung-Kyu}, title = {Detecting Re-captured Videos Using Shot-Based Photo Response Non-Uniformity}, booktitle = {Digital Forensics and Watermarking}, publisher = {Springer Berlin / Heidelberg}, year = {2012}, volume = {7128}, pages = {281-291}}
-
Exposing Postprocessed Copy--Paste Forgeries Through Transform-Invariant Features
IEEE Transactions on Information Forensics and Security, 2012, Vol. 7(3), pp. 1018-1028
BibTeX@article{Kakar2012, author = {Kakar, P. and Sudha, N. }, title = {Exposing Postprocessed Copy--Paste Forgeries Through Transform-Invariant Features}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2012}, volume = {7}, number = {3}, pages = {1018--1028}}
-
Authenticating Image Metadata Elements Using Geolocation Information and Sun Direction Estimation
Proc. IEEE Int Multimedia and Expo (ICME) Conf
2012, pp. 236-241
BibTeX@inproceedings{Kakar2012a, author = {Kakar, P. and Sudha, N. }, title = {Authenticating Image Metadata Elements Using Geolocation Information and Sun Direction Estimation}, booktitle = {Proc. IEEE Int Multimedia and Expo (ICME) Conf}, year = {2012}, pages = {236--241}}
-
Verifying Temporal Data in Geotagged Images Via Sun Azimuth Estimation
IEEE Transactions on Information Forensics and Security, 2012, Vol. 7(3), pp. 1029-1039
BibTeX@article{Kakar2012b, author = {Kakar, P. and Sudha, N.}, title = {Verifying Temporal Data in Geotagged Images Via Sun Azimuth Estimation}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2012}, volume = {7}, number = {3}, pages = {1029--1039}}
-
Novel Blind Video Forgery Detection Using Markov Models on Motion Residue
Pan, J.-S., Chen, S.-M. & Nguyen, N. (ed.)
Intelligent Information and Database Systems
Springer Berlin / Heidelberg, 2012, Vol. 7198, pp. 308-315
BibTeX@incollection{Kancherla2012, author = {Kancherla, Kesav and Mukkamala, Srinivas}, title = {Novel Blind Video Forgery Detection Using Markov Models on Motion Residue}, booktitle = {Intelligent Information and Database Systems}, publisher = {Springer Berlin / Heidelberg}, year = {2012}, volume = {7198}, pages = {308-315}}
-
Enhancing Source Camera Identification Performance With a Camera Reference Phase Sensor Pattern Noise
IEEE Transactions on Information Forensics and Security, 2012, Vol. 7(2), pp. 393-402
BibTeX@article{Kang2012, author = {Xiangui Kang and Yinxiang Li and Zhenhua Qu and Jiwu Huang}, title = {Enhancing Source Camera Identification Performance With a Camera Reference Phase Sensor Pattern Noise}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2012}, volume = {7}, number = {2}, pages = {393--402}}
-
Robust Median Filtering Forensics Based on the Autoregressive Model of Median Filtered Residual
2012
BibTeX@article{Kang2012a, author = {Kang, X. and Stamm, M.C. and Peng, A. and Liu, K.J.R.}, title = {Robust Median Filtering Forensics Based on the Autoregressive Model of Median Filtered Residual}, year = {2012}}
-
Effective Detection for Linear Up-Sampling by a Factor of Fraction
IEEE Transactions on Image Processing, 2012, Vol. 21(8), pp. 3443-3453
BibTeX@article{Kao2012, author = {Yang Ta Kao and Hwei Jen Lin and Chun Wei Wang and Yi Chun Pai}, title = {Effective Detection for Linear Up-Sampling by a Factor of Fraction}, journal = {IEEE Transactions on Image Processing}, year = {2012}, volume = {21}, number = {8}, pages = {3443--3453}}
-
Updates to Policies and Procedures Related to Potential Scientific and Academic Misconduct in the Journals of the American Diabetes Association
Diabetes Care, 2012, Vol. 35(1), pp. 189-190
BibTeX@article{Kohler2012, author = {Christian S. Kohler}, title = {Updates to Policies and Procedures Related to Potential Scientific and Academic Misconduct in the Journals of the American Diabetes Association}, journal = {Diabetes Care}, year = {2012}, volume = {35}, number = {1}, pages = {189-190}}
-
Alternative Anti-Forensics Method for Contrast Enhancement
Shi, Y., Kim, H.-J. & Perez-Gonzalez, F. (ed.)
Digital Forensics and Watermarking
Springer Berlin / Heidelberg, 2012, Vol. 7128, pp. 398-410
BibTeX@incollection{Kwok2012, author = {Kwok, Chun-Wing and Au, O. and Chui, Sung-Him}, title = {Alternative Anti-Forensics Method for Contrast Enhancement}, booktitle = {Digital Forensics and Watermarking}, publisher = {Springer Berlin / Heidelberg}, year = {2012}, volume = {7128}, pages = {398-410}}
-
Estimating the Natural Illumination Conditions from a Single Outdoor Image
International Journal of Computer Vision, Springer US, 2012, Vol. 98, pp. 123-145
BibTeX@article{Lalonde2012, author = {Lalonde, Jean-François and Efros, AlexeiA. and Narasimhan, SrinivasaG.}, title = {Estimating the Natural Illumination Conditions from a Single Outdoor Image}, journal = {International Journal of Computer Vision}, publisher = {Springer US}, year = {2012}, volume = {98}, pages = {123-145}}
-
Secrets of image denoising cuisine
Acta Numerica, 2012, Vol. 21, pp. 475-576
BibTeX@article{Lebrun2012, author = {M. Lebrun and M. Colom and A. Buades and J. M. Morel}, title = {Secrets of image denoising cuisine}, journal = {Acta Numerica}, year = {2012}, volume = {21}, pages = {475-576}}
-
Reconstructing compressed photo and video data
University of Cambridge - Computer Laboratory, University of Cambridge - Computer Laboratory, 2012(813)
BibTeX@techreport{Lewis2012, author = {Andrew B. Lewis}, title = {Reconstructing compressed photo and video data}, school = {University of Cambridge - Computer Laboratory}, year = {2012}, number = {813}}
-
An Empirical Investigation into the Correlation between Vignetting Effect and the Quality of Sensor Pattern Noise
Department of Computer Science, University of Warwick, Coventry CV4 7AL, UK, Department of Computer Science, University of Warwick, Coventry CV4 7AL, UK, 2012
BibTeX@techreport{Li2012b, author = {Li, C.T. and Satta, R.}, title = {An Empirical Investigation into the Correlation between Vignetting Effect and the Quality of Sensor Pattern Noise}, school = {Department of Computer Science, University of Warwick, Coventry CV4 7AL, UK}, year = {2012}}
-
Color-Decoupled Photo Response Non-Uniformity for Digital Image Forensics
IEEE Transactions on Circuits and Systems for Video Technology, 2012, Vol. 22(2), pp. 260-271
BibTeX@article{Li2012, author = {Chang-Tsun Li and Yue Li}, title = {Color-Decoupled Photo Response Non-Uniformity for Digital Image Forensics}, journal = {IEEE Transactions on Circuits and Systems for Video Technology}, year = {2012}, volume = {22}, number = {2}, pages = {260--271}}
-
Blind Detection of Digital Forgery Image Based on the Edge Width
Zhang, Y., Zhou, Z.-H., Zhang, C. & Li, Y. (ed.)
Intelligent Science and Intelligent Data Engineering
Springer Berlin / Heidelberg, 2012, Vol. 7202, pp. 546-553
BibTeX@incollection{Li2012c, author = {Li, Hang and Zheng, Jiangbin}, title = {Blind Detection of Digital Forgery Image Based on the Edge Width}, booktitle = {Intelligent Science and Intelligent Data Engineering}, publisher = {Springer Berlin / Heidelberg}, year = {2012}, volume = {7202}, pages = {546-553}}
-
Copy-move forgery detection based on PHT
Proc. World Congress Information and Communication Technologies (WICT)
2012, pp. 1061-1065
BibTeX@inproceedings{Li2012e, author = {Li, Leida and Li, Shushang and Wang, Jun}, title = {Copy-move forgery detection based on PHT}, booktitle = {Proc. World Congress Information and Communication Technologies (WICT)}, year = {2012}, pages = {1061--1065}}
-
Detection of tampered region for JPEG images by using mode-based first digit features
EURASIP Journal on Advances in Signal Processing, 2012, Vol. 1(190)
BibTeX@article{Li2012a, author = {Li, Xiang Hua and Zhao, Yu Qian and Liao, Miao and Shi Yun Q}, title = {Detection of tampered region for JPEG images by using mode-based first digit features}, journal = {EURASIP Journal on Advances in Signal Processing}, year = {2012}, volume = {1}, number = {190}}
-
Passive detection of copy-paste forgery between JPEG images
Journal of Central South University, Central South University, 2012, Vol. 19, pp. 2839-2851
BibTeX@article{Li2012d, author = {Li, Xiang-hua and Zhao, Yu-qian and Liao, Miao and Shih, F.Y. and Shi, Y.Q.}, title = {Passive detection of copy-paste forgery between JPEG images}, journal = {Journal of Central South University}, publisher = {Central South University}, year = {2012}, volume = {19}, pages = {2839-2851}}
-
Efficient Image Copy Detection Using Multiscale Fingerprints
IEEE Multimedia, 2012, Vol. 19(1), pp. 60-69
BibTeX@article{Ling2012, author = {Hefei Ling and Hongrui Cheng and Qingzhen Ma and Fuhao Zou and WeiQi Yan}, title = {Efficient Image Copy Detection Using Multiscale Fingerprints}, journal = {IEEE Multimedia}, year = {2012}, volume = {19}, number = {1}, pages = {60--69}}
-
Blind detection of image splicing based on run length matrix combined properties
Proc. 10th World Congress Intelligent Control and Automation (WCICA)
2012, pp. 4545-4550
BibTeX@inproceedings{Liu2012a, author = {Liu, Han and Yang, Yun and Shang, Minqing}, title = {Blind detection of image splicing based on run length matrix combined properties}, booktitle = {Proc. 10th World Congress Intelligent Control and Automation (WCICA)}, year = {2012}, pages = {4545--4550}}
-
Identification of Smartphone-Image Source and Manipulation
Jiang, H., Ding, W., Ali, M. & Wu, X. (ed.)
Advanced Research in Applied Artificial Intelligence
Springer Berlin / Heidelberg, 2012, Vol. 7345, pp. 262-271
BibTeX@incollection{Liu2012, author = {Liu, Qingzhong and Li, Xiaodong and Chen, Lei and Cho, Hyuk and Cooper, Peter and Chen, Zhongxue and Qiao, Mengyu and Sung, Andrew}, title = {Identification of Smartphone-Image Source and Manipulation}, booktitle = {Advanced Research in Applied Artificial Intelligence}, publisher = {Springer Berlin / Heidelberg}, year = {2012}, volume = {7345}, pages = {262-271}}
-
A Source Cell-phone Identification Scheme Based on Canonical Correlation Analysis of Photo Response Non-uniformity
Journal of Computational Information Systems, 2012, Vol. 8(4), pp. 1433-1440
BibTeX@article{Long2012, author = {Min Long and Ting Peng and Fei Peng}, title = {A Source Cell-phone Identification Scheme Based on Canonical Correlation Analysis of Photo Response Non-uniformity}, journal = {Journal of Computational Information Systems}, year = {2012}, volume = {8}, number = {4}, pages = {1433-1440}}
-
RGB digital image forgery detection using Singular Value Decomposition and One Dimensional Cellular Automata
Proc. 8th Int Computing Technology and Information Management (ICCM) Conf
2012, Vol. 1, pp. 483-488
BibTeX@inproceedings{Malakooti2012, author = {Malakooti, Mohammad V. and Pahlavan Tafti, Ahmad and Rohani, Faezeh and Moghaddasifar, Mohammad Amin}, title = {RGB digital image forgery detection using Singular Value Decomposition and One Dimensional Cellular Automata}, booktitle = {Proc. 8th Int Computing Technology and Information Management (ICCM) Conf}, year = {2012}, volume = {1}, pages = {483--488}}
-
Exposing structural tampering in digital images
Proc. IEEE Int Signal Processing, Computing and Control (ISPCC) Conf
2012, pp. 1-6
BibTeX@inproceedings{Mall2012, author = {Mall, V. and Bhatt, K. and Mitra, S. K. and Roy, A. K. }, title = {Exposing structural tampering in digital images}, booktitle = {Proc. IEEE Int Signal Processing, Computing and Control (ISPCC) Conf}, year = {2012}, pages = {1--6}}
-
A Review on Passive Approach for Image Manipulation Detection Techniques for Copy Move Forgery
Journal of Computing Technologies, 2012, Vol. 1(2), pp. -
BibTeX@article{Malviya2012, author = {A.V. Malviya and S.A. Sandlake}, title = {A Review on Passive Approach for Image Manipulation Detection Techniques for Copy Move Forgery}, journal = {Journal of Computing Technologies}, year = {2012}, volume = {1}, number = {2}, pages = {-}}
-
Discriminating multiple JPEG compression using first digit features
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2012
2012, pp. 2253-2256
BibTeX@inproceedings{Milani2012, author = {Milani, Simone and Tagliasacchi, Marco and Tubaro, Stefano}, title = {Discriminating multiple JPEG compression using first digit features}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2012}, year = {2012}, pages = {2253--2256}}
-
Detection of doctored images
International Journal of Current Engineering and Technology
International Journal of Current Engineering and Technology, ACM, 2012
BibTeX@article{Mudenagudi2012, author = {Uma Mudenagudi and Lalitha M. and Ananya U. and Harsh Holalad and Muktanidhi S. D.}, title = {Detection of doctored images}, booktitle = {International Journal of Current Engineering and Technology}, journal = {International Journal of Current Engineering and Technology}, publisher = {ACM}, year = {2012}}
-
Passive copy move image forgery detection using undecimated dyadic wavelet transform
Digital Investigation, 2012(0), pp. -
BibTeX@article{Muhammad2012, author = {Ghulam Muhammad and Muhammad Hussain and George Bebis}, title = {Passive copy move image forgery detection using undecimated dyadic wavelet transform}, journal = {Digital Investigation}, year = {2012}, number = {0}, pages = { - }}
-
Dyadic wavelets and DCT based blind copy-move image forgery detection
Proc. IET Conf. Image Processing (IPR 2012)
2012, pp. 1-6
BibTeX@inproceedings{Muhammad2012a, author = {Muhammad, Ghulam and Hussain, Muhammad and Mirza, Anwar M. and Bebis, George}, title = {Dyadic wavelets and DCT based blind copy-move image forgery detection}, booktitle = {Proc. IET Conf. Image Processing (IPR 2012)}, year = {2012}, pages = {1--6}}
-
Detection of digital photo image forgery
Proc. IEEE Int Advanced Communication Control and Computing Technologies (ICACCCT) Conf
2012, pp. 120-124
BibTeX@inproceedings{Murali2012a, author = {Murali, S. and Anami, B. S. and Chittapur, G. B. }, title = {Detection of digital photo image forgery}, booktitle = {Proc. IEEE Int Advanced Communication Control and Computing Technologies (ICACCCT) Conf}, year = {2012}, pages = {120--124}}
-
Format based photo forgery image detection
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
ACM, 2012, pp. 452-457
BibTeX@inproceedings{Murali2012, author = {Murali, S. and Chittapur, Govindraj B. and Prabhakara, H. S.}, title = {Format based photo forgery image detection}, booktitle = {Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology}, publisher = {ACM}, year = {2012}, pages = {452--457}}
-
Saliency detection as a support for image forensics
Proc. 5th Int Communications Control and Signal Processing (ISCCSP) Symp
2012, pp. 1-5
BibTeX@inproceedings{Muratov2012, author = {Muratov, O. and Duc-Tien Dang-Nguyen and Boato, Giulia and De Natale, F. G. B. }, title = {Saliency detection as a support for image forensics}, booktitle = {Proc. 5th Int Communications Control and Signal Processing (ISCCSP) Symp}, year = {2012}, pages = {1--5}}
-
Robust Resampling Detection in Digital Images
De Decker, B. & Chadwick, D. (ed.)
Communications and Multimedia Security
Springer Berlin / Heidelberg, 2012, Vol. 7394, pp. 3-15
BibTeX@incollection{Nguyen2012b, author = {Nguyen, Hieu and Katzenbeisser, Stefan}, title = {Robust Resampling Detection in Digital Images}, booktitle = {Communications and Multimedia Security}, publisher = {Springer Berlin / Heidelberg}, year = {2012}, volume = {7394}, pages = {3-15}}
-
Performance and Robustness Analysis for Some Re-sampling Detection Techniques in Digital Images
Shi, Y., Kim, H.-J. & Perez-Gonzalez, F. (ed.)
Digital Forensics and Watermarking
Springer Berlin / Heidelberg, 2012, Vol. 7128, pp. 387-397
BibTeX@incollection{Nguyen2012a, author = {Nguyen, Hieu and Katzenbeisser, Stefan}, title = {Performance and Robustness Analysis for Some Re-sampling Detection Techniques in Digital Images}, booktitle = {Digital Forensics and Watermarking}, publisher = {Springer Berlin / Heidelberg}, year = {2012}, volume = {7128}, pages = {387-397}}
-
Detection of Copy-move Forgery in Digital Images Using Radon Transformation and Phase Correlation
Proc. Eighth Int Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) Conf
2012, pp. 134-137
BibTeX@inproceedings{Nguyen2012, author = {Nguyen, Hieu Cuong and Katzenbeisser, Stefan}, title = {Detection of Copy-move Forgery in Digital Images Using Radon Transformation and Phase Correlation}, booktitle = {Proc. Eighth Int Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) Conf}, year = {2012}, pages = {134--137}}
-
Exposing photo manipulation with inconsistent reflections
ACM Trans. Graph., ACM, 2012, Vol. 31(1), pp. 4:1-4:11
BibTeX@article{OBrien2012, author = {O´Brien, James F. and Farid, Hany}, title = {Exposing photo manipulation with inconsistent reflections}, journal = {ACM Trans. Graph.}, publisher = {ACM}, year = {2012}, volume = {31}, number = {1}, pages = {4:1--4:11}}
-
Image manipulation detection using contourlet transform
Proc. 20th Signal Processing and Communications Applications Conf. (SIU)
2012, pp. 1-4
BibTeX@inproceedings{Ozparlak2012, author = {Özparlak, L. and Avcibas, I.}, title = {Image manipulation detection using contourlet transform}, booktitle = {Proc. 20th Signal Processing and Communications Applications Conf. (SIU)}, year = {2012}, pages = {1--4}}
-
Exposing image splicing with inconsistent local noise variances
Proc. IEEE Int Computational Photography (ICCP) Conf
2012, pp. 1-10
BibTeX@inproceedings{Pan2012, author = {Xunyu Pan and Xing Zhang and Siwei Lyu}, title = {Exposing image splicing with inconsistent local noise variances}, booktitle = {Proc. IEEE Int Computational Photography (ICCP) Conf}, year = {2012}, pages = {1--10}}
-
Detecting splicing in digital audios using local noise level estimation
Acoustics, Speech and Signal Processing (ICASSP), 2012 IEEE International Conference on
2012, pp. 1841-1844
BibTeX@inproceedings{Pan2012a, author = {Xunyu Pan and Xing Zhang and Siwei Lyu}, title = {Detecting splicing in digital audios using local noise level estimation}, booktitle = {Acoustics, Speech and Signal Processing (ICASSP), 2012 IEEE International Conference on}, year = {2012}, pages = {1841--1844}}
-
Identification of Natural Images and Computer Generated Graphics Based on Hybrid Features
International Journal of Digital Crime and Forensics (IJDCF), 2012, Vol. 4(1), pp. 1-16
BibTeX@article{Peng2012, author = {Fei Peng and Juan Liu and Min Long}, title = {Identification of Natural Images and Computer Generated Graphics Based on Hybrid Features}, journal = {International Journal of Digital Crime and Forensics (IJDCF)}, year = {2012}, volume = {4}, number = {1}, pages = {1-16}}
-
Spectral methods to determine the exact scaling factor of resampled digital images
Proc. 5th Int Communications Control and Signal Processing (ISCCSP) Symp
2012, pp. 1-6
BibTeX@inproceedings{Pfennig2012, author = {Pfennig, S. and Kirchner, M.}, title = {Spectral methods to determine the exact scaling factor of resampled digital images}, booktitle = {Proc. 5th Int Communications Control and Signal Processing (ISCCSP) Symp}, year = {2012}, pages = {1--6}}
-
A Comparative Analysis on Copy Move Forgery Detection in Spatial Domain Method Using Lexicographic and Non Lexicographic techniques
IJECCE, 2012, Vol. 3(1), pp. -
BibTeX@article{Pujari2012, author = {Vidya S. Pujari and Mandar Sohani}, title = {A Comparative Analysis on Copy Move Forgery Detection in Spatial Domain Method Using Lexicographic and Non Lexicographic techniques}, journal = {IJECCE}, year = {2012}, volume = {3}, number = {1}, pages = {-}}
-
Surrey University Library for Forensic Analysis (SULFA) of video content
Proc. IET Conf. Image Processing (IPR 2012)
2012, pp. 1-6
BibTeX@inproceedings{Qadir2012, author = {Qadir, Ghulam and Yahaya, Syamsul and Ho, Anthony T S}, title = {Surrey University Library for Forensic Analysis (SULFA) of video content}, booktitle = {Proc. IET Conf. Image Processing (IPR 2012)}, year = {2012}, pages = {1--6}}
-
Image Forensics with Rotation-Tolerant Resampling Detection
Proc. IEEE Int Multimedia and Expo Workshops (ICMEW) Conf
2012, pp. 61-66
BibTeX@inproceedings{Qian2012, author = {Qian, Ruohan and Li, Weihai and Yu, Nenghai and Hao, Zhuo}, title = {Image Forensics with Rotation-Tolerant Resampling Detection}, booktitle = {Proc. IEEE Int Multimedia and Expo Workshops (ICMEW) Conf}, year = {2012}, pages = {61--66}}
-
Combating Anti-forensics of Jpeg Compression
IJCSI International Journal of Computer Science Issues, 2012, Vol. 9(3), pp. 454-459
BibTeX@article{Qian2012a, author = {Zhenxing Qian and Xinpeng Zhang}, title = {Combating Anti-forensics of Jpeg Compression}, journal = {IJCSI International Journal of Computer Science Issues}, year = {2012}, volume = {9}, number = {3}, pages = {454--459}}
-
Identifying Shifted Double JPEG Compression Artifacts for Non-intrusive Digital Image Forensics
Hu, S.-M. & Martin, R. (ed.)
Computational Visual Media
Lecture Notes in Computer Science, Springer Berlin Heidelberg, 2012, Vol. 7633, pp. 1-8
BibTeX@incollection{Qu2012, author = {Qu, Zhenhua and Luo, Weiqi and Huang, Jiwu}, title = {Identifying Shifted Double JPEG Compression Artifacts for Non-intrusive Digital Image Forensics}, booktitle = {Computational Visual Media}, journal = {Lecture Notes in Computer Science}, publisher = {Springer Berlin Heidelberg}, year = {2012}, volume = {7633}, pages = {1-8}}
-
Copy-move forgery detection in digital images based on local dimension estimation
Proc. Int Cyber Security, Cyber Warfare and Digital Forensic (CyberSec) Conf
2012, pp. 180-185
BibTeX@inproceedings{Quan2012, author = {Xiaomei Quan and Hongbin Zhang}, title = {Copy-move forgery detection in digital images based on local dimension estimation}, booktitle = {Proc. Int Cyber Security, Cyber Warfare and Digital Forensic (CyberSec) Conf}, year = {2012}, pages = {180--185}}
-
Robust single image noise estimation from approximate local statistics
2012
BibTeX@article{Roodt2012, author = {Roodt, Y. and Clarke, W. and Robinson, P.E. and Nel, A.}, title = {Robust single image noise estimation from approximate local statistics}, year = {2012}}
-
Kamera-Sensorforensik: Erkennungsraten im Kontext von Bildkompression
Heinrich C. Mayr, Alpen-Adria-Universität Klagenfurt, A. (C. D. F. T. U. D. G. U. F. H. f. T. S. U. F. U. D.-E. G. J.-C. F. H.-U. z. B. G. M. G. U. D.-E. G. R. H. U. B. G. M. K. U. d. B. M. G. A. L. U. d. B. M. G. E. W. M. T. U. M. G. S. S. U. S. G. I. T. U. T. K. V. H. B. G. M. W. U. K.-L. G. (ed.)
Lecture Notes in Informatics
Fachhochschule Brandenburg, Fachbereich Informatik und Medien PF 2132, D--14737 Brandenburg, Fachhochschule Brandenburg, Fachbereich Informatik und Medien PF 2132, D--14737 Brandenburg, 2012, Vol. P-194(2012), pp. 117
BibTeX@inproceedings{Rosenfeld, author = {Rosenfeld, M. and Creutzburg, R. and Vielhauer, C.}, title = {Kamera-Sensorforensik: Erkennungsraten im Kontext von Bildkompression}, booktitle = {Lecture Notes in Informatics}, school = {Fachhochschule Brandenburg, Fachbereich Informatik und Medien PF 2132, D--14737 Brandenburg}, year = {2012}, volume = {P-194(2012)}, pages = {117}}
-
Forgery detection in digital images using Self Organizing Map
Proc. Int Devices, Circuits and Systems (ICDCS) Conf
2012, pp. 699-703
BibTeX@inproceedings{Ruth2012, author = {Ruth, R. M. S. and Vanitha, L. and Gnanaraj, F. F. }, title = {Forgery detection in digital images using Self Organizing Map}, booktitle = {Proc. Int Devices, Circuits and Systems (ICDCS) Conf}, year = {2012}, pages = {699--703}}
-
A Novel Method for Detecting Triple JPEG Compression with the Same Quantization Matrix
International Journal of Engineering Trends and Technology, 2012, Vol. 3(2), pp. 94-97
BibTeX@article{Manimurugan2012, author = {S.Manimurugan and Boby Jose}, title = {A Novel Method for Detecting Triple JPEG Compression with the Same Quantization Matrix}, journal = {International Journal of Engineering Trends and Technology}, year = {2012}, volume = {3}, number = {2}, pages = {94-97}}
-
NIH Image to ImageJ: 25 years of image analysis
Nature Methods, Nature Publishing Group, 2012, Vol. 9(7), pp. 671-675
BibTeX@article{Schneider2012, author = {Schneider, C.A. and Rasband, W.S. and Eliceiri, K.W.}, title = {NIH Image to ImageJ: 25 years of image analysis}, journal = {Nature Methods}, publisher = {Nature Publishing Group}, year = {2012}, volume = {9}, number = {7}, pages = {671--675}}
-
Microelectronic Systems: Circuits, Systems and Applications
Heppner, J., Heuberger, A., Kirsch, K., Elst, G. & Hanke, R. (ed.)
Chapter Analysis of Processing Pipelines in Digital Raw Cameras
Springer, 2012, pp. 281
BibTeX@inbook{Schoeberl2012, author = {Michael Schöberl}, title = {Microelectronic Systems: Circuits, Systems and Applications}, publisher = {Springer}, year = {2012}, pages = {281}}
-
Image region duplication detection based on circular window expansion and phase correlation
Forensic Science International, 2012, Vol. 04, pp. -
BibTeX@article{Shao2012, author = {Hong Shao and Tianshu Yu and Mengjia Xu and Wencheng Cui}, title = {Image region duplication detection based on circular window expansion and phase correlation}, journal = {Forensic Science International}, year = {2012}, volume = {04}, pages = {-}}
-
A Countermeasure against Double Compression Based Image Forensic
IEICE TRANSACTIONS on Information and Systems, The Institute of Electronics, Information and Communication Engineers, 2012, Vol. 95(10), pp. 2577-2580
BibTeX@article{Shen2012, author = {Shen, W. and Xiamu, NIU}, title = {A Countermeasure against Double Compression Based Image Forensic}, journal = {IEICE TRANSACTIONS on Information and Systems}, publisher = {The Institute of Electronics, Information and Communication Engineers}, year = {2012}, volume = {95}, number = {10}, pages = {2577--2580}}
-
A new method for detecting JEPG doubly compression images by using estimated primary quantization step
Proc. Int Systems and Informatics (ICSAI) Conf
2012, pp. 1810-1814
BibTeX@inproceedings{Shi2012, author = {FangLing Shi and BaoSheng Kang and HongAn Li and Yu Zhu}, title = {A new method for detecting JEPG doubly compression images by using estimated primary quantization step}, booktitle = {Proc. Int Systems and Informatics (ICSAI) Conf}, year = {2012}, pages = {1810--1814}}
-
Digital Forgery Detection Scheme Incorporating Imaging Device Characteristics Using Wiener Filter
J. (Jong Hyuk) Park, J. J. (J. H., Chao, H.-C., S. Obaidat, M. S. & Kim, J. (ed.)
Computer Science and Convergence
Springer Netherlands, 2012, Vol. 114, pp. 713-721
BibTeX@incollection{Shim2012, author = {Shim, Jae Youn and Kim, Seong-Whan}, title = {Digital Forgery Detection Scheme Incorporating Imaging Device Characteristics Using Wiener Filter}, booktitle = {Computer Science and Convergence}, publisher = {Springer Netherlands}, year = {2012}, volume = {114}, pages = {713-721}}
-
Fast Detection of Copy-Move Forgery Image Using Three Step Search Algorithm in the Spatial Domain
Lee, G., Howard, D., Kang, J. & Slezak, D. (ed.)
Convergence and Hybrid Information Technology
Springer Berlin / Heidelberg, 2012, Vol. 7425, pp. 389-395
BibTeX@incollection{Shin2012, author = {Shin, Yong-Dal}, title = {Fast Detection of Copy-Move Forgery Image Using Three Step Search Algorithm in the Spatial Domain}, booktitle = {Convergence and Hybrid Information Technology}, publisher = {Springer Berlin / Heidelberg}, year = {2012}, volume = {7425}, pages = {389-395}}
-
Primary Quality Factor Estimation in Double Compressed JPEG Images Using Quantization Error
Zhang, W., Yang, X., Xu, Z., An, P., Liu, Q. & Lu, Y. (ed.)
Advances on Digital Television and Wireless Multimedia Communications
Springer Berlin Heidelberg, 2012, Vol. 331, pp. 133-139
BibTeX@incollection{Shuang2012, author = {Shuang, Yang and Zhen, Fang}, title = {Primary Quality Factor Estimation in Double Compressed JPEG Images Using Quantization Error}, booktitle = {Advances on Digital Television and Wireless Multimedia Communications}, publisher = {Springer Berlin Heidelberg}, year = {2012}, volume = {331}, pages = {133-139}}
-
A High Performance Copy-Move Image Forgery Detection Scheme on GPU
Deep, K., Nagar, A., Pant, M. & Bansal, J. C. (ed.)
Proceedings of the International Conference on Soft Computing for Problem Solving (SocProS 2011) December 20-22, 2011
Springer Berlin / Heidelberg, 2012, Vol. 131, pp. 239-246
BibTeX@incollection{Singh2012, author = {Singh, Jaideep and Raman, Balasubramanian}, title = {A High Performance Copy-Move Image Forgery Detection Scheme on GPU}, booktitle = {Proceedings of the International Conference on Soft Computing for Problem Solving (SocProS 2011) December 20-22, 2011}, publisher = {Springer Berlin / Heidelberg}, year = {2012}, volume = {131}, pages = {239-246}}
-
Copy -- Move Image Forgery Detection an a Parallel Environment
Computer Science & Information Technology, 2012, Vol. 2, pp. 19-29
BibTeX@article{Sridevi2012a, author = {M. Sridevi and C. Mala and S. Sandeep}, title = {Copy -- Move Image Forgery Detection an a Parallel Environment}, journal = {Computer Science & Information Technology}, year = {2012}, volume = {2}, pages = {19-29}}
-
Comparative Study of Image Forgery and Copy-Move Techniques
Wyld, D. C., Zizka, J. & Nagamalai, D. (ed.)
Advances in Computer Science, Engineering & Applications
Springer Berlin / Heidelberg, 2012, Vol. 166, pp. 715-723
BibTeX@incollection{Sridevi2012, author = {Sridevi, M. and Mala, C. and Sanyam, Siddhant}, title = {Comparative Study of Image Forgery and Copy-Move Techniques}, booktitle = {Advances in Computer Science, Engineering & Applications}, publisher = {Springer Berlin / Heidelberg}, year = {2012}, volume = {166}, pages = {715-723}}
-
Temporal Forensics and Anti-Forensics for Motion Compensated Video
IEEE Transactions on Information Forensics and Security, 2012, Vol. 7(4), pp. 1315-1329
BibTeX@article{Stamm2012, author = {Stamm, M. C. and Lin, W. S. and Liu, K. J. R. }, title = {Temporal Forensics and Anti-Forensics for Motion Compensated Video}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2012}, volume = {7}, number = {4}, pages = {1315--1329}}
-
Forensics vs. anti-forensics: A decision and game theoretic framework
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2012
2012, pp. 1749-1752
BibTeX@inproceedings{Stamm2012a, author = {Stamm, Matthew C. and Lin, W. Sabrina and Liu, K. J. Ray}, title = {Forensics vs. anti-forensics: A decision and game theoretic framework}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2012}, year = {2012}, pages = {1749--1752}}
-
Exposing video forgeries by detecting MPEG double compression
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2012
2012, pp. 1389-1392
BibTeX@inproceedings{Sun2012, author = {Tanfeng Sun and Wan Wang and Xinghao Jiang}, title = {Exposing video forgeries by detecting MPEG double compression}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2012}, year = {2012}, pages = {1389--1392}}
-
Image Statistical Frameworks For Digital Image Forensics
New Jersey Institute of Technology - Department of Electrical and Computer Engineering, New Jersey Institute of Technology - Department of Electrical and Computer Engineering, 2012
BibTeX@phdthesis{Sutthiwan2012a, author = {Patchara Sutthiwan}, title = {Image Statistical Frameworks For Digital Image Forensics}, school = {New Jersey Institute of Technology - Department of Electrical and Computer Engineering}, year = {2012}}
-
Anti-Forensics of Double JPEG Compression Detection
Shi, Y., Kim, H.-J. & Perez-Gonzalez, F. (ed.)
Digital Forensics and Watermarking
Springer Berlin / Heidelberg, 2012, Vol. 7128, pp. 411-424
BibTeX@incollection{Sutthiwan2012, author = {Sutthiwan, Patchara and Shi, Yun}, title = {Anti-Forensics of Double JPEG Compression Detection}, booktitle = {Digital Forensics and Watermarking}, publisher = {Springer Berlin / Heidelberg}, year = {2012}, volume = {7128}, pages = {411-424}}
-
The Era of Interactive Media
Xu, M. & Jin, J. S. (ed.)
Chapter Digital Image Forensics: A Two-Step Approach for Identifying Source and Detecting Forgeries
The Era of Interactive Media, Springer, 2012, pp. 37
BibTeX@inbook{Taktak2012, author = {Taktak, Wiem and Dugelay, Jean-Luc}, title = {The Era of Interactive Media}, journal = {The Era of Interactive Media}, publisher = {Springer}, year = {2012}, pages = {37}}
-
Analysis Of Different Techniques Of Image Forgery Detection
International Journal of Computer Applications (IJCA), 2012, Vol. 7-8, pp. 13-18
BibTeX@article{Talmale2012, author = {G.R. Talmale and R.W. Jasutkar}, title = {Analysis Of Different Techniques Of Image Forgery Detection}, journal = {International Journal of Computer Applications (IJCA)}, year = {2012}, volume = {7-8}, pages = {13-18}}
-
Dual-Transform Based Noise Estimation
Proc. IEEE Int Multimedia and Expo (ICME) Conf
2012, pp. 991-996
BibTeX@inproceedings{Tang2012, author = {Chongwu Tang and Xiaokang Yang and Guangtao Zhai}, title = {Dual-Transform Based Noise Estimation}, booktitle = {Proc. IEEE Int Multimedia and Expo (ICME) Conf}, year = {2012}, pages = {991--996}}
-
Camera Model Identification Based on Hypothesis Testing Theory
Poc. of the 20th European Signal Processing Conference (EUSIPCO 2012)
2012, pp. 1234-1238
BibTeX@inproceedings{Thai2012, author = {T. H. Thai and R. Cogranne and F. Retraint}, title = {Camera Model Identification Based on Hypothesis Testing Theory}, booktitle = {Poc. of the 20th European Signal Processing Conference (EUSIPCO 2012)}, year = {2012}, pages = {1234-1238}}
-
An Improved Double Compression Detection Method for JPEG Image Forensics
Proc. IEEE Int Multimedia (ISM) Symp
2012, pp. 290-297
BibTeX@inproceedings{Thing2012, author = {Thing, Vrizlynn L. L. and Chen, Yu and Cheh, Carmen}, title = {An Improved Double Compression Detection Method for JPEG Image Forensics}, booktitle = {Proc. IEEE Int Multimedia (ISM) Symp}, year = {2012}, pages = {290--297}}
-
Image Noise Estimation Using A Variation-Adaptive Evolutionary Approach
IEEE Signal Processing Letters, 2012, Vol. 19(7), pp. 395-398
BibTeX@article{Tian2012, author = {Tian, J. and Chen, L. }, title = {Image Noise Estimation Using A Variation-Adaptive Evolutionary Approach}, journal = {IEEE Signal Processing Letters}, year = {2012}, volume = {19}, number = {7}, pages = {395--398}}
-
JPEG image tampering detection using blocking artifacts
Proc. 19th Int Systems, Signals and Image Processing (IWSSIP) Conf
2012, pp. 5-8
BibTeX@inproceedings{Tralic2012, author = {Tralic, Dijana and Petrovic, Juraj and Grgic, Sonja}, title = {JPEG image tampering detection using blocking artifacts}, booktitle = {Proc. 19th Int Systems, Signals and Image Processing (IWSSIP) Conf}, year = {2012}, pages = {5--8}}
-
Using decision fusion of feature selection in digital forensics for camera source model identification
Comput. Stand. Interfaces, Elsevier Science Publishers B. V., 2012, Vol. 34(3), pp. 292-304
BibTeX@article{Tsai2012, author = {Tsai, Min-Jen and Wang, Chen-Sheng and Liu, Jung and Yin, Jin-Sheng}, title = {Using decision fusion of feature selection in digital forensics for camera source model identification}, journal = {Comput. Stand. Interfaces}, publisher = {Elsevier Science Publishers B. V.}, year = {2012}, volume = {34}, number = {3}, pages = {292--304}}
-
Iris-sensor authentication using camera PRNU fingerprints
Proc. 5th IAPR Int Biometrics (ICB) Conf
2012, pp. 230-237
BibTeX@inproceedings{Uhl2012, author = {Uhl, A. and Holler, Y. }, title = {Iris-sensor authentication using camera PRNU fingerprints}, booktitle = {Proc. 5th IAPR Int Biometrics (ICB) Conf}, year = {2012}, pages = {230--237}}
-
Exploring Duplicated Regions in Natural Images
IJCA Proceedings on International Conference in Computational Intelligence (ICCIA2012), 2012, Vol. iccia(3), pp. -
BibTeX@article{V.Hulmukhe2012, author = {Kavita V.Hulmukhe and S.S.Sane and Alpana A. Borse}, title = {Exploring Duplicated Regions in Natural Images}, journal = {IJCA Proceedings on International Conference in Computational Intelligence (ICCIA2012)}, year = {2012}, volume = {iccia}, number = {3}, pages = {-}}
-
Pascal transform based self-authentication of color images
Proc. 19th Int Systems, Signals and Image Processing (IWSSIP) Conf
2012, pp. 168-171
BibTeX@inproceedings{Varsaki2012, author = {Varsaki, E. E. and Fotopoulos, V. and Skodras, A. N. }, title = {Pascal transform based self-authentication of color images}, booktitle = {Proc. 19th Int Systems, Signals and Image Processing (IWSSIP) Conf}, year = {2012}, pages = {168--171}}
-
Detection of video double encoding with GOP size estimation
Information Forensics and Security (WIFS), 2012 IEEE International Workshop on
2012, pp. 151-156
BibTeX@inproceedings{Vazquez-Padin2012a, author = {Vazquez-Padin, D. and Fontani, M. and Bianchi, T. and Comesana, P. and Piva, A. and Barni, M.}, title = {Detection of video double encoding with GOP size estimation}, booktitle = {Information Forensics and Security (WIFS), 2012 IEEE International Workshop on}, year = {2012}, pages = {151--156}}
-
Exposing Original and Duplicated Regions Using SIFT Features and Resampling Traces
Shi, Y., Kim, H.-J. & Perez-Gonzalez, F. (ed.)
Digital Forensics and Watermarking
Lecture Notes in Computer Science, Springer Berlin / Heidelberg, 2012, Vol. 7128, pp. 306-320
BibTeX@incollection{Vazquez-Padin2012, author = {Vázquez-Padín, David and Pérez-González, Fernando}, title = {Exposing Original and Duplicated Regions Using SIFT Features and Resampling Traces}, booktitle = {Digital Forensics and Watermarking}, journal = {Lecture Notes in Computer Science}, publisher = {Springer Berlin / Heidelberg}, year = {2012}, volume = {7128}, pages = {306-320}}
-
The Metadata Anonymization Toolkit
arXiv preprint arXiv:1212.3648, 2012
BibTeX@article{Voisin2012, author = {Voisin, Julien and Guyeux, Christophe and Bahi, Jacques M}, title = {The Metadata Anonymization Toolkit}, journal = {arXiv preprint arXiv:1212.3648}, year = {2012}}
-
Inter-Camera Model Image Source Identification with Conditional Probability Features
Proc. of the 3rd IIEEJ Image Electronics and Visual Computing Workshop 2012
2012
BibTeX@inproceedings{Wahab2012, author = {Ainuddin Wahid Abdul Wahab and Anthony T.S. Ho and Shujun Li}, title = {Inter-Camera Model Image Source Identification with Conditional Probability Features}, booktitle = {Proc. of the 3rd IIEEJ Image Electronics and Visual Computing Workshop 2012}, year = {2012}}
-
Image Splicing Localization Based on Re-demosaicing
Zeng, D. (ed.)
Advances in Information Technology and Industry Applications
Springer Berlin Heidelberg, 2012, Vol. 136, pp. 725-732
BibTeX@incollection{Wang2012, author = {Wang, Bo and Kong, Xiangwei}, title = {Image Splicing Localization Based on Re-demosaicing}, booktitle = {Advances in Information Technology and Industry Applications}, publisher = {Springer Berlin Heidelberg}, year = {2012}, volume = {136}, pages = {725-732}}
-
Hiding traces of double compression in JPEG images based on Tabu Search
Neural Computing & Applications, Springer London, 2012, Vol. -, pp. 1-9
BibTeX@article{Wang2012a, author = {Wang, Shen and Niu, Xiamu}, title = {Hiding traces of double compression in JPEG images based on Tabu Search}, journal = {Neural Computing & Applications}, publisher = {Springer London}, year = {2012}, volume = {-}, pages = {1-9}}
-
Blind Detection of Copy-Move Forgery Based on Multi-Scale Autoconvolution Invariants
Liu, C.-L., Zhang, C. & Wang, L. (ed.)
Pattern Recognition
Springer Berlin Heidelberg, 2012, Vol. 321, pp. 438-446
BibTeX@incollection{Wang2012c, author = {Wang, Tao and Tang, Jin and Zhao, Wei and Xu, Qin and Luo, Bin}, title = {Blind Detection of Copy-Move Forgery Based on Multi-Scale Autoconvolution Invariants}, booktitle = {Pattern Recognition}, publisher = {Springer Berlin Heidelberg}, year = {2012}, volume = {321}, pages = {438-446}}
-
Image forensic signature for content authenticity analysis
Journal of Visual Communication and Image Representation, 2012, Vol. 23(5), pp. 782 - 797
BibTeX@article{Wang2012d, author = {Xiaofeng Wang and Jianru Xue and Zhenqiang Zheng and Zhenli Liu and Ning Li}, title = {Image forensic signature for content authenticity analysis}, journal = {Journal of Visual Communication and Image Representation}, year = {2012}, volume = {23}, number = {5}, pages = {782 - 797}}
-
Wavelet Based Region Duplication Forgery Detection
Proc. Ninth Int Information Technology: New Generations (ITNG) Conf
2012, pp. 30-35
BibTeX@inproceedings{Wang2012b, author = {Wang, Yang and Gurule, Kaitlyn and Wise, Jacqueline and Zheng, Jun}, title = {Wavelet Based Region Duplication Forgery Detection}, booktitle = {Proc. Ninth Int Information Technology: New Generations (ITNG) Conf}, year = {2012}, pages = {30--35}}
-
Article: Blind Method for Image Forgery Detection: A tool for Digital Image Forensics
IJCA Proceedings on National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2012), 2012, Vol. ncipet(11), pp. 37-40
BibTeX@article{Warbhe2012, author = {Anil Dada Warbhe and R. V. Dharaskar}, title = {Article: Blind Method for Image Forgery Detection: A tool for Digital Image Forensics}, journal = {IJCA Proceedings on National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2012)}, year = {2012}, volume = {ncipet}, number = {11}, pages = {37-40}}
-
An Image Forensics Algorithm for Blur Detection Based on Properties of Sharp Edge Points
Advanced Materials Research, 2012, Vol. Volumes 341 - 342 Material and Manufacturing Technology II, pp. 743-747
BibTeX@article{Wei2012, author = {Li Xian Wei and Jun Jie Zhu and Xiao Yuan Yang}, title = {An Image Forensics Algorithm for Blur Detection Based on Properties of Sharp Edge Points}, journal = {Advanced Materials Research}, year = {2012}, volume = {Volumes 341 - 342 Material and Manufacturing Technology II}, pages = {743-747}}
-
The Analysis and Detection of Double JPEG2000 Compression Based on Statistical Characterization of DWT Coefficients
Energy Procedia, 2012, Vol. 17, Part A(0), pp. 623 - 629
BibTeX@article{Wei2012a, author = {Wang Wei and WANG Rang-ding}, title = {The Analysis and Detection of Double JPEG2000 Compression Based on Statistical Characterization of DWT Coefficients}, journal = {Energy Procedia}, year = {2012}, volume = {17, Part A}, number = {0}, pages = {623 - 629}}
-
A Context Adaptive Predictor of Sensor Pattern Noise for Camera Source Identification
School of Information Science and Technology, School of Information Science and Technology, 2012
BibTeX@techreport{Wu2012a, author = {Guangdong Wu and , Xiangui Kang and and K. J. Ray Liu}, title = {A Context Adaptive Predictor of Sensor Pattern Noise for Camera Source Identification}, school = {School of Information Science and Technology}, year = {2012}}
-
Detecting image forgeries using metrology
Machine Vision and Applications, Springer Berlin / Heidelberg, 2012, Vol. 23, pp. 363-373
BibTeX@article{Wu2012, author = {Wu, Lin and Cao, Xiaochun and Zhang, Wei and Wang, Yang}, title = {Detecting image forgeries using metrology}, journal = {Machine Vision and Applications}, publisher = {Springer Berlin / Heidelberg}, year = {2012}, volume = {23}, pages = {363-373}}
-
Detecting image forgeries using geometric cues
arXiv, Springer Berlin / Heidelberg, 2012
BibTeX@article{Wu2012b, author = {Wu, Lin Wang, Yang}, title = {Detecting image forgeries using geometric cues}, journal = {arXiv}, publisher = {Springer Berlin / Heidelberg}, year = {2012}}
-
A Fast Image Copy-Move Forgery Detection Method Using Phase Correlation
Proc. Fourth Int Multimedia Information Networking and Security (MINES) Conf
2012, pp. 319-322
BibTeX@inproceedings{Xu2012a, author = {Xu, Bo and Liu, Guangjie and Dai, Yuewei}, title = {A Fast Image Copy-Move Forgery Detection Method Using Phase Correlation}, booktitle = {Proc. Fourth Int Multimedia Information Networking and Security (MINES) Conf}, year = {2012}, pages = {319--322}}
-
Camera Model Identification Using Local Binary Patterns
Proc. IEEE Int Multimedia and Expo (ICME) Conf
2012, pp. 392-397
BibTeX@inproceedings{Xu2012, author = {Guanshuo Xu and Yun Qing Shi}, title = {Camera Model Identification Using Local Binary Patterns}, booktitle = {Proc. IEEE Int Multimedia and Expo (ICME) Conf}, year = {2012}, pages = {392--397}}
-
Detection of Blue Screen Special Effects in Videos
Physics Procedia, 2012, Vol. 33(0), pp. 1316 - 1322
BibTeX@article{Xu2012b, author = {Junyu Xu and Yanru Yu and Yuting Su and Bo Dong and Xingang You}, title = {Detection of Blue Screen Special Effects in Videos}, journal = {Physics Procedia}, year = {2012}, volume = {33}, number = {0}, pages = {1316 - 1322}}
-
Detection of Copy-Move Forgery of Images Using Discrete Wavelet Transform
International Journal on Computer Science and Engineering (IJCSE), 2012, Vol. 4, pp. 265-270
BibTeX@article{Yadav2012, author = {Preeti Yadav and Yogesh Rathore}, title = {Detection of Copy-Move Forgery of Images Using Discrete Wavelet Transform}, journal = {International Journal on Computer Science and Engineering (IJCSE)}, year = {2012}, volume = {4}, pages = {265-270}}
-
DWT Based Copy-Move Image Forgery Detection
International Journal of Advanced Research in Computer Science and Electroic Engineering, 2012, Vol. 1(5)
BibTeX@article{Yadav2012a, author = {Preeti Yadav and Yogesh Rathore and Aarti Yadu}, title = {DWT Based Copy-Move Image Forgery Detection}, journal = {International Journal of Advanced Research in Computer Science and Electroic Engineering}, year = {2012}, volume = {1}, number = {5}}
-
Advanced video camera identification using Conditional Probability Features
Proc. IET Conf. Image Processing (IPR 2012)
2012, pp. 1-5
BibTeX@inproceedings{Yahaya2012, author = {Yahaya, Syamsul and Ho, Anthony T S and Wahab, Ainuddin Abdul}, title = {Advanced video camera identification using Conditional Probability Features}, booktitle = {Proc. IET Conf. Image Processing (IPR 2012)}, year = {2012}, pages = {1--5}}
-
An Anti-JPEG Compression Digital Watermarking Technology with an Ability in Detecting Forgery Region for Color Images
Proc. Int Computer Distributed Control and Intelligent Environmental Monitoring (CDCIEM) Conf
2012, pp. 93-97
BibTeX@inproceedings{Yang2012, author = {Zheng-Chao Yang and Zhao-Hong Li}, title = {An Anti-JPEG Compression Digital Watermarking Technology with an Ability in Detecting Forgery Region for Color Images}, booktitle = {Proc. Int Computer Distributed Control and Intelligent Environmental Monitoring (CDCIEM) Conf}, year = {2012}, pages = {93--97}}
-
Detecting Image Forgery Using Perspective Constraints
IEEE Signal Processing Letters, 2012, Vol. 19(3), pp. 123-126
BibTeX@article{Yao2012, author = {Yao, H. and Wang, S. and Zhao, Y. and Zhang, X.}, title = {Detecting Image Forgery Using Perspective Constraints}, journal = {IEEE Signal Processing Letters}, year = {2012}, volume = {19}, number = {3}, pages = {123--126}}
-
Measure and redress of mode field diameter of polarization maintaining photonic crystal fibers
Instrumentation and Control Technology (ISICT), 2012 8th IEEE International Symposium on
2012, pp. 101-104
BibTeX@inproceedings{Ye2012, author = {Miao Ye and Yuanhong Yang and Weiqian Duan and Mingwei Yang}, title = {Measure and redress of mode field diameter of polarization maintaining photonic crystal fibers}, booktitle = {Instrumentation and Control Technology (ISICT), 2012 8th IEEE International Symposium on}, year = {2012}, pages = {101--104}}
-
Robust Evidence Detection of Copy-Rotate-Move Forgery in Image Based on Singular Value Decomposition
Chim, T. & Yuen, T. (ed.)
Information and Communications Security
Springer Berlin Heidelberg, 2012, Vol. 7618, pp. 357-364
BibTeX@incollection{Yong2012, author = {Yong, Liu and Meishan, Huang and Bogang, Lin}, title = {Robust Evidence Detection of Copy-Rotate-Move Forgery in Image Based on Singular Value Decomposition}, booktitle = {Information and Communications Security}, publisher = {Springer Berlin Heidelberg}, year = {2012}, volume = {7618}, pages = {357-364}}
-
Automated Image Forgery Detection through Classification of JPEG Ghosts
Pinz, A., Pock, T., Bischof, H. & Leberl, F. (ed.)
Pattern Recognition
Springer Berlin / Heidelberg, 2012, Vol. 7476, pp. 185-194
BibTeX@incollection{Zach2012, author = {Zach, Fabian and Riess, Christian and Angelopoulou, Elli}, title = {Automated Image Forgery Detection through Classification of JPEG Ghosts}, booktitle = {Pattern Recognition}, publisher = {Springer Berlin / Heidelberg}, year = {2012}, volume = {7476}, pages = {185-194}}
-
The Utility of Inconsistency in Information Security and Digital Forensics
Özyer, T., Kianmehr, K. & Tan, M. (ed.)
Recent Trends in Information Reuse and Integration
Springer Vienna, 2012, Vol. -, pp. 381-397
BibTeX@incollection{Zhang2012, author = {Zhang, Du}, title = {The Utility of Inconsistency in Information Security and Digital Forensics}, booktitle = {Recent Trends in Information Reuse and Integration}, publisher = {Springer Vienna}, year = {2012}, volume = {-}, pages = {381-397}}
-
Revealing Image Splicing Forgery Using Local Binary Patterns of DCT Coefficients
Liang, Q., Wang, W., Mu, J., Liang, J., Zhang, B., Pi, Y. & Zhao, C. (ed.)
Communications, Signal Processing, and Systems
Springer New York, 2012, Vol. 202, pp. 181-189
BibTeX@incollection{Zhang2012a, author = {Zhang, Yujin and Zhao, Chenglin and Pi, Yiming and Li, Shenghong}, title = {Revealing Image Splicing Forgery Using Local Binary Patterns of DCT Coefficients}, booktitle = {Communications, Signal Processing, and Systems}, publisher = {Springer New York}, year = {2012}, volume = {202}, pages = {181-189}}
-
A Comprehensive Study on Third Order Statistical Features for Image Splicing Detection
Shi, Y., Kim, H.-J. & Perez-Gonzalez, F. (ed.)
Digital Forensics and Watermarking
Springer Berlin / Heidelberg, 2012, Vol. 7128, pp. 243-256
BibTeX@incollection{Zhao2012, author = {Zhao, Xudong and Wang, Shilin and Li, Shenghong and Li, Jianhua}, title = {A Comprehensive Study on Third Order Statistical Features for Image Splicing Detection}, booktitle = {Digital Forensics and Watermarking}, publisher = {Springer Berlin / Heidelberg}, year = {2012}, volume = {7128}, pages = {243-256}}
-
A New Algorithm to Exposing Image Forgeries by Detecting Ambient Illumination Consistency
Zhang, C. S. (ed.)
Materials Science and Information Technology
2012, pp. 5463-5468
BibTeX@inproceedings{Zhong2012, author = {Wei Dong Zhong and Jun Jie Zhu and Li Xian Wei and Xiao Yuan Yang}, title = {A New Algorithm to Exposing Image Forgeries by Detecting Ambient Illumination Consistency}, booktitle = {Materials Science and Information Technology}, year = {2012}, pages = {5463-5468}}
-
Blind Copy-Paste Detection Using Improved SIFT Ring Descriptor
Shi, Y., Kim, H.-J. & Perez-Gonzalez, F. (ed.)
Digital Forensics and Watermarking
Springer Berlin / Heidelberg, 2012, Vol. 7128, pp. 257-267
BibTeX@incollection{Zhou2012, author = {Zhou, Lin-na and Guo, Yun-biao and You, Xin-gang}, title = {Blind Copy-Paste Detection Using Improved SIFT Ring Descriptor}, booktitle = {Digital Forensics and Watermarking}, publisher = {Springer Berlin / Heidelberg}, year = {2012}, volume = {7128}, pages = {257-267}}
-
Digital Image Identification Based on Asymmetrical Distribution
Journal of Information & Computational Science, 2012, Vol. 9(5), pp. 1337-1342
BibTeX@article{Zhou2012a, author = {Zhou, Z. and Zhou, C.}, title = {Digital Image Identification Based on Asymmetrical Distribution}, journal = {Journal of Information & Computational Science}, year = {2012}, volume = {9}, number = {5}, pages = {1337--1342}}
-
Image Detection Based-on the Analysis of Interpolating Signal Periodicity
Advanced Materials Research, 2012, Vol. 403-408, pp. 1297-1301
BibTeX@article{Zhu2012, author = {Jue Yu Zhu and Meng Yuan Chen and Feng Li}, title = {Image Detection Based-on the Analysis of Interpolating Signal Periodicity}, journal = {Advanced Materials Research}, year = {2012}, volume = {403-408}, pages = {1297-1301}}
2011
-
Numerical Analysis - Theory and Application
Awrejcewicz, J. (ed.)
Chapter Methods for Blind Estimation of the Variance of Mixed Noise and Their Performance Analysis
InTech, 2011, pp. 49-70
BibTeX@inbook{Abramov2011, author = {Sergey Abramov and Victoria Zabrodina and Vladimir Lukin and Benoit Vozel and Kacem Chehdi and Jaakko Astola}, title = {Numerical Analysis - Theory and Application}, publisher = {InTech}, year = {2011}, pages = {49-70}}
-
An image forensics tool for copy-move detection and localization
Irene Amerini, Lamberto Ballan, Roberto Caldelli, Alberto Del Bimbo, Luca Del Tongo, Giuseppe Serra, 2011
BibTeX@techreport{Amerini2011a, author = {Irene Amerini and Lamberto Ballan and Roberto Caldelli and Alberto Del Bimbo and Luca Del Tongo and Giuseppe Serra}, title = {An image forensics tool for copy-move detection and localization}, year = {2011}}
-
A SIFT-based forensic method for copy-move attack detection and transformation recovery
IEEE Transactions on Information Forensics and Security, 2011, Vol. 6(3), pp. 1099 - 1110
BibTeX@article{Amerini2011, author = {Amerini, I. and Ballan, L. and Caldelli, R. and Del Bimbo, A. and Serra, G.}, title = {A SIFT-based forensic method for copy-move attack detection and transformation recovery}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2011}, volume = {6}, number = {3}, pages = {1099 - 1110}}
-
Detection of doctored images using bispectral analysis
Proc. Int Image Information Processing (ICIIP) Conf
2011, pp. 1-6
BibTeX@inproceedings{Ananya2011, author = {Ananya, U. and Mudenagudi, U.}, title = {Detection of doctored images using bispectral analysis}, booktitle = {Proc. Int Image Information Processing (ICIIP) Conf}, year = {2011}, pages = {1--6}}
-
Digital Image Analysis: Analytical Framework For Authenticating Digital Images
University of Colorado Denver, 2011
BibTeX@mastersthesis{Anderson2011, author = {Anderson, Scott Dale}, title = {Digital Image Analysis: Analytical Framework For Authenticating Digital Images}, school = {University of Colorado Denver}, year = {2011}}
-
Robust Image Registration and Tampering Localization Exploiting Bag of Features Based Forensic Signature
Proceedings of the 19th ACM international conference on Multimedia
ACM, 2011, pp. 1245-1248
BibTeX@inproceedings{Battiato2011, author = {Sebastiano Battiato and Giovanni Maria Farinella and Enrico Messina and Giovanni Puglisi}, title = {Robust Image Registration and Tampering Localization Exploiting Bag of Features Based Forensic Signature}, booktitle = {Proceedings of the 19th ACM international conference on Multimedia}, publisher = {ACM}, year = {2011}, pages = {1245--1248}}
-
A Forensic Signature Based on Spatial Distributed Bag of Features for Image Alignment and Tampering Detection
Proceedings of the 3rd international ACM workshop on Multimedia in forensics and intelligence
ACM, 2011, pp. 19-24
BibTeX@inproceedings{Battiato2011a, author = {Sebastiano Battiato and Giovanni Maria Farinella and Enrico Messina and Giovanni Puglisi}, title = {A Forensic Signature Based on Spatial Distributed Bag of Features for Image Alignment and Tampering Detection}, booktitle = {Proceedings of the 3rd international ACM workshop on Multimedia in forensics and intelligence}, publisher = {ACM}, year = {2011}, pages = {19--24}}
-
Understanding geometric manipulations of images through bovw-based hashing
Proc. IEEE Int Multimedia and Expo (ICME) Conf
2011, pp. 1-6
BibTeX@inproceedings{Battiato2011b, author = {Battiato, S. and Farinella, G. M. and Messina, E. and Puglisi, G. }, title = {Understanding geometric manipulations of images through bovw-based hashing}, booktitle = {Proc. IEEE Int Multimedia and Expo (ICME) Conf}, year = {2011}, pages = {1--6}}
-
Improved DCT coefficient analysis for forgery localization in JPEG images
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2011
2011, pp. 2444-2447
BibTeX@inproceedings{Bianchi2011, author = {Bianchi, Tiziano and De Rosa, Alessia and Piva, Alessandro}, title = {Improved DCT coefficient analysis for forgery localization in JPEG images}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2011}, year = {2011}, pages = {2444--2447}}
-
Detection of Non-Aligned Double JPEG Compression Based on Integer Periodicity Maps
IEEE Transactions on Information Forensics and Security, 2011, Vol. PP(99), pp. 1
BibTeX@article{Bianchi2011a, author = {Bianchi, Tiziano and Piva, Alessandro}, title = {Detection of Non-Aligned Double JPEG Compression Based on Integer Periodicity Maps}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2011}, volume = {PP}, number = {99}, pages = {1}}
-
Analysis of non-aligned double JPEG artifacts for the localization of image forgeries
Proc. IEEE Int Information Forensics and Security (WIFS) Workshop
2011, pp. 1-6
BibTeX@inproceedings{Bianchi2011b, author = {Bianchi, Tiziano and Piva, Alessandro }, title = {Analysis of non-aligned double JPEG artifacts for the localization of image forgeries}, booktitle = {Proc. IEEE Int Information Forensics and Security (WIFS) Workshop}, year = {2011}, pages = {1--6}}
-
Detection of non-aligned double JPEG compression with estimation of primary compression parameters
Proc. 18th IEEE Int Image Processing (ICIP) Conf
2011, pp. 1929-1932
BibTeX@inproceedings{Bianchi2011d, author = {Bianchi, Tiziano and Piva, Alessandro }, title = {Detection of non-aligned double JPEG compression with estimation of primary compression parameters}, booktitle = {Proc. 18th IEEE Int Image Processing (ICIP) Conf}, year = {2011}, pages = {1929--1932}}
-
Uniform Motion Blur in Poissonian Noise: Blur/Noise Tradeoff
IEEE Transactions on Image Processing, 2011, Vol. 20(2), pp. 592-598
BibTeX@article{Boracchi2011, author = {Boracchi, G. and Foi, A.}, title = {Uniform Motion Blur in Poissonian Noise: Blur/Noise Tradeoff}, journal = {IEEE Transactions on Image Processing}, year = {2011}, volume = {20}, number = {2}, pages = {592--598}}
-
Exposing duplicated regions affected by reflection, rotation and scaling
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2011
2011, pp. 1880-1883
BibTeX@inproceedings{Bravo-Solorio2011, author = {Bravo-Solorio, Sergio and Nandi, Asoke K.}, title = {Exposing duplicated regions affected by reflection, rotation and scaling}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2011}, year = {2011}, pages = {1880--1883}}
-
Automated detection and localisation of duplicated regions affected by reflection, rotation and scaling in image forensics
Signal Processing, 2011, Vol. 91(8), pp. 1759 - 1770
BibTeX@article{Bravo-Solorio2011a, author = {Sergio Bravo-Solorio and Asoke K. Nandi}, title = {Automated detection and localisation of duplicated regions affected by reflection, rotation and scaling in image forensics}, journal = {Signal Processing}, year = {2011}, volume = {91}, number = {8}, pages = {1759 - 1770}}
-
Crop Detection Through Blocking Artefacts Analysis
Proc. of the 16th International Conference on Image Analysis and Processing ICIAP 2011
2011
BibTeX@inproceedings{Bruna2011, author = {Bruna, A.R., Messina, G., Battiato, S.}, title = {Crop Detection Through Blocking Artefacts Analysis}, booktitle = {Proc. of the 16th International Conference on Image Analysis and Processing ICIAP 2011}, year = {2011}}
-
Blind Image Tampering Identification Based on Histogram Features
Proc. Third Int Multimedia Information Networking and Security (MINES) Conf
2011, pp. 300-303
BibTeX@inproceedings{Cai2011, author = {Kaiwei Cai and Xiaoqing Lu and Jianguo Song and Xiao Wang}, title = {Blind Image Tampering Identification Based on Histogram Features}, booktitle = {Proc. Third Int Multimedia Information Networking and Security (MINES) Conf}, year = {2011}, pages = {300--303}}
-
Forensic identification of resampling operators: A semi non-intrusive approach
Forensic Science International, 2011, Vol. -(0), pp. -
BibTeX@article{Cao2011b, author = {Gang Cao and Yao Zhao and Rongrong Ni}, title = {Forensic identification of resampling operators: A semi non-intrusive approach}, journal = {Forensic Science International}, year = {2011}, volume = {-}, number = {0}, pages = { - }}
-
Unsharp Masking Sharpening Detection via Overshoot Artifacts Analysis
IEEE Signal Processing Letters, 2011, Vol. 18(10), pp. 603-606
BibTeX@article{Cao2011d, author = {G. Cao and Y. Zhao and R. Ni and AC Kot}, title = {Unsharp Masking Sharpening Detection via Overshoot Artifacts Analysis}, journal = {IEEE Signal Processing Letters}, year = {2011}, volume = {18}, number = {10}, pages = {603--606}}
-
Detection of Tampering Inconsistencies on Mobile Photos
Kim, H.-J., Shi, Y. & Barni, M. (ed.)
Digital Watermarking
Springer Berlin / Heidelberg, 2011, Vol. 6526, pp. 105-119
BibTeX@incollection{Cao2011, author = {Cao, Hong and Kot, Alex}, title = {Detection of Tampering Inconsistencies on Mobile Photos}, booktitle = {Digital Watermarking}, publisher = {Springer Berlin / Heidelberg}, year = {2011}, volume = {6526}, pages = {105-119}}
-
Similar DSLR Processor Identification using Compact Model Templates
APSIPA ASC, 2011, pp. 5
BibTeX@article{Cao2011c, author = {H. Cao and A.C. Kot}, title = {Similar DSLR Processor Identification using Compact Model Templates}, journal = {APSIPA ASC}, year = {2011}, pages = {5}}
-
A robust detection algorithm for copy-move forgery in digital images
Forensic Science International, 2011, Vol. In Press, Corrected Proof, pp. -
BibTeX@article{Cao2011a, author = {Yanjun Cao and Tiegang Gao and Li Fan and Qunting Yang}, title = {A robust detection algorithm for copy-move forgery in digital images}, journal = {Forensic Science International}, year = {2011}, volume = {In Press, Corrected Proof}, pages = { - }}
-
Image Multi-Distortion Estimation
IEEE Transactions on Image Processing, 2011, Vol. 20 Issue:12, pp. 3442 - 3454
BibTeX@article{Caron2011, author = {Caron, A. and Jodoin, P.}, title = {Image Multi-Distortion Estimation}, journal = {IEEE Transactions on Image Processing}, year = {2011}, volume = {20 Issue:12}, pages = {3442 - 3454}}
-
A Forensic Analysis of Images on Online Social Networks
Proc. Third Int Intelligent Networking and Collaborative Systems (INCoS) Conf
2011, pp. 679-684
BibTeX@inproceedings{Castiglione2011, author = {Castiglione, A. and Cattaneo, G. and De Santis, A. }, title = {A Forensic Analysis of Images on Online Social Networks}, booktitle = {Proc. Third Int Intelligent Networking and Collaborative Systems (INCoS) Conf}, year = {2011}, pages = {679--684}}
-
Practical Bounds on Image Denoising: From Estimation to Information
IEEE Transactions on Image Processing, 2011, Vol. 20(5), pp. 1221-1233
BibTeX@article{Chatterjee2011, author = {Chatterjee, P. and Milanfar, P. }, title = {Practical Bounds on Image Denoising: From Estimation to Information}, journal = {IEEE Transactions on Image Processing}, year = {2011}, volume = {20}, number = {5}, pages = {1221--1233}}
-
Research noise of image acquisition system on CCD
Proc. Int Electronics and Optoelectronics (ICEOE) Conf
2011, Vol. 2
BibTeX@inproceedings{Chen2011a, author = {Ying Chen and Shao-bo Fu and Lan-fang Fu and Zhi-yong Li and Yun-peng Hu}, title = {Research noise of image acquisition system on CCD}, booktitle = {Proc. Int Electronics and Optoelectronics (ICEOE) Conf}, year = {2011}, volume = {2}}
-
Further studies on forensic features for source camera identification
Proc. th Int Imaging for Crime Detection and Prevention 2011 (ICDP 2011) Conf
2011, pp. 1-6
BibTeX@inproceedings{Chen2011b, author = {Ying-Chu Chen and Yongjian Hu and Chang-Tsun Li}, title = {Further studies on forensic features for source camera identification}, booktitle = {Proc. th Int Imaging for Crime Detection and Prevention 2011 (ICDP 2011) Conf}, year = {2011}, pages = {1--6}}
-
Detecting Recompression of JPEG Images via Periodicity Analysis of Compression Artifacts for Tampering Detection
IEEE Transactions on Information Forensics and Security, 2011, Vol. 6(2), pp. 396-406
BibTeX@article{Chen2011, author = {Yi-Lei Chen and Chiou-Ting Hsu}, title = {Detecting Recompression of JPEG Images via Periodicity Analysis of Compression Artifacts for Tampering Detection}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2011}, volume = {6}, number = {2}, pages = {396--406}}
-
Efficient Image Matching using Local Invariant Features for Copy Detection
Li, C.-T. & Ho, T. S. (ed.)
Chapter cho18
New Technologies for Digital Crime and Forensics: Devices, Applications, and Software, IGI Global, 2011, pp. 257-276
BibTeX@inbook{Chennamma2011a, author = {Chennamma, H.R. and Lalitha Rangarajan and Rao, M.S.}, title = {Efficient Image Matching using Local Invariant Features for Copy Detection}, journal = {New Technologies for Digital Crime and Forensics: Devices, Applications, and Software}, publisher = {IGI Global}, year = {2011}, pages = {257-276}}
-
Image Splicing Detection Using Inherent Lens Radial Distortion
IJCSI International Journal of Computer Science Issues, 2011, Vol. 7, pp. 49-158
BibTeX@article{Chennamma2011, author = {H. R. Chennamma and Lalitha Rangarajan}, title = {Image Splicing Detection Using Inherent Lens Radial Distortion}, journal = {IJCSI International Journal of Computer Science Issues}, year = {2011}, volume = {7}, pages = {49-158}}
-
Noise in a CMOS digital pixel sensor
Journal of Semiconductors, 2011, Vol. 32(11), pp. 115005
BibTeX@article{Chi2011, author = {Zhang Chi and Yao Suying and Xu Jiangtao}, title = {Noise in a CMOS digital pixel sensor}, journal = {Journal of Semiconductors}, year = {2011}, volume = {32}, number = {11}, pages = {115005}}
-
PRNU-based detection of small-size image forgeries
Proc. 17th Int Digital Signal Processing (DSP) Conf
2011, pp. 1-6
BibTeX@inproceedings{Chierchia2011, author = {Chierchia, G. and Parrilli, S. and Poggi, G. and Verdoliva, L. and Sansone, C.}, title = {PRNU-based detection of small-size image forgeries}, booktitle = {Proc. 17th Int Digital Signal Processing (DSP) Conf}, year = {2011}, pages = {1--6}}
-
CFA pattern identification of digital cameras using intermediate value counting
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
ACM, 2011, pp. 21-26
BibTeX@inproceedings{Choi2011, author = {Choi, Chang-Hee and Choi, Jung-Ho and Lee, Heung-Kyu}, title = {CFA pattern identification of digital cameras using intermediate value counting}, booktitle = {Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security}, publisher = {ACM}, year = {2011}, pages = {21--26}}
-
Exploring compression effects for improved source camera identification using strongly compressed video
Proc. 18th IEEE Int Image Processing (ICIP) Conf
2011, pp. 1953-1956
BibTeX@inproceedings{Chuang2011, author = {Wei-Hong Chuang and Hui Su and Min Wu}, title = {Exploring compression effects for improved source camera identification using strongly compressed video}, booktitle = {Proc. 18th IEEE Int Image Processing (ICIP) Conf}, year = {2011}, pages = {1953--1956}}
-
Digital Forensics Tool Testing--Image Metadata in the Cloud
Department of Computer Science and Media Technology Gjøvik University College, 2011, 2011
BibTeX@mastersthesis{Clark2011, author = {Clark, Philip}, title = {Digital Forensics Tool Testing--Image Metadata in the Cloud}, school = {Department of Computer Science and Media Technology Gjøvik University College, 2011}, year = {2011}}
-
Analysis of sensor fingerprint for source camera identification
Electronics Letters, 2011, Vol. 47(25), pp. 1366-1367
BibTeX@article{Conotter2011, author = {Conotter, V. and Boato, Giulia }, title = {Analysis of sensor fingerprint for source camera identification}, journal = {Electronics Letters}, year = {2011}, volume = {47}, number = {25}, pages = {1366--1367}}
-
Performance comparison of denoising filters for source camera identification
Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
Proceedings of SPIE
Media Watermarking, Security, and Forensics III, SPIE, 2011, Vol. 7880(1), pp. 788007
BibTeX@conference{Cortiana2011, author = {A. Cortiana and V. Conotter and G. Boato and F. G. B. De Natale}, title = {Performance comparison of denoising filters for source camera identification}, booktitle = {Proceedings of SPIE}, journal = {Media Watermarking, Security, and Forensics III}, publisher = {SPIE}, year = {2011}, volume = {7880}, number = {1}, pages = {788007}}
-
Analisi e sviluppo di metodi per l'individuazione di manipolazioni copy-move in applicazioni di image forensics
UNIVERSITA DEGLI STUDI DI FIRENZE, 2011
BibTeX@mastersthesis{DelTongo2011, author = {Luca Del Tongo}, title = {Analisi e sviluppo di metodi per l'individuazione di manipolazioni copy-move in applicazioni di image forensics}, school = {UNIVERSITA DEGLI STUDI DI FIRENZE}, year = {2011}}
-
Source camera identification using Auto-White Balance approximation
Proc. IEEE Int Computer Vision (ICCV) Conf
2011, pp. 57-64
BibTeX@inproceedings{Deng2011, author = {Zhonghai Deng and Gijsenij, A. and Jingyuan Zhang}, title = {Source camera identification using Auto-White Balance approximation}, booktitle = {Proc. IEEE Int Computer Vision (ICCV) Conf}, year = {2011}, pages = {57--64}}
-
Digital Image Processing Techniques for Detection And Removal of Noise In Images Implementing Blind Source Separation
International Journal on Computer Science and Engineering (IJCSE), 2011, Vol. 3(8), pp. 3108-3114
BibTeX@article{Devi2011, author = {Devi, K. Devaki and Swamy, G.N.}, title = {Digital Image Processing Techniques for Detection And Removal of Noise In Images Implementing Blind Source Separation}, journal = {International Journal on Computer Science and Engineering (IJCSE)}, year = {2011}, volume = {3}, number = {8}, pages = {3108-3114}}
-
Double Compression Detection Based on Markov Model of the First Digits of DCT Coefficients
Proc. Sixth Int Image and Graphics (ICIG) Conf
2011, pp. 234-237
BibTeX@inproceedings{Dong2011, author = {Lisha Dong and Xiangwei Kong and Bo Wang and Xin´gang You}, title = {Double Compression Detection Based on Markov Model of the First Digits of DCT Coefficients}, booktitle = {Proc. Sixth Int Image and Graphics (ICIG) Conf}, year = {2011}, pages = {234--237}}
-
Modeling the EXIF-Image correlation for image manipulation detection
Proc. 18th IEEE Int Image Processing (ICIP) Conf
2011, pp. 1945-1948
BibTeX@inproceedings{Fan2011a, author = {Jiayuan Fan and Kot, A. C. and Hong Cao and Sattar, F.}, title = {Modeling the EXIF-Image correlation for image manipulation detection}, booktitle = {Proc. 18th IEEE Int Image Processing (ICIP) Conf}, year = {2011}, pages = {1945--1948}}
-
Detection of Double-Compression in JPEG2000 by Using Markov Features
Wu, Y. (ed.)
Computing and Intelligent Systems
Springer Berlin Heidelberg, 2011, Vol. 234, pp. 441-449
BibTeX@incollection{Fan2011, author = {Fan, Zhao and Wang, Shilin and Li, Shenghong and Zhang, Yujin}, title = {Detection of Double-Compression in JPEG2000 by Using Markov Features}, booktitle = {Computing and Intelligent Systems}, publisher = {Springer Berlin Heidelberg}, year = {2011}, volume = {234}, pages = {441-449}}
-
An energy-based method for the forensic detection of Re-sampled images
Proc. IEEE Int Multimedia and Expo (ICME) Conf
2011, pp. 1-6
BibTeX@inproceedings{Feng2011, author = {Xiaoying Feng and Cox, Ingemar J. and Doerr, Gwenael}, title = {An energy-based method for the forensic detection of Re-sampled images}, booktitle = {Proc. IEEE Int Multimedia and Expo (ICME) Conf}, year = {2011}, pages = {1--6}}
-
Statistical Image Processing and Multidimensional Modeling
Jordan, M., Nowak, R. & Schölkopf, B. (ed.)
Springer, 2011
BibTeX@book{Fieguth2010, author = {Fieguth, Paul}, title = {Statistical Image Processing and Multidimensional Modeling}, publisher = {Springer}, year = {2011}}
-
A Dempster-Shafer framework for decision fusion in image forensics
Information Forensics and Security (WIFS), 2011 IEEE International Workshop on
2011, pp. 1-6
BibTeX@inproceedings{Fontani2011, author = {Fontani, M and Bianchi, Tiziano and De Rosa, Alessia and Piva, Alessandro and Barni, M.}, title = {A Dempster-Shafer framework for decision fusion in image forensics}, booktitle = {Information Forensics and Security (WIFS), 2011 IEEE International Workshop on}, year = {2011}, pages = {1--6}}
-
Determining approximate age of digital images using sensor defects
Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
Proceedings of SPIE
Media Watermarking, Security, and Forensics III, SPIE, 2011, Vol. 7880(1), pp. 788006
BibTeX@conference{Fridrich2011, author = {Jessica Fridrich and Miroslav Goljan}, title = {Determining approximate age of digital images using sensor defects}, booktitle = {Proceedings of SPIE}, journal = {Media Watermarking, Security, and Forensics III}, publisher = {SPIE}, year = {2011}, volume = {7880}, number = {1}, pages = {788006}}
-
Multimodal Location Estimation on Flickr Videos
-
2011
BibTeX@inproceedings{Friedland2011, author = {Gerald Friedland and Jaeyoung Choi and Howard Lei and, Adam Janin}, title = {Multimodal Location Estimation on Flickr Videos}, booktitle = {-}, year = {2011}}
-
Robust detection of copy-move forgery using texture features
Proc. 19th Iranian Conf. Electrical Engineering (ICEE)
2011, pp. 1 - 4
BibTeX@inproceedings{Gharibi2011, author = {Gharibi, Fereshteh and RavanJamjah, Javad and Akhlaghian, Fardin and Azami, Bahram Zahir and Alirezaie, Javad}, title = {Robust detection of copy-move forgery using texture features}, booktitle = {Proc. 19th Iranian Conf. Electrical Engineering (ICEE)}, year = {2011}, pages = {1 - 4}}
-
Digital Camera Identification by Modeling the Probability Distribution of Sensor Pattern Noise
Proc. 7th Iranian Machine Vision and Image Processing (MVIP)
2011, pp. 1-4
BibTeX@inproceedings{Gharibi2011a, author = {Gharibi, F. and RavanJamjah, J. and ZahirAzami, B. and Akhlaghian, F. }, title = {Digital Camera Identification by Modeling the Probability Distribution of Sensor Pattern Noise}, booktitle = {Proc. 7th Iranian Machine Vision and Image Processing (MVIP)}, year = {2011}, pages = {1--4}}
-
DWT-DCT (QCD) based copy-move image forgery detection
Proc. 18th Int Systems, Signals and Image Processing (IWSSIP) Conf
2011, pp. 1-4
BibTeX@inproceedings{Ghorbani2011, author = {Ghorbani, M. and Firouzmand, M. and Faraahi, A.}, title = {DWT-DCT (QCD) based copy-move image forgery detection}, booktitle = {Proc. 18th Int Systems, Signals and Image Processing (IWSSIP) Conf}, year = {2011}, pages = {1--4}}
-
Demystifying histograms of multi-quantised DCT coefficients
Proc. IEEE Int Multimedia and Expo (ICME) Conf
2011, pp. 1-6
BibTeX@inproceedings{Gloe2011, author = {Gloe, T.}, title = {Demystifying histograms of multi-quantised DCT coefficients}, booktitle = {Proc. IEEE Int Multimedia and Expo (ICME) Conf}, year = {2011}, pages = {1--6}}
-
Detection of local artificial changes in images
Optoelectronics, Instrumentation and Data Processing, Allerton Press, Inc. distributed exclusively by Springer Science+Business Media LLC, 2011, Vol. 47, pp. 207-214
BibTeX@article{Glumov2011, author = {Glumov, N. and Kuznetsov, A.}, title = {Detection of local artificial changes in images}, journal = {Optoelectronics, Instrumentation and Data Processing}, publisher = {Allerton Press, Inc. distributed exclusively by Springer Science+Business Media LLC}, year = {2011}, volume = {47}, pages = {207-214}}
-
Analysis of images for local artificial changes with JPEG compression properties
Pattern Recognition and Image Analysis, MAIK Nauka/Interperiodica distributed exclusively by Springer Science+Business Media LLC., 2011, Vol. 21, pp. 251-253
BibTeX@article{Glumov2011a, author = {Glumov, N. and Kuznetsov, A.}, title = {Analysis of images for local artificial changes with JPEG compression properties}, journal = {Pattern Recognition and Image Analysis}, publisher = {MAIK Nauka/Interperiodica distributed exclusively by Springer Science+Business Media LLC.}, year = {2011}, volume = {21}, pages = {251-253}}
-
Defending Against Fingerprint-Copy Attack in Sensor-Based Camera Identification
IEEE Transactions on Information Forensics and Security, 2011, Vol. 6(1), pp. 227-236
BibTeX@article{Goljan2011, author = {Goljan, M. and Fridrich, J. and Mo Chen}, title = {Defending Against Fingerprint-Copy Attack in Sensor-Based Camera Identification}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2011}, volume = {6}, number = {1}, pages = {227--236}}
-
Blind Video Tamper Detection Based on Fusion of Source Features
Proc. Int Digital Image Computing Techniques and Applications (DICTA) Conf
2011, pp. 608-613
BibTeX@inproceedings{Goodwin2011, author = {Goodwin, J. and Chetty, G. }, title = {Blind Video Tamper Detection Based on Fusion of Source Features}, booktitle = {Proc. Int Digital Image Computing Techniques and Applications (DICTA) Conf}, year = {2011}, pages = {608--613}}
-
An Anisotropic Fourth-Order Diffusion Filter for Image Noise Removal
International Journal of Computer Vision, Springer Netherlands, 2011, Vol. 92, pp. 177-191
BibTeX@article{Hajiaboli2011, author = {Hajiaboli, Mohammad}, title = {An Anisotropic Fourth-Order Diffusion Filter for Image Noise Removal}, journal = {International Journal of Computer Vision}, publisher = {Springer Netherlands}, year = {2011}, volume = {92}, pages = {177-191}}
-
Digital image splicing detection based on approximate run length
Pattern Recognition Letters, 2011, Vol. 32(12), pp. 1591 - 1597
BibTeX@article{He2011, author = {Zhongwei He and Wei Sun and Wei Lu and Hongtao Lu}, title = {Digital image splicing detection based on approximate run length}, journal = {Pattern Recognition Letters}, year = {2011}, volume = {32}, number = {12}, pages = {1591 - 1597}}
-
Identifying camcorders using noise patterns from video clips recorded with image stabilisation
Proc. 7th Int Image and Signal Processing and Analysis (ISPA) Symp
2011, pp. 668-671
BibTeX@inproceedings{Hoglund2011, author = {Hoglund, Tobias and Brolund, Per and Norell, Kristin}, title = {Identifying camcorders using noise patterns from video clips recorded with image stabilisation}, booktitle = {Proc. 7th Int Image and Signal Processing and Analysis (ISPA) Symp}, year = {2011}, pages = {668--671}}
-
Representations and Techniques for 3D Object Recognition & Scene Interpretation (Synthesis Lectures on Artificial Intelligence and Machine Learning)
Chapter 2 -- Single view metrology
Morgan & Claypool Publishers, 2011, pp. 4-9
BibTeX@inbook{Hoiem2011, author = {Derek Hoiem and Silvio Savarese}, title = {Representations and Techniques for 3D Object Recognition & Scene Interpretation (Synthesis Lectures on Artificial Intelligence and Machine Learning)}, publisher = {Morgan & Claypool Publishers}, year = {2011}, pages = {4--9}}
-
An edge-sensing generic demosaicing algorithm with application to image resampling
IEEE Transactions on Image Processing, 2011, Vol. 99(99), pp. 9
BibTeX@article{Hore2011, author = {Hore, A. and Ziou, D. }, title = {An edge-sensing generic demosaicing algorithm with application to image resampling}, journal = {IEEE Transactions on Image Processing}, year = {2011}, volume = {99}, number = {99}, pages = {9}}
-
Image copy-move forgery detection based on "crossing shadow" division
Proc. Int Electric Information and Control Engineering (ICEICE) Conf
2011, pp. 1416-1419
BibTeX@inproceedings{Hou2011, author = {Dongmei Hou and Zhengyao Bai and Shuchun Liu}, title = {Image copy-move forgery detection based on "crossing shadow" division}, booktitle = {Proc. Int Electric Information and Control Engineering (ICEICE) Conf}, year = {2011}, pages = {1416--1419}}
-
Image copy-move forgery detection based on crossing shadow division
Proc. Int Electric Information and Control Engineering (ICEICE) Conf
2011, pp. 1416-1419
BibTeX@inproceedings{Hou2011a, author = {Dongmei Hou and Zhengyao Bai and Shuchun Liu}, title = {Image copy-move forgery detection based on crossing shadow division}, booktitle = {Proc. Int Electric Information and Control Engineering (ICEICE) Conf}, year = {2011}, pages = {1416--1419}}
-
Image copy-move forgery detection based on textquotedblleftcrossing shadowtextquotedblright division
Proc. Int Electric Information and Control Engineering (ICEICE) Conf
2011, pp. 1416-1419
BibTeX@inproceedings{Hou2011b, author = {Dongmei Hou and Zhengyao Bai and Shuchun Liu}, title = {Image copy-move forgery detection based on textquotedblleftcrossing shadowtextquotedblright division}, booktitle = {Proc. Int Electric Information and Control Engineering (ICEICE) Conf}, year = {2011}, pages = {1416--1419}}
-
Implementation of the likelihood ratio framework for camera identification based on sensor noise patterns
Law, Probability and Risk, 2011, Vol. 10(2), pp. 149-159
BibTeX@article{Houten2011, author = {Wiger van Houten and Ivo Alberink and Zeno Geradts}, title = {Implementation of the likelihood ratio framework for camera identification based on sensor noise patterns}, journal = {Law, Probability and Risk}, year = {2011}, volume = {10}, number = {2}, pages = {149-159}}
-
Exposing digital image forgeries by detecting inconsistencies in principal point
Proc. Int Computer Science and Service System (CSSS) Conf
2011, pp. 404-407
BibTeX@inproceedings{Hu2011a, author = {Jing Hu and Yezhou Li and Shaozhang Niu and Xianzhe Meng}, title = {Exposing digital image forgeries by detecting inconsistencies in principal point}, booktitle = {Proc. Int Computer Science and Service System (CSSS) Conf}, year = {2011}, pages = {404--407}}
-
An Improved Lexicographical Sort Algorithm of Copy-move Forgery Detection
Proc. Second Int Networking and Distributed Computing (ICNDC) Conf
2011, pp. 23-27
BibTeX@inproceedings{Hu2011, author = {Jie Hu and Huaxiong Zhang and Qiang Gao and Hai Huang}, title = {An Improved Lexicographical Sort Algorithm of Copy-move Forgery Detection}, booktitle = {Proc. Second Int Networking and Distributed Computing (ICNDC) Conf}, year = {2011}, pages = {23--27}}
-
Source Camera Identification Issues: Forensic Features Selection and Robustness
International Journal of Digital Crime and Forensics (IJDCF), 2011, Vol. 3(4), pp. 1-15
BibTeX@article{Hu2011b, author = {Yongjian Hu and Chang-Tsun Li and Changhui Zhou and Xufeng Lin}, title = {Source Camera Identification Issues: Forensic Features Selection and Robustness}, journal = {International Journal of Digital Crime and Forensics (IJDCF)}, year = {2011}, volume = {3}, number = {4}, pages = {1-15}}
-
Blind forensics in medical imaging based on Tchebichef image moments
Proc. Annual Int Engineering in Medicine and Biology Society,EMBC Conf. of the IEEE
2011, pp. 4473-4476
BibTeX@inproceedings{Huang2011a, author = {Huang, H. and Coatrieux, G. and Shu, H. Z. and Luo, L. M. and Roux, C. }, title = {Blind forensics in medical imaging based on Tchebichef image moments}, booktitle = {Proc. Annual Int Engineering in Medicine and Biology Society,EMBC Conf. of the IEEE}, year = {2011}, pages = {4473--4476}}
-
Improved DCT-based detection of copy-move forgery in images
Forensic Science International, 2011, Vol. 206(1-3), pp. 178 - 184
BibTeX@article{Huang2011, author = {Yanping Huang and Wei Lu and Wei Sun and Dongyang Long}, title = {Improved DCT-based detection of copy-move forgery in images}, journal = {Forensic Science International}, year = {2011}, volume = {206}, number = {1-3}, pages = {178 - 184}}
-
Webcam geo-localization using aggregate light levels
Proc. IEEE Workshop Applications of Computer Vision (WACV)
2011, pp. 132-138
BibTeX@inproceedings{Jacobs2011, author = {Jacobs, N. and Miskell, K. and Pless, R. }, title = {Webcam geo-localization using aggregate light levels}, booktitle = {Proc. IEEE Workshop Applications of Computer Vision (WACV)}, year = {2011}, pages = {132--138}}
-
A Novel Algorithm of Image Splicing Detection
School of Electrical Engineering Zhengzhou University, 2011
BibTeX@techreport{Kaizhen2011, author = {Zhu Kaizhen and, Zhen Zhang}, title = {A Novel Algorithm of Image Splicing Detection}, year = {2011}}
-
Detecting copy-paste forgeries using transform-invariant features
Proc. IEEE 15th Int Consumer Electronics (ISCE) Symp
2011, pp. 58-61
BibTeX@inproceedings{Kakar2011, author = {Kakar, P. and Sudha, N. }, title = {Detecting copy-paste forgeries using transform-invariant features}, booktitle = {Proc. IEEE 15th Int Consumer Electronics (ISCE) Symp}, year = {2011}, pages = {58--61}}
-
Exposing Digital Image Forgeries by Detecting Discrepancies in Motion Blur
IEEE Transactions on Multimedia, 2011, Vol. 13(3), pp. 443-452
BibTeX@article{Kakar2011a, author = {Kakar, P. and Sudha, N. and Ser, W.}, title = {Exposing Digital Image Forgeries by Detecting Discrepancies in Motion Blur}, journal = {IEEE Transactions on Multimedia}, year = {2011}, volume = {13}, number = {3}, pages = {443--452}}
-
Enhancing ROC performance of trustworthy camera source identification
Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
Proceedings of SPIE
Media Watermarking, Security, and Forensics III, SPIE, 2011, Vol. 7880(1), pp. 788009
BibTeX@conference{Kang2011, author = {Xiangui Kang and Yinxiang Li and Zhenhua Qu and Jiwu Huang}, title = {Enhancing ROC performance of trustworthy camera source identification}, booktitle = {Proceedings of SPIE}, journal = {Media Watermarking, Security, and Forensics III}, publisher = {SPIE}, year = {2011}, volume = {7880}, number = {1}, pages = {788009}}
-
Enhancing Source Camera Identification Performance with a Camera Reference Phase Sensor Pattern Noise
IEEE Transactions on Information Forensics and Security, 2011, Vol. PP Issue:99(99), pp. 1
BibTeX@article{Kang2011a, author = {Kang, X. and Li, Y. and Qu, Z. and Huang, J.}, title = {Enhancing Source Camera Identification Performance with a Camera Reference Phase Sensor Pattern Noise}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2011}, volume = {PP Issue:99}, number = {99}, pages = {1}}
-
Rendering synthetic objects into legacy photographs
Proceedings of the 2011 SIGGRAPH Asia Conference
ACM, 2011, pp. 157:1-157:12
BibTeX@inproceedings{Karsch2011, author = {Karsch, Kevin and Hedau, Varsha and Forsyth, David and Hoiem, Derek}, title = {Rendering synthetic objects into legacy photographs}, booktitle = {Proceedings of the 2011 SIGGRAPH Asia Conference}, publisher = {ACM}, year = {2011}, pages = {157:1--157:12}}
-
Digital Image Authentication From JPEG Headers
IEEE Transactions on Information Forensics and Security, 2011, Vol. 6(3), pp. 1066-1075
BibTeX@article{Kee2011, author = {Kee, Eric. and Johnson, Micah. Kimo and Farid, H.}, title = {Digital Image Authentication From JPEG Headers}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2011}, volume = {6}, number = {3}, pages = {1066--1075}}
-
Detection of copy-move forgery using multiresolution characteristic of discrete wavelet transform
Proceedings of the International Conference &38; Workshop on Emerging Trends in Technology
ACM, 2011, pp. 127-131
BibTeX@inproceedings{Khan2011, author = {Khan, S. and Kulkarni, A.}, title = {Detection of copy-move forgery using multiresolution characteristic of discrete wavelet transform}, booktitle = {Proceedings of the International Conference &38; Workshop on Emerging Trends in Technology}, publisher = {ACM}, year = {2011}, pages = {127--131}}
-
A photographic forensic case study: Myths, principles and techniques
Mathematical and Computer Modelling, 2011, Vol. In Press, Accepted Manuscript, pp. -
BibTeX@article{Kim2011, author = {Hyoung Joong Kim and Soomin Lim and Jongsub Moon and Boram Kim and Eui S. Jung}, title = {A photographic forensic case study: Myths, principles and techniques}, journal = {Mathematical and Computer Modelling}, year = {2011}, volume = {In Press, Accepted Manuscript}, pages = { - }}
-
Region-based tampering detection and recovery using homogeneity analysis in quality-sensitive imaging
Computer Vision and Image Understanding, 2011, Vol. 115(9), pp. 1308 - 1323
BibTeX@article{Kim2011a, author = {Kyung-Su Kim and Min-Jeong Lee and Ji-Won Lee and Tae-Woo Oh and Hae-Yeoun Lee}, title = {Region-based tampering detection and recovery using homogeneity analysis in quality-sensitive imaging}, journal = {Computer Vision and Image Understanding}, year = {2011}, volume = {115}, number = {9}, pages = {1308 - 1323}}
-
Article: Image based Secret Communication using Double Compression
International Journal of Computer Applications, 2011, Vol. 21(7), pp. 6-9
BibTeX@article{Kommini2011, author = {Chaitanya Kommini and Kamalesh Ellanti and Srinivasulu Asadi}, title = {Article: Image based Secret Communication using Double Compression}, journal = {International Journal of Computer Applications}, year = {2011}, volume = {21}, number = {7}, pages = {6--9}}
-
Countering Counter-Forensics: The Case of JPEG Compression
Filler, T., Pevný, T., Craver, S. & Ker, A. (ed.)
Information Hiding
Springer Berlin / Heidelberg, 2011, Vol. 6958, pp. 285-298
BibTeX@incollection{Lai2011, author = {Lai, ShiYue and Böhme, Rainer}, title = {Countering Counter-Forensics: The Case of JPEG Compression}, booktitle = {Information Hiding}, publisher = {Springer Berlin / Heidelberg}, year = {2011}, volume = {6958}, pages = {285-298}}
-
Understanding and recreating visual appearance under natural illumination
DTIC Document, 2011
BibTeX@techreport{Lalonde2011a, author = {Lalonde, Jean-Francois}, title = {Understanding and recreating visual appearance under natural illumination}, year = {2011}}
-
Estimating the natural illumination conditions from a single outdoor image
International Journal of Computer Vision, 2011, Vol. -, pp. 1-25
BibTeX@article{Lalonde2011, author = {Jean-François Lalonde and Alexei A. Efros and Srinivasa G. Narasimhan}, title = {Estimating the natural illumination conditions from a single outdoor image}, journal = {International Journal of Computer Vision}, year = {2011}, volume = {-}, pages = {1-25}}
-
On the Location-Dependent Quality of the Sensor Pattern Noise and Its Implication in Multimedia Forensics
Proceedings of the 4th International Conference on Imaging for Crime Detection and Prevention (ICDP 2011), London, United Kingdom
4th International Conference on Imaging for Crime Detection and Prevention (ICDP 2011), 2011
BibTeX@inproceedings{Li2011f, author = {Chang-Tzun Li and Riccardo Satta}, title = {On the Location-Dependent Quality of the Sensor Pattern Noise and Its Implication in Multimedia Forensics}, booktitle = {Proceedings of the 4th International Conference on Imaging for Crime Detection and Prevention (ICDP 2011), London, United Kingdom}, journal = {4th International Conference on Imaging for Crime Detection and Prevention (ICDP 2011)}, year = {2011}}
-
A Robust Approach to Detect Tampering by Exploring Correlation Patterns
Real, P., Diaz-Pernil, D., Molina-Abril, H., Berciano, A. & Kropatsch, W. (ed.)
Computer Analysis of Images and Patterns
Springer Berlin / Heidelberg, 2011, Vol. 6855, pp. 515-522
BibTeX@incollection{Li2011c, author = {Li, Lu and Xue, Jianru and Wang, Xiaofeng and Tian, Lihua}, title = {A Robust Approach to Detect Tampering by Exploring Correlation Patterns}, booktitle = {Computer Analysis of Images and Patterns}, publisher = {Springer Berlin / Heidelberg}, year = {2011}, volume = {6855}, pages = {515-522}}
-
Blind identification algorithm for retouched images based on Bi-Laplacian
Journal of Computer Applications, 2011, Vol. 1, pp. -
BibTeX@article{Li2011, author = {Li, Xiao-Fei and Shen, Xuan-Jing and Chen, Hai-Peng}, title = {Blind identification algorithm for retouched images based on Bi-Laplacian}, journal = {Journal of Computer Applications}, year = {2011}, volume = {1}, pages = {-}}
-
Decomposed PRNU Library for Forensics on Photos
International Journal of Digital Library Systems,, 2011, Vol. 2(1), pp. 38
BibTeX@article{Li2011b, author = {Yue Li}, title = {Decomposed PRNU Library for Forensics on Photos}, journal = {International Journal of Digital Library Systems,}, year = {2011}, volume = {2}, number = {1}, pages = {38}}
-
A robust forensic method based on Scale-Invariance Feature Transform
Proc. Int Multimedia Technology (ICMT) Conf
2011, pp. 5246-5249
BibTeX@inproceedings{Li2011e, author = {Yue Li}, title = {A robust forensic method based on Scale-Invariance Feature Transform}, booktitle = {Proc. Int Multimedia Technology (ICMT) Conf}, year = {2011}, pages = {5246--5249}}
-
Optimized digital library for digital forenisc based on Decomposed PRNU
Proc. Int Multimedia Technology (ICMT) Conf
2011, pp. 610-613
BibTeX@inproceedings{Li2011d, author = {Yue Li and Chang-Tsun Li}, title = {Optimized digital library for digital forenisc based on Decomposed PRNU}, booktitle = {Proc. Int Multimedia Technology (ICMT) Conf}, year = {2011}, pages = {610--613}}
-
An integrated technique for splicing and copy-move forgery image detection
Proc. 4th Int Image and Signal Processing (CISP) Congress
2011, Vol. 2, pp. 1086-1090
BibTeX@inproceedings{Lin2011a, author = {Lin, S. D. and Tszan Wu}, title = {An integrated technique for splicing and copy-move forgery image detection}, booktitle = {Proc. 4th Int Image and Signal Processing (CISP) Congress}, year = {2011}, volume = {2}, pages = {1086--1090}}
-
Image Authentication Using Distributed Source Coding
IEEE Transactions on Image Processing, 2011, Vol. PP Issue:99(99), pp. 1
BibTeX@article{Lin2011, author = {Lin, Y. and Varodayan, D. and Girod, B.}, title = {Image Authentication Using Distributed Source Coding}, journal = {IEEE Transactions on Image Processing}, year = {2011}, volume = {PP Issue:99}, number = {99}, pages = {1}}
-
Detect image splicing with artificial blurred boundary
Mathematical and Computer Modelling, 2011, Vol. In Press, Accepted Manuscript, pp. -
BibTeX@article{Liu2011, author = {Guangjie Liu and Junwen Wang and Shiguo Lian and Yuewei Dai}, title = {Detect image splicing with artificial blurred boundary}, journal = {Mathematical and Computer Modelling}, year = {2011}, volume = {In Press, Accepted Manuscript}, pages = { - }}
-
Detection of misaligned cropping and recompression with the same quantization matrix and relevant forgery
Proceedings of the 3rd international ACM workshop on Multimedia in forensics and intelligence
ACM, 2011, pp. 25-30
BibTeX@inproceedings{Liu2011c, author = {Liu, Qingzhong}, title = {Detection of misaligned cropping and recompression with the same quantization matrix and relevant forgery}, booktitle = {Proceedings of the 3rd international ACM workshop on Multimedia in forensics and intelligence}, publisher = {ACM}, year = {2011}, pages = {25--30}}
-
Identifying Image Composites Through Shadow Matte Consistency
IEEE Transactions on Information Forensics and Security, 2011, Vol. 6(3), pp. 1111-1122
BibTeX@article{Liu2011e, author = {Qiguang Liu and Xiaochun Cao and Chao Deng and Xiaojie Guo}, title = {Identifying Image Composites Through Shadow Matte Consistency}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2011}, volume = {6}, number = {3}, pages = {1111--1122}}
-
A Method to Detect JPEG-Based Double Compression
Liu, D., Zhang, H., Polycarpou, M., Alippi, C. & He, H. (ed.)
Advances in Neural Networks -- ISNN 2011
Springer Berlin / Heidelberg, 2011, Vol. 6676, pp. 466-476
BibTeX@incollection{Liu2011a, author = {Liu, Qingzhong and Sung, Andrew and Qiao, Mengyu}, title = {A Method to Detect JPEG-Based Double Compression}, booktitle = {Advances in Neural Networks -- ISNN 2011}, publisher = {Springer Berlin / Heidelberg}, year = {2011}, volume = {6676}, pages = {466-476}}
-
A fast noise variance estimation algorithm
Proc. Asia Pacific Conf Microelectronics and Electronics (PrimeAsia) Postgraduate Research in
2011, pp. 61-64
BibTeX@inproceedings{Liu2011b, author = {Liu, Wenjiang and Liu, Tao and Rong, Mengtian and Wang, Ruolin and Zhang, Hao}, title = {A fast noise variance estimation algorithm}, booktitle = {Proc. Asia Pacific Conf Microelectronics and Electronics (PrimeAsia) Postgraduate Research in}, year = {2011}, pages = {61--64}}
-
Passive Forensics Method to Detect Tampering for Double JPEG Compression Image
Proc. IEEE Int Multimedia (ISM) Symp
2011, pp. 185-189
BibTeX@inproceedings{Liu2011d, author = {Liu, Zhenli and Wang, Xiaofeng and Chen, Jing}, title = {Passive Forensics Method to Detect Tampering for Double JPEG Compression Image}, booktitle = {Proc. IEEE Int Multimedia (ISM) Symp}, year = {2011}, pages = {185--189}}
-
Revealing digital fakery using multiresolution decomposition and higher order statistics
Engineering Applications of Artificial Intelligence, 2011, Vol. 24(4), pp. 666 - 672
BibTeX@article{Lu2011, author = {Wei Lu and Wei Sun and Fu-Lai Chung and Hongtao Lu}, title = {Revealing digital fakery using multiresolution decomposition and higher order statistics}, journal = {Engineering Applications of Artificial Intelligence}, year = {2011}, volume = {24}, number = {4}, pages = {666 - 672}}
-
Blind Identification of Image Copy-paste Tampering Based on Logarithm Polar Coordinate Transformation
Blind Identification of Image Copy-paste Tampering Based on Logarithm Polar Coordinate Transformation, 2011
BibTeX@techreport{Lv2011, author = {Lv , A. Ying-Da and Shen, B. Xuan-Jing and Chen C. Hai-Peng}, title = {Blind Identification of Image Copy-paste Tampering Based on Logarithm Polar Coordinate Transformation}, year = {2011}}
-
An improved image blind identification based on inconsistency in light source direction
The Journal of Supercomputing, Springer Netherlands, 2011, Vol. 19(2), pp. 211-218
BibTeX@article{Lv2011a, author = {Lv, Yingda and Shen, Xuanjing and Chen, Haipeng}, title = {An improved image blind identification based on inconsistency in light source direction}, journal = {The Journal of Supercomputing}, publisher = {Springer Netherlands}, year = {2011}, volume = {19}, number = {2}, pages = {211-218}}
-
Digital image forgery detection and estimation by exploring basic image manipulations
Digital Investigation, 2011, Vol. In Press, Corrected Proof, pp. -
BibTeX@article{Mahalakshmi2011, author = {Mahalakshmi,S. Devi and K. Vijayalakshmi and S. Priyadharsini}, title = {Digital image forgery detection and estimation by exploring basic image manipulations}, journal = {Digital Investigation}, year = {2011}, volume = {In Press, Corrected Proof}, pages = { - }}
-
Identifying image forgeries using change points detection
Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
Proceedings of SPIE
Media Watermarking, Security, and Forensics III, SPIE, 2011, Vol. 7880(1), pp. 788008
BibTeX@conference{Mahdian2011a, author = {Babak Mahdian and Stanislav Saic}, title = {Identifying image forgeries using change points detection}, booktitle = {Proceedings of SPIE}, journal = {Media Watermarking, Security, and Forensics III}, publisher = {SPIE}, year = {2011}, volume = {7880}, number = {1}, pages = {788008}}
-
Image tampering detection using methods based on JPEG compression artifacts: a real-life experiment
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies
ACM, 2011, pp. 176:1-176:5
BibTeX@inproceedings{Mahdian2011b, author = {Mahdian, Babak and Saic, Stanislav}, title = {Image tampering detection using methods based on JPEG compression artifacts: a real-life experiment}, booktitle = {Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies}, publisher = {ACM}, year = {2011}, pages = {176:1--176:5}}
-
JPEG Quantization Tables Forensics: A Statistical Approach
Sako, H., Franke, K. & Saitoh, S. (ed.)
Computational Forensics
Springer Berlin / Heidelberg, 2011, Vol. 6540, pp. 150-159
BibTeX@incollection{Mahdian2011, author = {Mahdian, Babak and Saic, Stanislav and Nedbal, Radim}, title = {JPEG Quantization Tables Forensics: A Statistical Approach}, booktitle = {Computational Forensics}, publisher = {Springer Berlin / Heidelberg}, year = {2011}, volume = {6540}, pages = {150-159}}
-
Forensic printer detection using intrinsic signatures
Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
Proceedings of SPIE
Media Watermarking, Security, and Forensics III, SPIE, 2011, Vol. 7880(1), pp. 78800R
BibTeX@conference{Mikkilineni2011, author = {Aravind K. Mikkilineni and Nitin Khanna and Edward J. Delp}, title = {Forensic printer detection using intrinsic signatures}, booktitle = {Proceedings of SPIE}, journal = {Media Watermarking, Security, and Forensics III}, publisher = {SPIE}, year = {2011}, volume = {7880}, number = {1}, pages = {78800R}}
-
Discriminating Multiple Jpeg Compression Using First Digit Features
Dipartimento di Elettronica e Informazione - Politecnico di Milano, 2011
BibTeX@techreport{Milani2011, author = {Simone Milani and Marco Tagliasacchi and Stefano Tubaro}, title = {Discriminating Multiple Jpeg Compression Using First Digit Features}, year = {2011}}
-
Blind Copy Move Image Forgery Detection using Dyadic Undecimated Wavelet Transform
Proceedings of the 17th International Conference on Digital Signal Processing
College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia, 2011
BibTeX@inproceedings{Muhammad2011, author = {Ghulam Muhammad and Muhammad Hussain and Khalid Khawaji and George Bebis}, title = {Blind Copy Move Image Forgery Detection using Dyadic Undecimated Wavelet Transform}, booktitle = {Proceedings of the 17th International Conference on Digital Signal Processing}, year = {2011}}
-
Robust copy-move image forgery detection using undecimated wavelets and Zernike moments
Proceedings of the Third International Conference on Internet Multimedia Computing and Service
ACM, 2011, pp. 95-98
BibTeX@inproceedings{Muhammad2011a, author = {Muhammad, Ghulam and Hussain, Muhammad Shamim}, title = {Robust copy-move image forgery detection using undecimated wavelets and Zernike moments}, booktitle = {Proceedings of the Third International Conference on Internet Multimedia Computing and Service}, publisher = {ACM}, year = {2011}, pages = {95--98}}
-
A Non-intrusive Method for Copy-Move Forgery Detection
Bebis, G., Boyle, R., Parvin, B., Koracin, D., Wang, S., Kyungnam, K., Benes, B., Moreland, K., Borst, C., DiVerdi, S., Yi-Jen, C. & Ming, J. (ed.)
Advances in Visual Computing
Springer Berlin / Heidelberg, 2011, Vol. 6939, pp. 516-525
BibTeX@incollection{Muhammad2011b, author = {Muhammad, Najah and Hussain, Muhammad and Muhammad, Ghulam and Bebis, George}, title = {A Non-intrusive Method for Copy-Move Forgery Detection}, booktitle = {Advances in Visual Computing}, publisher = {Springer Berlin / Heidelberg}, year = {2011}, volume = {6939}, pages = {516-525}}
-
Copy-Move Forgery Detection Using Dyadic Wavelet Transform
Proc. Eighth Int Computer Graphics, Imaging and Visualization (CGIV) Conf
2011, pp. 103-108
BibTeX@inproceedings{Muhammad2011c, author = {Muhammad, Najah and Hussain, Muhammad and Muhammad, Ghulam and Bebis, George}, title = {Copy-Move Forgery Detection Using Dyadic Wavelet Transform}, booktitle = {Proc. Eighth Int Computer Graphics, Imaging and Visualization (CGIV) Conf}, year = {2011}, pages = {103--108}}
-
Detection of Copy-Create Image Forgery Using Luminance Level Techniques
Proc. Third National Conf. Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG)
2011, pp. 215-218
BibTeX@inproceedings{Murali2011, author = {Murali, S. and Anami, B. S. and Chittapur, G. B. }, title = {Detection of Copy-Create Image Forgery Using Luminance Level Techniques}, booktitle = {Proc. Third National Conf. Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG)}, year = {2011}, pages = {215--218}}
-
A Statistical Model for Quantized AC Block DCT Coefficients in JPEG Compression and its Application to Detecting Potential Compression History in Bitmap Images
Kim, H.-J., Shi, Y. & Barni, M. (ed.)
Digital Watermarking
Lecture Notes in Computer Science, Springer Berlin / Heidelberg, 2011, Vol. 6526, pp. 75-89
BibTeX@incollection{Narayanan2011, author = {Narayanan, Gopal and Shi, Yun}, title = {A Statistical Model for Quantized AC Block DCT Coefficients in JPEG Compression and its Application to Detecting Potential Compression History in Bitmap Images}, booktitle = {Digital Watermarking}, journal = {Lecture Notes in Computer Science}, publisher = {Springer Berlin / Heidelberg}, year = {2011}, volume = {6526}, pages = {75-89}}
-
Security of copy-move forgery detection techniques
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2011
2011, pp. 1864-1867
BibTeX@inproceedings{Nguyen2011, author = {Nguyen, Hieu Cuong and Katzenbeisser, Stefan}, title = {Security of copy-move forgery detection techniques}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2011}, year = {2011}, pages = {1864--1867}}
-
Digital image forensics using wavelet based image models
Proc. IEEE 19th Conf. Signal Processing and Communications Applications (SIU)
2011, pp. 335-338
BibTeX@inproceedings{Oezparlak2011, author = {Özparlak, L. and Avcibas, I.}, title = {Digital image forensics using wavelet based image models}, booktitle = {Proc. IEEE 19th Conf. Signal Processing and Communications Applications (SIU)}, year = {2011}, pages = {335--338}}
-
Differentiating Between Images Using Wavelet Based Transforms: A Comparative Study
IEEE Transactions on Information Forensics and Security, 2011, Vol. PP(99), pp. 1
BibTeX@article{Oezparlak2011b, author = {Özparlak, L. and Avcibas, I.}, title = {Differentiating Between Images Using Wavelet Based Transforms: A Comparative Study}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2011}, volume = {PP}, number = {99}, pages = {1}}
-
Discriminating Computer Graphics Images and Natural Images Using Hidden Markov Tree Model
Kim, H.-J., Shi, Y. & Barni, M. (ed.)
Digital Watermarking
Springer Berlin Heidelberg, 2011, Vol. 6526, pp. 23-28
BibTeX@incollection{Pan2011b, author = {Pan, Feng and Huang, Jiwu}, title = {Discriminating Computer Graphics Images and Natural Images Using Hidden Markov Tree Model}, booktitle = {Digital Watermarking}, publisher = {Springer Berlin Heidelberg}, year = {2011}, volume = {6526}, pages = {23-28}}
-
Image source detection : a case study on Facebook images taken by iPhones
ATIS 2011 : Workshop proceedingof ATIS 2011. Melbourne, November 9th, 2011. Second Applications and Techniques in Information Security Workshop
2011
BibTeX@inproceedings{Pan2011a, author = {Pan, Lei and Trepanic, Nijaz}, title = {Image source detection : a case study on Facebook images taken by iPhones}, booktitle = {ATIS 2011 : Workshop proceedingof ATIS 2011. Melbourne, November 9th, 2011. Second Applications and Techniques in Information Security Workshop}, year = {2011}}
-
Exposing image forgery with blind noise estimation
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
ACM, 2011, pp. 15-20
BibTeX@inproceedings{Pan2011, author = {Pan, Xunyu and Zhang, Xing and Lyu, Siwei}, title = {Exposing image forgery with blind noise estimation}, booktitle = {Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security}, publisher = {ACM}, year = {2011}, pages = {15--20}}
-
Identification of Photographic Images and Computer Graphics Using Fractal Feature of Sensor Pattern Noise
International Journal of Advancements in Computing Technology, 2011, Vol. 3(3), pp. 222-227
BibTeX@article{Peng2011a, author = {Fei Peng and Min Long}, title = {Identification of Photographic Images and Computer Graphics Using Fractal Feature of Sensor Pattern Noise}, journal = {International Journal of Advancements in Computing Technology}, year = {2011}, volume = {3}, number = {3}, pages = {222-227}}
-
A complete passive blind image copy-move forensics scheme based on compound statistics features
Forensic Science International, 2011, Vol. In Press, Corrected Proof, pp. -
BibTeX@article{Peng2011, author = {Fei Peng and Yun-ying Nie and Min Long}, title = {A complete passive blind image copy-move forensics scheme based on compound statistics features}, journal = {Forensic Science International}, year = {2011}, volume = {In Press, Corrected Proof}, pages = { - }}
-
Forensics Investigations of Multimedia Data: A Review of the State-of-the-Art
Proc. Sixth Int IT Security Incident Management and IT Forensics (IMF) Conf
2011, pp. 48-61
BibTeX@inproceedings{Poisel2011, author = {Poisel, R. and Tjoa, S.}, title = {Forensics Investigations of Multimedia Data: A Review of the State-of-the-Art}, booktitle = {Proc. Sixth Int IT Security Incident Management and IT Forensics (IMF) Conf}, year = {2011}, pages = {48--61}}
-
Forensische Unterschung Multimedialer Daten
9. Sicherheitskonferenz Krems, 2011
2011
BibTeX@inproceedings{Poisel2011a, author = {Rainer Poisel and Simon Tjoa}, title = {Forensische Unterschung Multimedialer Daten}, booktitle = {9. Sicherheitskonferenz Krems, 2011}, year = {2011}}
-
Image forensic of glare feature for improving image retrieval using Benford´s Law
Proc. IEEE Int Circuits and Systems (ISCAS) Symp
2011, pp. 2661-2664
BibTeX@inproceedings{Qadir2011, author = {Qadir, Ghulam and Zhao, Xi and Ho, Anthony TS and Casey, Matthew}, title = {Image forensic of glare feature for improving image retrieval using Benford´s Law}, booktitle = {Proc. IEEE Int Circuits and Systems (ISCAS) Symp}, year = {2011}, pages = {2661--2664}}
-
Blind Detection of Eclosion Forgeries Based on Curvelet Image Enhancement and Edge Detection
Proc. Int Multimedia and Signal Processing (CMSP) Conf
2011, Vol. 1, pp. 316-320
BibTeX@inproceedings{Qi2011, author = {Qi, Yin-Cheng and Xing, Xiao-Shuang and Zhang, Hua-Fang-Zi}, title = {Blind Detection of Eclosion Forgeries Based on Curvelet Image Enhancement and Edge Detection}, booktitle = {Proc. Int Multimedia and Signal Processing (CMSP) Conf}, year = {2011}, volume = {1}, pages = {316--320}}
-
A Novel Approach for Detection of Copy-Move Forgery
Proceedings of the ADVCOMP 2011, The Fifth International Conference on Advanced Engineering Computing and Applications in Sciences
2011
BibTeX@conference{Qiao2011, author = {Mengyu Qiao and Andrew Sung and Qingzhong Liu and Bernardete Ribeiro}, title = {A Novel Approach for Detection of Copy-Move Forgery}, booktitle = {Proceedings of the ADVCOMP 2011, The Fifth International Conference on Advanced Engineering Computing and Applications in Sciences}, year = {2011}}
-
Vision of the unseen: Current trends and challenges in digital image and video forensics
ACM Comput. Surv., ACM, 2011, Vol. 43(4), pp. 26:1-26:42
BibTeX@article{Rocha2011, author = {Rocha, Anderson and Scheirer, Walter and Boult, Terrance and Goldenstein, Siome}, title = {Vision of the unseen: Current trends and challenges in digital image and video forensics}, journal = {ACM Comput. Surv.}, publisher = {ACM}, year = {2011}, volume = {43}, number = {4}, pages = {26:1--26:42}}
-
Blind source separation of discrete finite alphabet sources using a single mixture
Proc. IEEE Statistical Signal Processing Workshop (SSP)
2011, pp. 709-712
BibTeX@inproceedings{Rostami2011, author = {Rostami, M. and Babaie-Zadeh, M. and Samadi, S. and Jutten, C. }, title = {Blind source separation of discrete finite alphabet sources using a single mixture}, booktitle = {Proc. IEEE Statistical Signal Processing Workshop (SSP)}, year = {2011}, pages = {709--712}}
-
A novel method for detecting light source for digital images forensic
Opto-Electronics Review, Versita, co-published with Springer-Verlag GmbH, 2011, Vol. 19, pp. 211-218
BibTeX@article{Roy2011, author = {Roy, A. and Mitra, S. and Agrawal, R.}, title = {A novel method for detecting light source for digital images forensic}, journal = {Opto-Electronics Review}, publisher = {Versita, co-published with Springer-Verlag GmbH}, year = {2011}, volume = {19}, pages = {211-218}}
-
Eye specular highlights telltales for digital forensics: A machine learning approach
Proc. 18th IEEE Int Image Processing (ICIP) Conf
2011, pp. 1937-1940
BibTeX@inproceedings{Saboia2011, author = {Saboia, P. and Carvalho, T. and Rocha, A. }, title = {Eye specular highlights telltales for digital forensics: A machine learning approach}, booktitle = {Proc. 18th IEEE Int Image Processing (ICIP) Conf}, year = {2011}, pages = {1937--1940}}
-
The First Robust Image Tamper Detection Scheme under Brightness
Proc. Fifth Int Genetic and Evolutionary Computing (ICGEC) Conf
2011, pp. 200-203
BibTeX@inproceedings{Shen2011, author = {Jau-Ji Shen and Wei-Cheng Huang}, title = {The First Robust Image Tamper Detection Scheme under Brightness}, booktitle = {Proc. Fifth Int Genetic and Evolutionary Computing (ICGEC) Conf}, year = {2011}, pages = {200--203}}
-
A Blur Image Blind Identify Algorithm Based on the Edge Feature
Proc. Third Int Multimedia Information Networking and Security (MINES) Conf
2011, pp. 309-313
BibTeX@inproceedings{Shen2011a, author = {Shen, Xuan-jing and Tang, Bo-hao and L,i Xiao-fei and Chen, Hai-peng}, title = {A Blur Image Blind Identify Algorithm Based on the Edge Feature}, booktitle = {Proc. Third Int Multimedia Information Networking and Security (MINES) Conf}, year = {2011}, pages = {309--313}}
-
Automated Forensic Method for Copy-Move Forgery Detection based on Harris Interest Points and SIFT Descriptors
International Journal of Computer Applications, 2011, Vol. 27(3), pp. 9-17
BibTeX@article{Shivakumar2011, author = {B.L. Shivakumar and S.Santhosh Baboo}, title = {Automated Forensic Method for Copy-Move Forgery Detection based on Harris Interest Points and SIFT Descriptors}, journal = {International Journal of Computer Applications}, year = {2011}, volume = {27}, number = {3}, pages = {9-17}}
-
Fast and Efficient Region Duplication Detection in Digital Images Using Sub-Blocking Method
International Journal of Advanced Science and Technology, 2011, Vol. 35, pp. 93-102
BibTeX@article{Singh2011, author = {Vivek Kumar Singh and R.C. Tripathi}, title = {Fast and Efficient Region Duplication Detection in Digital Images Using Sub-Blocking Method}, journal = {International Journal of Advanced Science and Technology}, year = {2011}, volume = {35}, pages = {93--102}}
-
A new estimation approach of resampling factors using threshold-based peak detection
Proc. IEEE Int Consumer Electronics (ICCE) Conf
2011, pp. 731-732
BibTeX@inproceedings{Song2011, author = {Geun-Sil Song and Yong-In Yun and Won-Hyung Lee}, title = {A new estimation approach of resampling factors using threshold-based peak detection}, booktitle = {Proc. IEEE Int Consumer Electronics (ICCE) Conf}, year = {2011}, pages = {731--732}}
-
Anti-forensics for frame deletion/addition in MPEG video
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2011
2011, pp. 1876-1879
BibTeX@inproceedings{Stamm2011, author = {Stamm, Matthew C. and Liu, K. J. Ray}, title = {Anti-forensics for frame deletion/addition in MPEG video}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2011}, year = {2011}, pages = {1876--1879}}
-
Anti-forensics of digital image compression
IEEE Transactions on Information Forensics and Security, 2011, Vol. 6(3), pp. 1050-1065
BibTeX@article{Stamm2011a, author = {Stamm, M. C. and Liu, K. J. R. }, title = {Anti-forensics of digital image compression}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2011}, volume = {6}, number = {3}, pages = {1050--1065}}
-
Detection of blue screen based on edge features
Information Technology and Artificial Intelligence Conference (ITAIC), 2011 6th IEEE Joint International
2011, Vol. 2, pp. 469-472
BibTeX@inproceedings{Su2011, author = {Y. Su and Y. Han and C. Zhang}, title = {Detection of blue screen based on edge features}, booktitle = {Information Technology and Artificial Intelligence Conference (ITAIC), 2011 6th IEEE Joint International}, year = {2011}, volume = {2}, pages = {469--472}}
-
Copy-Move Forgery Detection in Digital Images: Progress and Challenges
International Journal on Computer Science and Engineering, 2011, Vol. 3, pp. 652-663
BibTeX@article{SunilKumar2011, author = {Sunil Kumar, P. K. and Das, Shally and Mukherjee, S.}, title = {Copy-Move Forgery Detection in Digital Images: Progress and Challenges}, journal = {International Journal on Computer Science and Engineering}, year = {2011}, volume = {3}, pages = {652-663}}
-
Markovian Rake Transform for Digital Image Tampering Detection
Shi, Y., Emmanuel, S., Kankanhalli, M., Chang, S.-F., Radhakrishnan, R., Ma, F. & Zhao, L. (ed.)
Transactions on Data Hiding and Multimedia Security VI
Springer Berlin / Heidelberg, 2011, Vol. 6730, pp. 1-17
BibTeX@incollection{Sutthiwan2011, author = {Sutthiwan, Patchara and Shi, Yun and Zhao, Hong and Ng, Tian-Tsong and Su, Wei}, title = {Markovian Rake Transform for Digital Image Tampering Detection}, booktitle = {Transactions on Data Hiding and Multimedia Security VI}, publisher = {Springer Berlin / Heidelberg}, year = {2011}, volume = {6730}, pages = {1-17}}
-
Analysis of multimedia forensic technique
Proceedings of the 2011 International Conference on Communication, Computing & Security (ICCCS 2011)
Proceedings of the 2011 International Conference on Communication, Computing & Security, ACM, 2011, pp. 289-294
BibTeX@inproceedings{Talmale2011, author = {Talmale, G. R. and Talhan, A. V. and Dharaskar, R. V.}, title = {Analysis of multimedia forensic technique}, booktitle = {Proceedings of the 2011 International Conference on Communication, Computing & Security (ICCCS 2011)}, journal = {Proceedings of the 2011 International Conference on Communication, Computing & Security}, publisher = {ACM}, year = {2011}, pages = {289--294}}
-
Digital camera identification based on the clustered pattern noise of image sensors
Proc. IEEE Int Multimedia and Expo (ICME) Conf
2011, pp. 1-4
BibTeX@inproceedings{Tomioka2011, author = {Tomioka, Y. and Kitazawa, H. }, title = {Digital camera identification based on the clustered pattern noise of image sensors}, booktitle = {Proc. IEEE Int Multimedia and Expo (ICME) Conf}, year = {2011}, pages = {1--4}}
-
Countering JPEG anti-forensics
Proc. 18th IEEE Int Image Processing (ICIP) Conf
2011, pp. 1949-1952
BibTeX@inproceedings{Valenzise2011a, author = {Valenzise, Giuseppe and Nobile, V. and Tagliasacchi, Marco and Tubaro, Stefano}, title = {Countering JPEG anti-forensics}, booktitle = {Proc. 18th IEEE Int Image Processing (ICIP) Conf}, year = {2011}, pages = {1949--1952}}
-
The Cost of JPEG Compression Anti-forensics
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2011
2011
BibTeX@inproceedings{Valenzise2011, author = {Valenzise, Giuseppe and Tagliasacchi, Marco and Tubaro, Stefano}, title = {The Cost of JPEG Compression Anti-forensics}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2011}, year = {2011}}
-
Prefilter design for forensic resampling estimation
Proc. IEEE Int Information Forensics and Security (WIFS) Workshop
2011
BibTeX@inproceedings{Vazquez-Padin2011, author = {Vazquez-Padin, David and Perez-Gonzalez, Fernando}, title = {Prefilter design for forensic resampling estimation}, booktitle = {Proc. IEEE Int Information Forensics and Security (WIFS) Workshop}, year = {2011}}
-
Impact of Quantization Matrix on the Performance of JPEG
International Journal of Future Generation Communication and Networking, 2011, Vol. 4(3), pp. 107-118
BibTeX@article{Viraktamath2011, author = {S. V. Viraktamath and Girish V. Attimarad}, title = {Impact of Quantization Matrix on the Performance of JPEG}, journal = {International Journal of Future Generation Communication and Networking}, year = {2011}, volume = {4}, number = {3}, pages = {107--118}}
-
The image tampered detection and restoration using the characteristic values
Proc. Int Machine Learning and Cybernetics (ICMLC) Conf
2011, Vol. 4, pp. 1845-1850
BibTeX@inproceedings{Wang2011f, author = {Ching-Te Wang and Ching-Lin Wang and Lin-Chun Li and Ming-Yuan Hsieh}, title = {The image tampered detection and restoration using the characteristic values}, booktitle = {Proc. Int Machine Learning and Cybernetics (ICMLC) Conf}, year = {2011}, volume = {4}, pages = {1845--1850}}
-
Tampered Region Localization of Digital Color Images Based on JPEG Compression Noise
Kim, H.-J., Shi, Y. & Barni, M. (ed.)
Digital Watermarking
Springer Berlin / Heidelberg, 2011, Vol. 6526, pp. 120-133
BibTeX@incollection{Wang2011, author = {Wang, Wei and Dong, Jing and Tan, Tieniu}, title = {Tampered Region Localization of Digital Color Images Based on JPEG Compression Noise}, booktitle = {Digital Watermarking}, publisher = {Springer Berlin / Heidelberg}, year = {2011}, volume = {6526}, pages = {120-133}}
-
Exploring DCT coefficient quantization effect for image tampering localization
Proc. IEEE Int Information Forensics and Security (WIFS) Workshop
2011, pp. 1-6
BibTeX@inproceedings{Wang2011b, author = {Wei Wang and Jing Dong and Tieniu Tan}, title = {Exploring DCT coefficient quantization effect for image tampering localization}, booktitle = {Proc. IEEE Int Information Forensics and Security (WIFS) Workshop}, year = {2011}, pages = {1--6}}
-
The Analysis and Detection of Double JPEG2000 Compression
Key Engineering Materials, 2011, Vol. (Volumes 474 - 476) Advanced Materials and Computer Science, pp. 2043-2048
BibTeX@article{Wang2011a, author = {Wei Wang and Rang Ding Wang}, title = {The Analysis and Detection of Double JPEG2000 Compression}, journal = {Key Engineering Materials}, year = {2011}, volume = {(Volumes 474 - 476) Advanced Materials and Computer Science}, pages = {2043-2048}}
-
A DWT-DCT Based Passive Forensics Method for Copy-Move Attacks
Multimedia Information Networking and Security (MINES), 2011 Third International Conference on
2011, pp. 304-308
BibTeX@inproceedings{Wang2011c, author = {Xiaofeng Wang and Xiaoni Zhang and Zhen Li and Shangping Wang}, title = {A DWT-DCT Based Passive Forensics Method for Copy-Move Attacks}, booktitle = {Multimedia Information Networking and Security (MINES), 2011 Third International Conference on}, year = {2011}, pages = {304--308}}
-
Log-Polar Based Scheme for Revealing Duplicated Regions in Digital Images
IEEE Signal Processing Letters, 2011, Vol. 18(10), pp. 559-562
BibTeX@article{Wu2011, author = {Qiumin Wu and Shuozhong Wang and Xinpeng Zhang}, title = {Log-Polar Based Scheme for Revealing Duplicated Regions in Digital Images}, journal = {IEEE Signal Processing Letters}, year = {2011}, volume = {18}, number = {10}, pages = {559--562}}
-
Identifying computer generated graphics via histogram features
Image Processing (ICIP), 2011 18th IEEE International Conference on
2011, pp. 1933-1936
BibTeX@inproceedings{Wu2011b, author = {Ruoyu Wu and Xiaolong Li and Bin Yang}, title = {Identifying computer generated graphics via histogram features}, booktitle = {Image Processing (ICIP), 2011 18th IEEE International Conference on}, year = {2011}, pages = {1933--1936}}
-
Image Splicing Detection Using Illuminant Color Inconsistency
Proc. Third Int Multimedia Information Networking and Security (MINES) Conf
2011, pp. 600-603
BibTeX@inproceedings{Wu2011a, author = {Xuemin Wu and Zhen Fang}, title = {Image Splicing Detection Using Illuminant Color Inconsistency}, booktitle = {Proc. Third Int Multimedia Information Networking and Security (MINES) Conf}, year = {2011}, pages = {600--603}}
-
Photorealistic computer graphics forensics based on leading digit law
Journal of Electronics (China), Science Press, co-published with Springer-Verlag GmbH, 2011, Vol. 28, pp. 95-100
BibTeX@article{Xu2011, author = {Xu, Bo and Wang, Junwen and Liu, Guangjie and Dai, Yuewei}, title = {Photorealistic computer graphics forensics based on leading digit law}, journal = {Journal of Electronics (China)}, publisher = {Science Press, co-published with Springer-Verlag GmbH}, year = {2011}, volume = {28}, pages = {95-100}}
-
Detecting Copy-Move Forgery Using Non-negative Matrix Factorization
Proc. Third Int Multimedia Information Networking and Security (MINES) Conf
2011, pp. 591-594
BibTeX@inproceedings{Yao2011, author = {Heng Yao and Tong Qiao and Zhenjun Tang and Yan Zhao and Hualing Mao}, title = {Detecting Copy-Move Forgery Using Non-negative Matrix Factorization}, booktitle = {Proc. Third Int Multimedia Information Networking and Security (MINES) Conf}, year = {2011}, pages = {591--594}}
-
Digital Image Forgery Detection Based on Lens and Sensor Aberration
International Journal of Computer Vision, Springer Netherlands, 2011, Vol. 92, pp. 71-91
BibTeX@article{Yerushalmy2011, author = {Yerushalmy, Ido and Hel-Or, Hagit}, title = {Digital Image Forgery Detection Based on Lens and Sensor Aberration}, journal = {International Journal of Computer Vision}, publisher = {Springer Netherlands}, year = {2011}, volume = {92}, pages = {71-91}}
-
Toward the identification of DSLR lenses by chromatic aberration
Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
Proceedings of SPIE
Media Watermarking, Security, and Forensics III, SPIE, 2011, Vol. 7880(1), pp. 788010
BibTeX@conference{Yu2011, author = {Jun Yu and Scott Craver and Enping Li}, title = {Toward the identification of DSLR lenses by chromatic aberration}, booktitle = {Proceedings of SPIE}, journal = {Media Watermarking, Security, and Forensics III}, publisher = {SPIE}, year = {2011}, volume = {7880}, number = {1}, pages = {788010}}
-
Blind Forensics of Median Filtering in Digital Images
Proc. Fourth Int Computational Sciences and Optimization (CSO) Joint ConfMedian
IEEE Transactions on Information Forensics and Security, 2011(99), pp. 332 - 335
BibTeX@inproceedings{Yuan, author = {Yuan, H.}, title = {Blind Forensics of Median Filtering in Digital Images}, booktitle = {Proc. Fourth Int Computational Sciences and Optimization (CSO) Joint ConfMedian}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2011}, number = {99}, pages = {332 - 335}}
-
Image Authentication Using Active Watermarking and Passive Forensics Techniques
Lin, W., Tao, D., Kacprzyk, J., Li, Z., Izquierdo, E. & Wang, H. (ed.)
Multimedia Analysis, Processing and Communications
Springer Berlin / Heidelberg, 2011, Vol. 346, pp. 139-183
BibTeX@incollection{Zhao2011, author = {Zhao, Xi and Bateman, Philip and Ho, Anthony}, title = {Image Authentication Using Active Watermarking and Passive Forensics Techniques}, booktitle = {Multimedia Analysis, Processing and Communications}, publisher = {Springer Berlin / Heidelberg}, year = {2011}, volume = {346}, pages = {139-183}}
-
Detecting Digital Image Splicing in Chroma Spaces
Kim, H.-J., Shi, Y. & Barni, M. (ed.)
Digital Watermarking
Springer Berlin / Heidelberg, 2011, Vol. 6526, pp. 12-22
BibTeX@incollection{Zhao2011a, author = {Zhao, Xudong and Li, Jianhua and Li, Shenghong and Wang, Shilin}, title = {Detecting Digital Image Splicing in Chroma Spaces}, booktitle = {Digital Watermarking}, publisher = {Springer Berlin / Heidelberg}, year = {2011}, volume = {6526}, pages = {12--22}}
-
Passive Detection of Paint-Doctored JPEG Images
Kim, H.-J., Shi, Y. & Barni, M. (ed.)
Digital Watermarking
Springer Berlin / Heidelberg, 2011, Vol. 6526, pp. 1-11
BibTeX@incollection{Zhao2011b, author = {Zhao, Yu and Shih, Frank and Shi, Yun}, title = {Passive Detection of Paint-Doctored JPEG Images}, booktitle = {Digital Watermarking}, publisher = {Springer Berlin / Heidelberg}, year = {2011}, volume = {6526}, pages = {1-11}}
-
An Overview of Digital Watermarking in Image Forensics
Proc. Fourth Int Computational Sciences and Optimization (CSO) Joint Conf
2011, pp. 332-335
BibTeX@inproceedings{Zhou, author = {Zhou, Guojuan and Lv, Dianji}, title = {An Overview of Digital Watermarking in Image Forensics}, booktitle = {Proc. Fourth Int Computational Sciences and Optimization (CSO) Joint Conf}, year = {2011}, pages = {332--335}}
-
Photographic Composite Detection Using Two Circles
Proc. Sixth Int Image and Graphics (ICIG) Conf
2011, pp. 858-863
BibTeX@inproceedings{Zhu2011, author = {Shuyi Zhu and Xiaochun Cao and Handong Zhao}, title = {Photographic Composite Detection Using Two Circles}, booktitle = {Proc. Sixth Int Image and Graphics (ICIG) Conf}, year = {2011}, pages = {858--863}}
-
Passive Detection of Copy-paste Tampering for Digital Image Forensics
Proc. Int Intelligent Computation Technology and Automation (ICICTA) Conf
2011, Vol. 2, pp. 649-652
BibTeX@inproceedings{Zhulong2011, author = {Liu Zhulong and Li Xianghua and Zhao Yuqian}, title = {Passive Detection of Copy-paste Tampering for Digital Image Forensics}, booktitle = {Proc. Int Intelligent Computation Technology and Automation (ICICTA) Conf}, year = {2011}, volume = {2}, pages = {649--652}}
-
DWT-PCA (EVD) Based Copy-move Image Forgery Detection
International Journal of Digital Content Technology and its Applications., 2011, Vol. 5, pp. 251-258
BibTeX@article{Zimba2011, author = {Michael Zimba and Sun Xingming}, title = {DWT-PCA (EVD) Based Copy-move Image Forgery Detection}, journal = {International Journal of Digital Content Technology and its Applications.}, year = {2011}, volume = {5}, pages = {251--258}}
-
Tampering detection for composite images based on re-sampling and JPEG compression
Proc. First Asian Conf. Pattern Recognition (ACPR)
2011, pp. 169-173
BibTeX@inproceedings{Zuo2011, author = {Juxian Zuo and Shengjun Pan and Benyong Liu and Xiang Liao}, title = {Tampering detection for composite images based on re-sampling and JPEG compression}, booktitle = {Proc. First Asian Conf. Pattern Recognition (ACPR)}, year = {2011}, pages = {169--173}}
2010
-
XMP Specification Part 1 Data Model, Serialization, and Core Properties
Adobe, 2010
BibTeX@standard{Adobe2010, author = {Adobe}, title = {XMP Specification Part 1 Data Model, Serialization, and Core Properties}, year = {2010}}
-
XMP Specification Part 2 Additional Properties
Adobe, 2010
BibTeX@standard{Adobe2010a, author = {Adobe}, title = {XMP Specification Part 2 Additional Properties}, year = {2010}}
-
XMP Specification Part 3 Storage in Files
Adobe, 2010
BibTeX@standard{Adobe2010b, author = {Adobe}, title = {XMP Specification Part 3 Storage in Files}, year = {2010}}
-
Geometric tampering estimation by means of a sift-based forensic analysis
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2010
International Conference on Acoustics, Speech, and Signal Processing, 2010
BibTeX@inproceedings{Amerini2010, author = {Amerini, Irene and Ballan, Lamberto and Caldelli, Roberto and Bimbo, Alberto Del and Serra, Giuseppe}, title = {Geometric tampering estimation by means of a sift-based forensic analysis}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2010}, journal = {International Conference on Acoustics, Speech, and Signal Processing}, year = {2010}}
-
Geometric tampering estimation by means of a SIFT-based forensic analysis
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2010
2010, pp. 1702-1705
BibTeX@inproceedings{Amerini2010b, author = {Amerini, I. and Ballan, L. and Caldelli, R. and Del Bimbo, A. and Serra, G. }, title = {Geometric tampering estimation by means of a SIFT-based forensic analysis}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2010}, year = {2010}, pages = {1702--1705}}
-
Detecting multiple copies in tampered images
Proc. 17th IEEE Int Image Processing (ICIP) Conf
2010, pp. 2117-2120
BibTeX@inproceedings{Ardizzone2010, author = {Ardizzone, E. and Bruno, A. and Mazzola, G.}, title = {Detecting multiple copies in tampered images}, booktitle = {Proc. 17th IEEE Int Image Processing (ICIP) Conf}, year = {2010}, pages = {2117--2120}}
-
Identification of Cut & Paste Tampering by Means of Double-JPEG Detection and Image Segmentation
International Symposium on Circuits and Systems
2010
BibTeX@inproceedings{Barni2010, author = {Barni, Mauro and Costanzo, Andrea and Sabatini, Lara}, title = {Identification of Cut & Paste Tampering by Means of Double-JPEG Detection and Image Segmentation}, booktitle = {International Symposium on Circuits and Systems}, year = {2010}}
-
Exploring Duplicated Regions in Natural Images
IEEE Transactions on Image Processing, 2010, Vol. PP Issue:99(99), pp. 1
BibTeX@article{Bashar2010, author = {Bashar, M. and Noda, K. and Ohnishi, N. and Mori, K.}, title = {Exploring Duplicated Regions in Natural Images}, journal = {IEEE Transactions on Image Processing}, year = {2010}, volume = {PP Issue:99}, number = {99}, pages = {1}}
-
Chain of evidence generation for contrast enhancement in digital image forensics
Creutzburg, R. & Akopian, D. (ed.)
Proc. SPIE 7542
Multimedia on Mobile Devices 2010, SPIE, 2010, Vol. 7542(1), pp. 75420E
BibTeX@conference{Battiato2010, author = {Sebastiano Battiato and Giuseppe Messina and Daniela Strano}, title = {Chain of evidence generation for contrast enhancement in digital image forensics}, booktitle = {Proc. SPIE 7542}, journal = {Multimedia on Mobile Devices 2010}, publisher = {SPIE}, year = {2010}, volume = {7542}, number = {1}, pages = {75420E}}
-
Efficient techniques for sensor fingerprint matching in large image and video databases
Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
Media Forensics and Security II
Media Forensics and Security II, SPIE, 2010, Vol. 7541(1), pp. 754109
BibTeX@inproceedings{Bayram2010, author = {Sevinc Bayram and H. Taha Sencar and Nasir Memon}, title = {Efficient techniques for sensor fingerprint matching in large image and video databases}, booktitle = {Media Forensics and Security II}, journal = {Media Forensics and Security II}, publisher = {SPIE}, year = {2010}, volume = {7541}, number = {1}, pages = {754109}}
-
Forensic visual evidence 2007-2010: A Review
Proceeding of the 16th INTERPOL Forensic Science Symposium, Lyon, France, October 2010
2010
BibTeX@conference{Bijhold2010, author = {Bijhold, J. and Ruifrok, A. and Geradts, Z. J.}, title = {Forensic visual evidence 2007-2010: A Review}, booktitle = {Proceeding of the 16th INTERPOL Forensic Science Symposium, Lyon, France, October 2010}, year = {2010}}
-
Image Copy-Move Forgery Detection Based on SURF
Proc. Int Multimedia Information Networking and Security (MINES) Conf
2010, pp. 889-892
BibTeX@inproceedings{Bo2010, author = {Xu Bo and Wang Junwen and Liu Guangjie and Dai Yuewei}, title = {Image Copy-Move Forgery Detection Based on SURF}, booktitle = {Proc. Int Multimedia Information Networking and Security (MINES) Conf}, year = {2010}, pages = {889--892}}
-
Signal-dependent raw image denoising using sensor noise characterization via multiple acquisitions
Imai, Francisco; Sampat, N. X. F. (ed.)
Digital Photography VI
2010, Vol. Proceedings of the SPIE, Volume 7537
BibTeX@inproceedings{Bosco2010, author = {Bosco, A.; Bruna, R. A.; Giacalone, D.; Battiato, S.; Rizzo, R.}, title = {Signal-dependent raw image denoising using sensor noise characterization via multiple acquisitions}, booktitle = {Digital Photography VI}, year = {2010}, volume = {Proceedings of the SPIE, Volume 7537}}
-
Blind Tampering Identification by Incorporating EFR and Calibration
Proc. Int Multimedia Information Networking and Security (MINES) Conf
2010, pp. 379-383
BibTeX@inproceedings{Cai2010, author = {Kaiwei Cai and Xiaolong Li and Bin Yang and Xiaoqing Lu}, title = {Blind Tampering Identification by Incorporating EFR and Calibration}, booktitle = {Proc. Int Multimedia Information Networking and Security (MINES) Conf}, year = {2010}, pages = {379--383}}
-
A DFT-Based Analysis to Discern Between Camera and Scanned Images
International Journal of Digital Crime and Forensics (IJDCF), 2010, Vol. 2(1), pp. 21-29
BibTeX@article{Caldelli2010, author = {Caldelli, Roberto and Amerini, Irene and Picchioni, Francesco}, title = {A DFT-Based Analysis to Discern Between Camera and Scanned Images}, journal = {International Journal of Digital Crime and Forensics (IJDCF)}, year = {2010}, volume = {2}, number = {1}, pages = {21-29}}
-
Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions
Klinger, K. (ed.)
Chapter Multimedia Forensic Techniques for Acquisition Device Identification and Digital Image Authentication (Chapter 6)
Information Science Reference, 2010, pp. 130-154
BibTeX@inbook{Caldelli2010a, author = {Caldelli, Roberto and Amerini, Irene and Picchioni, Francesco and Rosa, Alessia De and Uccheddu, Francesca}, title = {Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions}, publisher = {Information Science Reference}, year = {2010}, pages = {130-154}}
-
Edge-based Blur Metric for Tamper Detection
Journal of Information Hiding and Multimedia Signal Processing, 2010, Vol. 1(1), pp. 20-27
BibTeX@article{Cao2010, author = {Cao, Gang and Zhao, Yao and Ni, Rongrong}, title = {Edge-based Blur Metric for Tamper Detection}, journal = {Journal of Information Hiding and Multimedia Signal Processing}, year = {2010}, volume = {1}, number = {1}, pages = {20-27}}
-
Forensic Estimation of Gamma Correction in Digital Images
International Conference on Image Processing
2010
BibTeX@inproceedings{Cao2010d, author = {Cao, Gang and Zhao, Yao and Ni, Rongrong}, title = {Forensic Estimation of Gamma Correction in Digital Images}, booktitle = {International Conference on Image Processing}, year = {2010}}
-
Anti-forensics of contrast enhancement in digital images
Proceedings of the 12th ACM workshop on Multimedia and security
ACM, 2010, pp. 25-34
BibTeX@inproceedings{Cao2010b, author = {Cao, Gang and Zhao, Yao and Ni, Rongrong and Tian, Huawei}, title = {Anti-forensics of contrast enhancement in digital images}, booktitle = {Proceedings of the 12th ACM workshop on Multimedia and security}, publisher = {ACM}, year = {2010}, pages = {25--34}}
-
Forensic Detection of Median Filtering in Digital Images
IEEE International Conference on Multimedia and EXPO
2010
BibTeX@inproceedings{Cao2010e, author = {Cao, Gang and Zhao, Yao and Ni, Rongrong and Yu, Lifang and Tian, Huawei}, title = {Forensic Detection of Median Filtering in Digital Images}, booktitle = {IEEE International Conference on Multimedia and EXPO}, year = {2010}}
-
Identification of recaptured photographs on LCD screens
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2010
2010, pp. 1790-1793
BibTeX@inproceedings{Cao2010a, author = {Cao, Hong and Kot, Alex C.}, title = {Identification of recaptured photographs on LCD screens}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2010}, year = {2010}, pages = {1790--1793}}
-
Mobile Camera Identification Using Demosaicing Features
International Symposium on Circuits and Systems
2010
BibTeX@inproceedings{Cao2010c, author = {Cao, Hong and Kot, Alex C.}, title = {Mobile Camera Identification Using Demosaicing Features}, booktitle = {International Symposium on Circuits and Systems}, year = {2010}}
-
Identification of recaptured photographs on LCD screens
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2010
2010, pp. 1790-1793
BibTeX@inproceedings{Cao2010f, author = {Hong Cao and Alex C. Kot}, title = {Identification of recaptured photographs on LCD screens}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2010}, year = {2010}, pages = {1790--1793}}
-
Search Strategies for Image Multi-distortion Estimation
Proc. 20th Int Pattern Recognition (ICPR) Conf
2010, pp. 2824-2827
BibTeX@inproceedings{Caron2010, author = {Caron, A. and Jodoin, P. and Charrier, C. }, title = {Search Strategies for Image Multi-distortion Estimation}, booktitle = {Proc. 20th Int Pattern Recognition (ICPR) Conf}, year = {2010}, pages = {2824--2827}}
-
Source Camera Identification in Real Practice: A Preliminary Experimentation
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, Communication and Applications, BWCCA 2010, November 4-6, 2010, Fukuoka Institute of Technology, Fukuoka, Japan (In conjunction with the 3PGCIC-2010 International Conference)
2010, pp. 417-422
BibTeX@inproceedings{Castiglione2010, author = {Castiglione, A. and Cattaneo, G. and Cembalo, M. and Petrillo, U. F.}, title = {Source Camera Identification in Real Practice: A Preliminary Experimentation}, booktitle = {Proceedings of the Fifth International Conference on Broadband and Wireless Computing, Communication and Applications, BWCCA 2010, November 4-6, 2010, Fukuoka Institute of Technology, Fukuoka, Japan (In conjunction with the 3PGCIC-2010 International Conference)}, year = {2010}, pages = {417--422}}
-
Integration Experiences and Performance Studies of A COTS Parallel Archive System
Cluster Computing (CLUSTER), 2010 IEEE International Conference on
2010, pp. 166-177
BibTeX@inproceedings{Chen2010a, author = {Chen, H. and Grider, G. and Scott, C. and Turley, M. and Torres, A. and Sanchez, K. and Bremer, J.}, title = {Integration Experiences and Performance Studies of A COTS Parallel Archive System}, booktitle = {Cluster Computing (CLUSTER), 2010 IEEE International Conference on}, year = {2010}, pages = {166--177}}
-
Blind Identification Method for Authenticity of Infinite Light Source Images
Proc. Fifth Int Frontier of Computer Science and Technology (FCST) Conf
2010, pp. 131-135
BibTeX@inproceedings{Chen2010, author = {Haipeng Chen and Xuanjing Shen and Yingda Lv}, title = {Blind Identification Method for Authenticity of Infinite Light Source Images}, booktitle = {Proc. Fifth Int Frontier of Computer Science and Technology (FCST) Conf}, year = {2010}, pages = {131--135}}
-
Source Camera Identification Based on Sensor Readout Noise
International Journal of Digital Crime and Forensics (IJDCF), 2010, Vol. 2(3), pp. 28-43
BibTeX@article{Chennamma2010, author = {H. R. Chennamma and Lalitha Rangarajan}, title = {Source Camera Identification Based on Sensor Readout Noise}, journal = {International Journal of Digital Crime and Forensics (IJDCF)}, year = {2010}, volume = {2}, number = {3}, pages = {28-43}}
-
Blind and passive digital video tamper detection based on multimodal fusion
Proceedings of the 14th WSEAS international conference on Communications
World Scientific and Engineering Academy and Society (WSEAS), 2010, pp. 109-117
BibTeX@inproceedings{Chetty2010a, author = {Chetty, Girija}, title = {Blind and passive digital video tamper detection based on multimodal fusion}, booktitle = {Proceedings of the 14th WSEAS international conference on Communications}, publisher = {World Scientific and Engineering Academy and Society (WSEAS)}, year = {2010}, pages = {109--117}}
-
Nonintrusive Image Tamper Detection Based on Fuzzy Fusion
Journal of Computer Science and Network Security, 2010, Vol. 10(9), pp. 86-90
BibTeX@article{Chetty2010b, author = {Chetty, Girija}, title = {Nonintrusive Image Tamper Detection Based on Fuzzy Fusion}, journal = {Journal of Computer Science and Network Security}, year = {2010}, volume = {10}, number = {9}, pages = {86-90}}
-
Digital Video Tamper Detection Based on Multimodal Fusion of Residue Features
Proc. 4th Int Network and System Security (NSS) Conf
2010, pp. 606-613
BibTeX@inproceedings{Chetty2010d, author = {Chetty, G. and Biswas, M. and Singh, R. }, title = {Digital Video Tamper Detection Based on Multimodal Fusion of Residue Features}, booktitle = {Proc. 4th Int Network and System Security (NSS) Conf}, year = {2010}, pages = {606--613}}
-
Digital Image Tamper Detection Based on Multimodal Fusion of Residue Features
Blanc-Talon, J., Bone, D., Philips, W., Popescu, D. & Scheunders, P. (ed.)
Advanced Concepts for Intelligent Vision Systems
Springer Berlin / Heidelberg, 2010, Vol. 6475, pp. 79-87
BibTeX@incollection{Chetty2010c, author = {Chetty, Girija and Goodwin, Julian and Singh, Monica}, title = {Digital Image Tamper Detection Based on Multimodal Fusion of Residue Features}, booktitle = {Advanced Concepts for Intelligent Vision Systems}, publisher = {Springer Berlin / Heidelberg}, year = {2010}, volume = {6475}, pages = {79-87}}
-
Blind Image Tamper Detection Based on Multimodal Fusion
Wong, K., Mendis, B. & Bouzerdoum, A. (ed.)
Neural Information Processing. Models and Applications
Springer Berlin / Heidelberg, 2010, Vol. 6444, pp. 557-564
BibTeX@incollection{Chetty2010, author = {Chetty, Girija and Singh, Monica and White, Matthew}, title = {Blind Image Tamper Detection Based on Multimodal Fusion}, booktitle = {Neural Information Processing. Models and Applications}, publisher = {Springer Berlin / Heidelberg}, year = {2010}, volume = {6444}, pages = {557-564}}
-
Intelligent Multimedia Analysis for Security Applications
Husrev T. Sencar, Sergio Velastin, N. N. S. L. (ed.)
Chapter Printer and Scanner Forensics: Models and Methods
Springer Berlin / Heidelberg, 2010, pp. 145-187
BibTeX@inbook{Chiang2010, author = {Chiang and Khanna and Mikkilineni and Segovia and Chiu and Delp, E. J.}, title = {Intelligent Multimedia Analysis for Security Applications}, publisher = {Springer Berlin / Heidelberg}, year = {2010}, pages = {145-187}}
-
Studies in Computational Intelligence
Chapter Printer and Scanner Forensics: Models and Methods
Springer, 2010, pp. 145-187
BibTeX@inbook{Chiang2010a, author = {Pei-Ju Chiang and Nitin Khanna and Aravind K. Mikkilineni and Maria V. Ortiz Segovia and Jan P. Allebach and George T. C. Chiu and Edward J. Delp}, title = {Studies in Computational Intelligence}, publisher = {Springer}, year = {2010}, pages = {145-187}}
-
On the influence of denoising in PRNU based forgery detection
Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence
ACM, 2010, pp. 117-122
BibTeX@inproceedings{Chierchia:2010:IDP:1877972.1878002, author = {Chierchia, Giovanni and Parrilli, Sara and Poggi, Giovanni and Sansone, Carlo and Verdoliva, Luisa}, title = {On the influence of denoising in PRNU based forgery detection}, booktitle = {Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence}, publisher = {ACM}, year = {2010}, pages = {117--122}}
-
Scanner Identification Using Spectral Noise in the Frequency Domain
International Conference on Image Processing
2010
BibTeX@inproceedings{Choi2010, author = {Choi, Chang-Hee and Lee, Min-Jeong and Lee, Heung-Kyu}, title = {Scanner Identification Using Spectral Noise in the Frequency Domain}, booktitle = {International Conference on Image Processing}, year = {2010}}
-
A Study on Features for the Detection of Copy-Move Forgeries
Information Security Solutions Europe
2010
BibTeX@inproceedings{Christlein2010, author = {Christlein, Vincent and Riess, Christian and Angelopoulou, Elli}, title = {A Study on Features for the Detection of Copy-Move Forgeries}, booktitle = {Information Security Solutions Europe}, year = {2010}}
-
On rotation invariance in copy-move forgery detection
Proc. IEEE Int Information Forensics and Security (WIFS) Workshop
2010, pp. 1-6
BibTeX@inproceedings{Christlein2010a, author = {Christlein, V. and Riess, C. and Angelopoulou, E.}, title = {On rotation invariance in copy-move forgery detection}, booktitle = {Proc. IEEE Int Information Forensics and Security (WIFS) Workshop}, year = {2010}, pages = {1--6}}
-
Semi non-intrusive training for cell-phone camera model linkage
Proc. IEEE Int Information Forensics and Security (WIFS) Workshop
2010, pp. 1-6
BibTeX@inproceedings{Chuang2010, author = {Wei-Hong Chuang and Min Wu}, title = {Semi non-intrusive training for cell-phone camera model linkage}, booktitle = {Proc. IEEE Int Information Forensics and Security (WIFS) Workshop}, year = {2010}, pages = {1--6}}
-
Removing chromatic aberration by digital image processing
Optical Engineering, SPIE, 2010, Vol. 49(6), pp. 067002
BibTeX@article{Chung2010, author = {Soon-Wook Chung and Byoung-Kwang Kim and Woo-Jin Song}, title = {Removing chromatic aberration by digital image processing}, journal = {Optical Engineering}, publisher = {SPIE}, year = {2010}, volume = {49}, number = {6}, pages = {067002}}
-
Exchangable image file format dor digital still cameras: EXIF Version 2.3
CIPA, 2010
BibTeX@standard{CIPA2010, author = {CIPA}, title = {Exchangable image file format dor digital still cameras: EXIF Version 2.3}, year = {2010}}
-
Handbook of Blind Source Separation: Independent Component Analysis and Applications
Academic Press, 2010
BibTeX@book{Comon2010, author = {Comon, Pierre and Jutten, Christian}, title = {Handbook of Blind Source Separation: Independent Component Analysis and Applications}, publisher = {Academic Press}, year = {2010}}
-
Detecting Photo Manipulation on Signs and Billboards
International Conference on Image Processing
2010
BibTeX@inproceedings{Conotter2010, author = {Conotter, Valentina and Boato, Giulia and Farid, Hany}, title = {Detecting Photo Manipulation on Signs and Billboards}, booktitle = {International Conference on Image Processing}, year = {2010}}
-
Avoiding Twisted Pixels: Ethical Guidelines for the Appropriate Use and Manipulation of Scientific Digital Images
Science and Engineering Ethics, Springer Netherlands, 2010, Vol. 16, pp. 639-667
BibTeX@article{Cromey2010, author = {Cromey, Douglas}, title = {Avoiding Twisted Pixels: Ethical Guidelines for the Appropriate Use and Manipulation of Scientific Digital Images}, journal = {Science and Engineering Ethics}, publisher = {Springer Netherlands}, year = {2010}, volume = {16}, pages = {639-667}}
-
Image splicing detection based on estimation of camera intrinsic parameters
Proc. Int Audio Language and Image Processing (ICALIP) Conf
2010, pp. 214-218
BibTeX@inproceedings{Dai2010, author = {Yanfei Dai and Hui Xiang and Peng Lu and Wenjuan Feng}, title = {Image splicing detection based on estimation of camera intrinsic parameters}, booktitle = {Proc. Int Audio Language and Image Processing (ICALIP) Conf}, year = {2010}, pages = {214--218}}
-
SIFT algorithm analysis and optimization
Proc. Int Image Analysis and Signal Processing (IASP) Conf
2010, pp. 415-419
BibTeX@inproceedings{Daixian2010, author = {Zhu Daixian}, title = {SIFT algorithm analysis and optimization}, booktitle = {Proc. Int Image Analysis and Signal Processing (IASP) Conf}, year = {2010}, pages = {415--419}}
-
On the Role of Differentiation for Resampling Detection
International Conference on Image Processing
2010
BibTeX@inproceedings{Dalgaard2010, author = {Dalgaard, Nahuel and Mosquera, Carlos and Perez-Gonzalez, Fernando}, title = {On the Role of Differentiation for Resampling Detection}, booktitle = {International Conference on Image Processing}, year = {2010}}
-
On the Limits of Perceptually Optimized JPEG
Multimedia Signal Processing Group (MMSPG) Ecole Polytechnique F´ed´erale de Lausanne (EPFL) CH-1015 Lausanne, Switzerland, 2010
BibTeX@techreport{DeSimone2010, author = {De Simone, Francesca and Goldmann, Lutz and Filimonov, Denis and Ebrahimi, Touradj}, title = {On the Limits of Perceptually Optimized JPEG}, year = {2010}}
-
Authentication of JPEG Images Based on Genetic Algorithms
The Open Artificial Intelligence Journal, 2010, Vol. 4, pp. 30-36
BibTeX@article{Edupuganti2010, author = {Edupuganti, Venkata Gopal and Shih, Frank. Y}, title = {Authentication of JPEG Images Based on Genetic Algorithms}, journal = {The Open Artificial Intelligence Journal}, year = {2010}, volume = {4}, pages = {30-36}}
-
Image Splicing Detection Using Color Edge Inconsistency
Proc. Int Multimedia Information Networking and Security (MINES) Conf
2010, pp. 923-926
BibTeX@inproceedings{Fang2010, author = {Zhen Fang and Shuozhong Wang and Xinpeng Zhang}, title = {Image Splicing Detection Using Color Edge Inconsistency}, booktitle = {Proc. Int Multimedia Information Networking and Security (MINES) Conf}, year = {2010}, pages = {923--926}}
-
A 3-D Photo Forensic Analysis of the Lee Harvey Oswald Backyard Photo
Department of Computer Science, Dartmouth College, 2010(TR2010-669)
BibTeX@techreport{Farid2010a, author = {Farid, Hany}, title = {A 3-D Photo Forensic Analysis of the Lee Harvey Oswald Backyard Photo}, year = {2010}, number = {TR2010-669}}
-
Image forensic analyses that elude the human visual system
Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
Media Forensics and Security II
Media Forensics and Security II, SPIE, 2010, Vol. 7541(1), pp. 754106
BibTeX@inproceedings{Farid2010, author = {Hany Farid and Mary J. Bravo}, title = {Image forensic analyses that elude the human visual system}, booktitle = {Media Forensics and Security II}, journal = {Media Forensics and Security II}, publisher = {SPIE}, year = {2010}, volume = {7541}, number = {1}, pages = {754106}}
-
JPEG recompression detection
Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
Media Forensics and Security II
Media Forensics and Security II, SPIE, 2010, Vol. 7541(1), pp. 75410J
BibTeX@inproceedings{Feng2010, author = {Feng, Xiaoying and Doërr, Gwenaël}, title = {JPEG recompression detection}, booktitle = {Media Forensics and Security II}, journal = {Media Forensics and Security II}, publisher = {SPIE}, year = {2010}, volume = {7541}, number = {1}, pages = {75410J}}
-
Detecting content adaptive scaling of images for forensic applications
Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
Media Forensics and Security II
Media Forensics and Security II, SPIE, 2010, Vol. 7541(1), pp. 75410Z
BibTeX@inproceedings{Fillion2010, author = {Claude Fillion and Gaurav Sharma}, title = {Detecting content adaptive scaling of images for forensic applications}, booktitle = {Media Forensics and Security II}, journal = {Media Forensics and Security II}, publisher = {SPIE}, year = {2010}, volume = {7541}, number = {1}, pages = {75410Z}}
-
Die digitale Erkennung von Bildbearbeitung
Deutsche Schule Stockholm Karlavägen 25 11431 Stockholm SCHWEDEN, 2010
BibTeX@techreport{Flemstroem2010, author = {David Flemström and Moritz Roth}, title = {Die digitale Erkennung von Bildbearbeitung}, year = {2010}}
-
Removing pedestrians from Google street view images
Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition Workshops (CVPRW)
2010, pp. 53-58
BibTeX@inproceedings{Flores2010, author = {Flores, Arturo and Belongie, Serge}, title = {Removing pedestrians from Google street view images}, booktitle = {Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition Workshops (CVPRW)}, year = {2010}, pages = {53--58}}
-
Multimodal location estimation
Proceedings of the international conference on Multimedia
ACM, 2010, pp. 1245-1252
BibTeX@inproceedings{Friedland2010, author = {Friedland, Gerald and Vinyals, Oriol and Darrell, Trevor}, title = {Multimodal location estimation}, booktitle = {Proceedings of the international conference on Multimedia}, publisher = {ACM}, year = {2010}, pages = {1245--1252}}
-
Single-View Recaptured Image Detection Based on Physics-Based Features
IEEE International Conference on Multimedia and EXPO
2010
BibTeX@inproceedings{Gao2010, author = {Gao, Xinting and Ng, Tian-Tsong and Qiu, Bo and Chang, Shih-Fu}, title = {Single-View Recaptured Image Detection Based on Physics-Based Features}, booktitle = {IEEE International Conference on Multimedia and EXPO}, year = {2010}}
-
Automatic Acquisition Device Identification from Speech Recordings
International Conference on Acoustics, Speech, and Signal Processing
2010, pp. 1806-1809
BibTeX@inproceedings{Garcia-Romero2010, author = {Garcia-Romero, Daniel and Espy-Wilson, Carol}, title = {Automatic Acquisition Device Identification from Speech Recordings}, booktitle = {International Conference on Acoustics, Speech, and Signal Processing}, year = {2010}, pages = {1806-1809}}
-
Using the local information of image to identify the source camera
Proc. IEEE Int Signal Processing and Information Technology (ISSPIT) Symp
2010, pp. 515-519
BibTeX@inproceedings{Gharibi2010, author = {Gharibi, F. and Akhlaghian, F. and RavanJamjah, J. and ZahirAzami, B. }, title = {Using the local information of image to identify the source camera}, booktitle = {Proc. IEEE Int Signal Processing and Information Technology (ISSPIT) Symp}, year = {2010}, pages = {515--519}}
-
The ´Dresden Image Database´ for benchmarking digital image forensics
SAC ´10: Proceedings of the 2010 ACM Symposium on Applied Computing
ACM, 2010, pp. 1584-1590
BibTeX@inproceedings{Gloe2010a, author = {Gloe, Thomas and Böhme, Rainer}, title = {The ´Dresden Image Database´ for benchmarking digital image forensics}, booktitle = {SAC ´10: Proceedings of the 2010 ACM Symposium on Applied Computing}, publisher = {ACM}, year = {2010}, pages = {1584--1590}}
-
Efficient estimation and large-scale evaluation of lateral chromatic aberration for digital image forensics
Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
Media Forensics and Security II
Media Forensics and Security II, SPIE, 2010, Vol. 7541(1), pp. 754107
BibTeX@inproceedings{Gloe2010, author = {Thomas Gloe and Karsten Borowka and Antje Winkler}, title = {Efficient estimation and large-scale evaluation of lateral chromatic aberration for digital image forensics}, booktitle = {Media Forensics and Security II}, journal = {Media Forensics and Security II}, publisher = {SPIE}, year = {2010}, volume = {7541}, number = {1}, pages = {754107}}
-
Sensor noise camera identification: countering counter-forensics
Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
Media Forensics and Security II
Media Forensics and Security II, SPIE, 2010, Vol. 7541(1), pp. 75410S
BibTeX@inproceedings{Goljan2010a, author = {Miroslav Goljan and Jessica Fridrich and Mo Chen}, title = {Sensor noise camera identification: countering counter-forensics}, booktitle = {Media Forensics and Security II}, journal = {Media Forensics and Security II}, publisher = {SPIE}, year = {2010}, volume = {7541}, number = {1}, pages = {75410S}}
-
Managing a large database of camera fingerprints
Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
Media Forensics and Security II
Media Forensics and Security II, SPIE, 2010, Vol. 7541(1), pp. 754108
BibTeX@inproceedings{Goljan2010, author = {Miroslav Goljan and Jessica Fridrich and Filler, Tomáš}, title = {Managing a large database of camera fingerprints}, booktitle = {Media Forensics and Security II}, journal = {Media Forensics and Security II}, publisher = {SPIE}, year = {2010}, volume = {7541}, number = {1}, pages = {754108}}
-
Survey on passive methods of image tampering detection
Proc. Int Communication and Computational Intelligence (INCOCCI) Conf
2010, pp. 431-436
BibTeX@inproceedings{Granty2010, author = {Granty, R. E. J. and Aditya, T. S. and Madhu, S. S. }, title = {Survey on passive methods of image tampering detection}, booktitle = {Proc. Int Communication and Computational Intelligence (INCOCCI) Conf}, year = {2010}, pages = {431--436}}
-
Deanonymisierung von Profilen sozialer Netzwerke unter Nutzung von Metadaten aus Bildern
Proceedings of D•A•CH Security 2010
2010
BibTeX@inproceedings{Greveler2010, author = {Ulrich Greveler and Dennis Löhr}, title = {Deanonymisierung von Profilen sozialer Netzwerke unter Nutzung von Metadaten aus Bildern}, booktitle = {Proceedings of D•A•CH Security 2010}, year = {2010}}
-
Digital Image Forgery Detection by Local Statistical Models
International Conference on Intelligent Information Hiding and Multimedia Signal Processing
2010, pp. 579-582
BibTeX@inproceedings{Grim2010, author = {Grim, Jiri and Somol, Petr and Pudil, Pavel}, title = {Digital Image Forgery Detection by Local Statistical Models}, booktitle = {International Conference on Intelligent Information Hiding and Multimedia Signal Processing}, year = {2010}, pages = {579-582}}
-
SVD based image manipulation detection
Proc. 17th IEEE Int Image Processing (ICIP) Conf
2010, pp. 1765-1768
BibTeX@inproceedings{Gul2010, author = {Gul, Gokhan and Avcibas, Ismail and Kurugollu, Fatih}, title = {SVD based image manipulation detection}, booktitle = {Proc. 17th IEEE Int Image Processing (ICIP) Conf}, year = {2010}, pages = {1765--1768}}
-
Retrieval of Bitmap Compression History
International Journal of Computer Science and Information Security, 2010, Vol. 8, pp. 141-146
BibTeX@article{Hamdy2010, author = {Salma Hamdy and Haytham El-Messiry and Mohamed Roushdy and Essam Kahlifa}, title = {Retrieval of Bitmap Compression History}, journal = {International Journal of Computer Science and Information Security}, year = {2010}, volume = {8}, pages = {141-146}}
-
Quantization Table Estimation in JPEG Images
International Journal of Advanced Computer Sciences and Applications, 2010, Vol. 1, pp. 17-23
BibTeX@article{Hamdy2010a, author = {Salma Hamdy and Haytham El-Messiry and Mohamed Roushdy and Essam Kahlifa}, title = {Quantization Table Estimation in JPEG Images}, journal = {International Journal of Advanced Computer Sciences and Applications}, year = {2010}, volume = {1}, pages = {17-23}}
-
Rendering fake soft shadows based on the erosion and dilation
Proc. 2nd Int Computer Engineering and Technology (ICCET) Conf
2010, Vol. 6
BibTeX@inproceedings{Hanjun2010, author = {Jin Hanjun and Sun Huali}, title = {Rendering fake soft shadows based on the erosion and dilation}, booktitle = {Proc. 2nd Int Computer Engineering and Technology (ICCET) Conf}, year = {2010}, volume = {6}}
-
Inter-Channel Demosaicking Traces for Digital Image Forensics
IEEE International Conference on Multimedia and EXPO
2010
BibTeX@inproceedings{Ho2010, author = {Ho, John and Au, Oscar C. and Zhou, Jiantao}, title = {Inter-Channel Demosaicking Traces for Digital Image Forensics}, booktitle = {IEEE International Conference on Multimedia and EXPO}, year = {2010}}
-
Camera Response Functions For Image Forensics: An Automatic Algorithm for Splicing Detection
IEEE Transactions on Information Forensics and Security, 2010, Vol. 5(5), pp. 1
BibTeX@article{Hsu2010, author = {Hsu, Y. F. and Chang, S. F.}, title = {Camera Response Functions For Image Forensics: An Automatic Algorithm for Splicing Detection}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2010}, volume = {5}, number = {5}, pages = {1}}
-
Using improved imaging sensor pattern noise for source camera identification
Proc. IEEE Int Multimedia and Expo (ICME) Conf
2010, pp. 1481-1486
BibTeX@inproceedings{Hu2010b, author = {Yongjian Hu and Chao Jian and Chang-Tsun Li}, title = {Using improved imaging sensor pattern noise for source camera identification}, booktitle = {Proc. IEEE Int Multimedia and Expo (ICME) Conf}, year = {2010}, pages = {1481--1486}}
-
Building fingerprints with information from three color bands for source camera identification
Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence
ACM, 2010, pp. 111-116
BibTeX@inproceedings{Hu2010a, author = {Hu, Yongjian and Li, Chang-Tsun and Jian, Chao}, title = {Building fingerprints with information from three color bands for source camera identification}, booktitle = {Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence}, publisher = {ACM}, year = {2010}, pages = {111--116}}
-
Selecting forensic features for robust source camera identification
Proc. Int. Computer Symp. (ICS)
2010, pp. 506-511
BibTeX@inproceedings{Hu2010, author = {Yongjian Hu and Chang-Tsun Li and Changhui Zhou}, title = {Selecting forensic features for robust source camera identification}, booktitle = {Proc. Int. Computer Symp. (ICS)}, year = {2010}, pages = {506--511}}
-
Detecting Double JPEG Compression With the Same Quantization Matrix
IEEE Transactions on Information Forensics and Security, 2010, Vol. 5(4), pp. 848-856
BibTeX@article{Huang2010a, author = {Fangjun Huang and Jiwu Huang and Yun Qing Shi}, title = {Detecting Double JPEG Compression With the Same Quantization Matrix}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2010}, volume = {5}, number = {4}, pages = {848--856}}
-
Medical image tamper approximation based on an image moment signature
Proc. 12th IEEE Int e-Health Networking Applications and Services (Healthcom) Conf
2010, pp. 254-259
BibTeX@inproceedings{Huang2010b, author = {Huang, H. and Coatrieux, G. and Shu, H. Z. and Luo, L. M. and Roux, C.}, title = {Medical image tamper approximation based on an image moment signature}, booktitle = {Proc. 12th IEEE Int e-Health Networking Applications and Services (Healthcom) Conf}, year = {2010}, pages = {254--259}}
-
Learning from Interpolated Images using Neural Networks for Digital Forensics
Computer Sciences Department University of Wisconsin-Madison, 2010
BibTeX@techreport{Huang2010, author = {Huang, Y. and Fang, N.}, title = {Learning from Interpolated Images using Neural Networks for Digital Forensics}, year = {2010}}
-
IPTC Standard Photo Metadata IPTC Core Specification Version 1.1 IPTC Extension Specification Version 1.1
IPTC, 2010
BibTeX@standard{IPTC2010, author = {IPTC}, title = {IPTC Standard Photo Metadata IPTC Core Specification Version 1.1 IPTC Extension Specification Version 1.1}, year = {2010}}
-
Identification of copy--paste regions in digital image
International Journal of Imaging Systems and Technology, 2010, Vol. 20(4), pp. 367-369
BibTeX@article{Jajal2010, author = {Brijesh Jajal and Vipul Desai}, title = {Identification of copy--paste regions in digital image}, journal = {International Journal of Imaging Systems and Technology}, year = {2010}, volume = {20}, number = {4}, pages = {367--369}}
-
A Novel Multi-size Block Benford’s Law Scheme for Printer Identification
Qiu, G., Lam, K., Kiya, H., Xue, X.-Y., Kuo, C.-C. & Lew, M. (ed.)
Advances in Multimedia Information Processing - PCM 2010
Springer Berlin Heidelberg, 2010, Vol. 6297, pp. 643-652
BibTeX@incollection{Jiang2010, author = {Jiang, Weina and Ho, AnthonyT.S. and Treharne, Helen and Shi, YunQ.}, title = {A Novel Multi-size Block Benford’s Law Scheme for Printer Identification}, booktitle = {Advances in Multimedia Information Processing - PCM 2010}, publisher = {Springer Berlin Heidelberg}, year = {2010}, volume = {6297}, pages = {643-652}}
-
Artificial Joint Surface Fitting Based on Moving Least Squares Methods
Proc. Int Internet Technology and Applications Conf
2010, pp. 1-4
BibTeX@inproceedings{Jin2010, author = {Xiangyang Jin}, title = {Artificial Joint Surface Fitting Based on Moving Least Squares Methods}, booktitle = {Proc. Int Internet Technology and Applications Conf}, year = {2010}, pages = {1--4}}
-
Image tamper detection algorithm based on Radon and Fourier-Mellin transform
Proc. IEEE Int Information Theory and Information Security (ICITIS) Conf
2010, pp. 212-215
BibTeX@inproceedings{Jing2010, author = {Tao Jing and Xinghua Li and Feifei Zhang}, title = {Image tamper detection algorithm based on Radon and Fourier-Mellin transform}, booktitle = {Proc. IEEE Int Information Theory and Information Security (ICITIS) Conf}, year = {2010}, pages = {212--215}}
-
GPS coordinates estimation and camera calibration from solar shadows
Computer Vision and Image Understanding, 2010, Vol. 114(9), pp. 991 - 1003
BibTeX@article{Junejo2010, author = {Junejo, Imran N. and Foroosh, Hassan}, title = {GPS coordinates estimation and camera calibration from solar shadows}, journal = {Computer Vision and Image Understanding}, year = {2010}, volume = {114}, number = {9}, pages = {991 - 1003}}
-
Detection of Copy-Move Forgery based on one improved LLE method
Proc. 2nd Int Advanced Computer Control (ICACC) Conf
2010, Vol. 4, pp. 547-550
BibTeX@inproceedings{Junhong2010, author = {Zhao Junhong}, title = {Detection of Copy-Move Forgery based on one improved LLE method}, booktitle = {Proc. 2nd Int Advanced Computer Control (ICACC) Conf}, year = {2010}, volume = {4}, pages = {547--550}}
-
Detecting Digital Image Forgeries Through Inconsistent Motion Blur
IEEE International Conference on Multimedia and EXPO
2010
BibTeX@inproceedings{Kakar2010, author = {Kakar, Pravin and Natarajan, Sudha and Ser, Wee}, title = {Detecting Digital Image Forgeries Through Inconsistent Motion Blur}, booktitle = {IEEE International Conference on Multimedia and EXPO}, year = {2010}}
-
Image authentication by motion blur consistency verification
TENCON 2010 - 2010 IEEE Region 10 Conference
2010, pp. 188-193
BibTeX@inproceedings{Kakar2010a, author = {Kakar, P. and Natarajan, S. and Wee Ser}, title = {Image authentication by motion blur consistency verification}, booktitle = {TENCON 2010 - 2010 IEEE Region 10 Conference}, year = {2010}, pages = {188--193}}
-
Copy-move forgery detection in digital image
Proc. 3rd Int Image and Signal Processing (CISP) Congress
2010, Vol. 5, pp. 2419-2421
BibTeX@inproceedings{Kang2010, author = {Li Kang and Xiao-ping Cheng}, title = {Copy-move forgery detection in digital image}, booktitle = {Proc. 3rd Int Image and Signal Processing (CISP) Congress}, year = {2010}, volume = {5}, pages = {2419--2421}}
-
Digital image authentication from thumbnails
Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
Media Forensics and Security II
Media Forensics and Security II, SPIE, 2010, Vol. 7541(1), pp. 75410E
BibTeX@inproceedings{Kee2010, author = {Kee, Eric and Farid, Hany}, title = {Digital image authentication from thumbnails}, booktitle = {Media Forensics and Security II}, journal = {Media Forensics and Security II}, publisher = {SPIE}, year = {2010}, volume = {7541}, number = {1}, pages = {75410E}}
-
Exposing Digital Forgeries from 3-D Lighting Environments
IEEE International Workshop on Information Forensics and Security
2010
BibTeX@misc{Kee2010a, author = {Kee, Eric and Farid, Hany}, title = {Exposing Digital Forgeries from 3-D Lighting Environments}, booktitle = {IEEE International Workshop on Information Forensics and Security}, year = {2010}}
-
An Efficient Method for Detection of Copy-Move Forgery Using Discrete Wavelet Transform.
International Journal on Computer Science and Engineering, 2010, Vol. 2, pp. 1801-1806
BibTeX@article{Khan2010, author = {Saiqa Khan and Arun Kulkarni}, title = {An Efficient Method for Detection of Copy-Move Forgery Using Discrete Wavelet Transform.}, journal = {International Journal on Computer Science and Engineering}, year = {2010}, volume = {2}, pages = {1801-1806}}
-
Reduced Time Complexity for Detection of Copy-Move Forgery Using Discrete Wavelet Transform
International Journal of Computer Applications, 2010, Vol. 6, pp. 31-36
BibTeX@article{Khan2010a, author = {Saiqa Khan and Arun Kulkarni}, title = {Reduced Time Complexity for Detection of Copy-Move Forgery Using Discrete Wavelet Transform}, journal = {International Journal of Computer Applications}, year = {2010}, volume = {6}, pages = {31-36}}
-
Robust method for detection of copy-move forgery in digital images
Proc. Int Signal and Image Processing (ICSIP) Conf
2010, pp. 69-73
BibTeX@inproceedings{Khan2010b, author = {Khan, S. and Kulkarni, A. }, title = {Robust method for detection of copy-move forgery in digital images}, booktitle = {Proc. Int Signal and Image Processing (ICSIP) Conf}, year = {2010}, pages = {69--73}}
-
Intrinsic Signatures for Scanned Documents Forensics : Effect of Font Shape and Size
International Symposium on Circuits and Systems
2010
BibTeX@inproceedings{Khanna2010a, author = {Khanna, Nitin and Delp, Edward J.}, title = {Intrinsic Signatures for Scanned Documents Forensics : Effect of Font Shape and Size}, booktitle = {International Symposium on Circuits and Systems}, year = {2010}}
-
Efficient estimation of CFA pattern configuration in digital camera images
Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
Proc. SPIE
Media Forensics and Security II, SPIE, 2010, Vol. 7541(1), pp. 754111
BibTeX@conference{Kirchner2010, author = {Matthias Kirchner}, title = {Efficient estimation of CFA pattern configuration in digital camera images}, booktitle = {Proc. SPIE}, journal = {Media Forensics and Security II}, publisher = {SPIE}, year = {2010}, volume = {7541}, number = {1}, pages = {754111}}
-
Linear row and column predictors for the analysis of resized images
Proceedings of the 12th ACM workshop on Multimedia and security
ACM, 2010, pp. 13-18
BibTeX@inproceedings{Kirchner2010a, author = {Kirchner, Matthias}, title = {Linear row and column predictors for the analysis of resized images}, booktitle = {Proceedings of the 12th ACM workshop on Multimedia and security}, publisher = {ACM}, year = {2010}, pages = {13--18}}
-
On detection of median filtering in digital images
Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
Proc. SPIE
Media Forensics and Security II, SPIE, 2010, Vol. 7541(1), pp. 754110
BibTeX@conference{Kirchner2010b, author = {Matthias Kirchner and Jessica Fridrich}, title = {On detection of median filtering in digital images}, booktitle = {Proc. SPIE}, journal = {Media Forensics and Security II}, publisher = {SPIE}, year = {2010}, volume = {7541}, number = {1}, pages = {754110}}
-
Detecting Forgery from Static-Scene Video Based on Inconsistency in Noise Level Functions
IEEE Transactions on Information Forensics and Security, 2010, Vol. 5(4), pp. 1
BibTeX@article{Kobayashi2010, author = {Kobayashi, M. and Okabe, T. and Sato, Y.}, title = {Detecting Forgery from Static-Scene Video Based on Inconsistency in Noise Level Functions}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2010}, volume = {5}, number = {4}, pages = {1}}
-
Detecting Ground Shadows in Outdoor Consumer Photographs
Daniilidis, K., Maragos, P. & Paragios, N. (ed.)
Computer Vision -- ECCV 2010
Springer Berlin Heidelberg, 2010, Vol. 6312, pp. 322-335
BibTeX@incollection{Lalonde2010, author = {Lalonde, Jean-François and Efros, AlexeiA. and Narasimhan, SrinivasaG.}, title = {Detecting Ground Shadows in Outdoor Consumer Photographs}, booktitle = {Computer Vision -- ECCV 2010}, publisher = {Springer Berlin Heidelberg}, year = {2010}, volume = {6312}, pages = {322-335}}
-
An Introduction to Independent Component Analysis: InfoMax and FastICA algorithms
Tutorials in Quantitative Methods for Psychology, 2010, Vol. 6(1), pp. 31-38
BibTeX@article{Langlois2010, author = {Dominic Langlois and Sylvain Chartier and Dominique Gosselin}, title = {An Introduction to Independent Component Analysis: InfoMax and FastICA algorithms}, journal = {Tutorials in Quantitative Methods for Psychology}, year = {2010}, volume = {6(1)}, pages = {31--38}}
-
Exact JPEG recompression
Visual Information Processing and Communication
Visual Information Processing and Communication, SPIE, 2010, Vol. 7543(1), pp. 75430V
BibTeX@conference{Lewis2010, author = {Andrew B. Lewis and Markus G. Kuhn}, title = {Exact JPEG recompression}, booktitle = {Visual Information Processing and Communication}, journal = {Visual Information Processing and Communication}, publisher = {SPIE}, year = {2010}, volume = {7543}, number = {1}, pages = {75430V}}
-
Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions
Klinger, K. (ed.)
Hershey, New York, 2010
BibTeX@book{Li2010c, author = {Chang-Tsun Li}, title = {Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions}, publisher = {Hershey, New York}, year = {2010}}
-
Source Camera Identification Using Enhanced Sensor Pattern Noise
IEEE Transactions on Information Forensics and Security, 2010, Vol. 5(2), pp. 280-287
BibTeX@article{Li2010, author = {Li, Chang-Tsun}, title = {Source Camera Identification Using Enhanced Sensor Pattern Noise}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2010}, volume = {5}, number = {2}, pages = {280-287}}
-
Unsupervised Classification of Digital Images Using Enhanced Sensor Pattern Noise
IEEE International Symposium on Circuits and Systems
2010
BibTeX@inproceedings{Li2010b, author = {Li, Chang-Tsun}, title = {Unsupervised Classification of Digital Images Using Enhanced Sensor Pattern Noise}, booktitle = {IEEE International Symposium on Circuits and Systems}, year = {2010}}
-
On the Repudiability of Device Identification and Image Integrity Verification Using Sensor Pattern Noise
Akan, O., Bellavista, P., Cao, J., Dressler, F., Ferrari, D., Gerla, M., Kobayashi, H., Palazzo, S., Sahni, S., Shen, X. (S., Stan, M., Xiaohua, J., Zomaya, A., Coulson, G. & Weerasinghe, D. (ed.)
Information Security and Digital Forensics
Springer Berlin Heidelberg, 2010, Vol. 41, pp. 19-25
BibTeX@incollection{Li2010e, author = {Li, Chang-Tsun and Chang, Chih-Yuan and Li, Yue}, title = {On the Repudiability of Device Identification and Image Integrity Verification Using Sensor Pattern Noise}, booktitle = {Information Security and Digital Forensics}, publisher = {Springer Berlin Heidelberg}, year = {2010}, volume = {41}, pages = {19-25}}
-
Digital Camera Identification Using Colour-Decoupled Photo Response Non-Uniformity Noise Pattern
International Symposium on Circuits and Systems
2010
BibTeX@inproceedings{Li2010a, author = {Li, Chang-Tsun and Li, Yue}, title = {Digital Camera Identification Using Colour-Decoupled Photo Response Non-Uniformity Noise Pattern}, booktitle = {International Symposium on Circuits and Systems}, year = {2010}}
-
Resampling forgery detection in JPEG-compressed images
Proc. 3rd Int Image and Signal Processing (CISP) Congress
2010, Vol. 3, pp. 1166-1170
BibTeX@inproceedings{Li2010g, author = {Shu-ping Li and Zhi Han and Yi-zhen Chen and Bo Fu and Chunhui Lu and Xiaohui Yao}, title = {Resampling forgery detection in JPEG-compressed images}, booktitle = {Proc. 3rd Int Image and Signal Processing (CISP) Congress}, year = {2010}, volume = {3}, pages = {1166--1170}}
-
Rotation Robust Detection of Copy-Move Forgery
Image Processing (ICIP), 2010 17th IEEE International Conference on
2010
BibTeX@inproceedings{Li2010f, author = {Li, Weihai and Yu, Nenghai}, title = {Rotation Robust Detection of Copy-Move Forgery}, booktitle = {Image Processing (ICIP), 2010 17th IEEE International Conference on}, year = {2010}}
-
Identifying camera and processing from cropped JPEG photos via tensor analysis
Proc. IEEE Int Systems Man and Cybernetics (SMC) Conf
2010, pp. 3889-3895
BibTeX@inproceedings{Li2010h, author = {Weihai Li and Nenghai Yu and Yuan Yuan}, title = {Identifying camera and processing from cropped JPEG photos via tensor analysis}, booktitle = {Proc. IEEE Int Systems Man and Cybernetics (SMC) Conf}, year = {2010}, pages = {3889--3895}}
-
Identifying photorealistic computer graphics using second-order difference statistics
Proc. Seventh Int Fuzzy Systems and Knowledge Discovery (FSKD) Conf
2010, Vol. 5, pp. 2316-2319
BibTeX@inproceedings{Li2010d, author = {Wenxiang Li and Tao Zhang and Ergong Zheng and Xijian Ping}, title = {Identifying photorealistic computer graphics using second-order difference statistics}, booktitle = {Proc. Seventh Int Fuzzy Systems and Knowledge Discovery (FSKD) Conf}, year = {2010}, volume = {5}, pages = {2316--2319}}
-
Image splicing detection based on moment features and Hilbert-Huang Transform
Proc. IEEE Int Information Theory and Information Security (ICITIS) Conf
2010, pp. 1127-1130
BibTeX@inproceedings{Li2010i, author = {Xuefang Li and Tao Jing and Xinghua Li}, title = {Image splicing detection based on moment features and Hilbert-Huang Transform}, booktitle = {Proc. IEEE Int Information Theory and Information Security (ICITIS) Conf}, year = {2010}, pages = {1127--1130}}
-
Multimedia Forensics for Detecting Forgeries
Stavroulakis, P. & Stamp, M. (ed.)
Handbook of Information and Communication Security
Springer Berlin Heidelberg, 2010, pp. 809-828
BibTeX@incollection{Lian2010, author = {Lian, Shiguo and Zhang, Yan}, title = {Multimedia Forensics for Detecting Forgeries}, booktitle = {Handbook of Information and Communication Security}, publisher = {Springer Berlin Heidelberg}, year = {2010}, pages = {809-828}}
-
Fast Forgery Detection with the Intrinsic Resampling Properties
Proc. Sixth Int Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) Conf
2010, pp. 232-235
BibTeX@inproceedings{Lien2010, author = {Lien, Cheng-Chang and Shih, Cheng-Lun and Chou, Chih-Hsun}, title = {Fast Forgery Detection with the Intrinsic Resampling Properties}, booktitle = {Proc. Sixth Int Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) Conf}, year = {2010}, pages = {232--235}}
-
A passive scheme for tampering detection based on quantization table estimation
Frossard, P., Li, H., Wu, F., Girod, B., Li, S. & Wei, G. (ed.)
Proceedings of SPIE
Visual Communications and Image Processing 2010, SPIE, 2010, Vol. 7744(1), pp. 774433
BibTeX@conference{Lin2010, author = {Guo-Shiang Lin and Min-Kuan Chang and You-lin Chen}, title = {A passive scheme for tampering detection based on quantization table estimation}, booktitle = {Proceedings of SPIE}, journal = {Visual Communications and Image Processing 2010}, publisher = {SPIE}, year = {2010}, volume = {7744}, number = {1}, pages = {774433}}
-
On classification of source cameras: A graph based approach
Proc. IEEE Int Information Forensics and Security (WIFS) Workshop
2010, pp. 1-5
BibTeX@inproceedings{Liu2010c, author = {Bei-bei Liu and Heung-Kyu Lee and Yongjian Hu and Chang-Hee Choi}, title = {On classification of source cameras: A graph based approach}, booktitle = {Proc. IEEE Int Information Forensics and Security (WIFS) Workshop}, year = {2010}, pages = {1--5}}
-
Source camera identification from significant noise residual regions
Proc. 17th IEEE Int Image Processing (ICIP) Conf
2010, pp. 1749-1752
BibTeX@inproceedings{Liu2010b, author = {Liu, Bei-Bei and Hu, Yongjian and Lee, Heung-Kyu}, title = {Source camera identification from significant noise residual regions}, booktitle = {Proc. 17th IEEE Int Image Processing (ICIP) Conf}, year = {2010}, pages = {1749--1752}}
-
Digital Image Forensics Using Multi-Resolution Histograms
International Journal of Digital Crime and Forensics (IJDCF), 2010, Vol. 2(4), pp. 37-51
BibTeX@article{Liu2010d, author = {Jin Liu and Hefei Ling and Fuhao Zou and WeiQi Yan and and Zhengding Lu}, title = {Digital Image Forensics Using Multi-Resolution Histograms}, journal = {International Journal of Digital Crime and Forensics (IJDCF)}, year = {2010}, volume = {2}, number = {4}, pages = {37-51}}
-
Optimizing Photo Composition
Computer Graphics Forum, 2010, Vol. 29(2), pp. 469-478
BibTeX@article{Liu2010, author = {Liu, L., Chen, R., Wolf, L. and Cohen-Or, D}, title = {Optimizing Photo Composition}, journal = {Computer Graphics Forum}, year = {2010}, volume = {29}, number = {2}, pages = {469-478}}
-
Camera Model Identification for JPEG Images via Tensor Analysis
International Conference on Intelligent Information Hiding and Multimedia Signal Processing
2010, pp. 462-465
BibTeX@inproceedings{Liu2010a, author = {Liu, Ming and Yu, Nenghai and Li, Weihai}, title = {Camera Model Identification for JPEG Images via Tensor Analysis}, booktitle = {International Conference on Intelligent Information Hiding and Multimedia Signal Processing}, year = {2010}, pages = {462-465}}
-
Forensic hash for multimedia information
Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
Proc. SPIE
Media Forensics and Security II, SPIE, 2010, Vol. 7541(1), pp. 75410Y
BibTeX@conference{Lu2010, author = {Wenjun Lu and Avinash L. Varna and Min Wu}, title = {Forensic hash for multimedia information}, booktitle = {Proc. SPIE}, journal = {Media Forensics and Security II}, publisher = {SPIE}, year = {2010}, volume = {7541}, number = {1}, pages = {75410Y}}
-
Hiding traces of the blurring effect in digital forgeries
Proc. Int Information Networking and Automation (ICINA) Conf
2010, Vol. 2
BibTeX@inproceedings{Luo2010a, author = {Siqing Luo and Di Wu and Shen Wang}, title = {Hiding traces of the blurring effect in digital forgeries}, booktitle = {Proc. Int Information Networking and Automation (ICINA) Conf}, year = {2010}, volume = {2}}
-
JPEG Error Analysis and Its Applications to Digital Image Forensics
IEEE Transactions on Information Forensics and Security, 2010, Vol. PP Issue:99(99), pp. 1
BibTeX@article{Luo2010, author = {Luo, W and Huang, J and Qiu, G}, title = {JPEG Error Analysis and Its Applications to Digital Image Forensics}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2010}, volume = {PP Issue:99}, number = {99}, pages = {1}}
-
Estimating vignetting function from a single image for image authentication
Proceedings of the 12th ACM workshop on Multimedia and security
ACM, 2010, pp. 3-12
BibTeX@inproceedings{Lyu2010, author = {Lyu, Siwei}, title = {Estimating vignetting function from a single image for image authentication}, booktitle = {Proceedings of the 12th ACM workshop on Multimedia and security}, publisher = {ACM}, year = {2010}, pages = {3--12}}
-
Printer Identification Techniques and Their Privacy Implications
Newcastle University, University of Newcastle upon Tyne, Computing Science, 2010
BibTeX@techreport{Mace2010, author = {Mace, John}, title = {Printer Identification Techniques and Their Privacy Implications}, publisher = {University of Newcastle upon Tyne, Computing Science}, year = {2010}}
-
A bibliography on blind methods for identifying image forgery
Signal Processing: Image Communication, 2010, Vol. 25(6), pp. 389 - 399
BibTeX@article{Mahdian2010, author = {Babak Mahdian and Stanislav Saic}, title = {A bibliography on blind methods for identifying image forgery}, journal = {Signal Processing: Image Communication}, year = {2010}, volume = {25}, number = {6}, pages = {389 - 399}}
-
Blind methods for detecting image fakery
IEEE Aerospace and Electronic Systems Magazine, 2010, Vol. 25(4), pp. 18-24
BibTeX@article{Mahdian2010a, author = {Mahdian, B. and Saic, S.}, title = {Blind methods for detecting image fakery}, journal = {IEEE Aerospace and Electronic Systems Magazine}, year = {2010}, volume = {25}, number = {4}, pages = {18--24}}
-
Watermarking of Raw Digital Images in Camera Firmware
IPSJ Transactions on Computer Vision and Applications, 2010, Vol. 2( ), pp. 16-24
BibTeX@article{Meerwald2010, author = {Meerwald, Peter and Uhl, Andreas}, title = {Watermarking of Raw Digital Images in Camera Firmware}, journal = {IPSJ Transactions on Computer Vision and Applications}, year = {2010}, volume = {2}, number = { }, pages = {16-24}}
-
Tamper Detection for Shifted Double JPEG Compression
Proc. Sixth Int Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) Conf
2010, pp. 434-437
BibTeX@inproceedings{Meng2010, author = {Meng, Xian-zhe and Niu, Shao-zhang and Zou, Jian-chen}, title = {Tamper Detection for Shifted Double JPEG Compression}, booktitle = {Proc. Sixth Int Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) Conf}, year = {2010}, pages = {434--437}}
-
Texture based attacks on intrinsic signature based printer identification
Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
Media Forensics and Security II
Media Forensics and Security II, SPIE, 2010, Vol. 7541(1), pp. 75410T
BibTeX@inproceedings{Mikkilineni2010, author = {Aravind K. Mikkilineni and Nitin Khanna and Edward J. Delp}, title = {Texture based attacks on intrinsic signature based printer identification}, booktitle = {Media Forensics and Security II}, journal = {Media Forensics and Security II}, publisher = {SPIE}, year = {2010}, volume = {7541}, number = {1}, pages = {75410T}}
-
Improving re-sampling detection by adding noise
Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
Media Forensics and Security II
Media Forensics and Security II, SPIE, 2010, Vol. 7541(1), pp. 75410I
BibTeX@inproceedings{Nataraj2010a, author = {Lakshmanan Nataraj and Anindya Sarkar and B. S. Manjunath}, title = {Improving re-sampling detection by adding noise}, booktitle = {Media Forensics and Security II}, journal = {Media Forensics and Security II}, publisher = {SPIE}, year = {2010}, volume = {7541}, number = {1}, pages = {75410I}}
-
Improving re-sampling detection by adding noise
Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series
2010, Vol. 7541
BibTeX@inproceedings{Nataraj2010, author = {Nataraj, L. and Sarkar, A. and Manjunath, B.~S.}, title = {Improving re-sampling detection by adding noise}, booktitle = {Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series}, year = {2010}, volume = {7541}}
-
Detecting Image Region Duplication Using SIFT Features
International Conference on Acoustics, Speech, and Signal Processing
2010
BibTeX@inproceedings{Pan2010, author = {Pan, Xunyu and Lyu, Siwei}, title = {Detecting Image Region Duplication Using SIFT Features}, booktitle = {International Conference on Acoustics, Speech, and Signal Processing}, year = {2010}}
-
Region Duplication Detection Using Image Feature Matching
IEEE Transactions on Information Forensics and Security, 2010, Vol. 5(4), pp. 857-867
BibTeX@article{Pan2010a, author = {Pan, Xunyu. and Lyu, Siwei}, title = {Region Duplication Detection Using Image Feature Matching}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2010}, volume = {5}, number = {4}, pages = {857--867}}
-
Digital Image Forgery Forensics by Using Blur Estimation and Abnormal Hue Detection
Proc. Symp. Photonics and Optoelectronic (SOPO)
2010, pp. 1-4
BibTeX@inproceedings{Peng2010, author = {Fei Peng and Xi-lan Wang}, title = {Digital Image Forgery Forensics by Using Blur Estimation and Abnormal Hue Detection}, booktitle = {Proc. Symp. Photonics and Optoelectronic (SOPO)}, year = {2010}, pages = {1--4}}
-
Signal Processing Algorithms For Digital Image Forensics
Faculty of Engineering, 2010
BibTeX@mastersthesis{Prasad2010, author = {Prasad, S}, title = {Signal Processing Algorithms For Digital Image Forensics}, school = {Faculty of Engineering}, year = {2010}}
-
Estimating JPEG2000 compression for image forensics using Benford´s Law
Schelkens, P., Ebrahimi, T., Cristobal, G., Truchetet, F. & Saarikko, P. (ed.)
Proc. SPIE 7723
Optics, Photonics, and Digital Technologies for Multimedia Applications, SPIE, 2010, Vol. 7723(1), pp. 77230J
BibTeX@conference{Qadir2010, author = {Ghulam Qadir and Xi Zhao and Anthony T. S. Ho}, title = {Estimating JPEG2000 compression for image forensics using Benford´s Law}, booktitle = {Proc. SPIE 7723}, journal = {Optics, Photonics, and Digital Technologies for Multimedia Applications}, publisher = {SPIE}, year = {2010}, volume = {7723}, number = {1}, pages = {77230J}}
-
Image stitching using simplified SIFT
Proc. IEEE Int Information and Automation (ICIA) Conf
2010, pp. 1134-1137
BibTeX@inproceedings{Qidan2010, author = {Zhu Qidan and Li Ke}, title = {Image stitching using simplified SIFT}, booktitle = {Proc. IEEE Int Information and Automation (ICIA) Conf}, year = {2010}, pages = {1134--1137}}
-
Original oder manipuliert?
Rechtsmedizin, 2010, Vol. -, pp. -
BibTeX@article{Ramsthaler2010, author = {Ramsthaler, F. and Kettner, M. and Potente, S. and Gehl, A. and Kreutz, K. and Verhoff, M.A.}, title = {Original oder manipuliert?}, journal = {Rechtsmedizin}, year = {2010}, volume = {-}, pages = {--}}
-
Digital image forensics: a booklet for beginners
Multimedia Tools and Applications, Springer Netherlands, 2010, pp. 1-30
BibTeX@booklet{Redi2010, author = {Redi, Judith and Taktak, Wiem and Dugelay, Jean-Luc}, title = {Digital image forensics: a booklet for beginners}, journal = {Multimedia Tools and Applications}, publisher = {Springer Netherlands}, year = {2010}, pages = {1-30}}
-
Scene Illumination as an Indicator of Image Manipulation
International Workshop on Information Hiding
2010
BibTeX@inproceedings{Riess2010, author = {Riess, Christian and Angelopoulou, Elli}, title = {Scene Illumination as an Indicator of Image Manipulation}, booktitle = {International Workshop on Information Hiding}, year = {2010}}
-
Exploring image dependencies: a new challenge in image forensics
Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
Media Forensics and Security II
Media Forensics and Security II, SPIE, 2010, Vol. 7541(1), pp. 75410X
BibTeX@inproceedings{Rosa2010, author = {A. De Rosa and F. Uccheddu and A. Costanzo and A. Piva and M. Barni}, title = {Exploring image dependencies: a new challenge in image forensics}, booktitle = {Media Forensics and Security II}, journal = {Media Forensics and Security II}, publisher = {SPIE}, year = {2010}, volume = {7541}, number = {1}, pages = {75410X}}
-
Electrophotographic Printer Identification by Halftone Texture Analysis
IEEE International Conference on Acoustics, Speech and Signal Processing
2010, pp. 1846-1849
BibTeX@inproceedings{Ryu2010a, author = {Ryu, Seung-Jin and Lee, Hae-Yeoun and Im, Dong-Hyuck and Choi, Jung-Ho and Lee, Heung-Kyu}, title = {Electrophotographic Printer Identification by Halftone Texture Analysis}, booktitle = {IEEE International Conference on Acoustics, Speech and Signal Processing}, year = {2010}, pages = {1846-1849}}
-
Detection of Copy-Rotate-Move Forgery using Zernike Moments
International Workshop on Information Hiding
2010
BibTeX@inproceedings{Ryu2010, author = {Ryu, Seung-Jin and Lee, Min-Jeong and Lee, Heung-Kyu}, title = {Detection of Copy-Rotate-Move Forgery using Zernike Moments}, booktitle = {International Workshop on Information Hiding}, year = {2010}}
-
Uses of software in digital image analysis: a forensic report
Jusoff, K. & Xie, Y. (ed.)
Second International Conference on Digital Image Processing
Second International Conference on Digital Image Processing, SPIE, 2010, Vol. 7546(1), pp. 75462B
BibTeX@conference{Sharma2010, author = {Mukesh Sharma and Shailendra Jha}, title = {Uses of software in digital image analysis: a forensic report}, booktitle = {Second International Conference on Digital Image Processing}, journal = {Second International Conference on Digital Image Processing}, publisher = {SPIE}, year = {2010}, volume = {7546}, number = {1}, pages = {75462B}}
-
Image processing and pattern recognition
Hanzo, L. (ed.)
Wiley-Interscience, 2010
BibTeX@book{Shih2010, author = {Frank Y. Shih}, title = {Image processing and pattern recognition}, publisher = {Wiley-Interscience}, year = {2010}}
-
A Comparison Study on Copy-Cover Image Forgery Detection
The Open Artificial Intelligence Journal, 2010, Vol. 4, pp. 49-54
BibTeX@article{Shih, author = {Shih, Frank Y. and Yuan, Yuan}, title = {A Comparison Study on Copy-Cover Image Forgery Detection}, journal = {The Open Artificial Intelligence Journal}, year = {2010}, volume = {4}, pages = {49-54}}
-
Detecting Copy-Move Forgery in Digital Images:A Survey and Analysis of Current Methods
Global Journal of Computer Science and Technology, 2010, Vol. 10(7), pp. 61-65
BibTeX@article{Shivakumar2010, author = {B.L. Shivakumar and Lt. Dr. S. Santhosh Baboo}, title = {Detecting Copy-Move Forgery in Digital Images:A Survey and Analysis of Current Methods}, journal = {Global Journal of Computer Science and Technology}, year = {2010}, volume = {10}, number = {7}, pages = {61-65}}
-
Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions
Klinger, K. (ed.)
Chapter Digital Camera Photographic Provenance (Chapter 5)
Information Science Reference, 2010, pp. 104-129
BibTeX@inbook{Sorell2010, author = {Matthew Sorell}, title = {Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions}, publisher = {Information Science Reference}, year = {2010}, pages = {104-129}}
-
Forensic Detection of Image Manipulation Using Statistical Intrinsic Fingerprints
IEEE Transactions on Information Forensics and Security, 2010, Vol. PP Issue:99(99), pp. 1
BibTeX@article{Stamm2010a, author = {Stamm, M and Liu, J. R.}, title = {Forensic Detection of Image Manipulation Using Statistical Intrinsic Fingerprints}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2010}, volume = {PP Issue:99}, number = {99}, pages = {1}}
-
Wavelet-Based Image Compression Anti-Forensics
International Conference on Image Processing
2010
BibTeX@inproceedings{Stamm2010b, author = {Stamm, Matthew and Liu, K. J. Ray}, title = {Wavelet-Based Image Compression Anti-Forensics}, booktitle = {International Conference on Image Processing}, year = {2010}}
-
Undetectable Image Tampering Through JPEG Compression Anti-Forensics
International Conference on Image Processing
2010
BibTeX@inproceedings{Stamm2010d, author = {Stamm, Matthew and Tjoa, Steven and Lin, W. Sabrina and Liu, K. J. Ray}, title = {Undetectable Image Tampering Through JPEG Compression Anti-Forensics}, booktitle = {International Conference on Image Processing}, year = {2010}}
-
Forensic estimation and reconstruction of a contrast enhancement mapping
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2010
2010, pp. 1698-1701
BibTeX@inproceedings{Stamm2010c, author = {Stamm, Matthew C. and Liu, K. J. Ray}, title = {Forensic estimation and reconstruction of a contrast enhancement mapping}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2010}, year = {2010}, pages = {1698--1701}}
-
Anti-forensics of JPEG compression
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2010
2010, pp. 1694-1697
BibTeX@inproceedings{Stamm2010, author = {Stamm, Matthew C. and Tjoa, Steven K. and Lin, W. Sabrina and Liu, K. J. Ray}, title = {Anti-forensics of JPEG compression}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2010}, year = {2010}, pages = {1694--1697}}
-
Cell Phone Camera Ballistics: Attacks and Countermeasures
SPIE Conference on Multimedia on Mobile Devices
2010
BibTeX@inproceedings{Steinebach2010a, author = {Steinebach, Martin and Liu, Huajian and Fan, Peishuai and Katzenbeisser, Stefan}, title = {Cell Phone Camera Ballistics: Attacks and Countermeasures}, booktitle = {SPIE Conference on Multimedia on Mobile Devices}, year = {2010}}
-
On the Reliability of Cell Phone Camera Fingerprint Recognition
Goel, S. (ed.)
Chapter On the Reliability of Cell Phone Camera Fingerprint Recognition
Springer Berlin Heidelberg, 2010, Vol. 31, pp. 69-76
BibTeX@inbook{Steinebach2010, author = {Steinebach, Martin and Mohamed El Ouariachi, Huajian Liu and Stefan Katzenbeisser}, title = {On the Reliability of Cell Phone Camera Fingerprint Recognition}, publisher = {Springer Berlin Heidelberg}, year = {2010}, volume = {31}, pages = {69-76}}
-
Detection of Double-Compression in MPEG-2 Videos
Proc. 2nd Int Intelligent Systems and Applications (ISA) Workshop
2010, pp. 1-4
BibTeX@inproceedings{Su2010a, author = {Yuting Su and Junyu Xu}, title = {Detection of Double-Compression in MPEG-2 Videos}, booktitle = {Proc. 2nd Int Intelligent Systems and Applications (ISA) Workshop}, year = {2010}, pages = {1--4}}
-
Exposing Digital Video Logo-removal Forgery by Inconsistency of Blur
International Journal of Pattern Recognition and Artificial Intelligence (IJPRAI), 2010, Vol. 24(7), pp. 1027-1046
BibTeX@article{Su2010, author = {Yuting Su and Jing Zhang and Yu Han and Jing Chen and Qingzhong Liu}, title = {Exposing Digital Video Logo-removal Forgery by Inconsistency of Blur}, journal = {International Journal of Pattern Recognition and Artificial Intelligence (IJPRAI)}, year = {2010}, volume = {24}, number = {7}, pages = {1027-1046}}
-
New Developments in Color Image Tampering Detection
International Symposium on Circuits and Systems
2010
BibTeX@inproceedings{Sutthiwan2010a, author = {Sutthiwan, Patchara and Shi, Yun Qing and Dong, Jing and Tan, Tieniu and Ng, Tian-Tsong}, title = {New Developments in Color Image Tampering Detection}, booktitle = {International Symposium on Circuits and Systems}, year = {2010}}
-
Rake Transform and Edge Statistics for Image Forgery Detection
IEEE International Conference on Multimedia and EXPO
2010
BibTeX@inproceedings{Sutthiwan2010, author = {Sutthiwan, Patchara and Shi, Yun Qing and Su, Wei and Ng, Tian-Tsong}, title = {Rake Transform and Edge Statistics for Image Forgery Detection}, booktitle = {IEEE International Conference on Multimedia and EXPO}, year = {2010}}
-
Estimating demosaicing algorithms using image noise variance
Nara Institute of Science and Technology, 2010
BibTeX@techreport{Takamatsu2010, author = {Takamatsu, Jun and Ogasawara, Tsukasa and Matsushita, Yasuyuki and Ikeuchi, Katsushi}, title = {Estimating demosaicing algorithms using image noise variance}, year = {2010}}
-
Nonattribution Properties of JPEG Quantization Tables
University of New Orleans, 2010
BibTeX@mastersthesis{Tuladhar2010, author = {Punnya Tuladhar}, title = {Nonattribution Properties of JPEG Quantization Tables}, school = {University of New Orleans}, year = {2010}}
-
Detection of resampled images: performance analysis and practical challenges
Proceedings of the 18th European Signal Processing Conference (EUSIPCO-2010)
2010
BibTeX@inproceedings{Uccheddu2010, author = {F. Uccheddu and A. De Rosa and A. Piva and M. Barni}, title = {Detection of resampled images: performance analysis and practical challenges}, booktitle = {Proceedings of the 18th European Signal Processing Conference (EUSIPCO-2010)}, year = {2010}}
-
Two-Dimensional Statistical Test for the Presence of Almost Cyclostationarity on Images
International Conference on Image Processing
2010
BibTeX@inproceedings{Vazquez-Padin2010, author = {Vazquez-Padin, David and Mosquera, Carlos and Perez-Gonzalez, Fernando}, title = {Two-Dimensional Statistical Test for the Presence of Almost Cyclostationarity on Images}, booktitle = {International Conference on Image Processing}, year = {2010}}
-
Conditional Probability Based Camera Identification
International Journal of Cryptology Research, 2010, Vol. 2(1), pp. 63-71
BibTeX@article{Wahab2010, author = {Ainuddin Wahid Abdul Wahab and Philip Bateman}, title = {Conditional Probability Based Camera Identification}, journal = {International Journal of Cryptology Research}, year = {2010}, volume = {2}, number = {1}, pages = {63-71}}
-
Improved method for source camera forensics using JPEG compression images
Proc. IEEE Int Information Theory and Information Security (ICITIS) Conf
2010, pp. 84-87
BibTeX@inproceedings{Wang2010a, author = {Gengzhong Wang and Wenhui Lang and Jianshe Wang}, title = {Improved method for source camera forensics using JPEG compression images}, booktitle = {Proc. IEEE Int Information Theory and Information Security (ICITIS) Conf}, year = {2010}, pages = {84--87}}
-
Image Forgery Forensics Based on Manual Blurred Edge Detection
Proc. Int Multimedia Information Networking and Security (MINES) Conf
2010, pp. 907-911
BibTeX@inproceedings{Wang2010d, author = {Junwen Wang and Guangjie Liu and Bo Xu and Hongyuan Li and Yuewei Dai and Zhiquan Wang}, title = {Image Forgery Forensics Based on Manual Blurred Edge Detection}, booktitle = {Proc. Int Multimedia Information Networking and Security (MINES) Conf}, year = {2010}, pages = {907--911}}
-
Image tampering detection based on stationary distribution of Markov chain
Proc. 17th IEEE Int Image Processing (ICIP) Conf
2010, pp. 2101-2104
BibTeX@inproceedings{Wang2010, author = {Wang, Wei and Dong, Jing and Tan, Tieniu}, title = {Image tampering detection based on stationary distribution of Markov chain}, booktitle = {Proc. 17th IEEE Int Image Processing (ICIP) Conf}, year = {2010}, pages = {2101--2104}}
-
Estimation of Image Rotation Angle Using Interpolation-Related Spectral Signatures With Application to Blind Detection of Image Forgery
IEEE Transactions on Information Forensics and Security, 2010, Vol. 5(3), pp. 507-517
BibTeX@article{Wei2010, author = {Weimin Wei and Shuozhong Wang and Xinpeng Zhang and Zhenjun Tang}, title = {Estimation of Image Rotation Angle Using Interpolation-Related Spectral Signatures With Application to Blind Detection of Image Forgery}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2010}, volume = {5}, number = {3}, pages = {507--517}}
-
Resolution variant visual cryptography for street view of Google Maps
Proc. IEEE Int Circuits and Systems (ISCAS) Symp
2010, pp. 1695-1698
BibTeX@inproceedings{Weir2010, author = {Weir, Jonathan and Yan, WeiQi}, title = {Resolution variant visual cryptography for street view of Google Maps}, booktitle = {Proc. IEEE Int Circuits and Systems (ISCAS) Symp}, year = {2010}, pages = {1695--1698}}
-
Blind Source Separation: Eine Einführung
2010
BibTeX@misc{Wohlmayr2010, author = {Wohlmayr, Michael}, title = {Blind Source Separation: Eine Einführung}, year = {2010}}
-
Geo-location estimation from two shadow trajectories
Proc. IEEE Conf. Computer Vision and Pattern Recognition (CVPR)
2010, pp. 585-590
BibTeX@inproceedings{Wu2010a, author = {Wu, Lin and Cao, Xiaochun}, title = {Geo-location estimation from two shadow trajectories}, booktitle = {Proc. IEEE Conf. Computer Vision and Pattern Recognition (CVPR)}, year = {2010}, pages = {585--590}}
-
Camera calibration and geo-location estimation from two shadow trajectories
Computer Vision and Image Understanding, 2010, Vol. 114(8), pp. 915 - 927
BibTeX@article{Wu2010, author = {Lin Wu and Xiaochun Cao and Hassan Foroosh}, title = {Camera calibration and geo-location estimation from two shadow trajectories}, journal = {Computer Vision and Image Understanding}, year = {2010}, volume = {114}, number = {8}, pages = {915 - 927}}
-
A study of medical image tampering detection
Proc. Int Medical Image Analysis and Clinical Applications (MIACA) Conf
2010, pp. 131-134
BibTeX@inproceedings{Xu2010, author = {Weijian Xu and Hui Huang and Wenxue Yu}, title = {A study of medical image tampering detection}, booktitle = {Proc. Int Medical Image Analysis and Clinical Applications (MIACA) Conf}, year = {2010}, pages = {131--134}}
-
Detecting Resized JPEG Images by Analyzing High Frequency Elements in DCT Coefficients
Proc. Sixth Int Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) Conf
2010, pp. 567-570
BibTeX@inproceedings{Yamasaki2010, author = {Yamasaki, Toshihiko and Matsunami, Tomoaki and Aizawa, Kiyoharu}, title = {Detecting Resized JPEG Images by Analyzing High Frequency Elements in DCT Coefficients}, booktitle = {Proc. Sixth Int Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) Conf}, year = {2010}, pages = {567--570}}
-
Detecting Double Compression of Audio Signal
SPIE Conference on Media Forensics and Security
2010
BibTeX@inproceedings{Yang2010, author = {Yang, Rui and Shi, Yun Qing and Huang, Jiwu}, title = {Detecting Double Compression of Audio Signal}, booktitle = {SPIE Conference on Media Forensics and Security}, year = {2010}}
-
Exposing Digital Image Forgeries by Using Canonical Correlation Analysis
Proc. 20th Int Pattern Recognition (ICPR) Conf
2010, pp. 838-841
BibTeX@inproceedings{Zhang2010b, author = {Chi Zhang and Hongbin Zhang}, title = {Exposing Digital Image Forgeries by Using Canonical Correlation Analysis}, booktitle = {Proc. 20th Int Pattern Recognition (ICPR) Conf}, year = {2010}, pages = {838--841}}
-
Identifying color image origin using curvelet transform
Proc. 17th IEEE Int Image Processing (ICIP) Conf
2010, pp. 2125-2128
BibTeX@inproceedings{Zhang2010c, author = {Zhang, Chi and Zhang, Hongbin}, title = {Identifying color image origin using curvelet transform}, booktitle = {Proc. 17th IEEE Int Image Processing (ICIP) Conf}, year = {2010}, pages = {2125--2128}}
-
Detecting and Extracting the Photo Composites Using Planar Homography and Graph Cut
IEEE Transactions on Information Forensics and Security, 2010, Vol. 5(3), pp. 544-555
BibTeX@article{Zhang2010, author = {Zhang, W. and Cao, X. and Qu, Y. and Hou, Y. and Zhao, H. and Zhang, C.}, title = {Detecting and Extracting the Photo Composites Using Planar Homography and Graph Cut}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2010}, volume = {5}, number = {3}, pages = {544--555}}
-
Detection of composite forged image
Proc. Int Computer Application and System Modeling (ICCASM) Conf
2010, Vol. 11
BibTeX@inproceedings{Zhang2010a, author = {Zhen Zhang and Zhou Yu and BaiNa Su}, title = {Detection of composite forged image}, booktitle = {Proc. Int Computer Application and System Modeling (ICCASM) Conf}, year = {2010}, volume = {11}}
-
Detecting Double Compressed JPEG Images by Using Moment Features of Mode Based DCT Histograms
Proc. Int Multimedia Technology (ICMT) Conf
2010, pp. 1-4
BibTeX@inproceedings{Zhao2010, author = {Feng Zhao and Zhenhua Yu and Shenghong Li}, title = {Detecting Double Compressed JPEG Images by Using Moment Features of Mode Based DCT Histograms}, booktitle = {Proc. Int Multimedia Technology (ICMT) Conf}, year = {2010}, pages = {1--4}}
-
Detecting Composite JPEG Images in Transform Domain
Proc. Int Multimedia Information Networking and Security (MINES) Conf
2010, pp. 340-344
BibTeX@inproceedings{Zheng2010, author = {Ergong Zheng and Xijian Ping and Tao Zhang}, title = {Detecting Composite JPEG Images in Transform Domain}, booktitle = {Proc. Int Multimedia Information Networking and Security (MINES) Conf}, year = {2010}, pages = {340--344}}
-
Digital spliced image forensics based on edge blur measurement
Proc. IEEE Int Information Theory and Information Security (ICITIS) Conf
2010, pp. 399-402
BibTeX@inproceedings{Zheng2010a, author = {Qianru Zheng and Wei Sun and Wei Lu}, title = {Digital spliced image forensics based on edge blur measurement}, booktitle = {Proc. IEEE Int Information Theory and Information Security (ICITIS) Conf}, year = {2010}, pages = {399--402}}
-
Image splicing detection based on image quality and analysis of variance
Proc. 2nd Int Education Technology and Computer (ICETC) Conf
2010, Vol. 4
BibTeX@inproceedings{Zhou2010, author = {Zhou, Zhi-ping and Zhang, Xiao-xiang}, title = {Image splicing detection based on image quality and analysis of variance}, booktitle = {Proc. 2nd Int Education Technology and Computer (ICETC) Conf}, year = {2010}, volume = {4}}
2009
-
Saliency detection for content-aware image resizing
Proc. 16th IEEE Int Image Processing (ICIP) Conf
2009, pp. 1005-1008
BibTeX@inproceedings{Achanta2009, author = {Achanta, R. and Susstrunk, S. }, title = {Saliency detection for content-aware image resizing}, booktitle = {Proc. 16th IEEE Int Image Processing (ICIP) Conf}, year = {2009}, pages = {1005--1008}}
-
Automatic noise estimation in images using local statistics. Additive and multiplicative cases
Image and Vision Computing , 2009, Vol. 27(6), pp. 756 - 770
BibTeX@article{Aja-Fernandez2009, author = {Santiago Aja-Fernández and Gonzalo Vegas-Sánchez-Ferrero and Marcos Martín-Fernández and Carlos Alberola-López}, title = {Automatic noise estimation in images using local statistics. Additive and multiplicative cases }, journal = {Image and Vision Computing }, year = {2009}, volume = {27}, number = {6}, pages = {756 - 770}}
-
Source Camera Identification for Heavily JPEG Compressed Low Resolution Still Images
Journal of Forensic Sciences, 2009, Vol. 54(3), pp. 628-638
BibTeX@article{Alles2009, author = {Alles, Erwin J. and Geradts, Zeno J. and Veenman, Cor. J.}, title = {Source Camera Identification for Heavily JPEG Compressed Low Resolution Still Images}, journal = {Journal of Forensic Sciences}, year = {2009}, volume = {54}, number = {3}, pages = {628-638}}
-
Analysis of denoising filters for photo response non uniformity noise extraction in source camera identification
DSP´09: Proceedings of the 16th international conference on Digital Signal Processing
IEEE Press, 2009, pp. 511-517
BibTeX@inproceedings{Amerini2009, author = {Amerini, Irene and Caldelli, Roberto and Cappellini, Vito and Picchioni, Francesco and Piva, Alessandro}, title = {Analysis of denoising filters for photo response non uniformity noise extraction in source camera identification}, booktitle = {DSP´09: Proceedings of the 16th international conference on Digital Signal Processing}, publisher = {IEEE Press}, year = {2009}, pages = {511--517}}
-
Detection of Duplicated Regions in Tampered Digital Images by Bit-Plane Analysis
Image Analysis and Processing
2009, pp. 893-901
BibTeX@inproceedings{Ardizzone2009, author = {Ardizzone, Edoardo and Mazzola, Giuseppe}, title = {Detection of Duplicated Regions in Tampered Digital Images by Bit-Plane Analysis}, booktitle = {Image Analysis and Processing}, year = {2009}, pages = {893-901}}
-
Identifying sensors from fingerprint images
Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition Workshops CVPR Workshops 2009
2009, pp. 78-84
BibTeX@inproceedings{Bartlow2009, author = {Bartlow, N. and Kalka, N. and Cukic, B. and Ross, A.}, title = {Identifying sensors from fingerprint images}, booktitle = {Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition Workshops CVPR Workshops 2009}, year = {2009}, pages = {78--84}}
-
Image Forensics of Digital Cameras by Analysing Image Variations Using Statistical Process Control
International Conference on Information, Communications and Signal Processing
2009
BibTeX@inproceedings{Bateman2009, author = {Bateman, Philip and Ho, Anthony T. S. and Woodward, Alan}, title = {Image Forensics of Digital Cameras by Analysing Image Variations Using Statistical Process Control}, booktitle = {International Conference on Information, Communications and Signal Processing}, year = {2009}}
-
Digital forgery estimation into DCT domain: a critical analysis
MiFor ´09: Proceedings of the First ACM workshop on Multimedia in forensics
ACM, 2009, pp. 37-42
BibTeX@inproceedings{Battiato2009, author = {Battiato, Sebastiano and Messina, Giuseppe}, title = {Digital forgery estimation into DCT domain: a critical analysis}, booktitle = {MiFor ´09: Proceedings of the First ACM workshop on Multimedia in forensics}, publisher = {ACM}, year = {2009}, pages = {37--42}}
-
Image Forensics
Università di Catania Dipartimento di Matematica ed Informatica Image Processing Laboratory, 2009
BibTeX@techreport{Battiato2009a, author = {Battiato, Sebastiano and Messina, Giuseppe and Rizzo, Rosetta}, title = {Image Forensics}, year = {2009}}
-
An efficient and robust method for detecting copy-move forgery
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2009
2009, pp. 1053-1056
BibTeX@inproceedings{Bayram2009, author = {Bayram, S. and Sencar, H. T. and Memon, N.}, title = {An efficient and robust method for detecting copy-move forgery}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2009}, year = {2009}, pages = {1053--1056}}
-
Multimedia-Forensik als Teildisziplin der digitalen Forensik
Fischer, S., Maehle, E. & Reischuk, R. (ed.)
Informatik 2009, Im Fokus das Leben, 28.9.-2.10.2009, Lübeck,
2009, Vol. 154
BibTeX@conference{Boehme2009, author = {Böhme, R. and Freiling, F. and Gloe, T. and Kirchner, M.}, title = {Multimedia-Forensik als Teildisziplin der digitalen Forensik}, booktitle = {Informatik 2009, Im Fokus das Leben, 28.9.-2.10.2009, Lübeck,}, year = {2009}, volume = {154}}
-
Multimedia Forensics is not Computer Forensics
Geradts, Z. J., Franke, K. Y. & Veenman, C. J. (ed.)
Third International Workshop on Computational Forensics
2009, pp. 90-103
BibTeX@inproceedings{Bohme2009, author = {Böhme, Rainer and Freiling, Felix and Gloe, Thomas and Kirchner, Matthias}, title = {Multimedia Forensics is not Computer Forensics}, booktitle = {Third International Workshop on Computational Forensics}, year = {2009}, pages = {90-103}}
-
The Essential Guide to Image Processing
Academic Press, 2009
BibTeX@book{Bovik2009, author = {Bovik, Al}, title = {The Essential Guide to Image Processing}, publisher = {Academic Press}, year = {2009}}
-
Passive Forensic Method for Detecting Duplicated Regions Affected by Reflection, Rotation and Scaling
Proceedings of the 17th European Signal Processing Conference (EUSIPCO 2009)
2009, pp. 824-828
BibTeX@inproceedings{Bravo-Solorio2009, author = {Bravo-Solorio, Sergio and Nandi, Asoke K.}, title = {Passive Forensic Method for Detecting Duplicated Regions Affected by Reflection, Rotation and Scaling}, booktitle = {Proceedings of the 17th European Signal Processing Conference (EUSIPCO 2009)}, year = {2009}, pages = {824-828}}
-
Passive Method for Detecting Duplicated Regions Affected by Reflection, Rotation and Scaling
European Signal Processing Conference
2009, pp. 824-828
BibTeX@inproceedings{Bravo-Solorio2009a, author = {Bravo-Solorio, Sergio and Nandi, Asoke K.}, title = {Passive Method for Detecting Duplicated Regions Affected by Reflection, Rotation and Scaling}, booktitle = {European Signal Processing Conference}, year = {2009}, pages = {824-828}}
-
Geometric Distortion Signatures for Printer Identification
IEEE International Conference on Acoustics, Speech, and Signal Processing
2009, pp. 1401-1404
BibTeX@inproceedings{Bulan2009, author = {Bulan, Orhan and Mao, Junwen and Sharma, Gaurav}, title = {Geometric Distortion Signatures for Printer Identification}, booktitle = {IEEE International Conference on Acoustics, Speech, and Signal Processing}, year = {2009}, pages = {1401-1404}}
-
Forensics in Telecommunications, Information and Multimedia
Sorell, M. (ed.)
Forensics in Telecommunications, Information and Multimedia
Chapter Distinguishing between Camera and Scanned Images by Means of Frequency Analysis
Springer Berlin Heidelberg, 2009, pp. 95-+
BibTeX@inbook{Caldelli2009, author = {Caldelli, R. and Amerini, I. and Picchioni, F.}, title = {Forensics in Telecommunications, Information and Multimedia}, booktitle = {Forensics in Telecommunications, Information and Multimedia}, publisher = {Springer Berlin Heidelberg}, year = {2009}, pages = {95-+}}
-
Distinguishing Between Camera and Scanned Images by Means of Frequency Analysis
Sorell, M. (ed.)
International Conference on Forensics in Telecommunications, Information and Multimedia
2009
BibTeX@inproceedings{Caldelli2009c, author = {Caldelli, Roberto and Amerini, Irene and Picchioni, Francesco}, title = {Distinguishing Between Camera and Scanned Images by Means of Frequency Analysis}, booktitle = {International Conference on Forensics in Telecommunications, Information and Multimedia}, year = {2009}}
-
Multimedia Forensics: Technologies for Imagery Investigation
Electronic Information, the Visual Arts and Beyond
2009, pp. 87-92
BibTeX@inproceedings{Caldelli2009a, author = {Caldelli, Roberto and Amerini, Irene and Picchioni, Francesco and Rosa, Alessia De and Cappellini, Vito}, title = {Multimedia Forensics: Technologies for Imagery Investigation}, booktitle = {Electronic Information, the Visual Arts and Beyond}, year = {2009}, pages = {87-92}}
-
Detection of image sharpening based on histogram aberration and ringing artifacts
ICME´09: Proceedings of the 2009 IEEE international conference on Multimedia and Expo
IEEE Press, 2009, pp. 1026-1029
BibTeX@inproceedings{Cao2009b, author = {Cao, Gang and Zhao, Yao and Ni, Rongrong}, title = {Detection of image sharpening based on histogram aberration and ringing artifacts}, booktitle = {ICME´09: Proceedings of the 2009 IEEE international conference on Multimedia and Expo}, publisher = {IEEE Press}, year = {2009}, pages = {1026--1029}}
-
RAW Tool Identification Though Detected Demosaicing Regularity
Proc. 16th IEEE Int Image Processing (ICIP) Conf, 2009
2009
BibTeX@inproceedings{Cao2009, author = {Cao, Hong and Kot, Alex C}, title = {RAW Tool Identification Though Detected Demosaicing Regularity}, booktitle = {Proc. 16th IEEE Int Image Processing (ICIP) Conf, 2009}, year = {2009}}
-
Accurate detection of demosaicing regularity for digital image forensics
Trans. Info. For. Sec., IEEE Press, 2009, Vol. 4(4), pp. 899-910
BibTeX@article{Cao2009a, author = {Cao, Hong and Kot, Alex C.}, title = {Accurate detection of demosaicing regularity for digital image forensics}, journal = {Trans. Info. For. Sec.}, publisher = {IEEE Press}, year = {2009}, volume = {4}, number = {4}, pages = {899--910}}
-
Identifying computer generated and digital camera images using fractional lower order moments
Proc. 4th IEEE Conf. Industrial Electronics and Applications ICIEA 2009
2009, pp. 230-235
BibTeX@inproceedings{Chen2009, author = {Dongmei Chen and Jianhua Li and Shilin Wang and Shenghong Li}, title = {Identifying computer generated and digital camera images using fractional lower order moments}, booktitle = {Proc. 4th IEEE Conf. Industrial Electronics and Applications ICIEA 2009}, year = {2009}, pages = {230--235}}
-
Noise brush: interactive high quality image-noise separation
ACM Transactions on Graphics, 2009, Vol. 28, pp. 146:1-146:10
BibTeX@article{Chen2009b, author = {Chen, Jia and Tang, Chi-Keung and Wang, Jue}, title = {Noise brush: interactive high quality image-noise separation}, journal = {ACM Transactions on Graphics}, year = {2009}, volume = {28}, pages = {146:1--146:10}}
-
Digital Camera Imaging System Simulation
IEEE Transactions on Electron Devices, 2009, Vol. 56(11), pp. 2496-2505
BibTeX@article{Chen2009c, author = {Junqing Chen and Venkataraman, K. and Bakin, D. and Rodricks, B. and Gravelle, R. and Rao, P. and Yongshen Ni}, title = {Digital Camera Imaging System Simulation}, journal = {IEEE Transactions on Electron Devices}, year = {2009}, volume = {56}, number = {11}, pages = {2496--2505}}
-
Detecting Doubly Compressed Images Based on Quantization Noise Model and Image Restoration
IEEE Workshop on Multimedia Signal Processing
2009
BibTeX@inproceedings{Chen2009a, author = {Chen, Yi-Lei and Hsu, Chiou-Ting}, title = {Detecting Doubly Compressed Images Based on Quantization Noise Model and Image Restoration}, booktitle = {IEEE Workshop on Multimedia Signal Processing}, year = {2009}}
-
Printer and Scanner Forensics
IEEE Signal Processing Magazine, 2009, Vol. 26(2), pp. 72-83
BibTeX@article{Chiang2009, author = {Chiang, Pei-Ju and Khanna, Nitin and Mikkilineni, Aravind K. and Segovia, Maria V. Ortiz and Suh, Sungjoo and Allebach, Jan P. and Chiu, George T.-C. and Delp, Edward J.}, title = {Printer and Scanner Forensics}, journal = {IEEE Signal Processing Magazine}, year = {2009}, volume = {26}, number = {2}, pages = {72-83}}
-
Color Laser Printer Identification by Analyzing Statistical Features on Discrete Wavelet Transform
IEEE International Conference on Image Processing
2009, pp. 1505-1508
BibTeX@inproceedings{Choi2009, author = {Choi, Jung-Ho and Im, Dong-Hyuck and Lee, Hae-Yeoun and Oh, Jun-Taek and Ryu, Jin-Ho and Lee, Heung-Kyu}, title = {Color Laser Printer Identification by Analyzing Statistical Features on Discrete Wavelet Transform}, booktitle = {IEEE International Conference on Image Processing}, year = {2009}, pages = {1505-1508}}
-
Tampering identification using Empirical Frequency Response
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2009
2009, pp. 1517-1520
BibTeX@inproceedings{Chuang2009, author = {Wei-Hong Chuang and Swaminathan, A. and Min Wu}, title = {Tampering identification using Empirical Frequency Response}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2009}, year = {2009}, pages = {1517--1520}}
-
Detecting and eliminating chromatic aberration in digital images
Proc. 16th IEEE Int Image Processing (ICIP) Conf
2009, pp. 3905-3908
BibTeX@inproceedings{Chung2009, author = {Soon-Wook Chung and Byoung-Kwang Kim and Woo-Jin Song}, title = {Detecting and eliminating chromatic aberration in digital images}, booktitle = {Proc. 16th IEEE Int Image Processing (ICIP) Conf}, year = {2009}, pages = {3905--3908}}
-
MP3Bit Rate Quality Detection Through Frequency Spectrum Analysis
ACM Proceedings of the Multimedia and Security Workshop
2009, pp. 57-62
BibTeX@inproceedings{DAlessandro2009, author = {DAlessandro, Brian and Shi, Yun Qing}, title = {MP3Bit Rate Quality Detection Through Frequency Spectrum Analysis}, booktitle = {ACM Proceedings of the Multimedia and Security Workshop}, year = {2009}, pages = {57-62}}
-
Gaussian Variogram Model for Printing Technology Identification
Proc. Third Asia Int. Conf. Modelling & Simulation AMS ´09
2009, pp. 320-325
BibTeX@inproceedings{Devi2009, author = {Devi, M. U. and Agarwal, A. and Rao, C. R.}, title = {Gaussian Variogram Model for Printing Technology Identification}, booktitle = {Proc. Third Asia Int. Conf. Modelling & Simulation AMS ´09}, year = {2009}, pages = {320--325}}
-
Image tamper detection based on demosaicing artifacts
Proc. 16th IEEE Int Image Processing (ICIP) Conf
2009, pp. 1497-1500
BibTeX@inproceedings{Dirik2009, author = {Dirik, A. E. and Memon, N.}, title = {Image tamper detection based on demosaicing artifacts}, booktitle = {Proc. 16th IEEE Int Image Processing (ICIP) Conf}, year = {2009}, pages = {1497--1500}}
-
Flatbed Scanner Identification Based on Dust and Scratches Over Scanner Platen
IEEE International Conference on Acoustics, Speech, and Signal Processing
2009, pp. 1385-1388
BibTeX@inproceedings{Dirik2009a, author = {Dirik, Ahmet Emir and Sencar, Husrev T. and Memon, Nasir}, title = {Flatbed Scanner Identification Based on Dust and Scratches Over Scanner Platen}, booktitle = {IEEE International Conference on Acoustics, Speech, and Signal Processing}, year = {2009}, pages = {1385-1388}}
-
A pixel-based digital photo authentication framework via demosaicking inter-pixel correlation
MM&38;Sec ´09: Proceedings of the 11th ACM workshop on Multimedia and security
ACM, 2009, pp. 125-130
BibTeX@inproceedings{Fan2009, author = {Fan, Na and Jin, Cheng and Huang, Yizhen}, title = {A pixel-based digital photo authentication framework via demosaicking inter-pixel correlation}, booktitle = {MM&38;Sec ´09: Proceedings of the 11th ACM workshop on Multimedia and security}, publisher = {ACM}, year = {2009}, pages = {125--130}}
-
Source Class Identification for DSLR and Compact Cameras
IEEE Workshop on Multimedia Signal Processing
2009
BibTeX@inproceedings{Fang2009b, author = {Fang, Yanmei and Dirik, Ahmet Emir and Sun, Xiaoxi and Memon, Nasir}, title = {Source Class Identification for DSLR and Compact Cameras}, booktitle = {IEEE Workshop on Multimedia Signal Processing}, year = {2009}}
-
Image Splicing Detection Using Camera Characteristic Inconsistency
Proc. Int. Conf. Multimedia Information Networking and Security MINES ´09
2009, Vol. 1, pp. 20-24
BibTeX@inproceedings{Fang2009, author = {Zhen Fang and Shuozhong Wang and Xinpeng Zhang}, title = {Image Splicing Detection Using Camera Characteristic Inconsistency}, booktitle = {Proc. Int. Conf. Multimedia Information Networking and Security MINES ´09}, year = {2009}, volume = {1}, pages = {20--24}}
-
Advances in Computers
Zelkowitz, M. (ed.)
Chapter Photo Fakery and Forensics
Elsevier, 2009, Vol. 77, pp. 1-55
BibTeX@inbook{Farid2009h, author = {Farid, Hany}, title = {Advances in Computers}, publisher = {Elsevier}, year = {2009}, volume = {77}, pages = {1-55}}
-
Image forgery detection
IEEE Signal Processing Magazine, 2009, Vol. 26(2), pp. 16-25
BibTeX@article{Farid2009, author = {Farid, Hany}, title = {Image forgery detection}, journal = {IEEE Signal Processing Magazine}, year = {2009}, volume = {26}, number = {2}, pages = {16--25}}
-
Seeing is not believing
IEEE Spectrum, 2009, Vol. 46(8), pp. 44-51
BibTeX@article{Farid2009a, author = {Farid, Hany}, title = {Seeing is not believing}, journal = {IEEE Spectrum}, year = {2009}, volume = {46}, number = {8}, pages = {44--51}}
-
Exposing Digital Forgeries From JPEG Ghosts
IEEE Transactions on Information Forensics and Security, 2009, Vol. 4(1), pp. 154-160
BibTeX@article{Farid2009b, author = {Farid, Hany}, title = {Exposing Digital Forgeries From JPEG Ghosts}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2009}, volume = {4}, number = {1}, pages = {154--160}}
-
A Survey of Image Forgery Detection
IEEE Signal Processing Magazine, 2009, Vol. 2(26), pp. 16-25
BibTeX@article{Farid2009d, author = {Farid, Hany}, title = {A Survey of Image Forgery Detection}, journal = {IEEE Signal Processing Magazine}, year = {2009}, volume = {2}, number = {26}, pages = {16-25}}
-
The Lee Harvey Oswald Backyard Photos: Real or Fake?
Perception, 2009, Vol. 11(38), pp. 1731-1734
BibTeX@article{Farid2009f, author = {Farid, Hany}, title = {The Lee Harvey Oswald Backyard Photos: Real or Fake?}, journal = {Perception}, year = {2009}, volume = {11}, number = {38}, pages = {1731-1734}}
-
Deception: Methods, Motives, Contexts and Consequences
Chapter Digital Doctoring: can we trust photographs?
Stanford University Press, 2009, pp. 95-108
BibTeX@inbook{Farid2009g, author = {Farid, Hany}, title = {Deception: Methods, Motives, Contexts and Consequences}, publisher = {Stanford University Press}, year = {2009}, pages = {95-108}}
-
Stochastic Image Denoising
Proceedings of the British Machine Vision Conference (BMVC)
2009
BibTeX@inproceedings{Estrada2009, author = {Francisco Estrada, David Fleet and Allan Jepson}, title = {Stochastic Image Denoising}, booktitle = {Proceedings of the British Machine Vision Conference (BMVC)}, year = {2009}}
-
Digital Image Forensics Using Sensor Noise
IEEE Signal Processing Magazine, 2009, Vol. 26(2), pp. 26-37
BibTeX@article{Fridrich2009, author = {Jessica Fridrich}, title = {Digital Image Forensics Using Sensor Noise}, journal = {IEEE Signal Processing Magazine}, year = {2009}, volume = {26}, number = {2}, pages = {26--37}}
-
Digital Image Forensics
IEEE Signal Processing Magazine, 2009, Vol. 26(2), pp. 26-37
BibTeX@article{Fridrich2009a, author = {Fridrich, J.}, title = {Digital Image Forensics}, journal = {IEEE Signal Processing Magazine}, year = {2009}, volume = {26}, number = {2}, pages = {26--37}}
-
Printer-scanner identification via analysis of structured security deterrents
Proceedings of the 2009 First IEEE International Workshop on Information Forensics and Security
2009, pp. 151-155
BibTeX@inproceedings{Gaubatz2009, author = {Matthew D. Gaubatz and Steven J. Simske}, title = {Printer-scanner identification via analysis of structured security deterrents}, booktitle = {Proceedings of the 2009 First IEEE International Workshop on Information Forensics and Security}, year = {2009}, pages = {151--155}}
-
A Low-complexity Reduced-reference Print Identification Algorithm
IEEE International Conference on Image Processing
2009, pp. 1281-1284
BibTeX@inproceedings{Gaubatz2009a, author = {Gaubatz, Matthew D. and Ulichney, Robert and Rouse, David}, title = {A Low-complexity Reduced-reference Print Identification Algorithm}, booktitle = {IEEE International Conference on Image Processing}, year = {2009}, pages = {1281-1284}}
-
Feature-Based Camera Model Identification Works in Practice: Results of a Comprehensive Evaluation Study
Katzenbeisser, S. & Sadeghi, A.-R. (ed.)
International Workshop on Information Hiding
2009, pp. 262-276
BibTeX@inproceedings{Gloe2009, author = {Gloe, Thomas and Borowka, Karsten and Winkler, Antje}, title = {Feature-Based Camera Model Identification Works in Practice: Results of a Comprehensive Evaluation Study}, booktitle = {International Workshop on Information Hiding}, year = {2009}, pages = {262-276}}
-
High-profile forensic analysis of images
Proc. rd Int Crime Detection and Prevention (ICDP 2009) Conf
2009, pp. 1-6
BibTeX@inproceedings{Goldenstein2009, author = {Goldenstein, Siome and Rocha, Anderson}, title = {High-profile forensic analysis of images}, booktitle = {Proc. rd Int Crime Detection and Prevention (ICDP 2009) Conf}, year = {2009}, pages = {1--6}}
-
The Split Bregman Method for L1-Regularized Problems
SIAM Journal on Imaging Sciences, SIAM, 2009, Vol. 2(2), pp. 323-343
BibTeX@article{Goldstein2009, author = {Tom Goldstein and Stanley Osher}, title = {The Split Bregman Method for L1-Regularized Problems}, journal = {SIAM Journal on Imaging Sciences}, publisher = {SIAM}, year = {2009}, volume = {2}, number = {2}, pages = {323-343}}
-
Digital Camera Identification from Images - Estimating False Acceptance Probability
Digital Watermarking, Springer-Verlag, 2009, Vol. 5450/2009, pp. 454-468
BibTeX@article{Goljan2009, author = {Goljan, Miroslav}, title = {Digital Camera Identification from Images - Estimating False Acceptance Probability}, journal = {Digital Watermarking}, publisher = {Springer-Verlag}, year = {2009}, volume = {5450/2009}, pages = {454--468}}
-
Large Scale Test of Sensor Fingerprint Camera Identification
SPIE Conference on Media Forensics and Security
2009
BibTeX@inproceedings{Goljan2009a, author = {Goljan, Miroslav and Fridrich, Jessica and Filler, Tomáš}, title = {Large Scale Test of Sensor Fingerprint Camera Identification}, booktitle = {SPIE Conference on Media Forensics and Security}, year = {2009}}
-
Intrinsic Sensor Noise Features for Forensic Analysis on Scanners and Scanned Images
IEEE Transactions on Information Forensics and Security, 2009, Vol. 4(3), pp. 476-491
BibTeX@article{Gou2009, author = {Hongmei Gou and Swaminathan, A. and Min Wu}, title = {Intrinsic Sensor Noise Features for Forensic Analysis on Scanners and Scanned Images}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2009}, volume = {4}, number = {3}, pages = {476--491}}
-
Forensic Speech and Audio Analysis Working Group - Best Practice Guidelines for ENF Analysis in Forensic Authentication of Digital Evidence
2009
BibTeX@misc{Grigoras2009, author = {Grigoras, Catalin and Cooper, Alan and Michalek, Marcin}, title = {Forensic Speech and Audio Analysis Working Group - Best Practice Guidelines for ENF Analysis in Forensic Authentication of Digital Evidence}, year = {2009}}
-
Source Cell Phone Camera Identification Based on Singular Value Decomposition
IEEE Workshop on Information Forensics and Security
2009, pp. 171-175
BibTeX@inproceedings{Gul2009, author = {Gül, Gökhan and Avcibas, Ismail}, title = {Source Cell Phone Camera Identification Based on Singular Value Decomposition}, booktitle = {IEEE Workshop on Information Forensics and Security}, year = {2009}, pages = {171-175}}
-
Using the ENF Criterion for Determining the Time of Recording of Short Digital Audio Recordings
Geradts, Z. J., Franke, K. Y. & Veenman, C. J. (ed.)
International Workshop on Computational Forensics
2009, pp. 116-124
BibTeX@inproceedings{Huijbregtse2009, author = {Huijbregtse, Maarten and Geradts, Zeno J.}, title = {Using the ENF Criterion for Determining the Time of Recording of Short Digital Audio Recordings}, booktitle = {International Workshop on Computational Forensics}, year = {2009}, pages = {116-124}}
-
Digital Camera Identification
2009
BibTeX@misc{Jenkins2009, author = {Jenkins, Neil}, title = {Digital Camera Identification}, year = {2009}}
-
Image Denoising Using Adaptive Threshold Based on Second Generation Bandelets Transform
Proc. Int. Forum Computer Science-Technology and Applications IFCSTA ´09
2009, Vol. 1, pp. 444-447
BibTeX@inproceedings{Jiaxue2009, author = {Liu Jiaxue and Guo Lei}, title = {Image Denoising Using Adaptive Threshold Based on Second Generation Bandelets Transform}, booktitle = {Proc. Int. Forum Computer Science-Technology and Applications IFCSTA ´09}, year = {2009}, volume = {1}, pages = {444--447}}
-
Blind Detection of Digital Forgeries Using Detection Trace of Eclosion
Proc. Int. Conf. Computational Intelligence and Software Engineering CiSE 2009
2009, pp. 1-4
BibTeX@inproceedings{Jing2009, author = {Tao Jing and Yuefeng Peng and Feifei Zhang and Yan Huo}, title = {Blind Detection of Digital Forgeries Using Detection Trace of Eclosion}, booktitle = {Proc. Int. Conf. Computational Intelligence and Software Engineering CiSE 2009}, year = {2009}, pages = {1--4}}
-
Image deblurring and denoising using color priors
Proc. IEEE Conf. Computer Vision and Pattern Recognition CVPR 2009
2009, pp. 1550-1557
BibTeX@inproceedings{Joshi2009, author = {Joshi, N. and Zitnick, C. L. and Szeliski, R. and Kriegman, D. J. }, title = {Image deblurring and denoising using color priors}, booktitle = {Proc. IEEE Conf. Computer Vision and Pattern Recognition CVPR 2009}, year = {2009}, pages = {1550--1557}}
-
Image Source Separation Using Color Channel Dependencies
Adali, T., Jutten, C., Romano, J. & Barros, A. (ed.)
Independent Component Analysis and Signal Separation
Springer Berlin / Heidelberg, 2009, Vol. 5441, pp. 499-506
BibTeX@incollection{Kayabol2009, author = {Kayabol, Koray and Kuruoglu, Ercan and Sankur, Bulent}, title = {Image Source Separation Using Color Channel Dependencies}, booktitle = {Independent Component Analysis and Signal Separation}, publisher = {Springer Berlin / Heidelberg}, year = {2009}, volume = {5441}, pages = {499-506}}
-
Detecting Photographic Composites of Famous People
Department of Computer Science, Dartmouth College, 2009(TR2009-656)
BibTeX@techreport{Kee2009, author = {Kee, Eric and Farid, Hany}, title = {Detecting Photographic Composites of Famous People}, year = {2009}, number = {TR2009-656}}
-
Source Scanner Identification for Scanned Documents
IEEE Workshop on Information Forensics and Security
2009, pp. 166-170
BibTeX@inproceedings{Khanna2009c, author = {Khanna, Nitin and Delp, Edward J.}, title = {Source Scanner Identification for Scanned Documents}, booktitle = {IEEE Workshop on Information Forensics and Security}, year = {2009}, pages = {166-170}}
-
Scanner Identification Using Feature-Based Processing and Analysis
IEEE Transactions on Information Forensics and Security, 2009, Vol. 4(1), pp. 123-139
BibTeX@article{Khanna2009, author = {Khanna, N. and Mikkilineni, A. K. and Delp, E. J.}, title = {Scanner Identification Using Feature-Based Processing and Analysis}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2009}, volume = {4}, number = {1}, pages = {123--139}}
-
Forensic Camera Classification: Verification of Sensor Pattern Noise Approach
Forensic Science Communications, 2009, Vol. 11(1), pp. 10
BibTeX@article{Khanna2009b, author = {Khanna, Nitin and Mikkilineni, Aravind K. and Delp, Edward J.}, title = {Forensic Camera Classification: Verification of Sensor Pattern Noise Approach}, journal = {Forensic Science Communications}, year = {2009}, volume = {11}, number = {1}, pages = {10}}
-
A New Forensic Model And Its Application To The Collection, Extraction And Long Term Storage Of Screen Content Off A Memory Dump
International Conference on Digital Signal Processing
2009, pp. 1135-1140
BibTeX@inproceedings{Kiltz2009a, author = {Kiltz, Stefan and Hoppe, Tobias and Dittmann, Jana}, title = {A New Forensic Model And Its Application To The Collection, Extraction And Long Term Storage Of Screen Content Off A Memory Dump}, booktitle = {International Conference on Digital Signal Processing}, year = {2009}, pages = {1135-1140}}
-
Video Surveillance: A new forensic model for the forensically sound retrival of picture content off a memory dump
Fischer, S., Maehle, E. & Reischuk, R. (ed.)
Informatik2009 - Digitale Multimedia-Forensik
2009, pp. 1619-1633
BibTeX@inproceedings{Kiltz2009, author = {Kiltz, Stefan and Hoppe, Tobias and Dittmann, Jana and Vielhauer, Claus}, title = {Video Surveillance: A new forensic model for the forensically sound retrival of picture content off a memory dump}, booktitle = {Informatik2009 - Digitale Multimedia-Forensik}, year = {2009}, pages = {1619-1633}}
-
Synthesis of color filter array pattern in digital images
Proceedings of SPIE
2009, Vol. 7254, pp. 72540K
BibTeX@inproceedings{Kirchner2009, author = {Matthias Kirchner and Rainer Böhme}, title = {Synthesis of color filter array pattern in digital images}, booktitle = {Proceedings of SPIE}, year = {2009}, volume = {7254}, pages = {72540K}}
-
On resampling detection in re-compressed images
Proceedings of the 2009 First IEEE International Workshop on Information Forensics and Security
2009, pp. 21-25
BibTeX@inproceedings{Kirchner2009a, author = {Kirchner, Matthias and Gloe, Thomas}, title = {On resampling detection in re-compressed images}, booktitle = {Proceedings of the 2009 First IEEE International Workshop on Information Forensics and Security}, year = {2009}, pages = {21--25}}
-
Forensics in Telecommunications, Information and Multimedia
Sorell, M. (ed.)
Forensics in Telecommunications, Information and Multimedia (Proceedings of the International Conference on Forensics in Telecommunications, Information and Multimedia)
Chapter Analysis of Sensor Photo Response Non-Uniformity in RAW Images
Springer, 2009, pp. 130-141
BibTeX@inbook{Knight2009, author = {Knight, Simon and Moschou, Simon and Sorell, Matthew}, title = {Forensics in Telecommunications, Information and Multimedia}, booktitle = {Forensics in Telecommunications, Information and Multimedia (Proceedings of the International Conference on Forensics in Telecommunications, Information and Multimedia)}, publisher = {Springer}, year = {2009}, pages = {130-141}}
-
Detecting Video Forgeries Based on Noise Characteristics
Wada, T., Huang, F. & Lin, S. (ed.)
Advances in Image and Video Technology, Third Pacific Rim Symposium
2009, pp. 306-317
BibTeX@inproceedings{Kobayashi2009, author = {Kobayashi, Michihiro and Okabe, Takahiro and Sato, Yoichi}, title = {Detecting Video Forgeries Based on Noise Characteristics}, booktitle = {Advances in Image and Video Technology, Third Pacific Rim Symposium}, year = {2009}, pages = {306-317}}
-
Custom Design of JPEG Quantisation Tables for Compressing Iris Polar Images to Improve Recognition Accuracy
Tistarelli, M. & Nixon, M. (ed.)
Advances in Biometrics
Springer Berlin Heidelberg, 2009, Vol. 5558, pp. 1091-1101
BibTeX@incollection{Konrad2009, author = {Konrad, Mario and Stögner, Herbert and Uhl, Andreas}, title = {Custom Design of JPEG Quantisation Tables for Compressing Iris Polar Images to Improve Recognition Accuracy}, booktitle = {Advances in Biometrics}, publisher = {Springer Berlin Heidelberg}, year = {2009}, volume = {5558}, pages = {1091-1101}}
-
The application of intelligent system to digital image forensics
Proc. Int Machine Learning and Cybernetics Conf
2009, Vol. 5, pp. 2991-2998
BibTeX@inproceedings{Lai2009, author = {Cheng-Liang Lai and Yi-Shiang Chen}, title = {The application of intelligent system to digital image forensics}, booktitle = {Proc. Int Machine Learning and Cybernetics Conf}, year = {2009}, volume = {5}, pages = {2991--2998}}
-
Estimating natural illumination from a single outdoor image
Proc. IEEE 12th Int Computer Vision Conf
2009, pp. 183-190
BibTeX@inproceedings{Lalonde2009, author = {Lalonde, J.-F. and Efros, A. A. and Narasimhan, S. G.}, title = {Estimating natural illumination from a single outdoor image}, booktitle = {Proc. IEEE 12th Int Computer Vision Conf}, year = {2009}, pages = {183--190}}
-
Image and Video Fingerprinting: Forensic Applications
SPIE Conference on Media Forensics and Security
2009
BibTeX@inproceedings{Lefebvre2009, author = {Lefebvre, Frederic and Chupeau, Bertrand and Massoudi, Ayoub and Diehl, Eric}, title = {Image and Video Fingerprinting: Forensic Applications}, booktitle = {SPIE Conference on Media Forensics and Security}, year = {2009}}
-
Understanding and evaluating blind deconvolution algorithms
Proc. IEEE Conf. Computer Vision and Pattern Recognition CVPR 2009
2009, pp. 1964-1971
BibTeX@inproceedings{Levin2009, author = {Levin, A. and Weiss, Y. and Durand, F. and Freeman, W. T. }, title = {Understanding and evaluating blind deconvolution algorithms}, booktitle = {Proc. IEEE Conf. Computer Vision and Pattern Recognition CVPR 2009}, year = {2009}, pages = {1964--1971}}
-
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Sorell, M. (ed.)
Forensics in Telecommunications, Information and Multimedia
Chapter Detection of Block Artifacts for Digital Forensic Analysis
Springer Berlin Heidelberg, 2009, Vol. Volume 8, pp. 173-178
BibTeX@inbook{Li2009a, author = {Li, Chang-Tsun}, title = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, booktitle = {Forensics in Telecommunications, Information and Multimedia}, publisher = {Springer Berlin Heidelberg}, year = {2009}, volume = {Volume 8}, pages = {173-178}}
-
Detection of Block Artifacts for Digital Forensic Analysis
Sorell, M. (ed.)
International Conference on Forensics in Telecommunications, Information and Multimedia
2009, pp. 173-178
BibTeX@inproceedings{Li2009g, author = {Li, Chang-Tsun}, title = {Detection of Block Artifacts for Digital Forensic Analysis}, booktitle = {International Conference on Forensics in Telecommunications, Information and Multimedia}, year = {2009}, pages = {173-178}}
-
Source camera linking using enhanced sensor pattern noise extracted from images
IET Seminar Digests, IEE, 2009, Vol. 2009(2), pp. P46-P46
BibTeX@article{Li2009b, author = {Chang-Tsun Li}, title = {Source camera linking using enhanced sensor pattern noise extracted from images}, journal = {IET Seminar Digests}, publisher = {IEE}, year = {2009}, volume = {2009}, number = {2}, pages = {P46-P46}}
-
Source Camera Identification Using Enhanced Sensor Pattern Noise
IEEE International Conference on Image Processing
2009
BibTeX@inproceedings{Li2009e, author = {Li, Chang-Tsun}, title = {Source Camera Identification Using Enhanced Sensor Pattern Noise}, booktitle = {IEEE International Conference on Image Processing}, year = {2009}}
-
On the Repudiability of Device Identification and Image Integrity Verification Using Sensor Pattern Noise
International Conference on Information Security and Digital Forensics
2009, pp. 19-25
BibTeX@inproceedings{Li2009h, author = {Li, Chang-Tsun and Chang, Chih-Yuan and Li, Yue}, title = {On the Repudiability of Device Identification and Image Integrity Verification Using Sensor Pattern Noise}, booktitle = {International Conference on Information Security and Digital Forensics}, year = {2009}, pages = {19-25}}
-
TDI CCD non-uniformity correction algorithm
Proc. 4th IEEE Conf. Industrial Electronics and Applications ICIEA 2009
2009, pp. 1483-1487
BibTeX@inproceedings{Li2009f, author = {Tao Li and Mingyi He and Ning Lei and Chunmei Li and Qingyuan Wang}, title = {TDI CCD non-uniformity correction algorithm}, booktitle = {Proc. 4th IEEE Conf. Industrial Electronics and Applications ICIEA 2009}, year = {2009}, pages = {1483--1487}}
-
Passive Detection of Doctored JPEG Image Via Block Artifact Grid Extraction
IEEE Transactions on Signal Processing, 2009, Vol. 89(9), pp. 1821-1829
BibTeX@article{Li2009c, author = {Li, Weihai and Yuan, Yuan and Yu, Nenghai}, title = {Passive Detection of Doctored JPEG Image Via Block Artifact Grid Extraction}, journal = {IEEE Transactions on Signal Processing}, year = {2009}, volume = {89}, number = {9}, pages = {1821-1829}}
-
Decomposed Photo Response Non-Uniformity for Digital Forensic Analysis
Sorell, M. (ed.)
International Conference on Forensics in Telecommunications, Information and Multimedia
2009, pp. 166-172
BibTeX@inproceedings{Li2009d, author = {Li, Yue and Li, Chang-Tsun}, title = {Decomposed Photo Response Non-Uniformity for Digital Forensic Analysis}, booktitle = {International Conference on Forensics in Telecommunications, Information and Multimedia}, year = {2009}, pages = {166-172}}
-
Blind Detection of Digital Forgery Image Based on the Local Entropy of the Gradient
Digital Watermarking, Springer-Verlag, 2009, Vol. 5450/2009, pp. 161-169
BibTeX@article{Li2009, author = {Li, Zhe and Zheng, Jiang-Bin}, title = {Blind Detection of Digital Forgery Image Based on the Local Entropy of the Gradient}, journal = {Digital Watermarking}, publisher = {Springer-Verlag}, year = {2009}, volume = {5450/2009}, pages = {161--169}}
-
Image Fakery Detection Based on Singular Value Decomposition
Makara Seri Sains, 2009, Vol. 13(2), pp. 180-184
BibTeX@article{Liliana2009, author = {Liliana, Dewi Yanti and T. Basaruddin}, title = {Image Fakery Detection Based on Singular Value Decomposition}, journal = {Makara Seri Sains}, year = {2009}, volume = {13}, number = {2}, pages = {180-184}}
-
Fast copy-move forgery detection
WSEAS Trans. Sig. Proc., World Scientific and Engineering Academy and Society (WSEAS), 2009, Vol. 5(5), pp. 188-197
BibTeX@article{Lin2009, author = {Lin, Hwei-Jen and Wang, Chun-Wei and Kao, Yang-Ta}, title = {Fast copy-move forgery detection}, journal = {WSEAS Trans. Sig. Proc.}, publisher = {World Scientific and Engineering Academy and Society (WSEAS)}, year = {2009}, volume = {5}, number = {5}, pages = {188--197}}
-
An Efficient Method for Copy-Move Forgery Detection
Proceedings of the 8th WSEAS International Conference on Applied Computer and Applied Computational Science
2009
BibTeX@inproceedings{Lin2009a, author = {Lin, Hwei-Jen and Wang, Chun-Wei and Kao, Yang-Ta}, title = {An Efficient Method for Copy-Move Forgery Detection}, booktitle = {Proceedings of the 8th WSEAS International Conference on Applied Computer and Applied Computational Science}, year = {2009}}
-
Digital Image Forensics Using EM Algorithm
Muneesawang, P., Wu, F., Kumazawa, I., Roeksabutr, A., Liao, M. & Tang, X. (ed.)
Advances in Multimedia Information Processing - PCM 2009
Springer Berlin / Heidelberg, 2009, Vol. 5879, pp. 994-998
BibTeX@incollection{Lin2009c, author = {Lin, Tim-kun and Huang, Chung-Lin}, title = {Digital Image Forensics Using EM Algorithm}, booktitle = {Advances in Multimedia Information Processing - PCM 2009}, publisher = {Springer Berlin / Heidelberg}, year = {2009}, volume = {5879}, pages = {994-998}}
-
Digital Image Source Coder Forensics via Intrinsic Fingerprints
IEEE Transactions on Information Forensics and Security, 2009, Vol. 4(3), pp. 460-475
BibTeX@article{Lin2009e, author = {Lin, W. Sabrina and Tjoa, Steven and Zhao, H. Vicky and Liu, K. J. Ray}, title = {Digital Image Source Coder Forensics via Intrinsic Fingerprints}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2009}, volume = {4}, number = {3}, pages = {460-475}}
-
Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis
Pattern Recognition, 2009, Vol. 42(11), pp. 2492 - 2501
BibTeX@article{Lin2009b, author = {Zhouchen Lin and Junfeng He and Xiaoou Tang and Chi-Keung Tang}, title = {Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis}, journal = {Pattern Recognition}, year = {2009}, volume = {42}, number = {11}, pages = {2492 - 2501}}
-
A new approach for JPEG resize and image splicing detection
MiFor ´09: Proceedings of the First ACM workshop on Multimedia in forensics
ACM, 2009, pp. 43-48
BibTeX@inproceedings{Liu2009, author = {Liu, Qingzhong and Sung, Andrew H.}, title = {A new approach for JPEG resize and image splicing detection}, booktitle = {MiFor ´09: Proceedings of the First ACM workshop on Multimedia in forensics}, publisher = {ACM}, year = {2009}, pages = {43--48}}
-
Blind identification for digital images based on inconsistency of illuminant direction
Journal of Jilin University
2009, Vol. 27(3), pp. 293-298
BibTeX@inproceedings{Lu2009, author = {Lu, Ying-Da and Shen, Xuan-Jing and Chen, Hai-Peng and Wang, You-Wei}, title = {Blind identification for digital images based on inconsistency of illuminant direction}, booktitle = {Journal of Jilin University}, year = {2009}, volume = {27}, number = {3}, pages = {293-298}}
-
A Novel Method for Block Size Forensics Based on Morphological Operations
Lecture Notes In Computer Science, Springer-Verlag, 2009, Vol. 5450/2009, pp. 229-239
BibTeX@article{Luo2009, author = {Luo, Weiqi and Huang, Jiwu and Qiu, Guoping}, title = {A Novel Method for Block Size Forensics Based on Morphological Operations}, journal = {Lecture Notes In Computer Science}, publisher = {Springer-Verlag}, year = {2009}, volume = {5450/2009}, pages = {229--239}}
-
Identifying Image Authenticity by Detecting Inconsistency in Light Source Direction
Proc. Int. Conf. Information Engineering and Computer Science ICIECS 2009
2009, pp. 1-5
BibTeX@inproceedings{Lv2009, author = {Yingda Lv and Xuanjing Shen and Haipeng Chen}, title = {Identifying Image Authenticity by Detecting Inconsistency in Light Source Direction}, booktitle = {Proc. Int. Conf. Information Engineering and Computer Science ICIECS 2009}, year = {2009}, pages = {1--5}}
-
Detection and description of geometrically transformed digital images
Delp, E. J., Dittmann, J., Memon, N. D. & Wong, P. W. (ed.)
Proceedings of SPIE-IS&T Electronic Imaging: Media Forensics and Security XI
2009, Vol. 7254, pp. 72540J
BibTeX@inproceedings{Mahdian2009, author = {Babak Mahdian and Stanislav Saic}, title = {Detection and description of geometrically transformed digital images}, booktitle = {Proceedings of SPIE-IS&T Electronic Imaging: Media Forensics and Security XI}, year = {2009}, volume = {7254}, pages = {72540J}}
-
A Cyclostationarity Analysis Applied to Scaled Images
Leung C.S., Lee M., C. J. (ed.)
International Conference on Neural Information Processing (ICONIP 2009)
2009, Vol. 16
BibTeX@inproceedings{Mahdian2009d, author = {Babak Mahdian and Stanislav Saic}, title = {A Cyclostationarity Analysis Applied to Scaled Images}, booktitle = {International Conference on Neural Information Processing (ICONIP 2009)}, year = {2009}, volume = {16}}
-
Using noise inconsistencies for blind image forensics
Image and Vision Computing, 2009, Vol. 27, pp. 1497-1503
BibTeX@article{Mahdian2009a, author = {Mahdian, Babak and Saic, Stanislav}, title = {Using noise inconsistencies for blind image forensics}, journal = {Image and Vision Computing}, year = {2009}, volume = {27}, pages = {1497--1503}}
-
A cyclostationarity analysis applied to image forensics
Proc. Workshop Applications of Computer Vision (WACV)
2009, pp. 1-6
BibTeX@inproceedings{Mahdian2009b, author = {Mahdian, B. and Saic, S.}, title = {A cyclostationarity analysis applied to image forensics}, booktitle = {Proc. Workshop Applications of Computer Vision (WACV)}, year = {2009}, pages = {1--6}}
-
Detecting double compressed JPEG images
Proc. rd Int Crime Detection and Prevention (ICDP 2009) Conf
2009, pp. 1-6
BibTeX@inproceedings{Mahdian2009c, author = {Mahdian, Babak and Saic, Stanislav}, title = {Detecting double compressed JPEG images}, booktitle = {Proc. rd Int Crime Detection and Prevention (ICDP 2009) Conf}, year = {2009}, pages = {1--6}}
-
Device Temporal Forensics: An Information Theoretic Approach
IEEE International Conference on Image Processing
2009, pp. 1501-1504
BibTeX@inproceedings{Mao2009, author = {Mao, Junwen and Bulan, Orhan and Sharma, Gaurav and Datta, Suprakash}, title = {Device Temporal Forensics: An Information Theoretic Approach}, booktitle = {IEEE International Conference on Image Processing}, year = {2009}, pages = {1501-1504}}
-
An improved camera identification method based on the texture complexity and the image restoration
Proceedings of the 2009 International Conference on Hybrid Information Technology
ACM, 2009, Vol. 3(1), pp. 171-175
BibTeX@inproceedings{Matsushita2009, author = {Matsushita, Kazuya and Kitazawa, Hitoshi}, title = {An improved camera identification method based on the texture complexity and the image restoration}, booktitle = {Proceedings of the 2009 International Conference on Hybrid Information Technology}, publisher = {ACM}, year = {2009}, volume = {3}, number = {1}, pages = {171--175}}
-
Presented to Interpol Crime Against Children Group
Interpol Crime Against Children Group, Lyon, 25 March 2009
2009
BibTeX@conference{Messina2009, author = {Messina, Giuseppe}, title = {Presented to Interpol Crime Against Children Group}, booktitle = {Interpol Crime Against Children Group, Lyon, 25 March 2009}, year = {2009}}
-
Estimating Optimal Block Size for Copy-Move Attack Detection on Highly Textured Image
UNIVERSITI TEKNOLOGI MALAYSIA, 2009
BibTeX@mastersthesis{MohdShaid2009, author = {Mohd Shaid, Syed Zainudeen Bin}, title = {Estimating Optimal Block Size for Copy-Move Attack Detection on Highly Textured Image}, school = {UNIVERSITI TEKNOLOGI MALAYSIA}, year = {2009}}
-
Adding Gaussian Noise to "Denoise" JPEG for detecting Image Resizing
Proceedings of the International Conference on Image Processing 2009, Cairo, Egypt9
2009, pp. 1493-1496
BibTeX@inproceedings{Nataraj2009, author = {Lakshmanan Nataraj and Anindya Sarkar and B. S. Manjunath}, title = {Adding Gaussian Noise to "Denoise" JPEG for detecting Image Resizing}, booktitle = {Proceedings of the International Conference on Image Processing 2009, Cairo, Egypt9}, year = {2009}, pages = {1493--1496}}
-
Camera response function signature for digital forensics --- Part II: Signature extraction
Proceedings of the 2009 First IEEE International Workshop on Information Forensics and Security
2009, pp. 161-165
BibTeX@inproceedings{Ng2009a, author = {Tian-Tsong Ng}, title = {Camera response function signature for digital forensics --- Part II: Signature extraction}, booktitle = {Proceedings of the 2009 First IEEE International Workshop on Information Forensics and Security}, year = {2009}, pages = {161--165}}
-
Identifying and prefiltering images
IEEE Signal Processing Magazine, 2009, Vol. 26(2), pp. 49-58
BibTeX@article{Ng2009b, author = {Tian-Tsong Ng and Shih-Fu Chang}, title = {Identifying and prefiltering images}, journal = {IEEE Signal Processing Magazine}, year = {2009}, volume = {26}, number = {2}, pages = {49--58}}
-
Camera response function signature for digital forensics --- Part I: Theory and data selection
Proceedings of the 2009 First IEEE International Workshop on Information Forensics and Security
2009, pp. 156-160
BibTeX@inproceedings{Ng2009, author = {Tian-Tsong Ng and Mao-Pei Tsui}, title = {Camera response function signature for digital forensics --- Part I: Theory and data selection}, booktitle = {Proceedings of the 2009 First IEEE International Workshop on Information Forensics and Security}, year = {2009}, pages = {156--160}}
-
Image Manipulation as Research Misconduct
Science and Engineering Ethics, Springer Netherlands, 2009, Vol. 15, pp. 161-167
BibTeX@article{Parrish2009, author = {Parrish, Debra and Noonan, Bridget}, title = {Image Manipulation as Research Misconduct}, journal = {Science and Engineering Ethics}, publisher = {Springer Netherlands}, year = {2009}, volume = {15}, pages = {161-167}}
-
Detect Digital Image Splicing with Visual Cues
Katzenbeisser, S. & Sadeghi, A.-R. (ed.)
International Workshop on Information Hiding
2009, pp. 247-261
BibTeX@inproceedings{Qu2009, author = {Qu, Zhenhua and Qiu, Guoping and Huang, Jiwu}, title = {Detect Digital Image Splicing with Visual Cues}, booktitle = {International Workshop on Information Hiding}, year = {2009}, pages = {247-261}}
-
A Study of the Robustness of PRNU-Based Camera Identification
Delp, E. J., Dittmann, J., Memon, N. & Wong, P. W. (ed.)
SPIE Conference on Media Forensics and Security
2009
BibTeX@inproceedings{Rosenfeld2009, author = {Rosenfeld, Kurt and Sencar, Husrev T.}, title = {A Study of the Robustness of PRNU-Based Camera Identification}, booktitle = {SPIE Conference on Media Forensics and Security}, year = {2009}}
-
Feature Based Classification of Computer Graphics and Real Images
IEEE International Conference on Acoustics, Speech, and Signal Processing
2009, pp. 1513-1516
BibTeX@inproceedings{Sankar2009, author = {Sankar, Gopinath and Zhao, H. Vicky and Yang, Yee-Hong}, title = {Feature Based Classification of Computer Graphics and Real Images}, booktitle = {IEEE International Conference on Acoustics, Speech, and Signal Processing}, year = {2009}, pages = {1513-1516}}
-
Detection of seam carving and localization of seam insertions in digital images
MM&38;Sec ´09: Proceedings of the 11th ACM workshop on Multimedia and security
ACM, 2009, pp. 107-116
BibTeX@inproceedings{Sarkar2009, author = {Sarkar, Anindya and Nataraj, Lakshmanan and Manjunath, B. S.}, title = {Detection of seam carving and localization of seam insertions in digital images}, booktitle = {MM&38;Sec ´09: Proceedings of the 11th ACM workshop on Multimedia and security}, publisher = {ACM}, year = {2009}, pages = {107--116}}
-
Identification and recovery of JPEG files with missing fragments
Digital Investigation , 2009, Vol. 6, Supplement(0), pp. S88 - S98
BibTeX@article{Sencar2009, author = {Husrev T. Sencar and Nasir Memon}, title = {Identification and recovery of JPEG files with missing fragments }, journal = {Digital Investigation }, year = {2009}, volume = {6, Supplement}, number = {0}, pages = {S88 - S98}}
-
Detection of manipulated images
Wichita State University, 2009
BibTeX@mastersthesis{Senpathi2009, author = {Senpathi, Santoshi}, title = {Detection of manipulated images}, school = {Wichita State University}, year = {2009}}
-
Copy-Move Forgery Detection Algorithm for Digital Images and a New Accuracy Metric
International Journal of Recent Trends in Engineering,, 2009, Vol. 2(2), pp. 159-161
BibTeX@article{Shahid2009, author = {Shahid, Tehseen and Bin Mansoor, Atif}, title = {Copy-Move Forgery Detection Algorithm for Digital Images and a New Accuracy Metric}, journal = {International Journal of Recent Trends in Engineering,}, year = {2009}, volume = {2}, number = {2}, pages = {159--161}}
-
Image Self-Embedding Technology Research Based on Discrete Cosine Transform
Proc. Int. Conf. Networks Security, Wireless Communications and Trusted Computing NSWCTC ´09
2009, Vol. 1, pp. 42-46
BibTeX@inproceedings{Shengbing2009, author = {Che Shengbing and Che Zuguo and Huang Qiangbo and Yu Shaojun}, title = {Image Self-Embedding Technology Research Based on Discrete Cosine Transform}, booktitle = {Proc. Int. Conf. Networks Security, Wireless Communications and Trusted Computing NSWCTC ´09}, year = {2009}, volume = {1}, pages = {42--46}}
-
Forensic Detection of Image Tampering Using Intrinsic Statistical Fingerprints in Histograms
Proc. APSIPA Annual Summit and Conference
2009
BibTeX@inproceedings{Stamm2009, author = {Stamm, Matthew and Liu, K. J. Ray}, title = {Forensic Detection of Image Tampering Using Intrinsic Statistical Fingerprints in Histograms}, booktitle = {Proc. APSIPA Annual Summit and Conference}, year = {2009}}
-
Computer Graphics Classification Based on Markov Process Model and Boosting Feature Selection Technique
IEEE International Conference on Image Processing
2009, pp. 2913-2916
BibTeX@inproceedings{Sutthiwan2009a, author = {Sutthiwan, Patchara and Cai, Xiao and Shi, Yun Qing and Zhang, Hong}, title = {Computer Graphics Classification Based on Markov Process Model and Boosting Feature Selection Technique}, booktitle = {IEEE International Conference on Image Processing}, year = {2009}, pages = {2913-2916}}
-
An Enhanced Statistical Approach to Identifying Photorealistic Images
Ho, A. T. S., Shi, Y. Q., Kim, H.-J. & Barni, M. (ed.)
International Workshop on Digital Watermarking
2009, pp. 323-335
BibTeX@inproceedings{Sutthiwan2009, author = {Sutthiwan, Patchara and Ye, Jingyu and Shi, Yun Qing}, title = {An Enhanced Statistical Approach to Identifying Photorealistic Images}, booktitle = {International Workshop on Digital Watermarking}, year = {2009}, pages = {323-335}}
-
Component forensics
IEEE Signal Processing Magazine, 2009, Vol. 26(2), pp. 38-48
BibTeX@article{Swaminathan2009, author = {Swaminathan, Ashwin and Min Wu and Liu, K. J. R.}, title = {Component forensics}, journal = {IEEE Signal Processing Magazine}, year = {2009}, volume = {26}, number = {2}, pages = {38--48}}
-
Hash-Based Identification of Sparse Image Tampering
IEEE Transactions on Image Processing, 2009, Vol. 18(11), pp. 2491-2504
BibTeX@article{Tagliasacchi2009, author = {Tagliasacchi, Marco and Valenzise, Giuseppe and Tubaro, Stefano }, title = {Hash-Based Identification of Sparse Image Tampering}, journal = {IEEE Transactions on Image Processing}, year = {2009}, volume = {18}, number = {11}, pages = {2491--2504}}
-
Copy-Move Forgery Detection Based on SVD in Digital Image
Proc. 2nd Int. Congress Image and Signal Processing CISP ´09
2009, pp. 1-5
BibTeX@inproceedings{Ting2009a, author = {Zhang Ting and Wang Rang-ding}, title = {Copy-Move Forgery Detection Based on SVD in Digital Image}, booktitle = {Proc. 2nd Int. Congress Image and Signal Processing CISP ´09}, year = {2009}, pages = {1--5}}
-
Doctored JPEG image detection based on double compression features analysis
Proc. ISECS Int. Colloquium Computing, Communication, Control, and Management CCCM 2009
2009, Vol. 2, pp. 76-80
BibTeX@inproceedings{Ting2009b, author = {Zhang Ting and Wang Rangding}, title = {Doctored JPEG image detection based on double compression features analysis}, booktitle = {Proc. ISECS Int. Colloquium Computing, Communication, Control, and Management CCCM 2009}, year = {2009}, volume = {2}, pages = {76--80}}
-
Copy-Move Forgery Detection Based on SVD in Digital Image
Proc. 2nd Int. Congress Image and Signal Processing CISP ´09
2009, pp. 1-5
BibTeX@inproceedings{Ting2009, author = {Ting, Zhang and Rang-ding, Wang}, title = {Copy-Move Forgery Detection Based on SVD in Digital Image}, booktitle = {Proc. 2nd Int. Congress Image and Signal Processing CISP ´09}, year = {2009}, pages = {1--5}}
-
Fundamentals of Three-Dimensional Digital Image Processing
Springer, 2009
BibTeX@book{Toriwaki2009, author = {Junichiro Toriwaki and Hiroyuki Yoshida}, title = {Fundamentals of Three-Dimensional Digital Image Processing}, publisher = {Springer}, year = {2009}}
-
Richard Tortorella
NARCAP, 2009
BibTeX@techreport{Tortorella2009, author = {Richard Tortorella}, title = {Richard Tortorella}, year = {2009}}
-
A Hybrid Model for Digital Camera Source Identification
IEEE International Conference on Image Processing
2009, pp. 2901-2904
BibTeX@inproceedings{Tsai2009, author = {Tsai, Min-Jen and Wang, Cheng-Sheng and Liu, Jung}, title = {A Hybrid Model for Digital Camera Source Identification}, booktitle = {IEEE International Conference on Image Processing}, year = {2009}, pages = {2901-2904}}
-
Using Sensor Noise to Identify Low Resolution Compressed Videos from YouTube
Geradts, Z. J., Franke, K. Y. & Veenman, C. J. (ed.)
International Workshop on Computational Forensics
2009, pp. 104-115
BibTeX@inproceedings{VanHouten2009a, author = {Van Houten, Wiger and Geradts, Zeno J.}, title = {Using Sensor Noise to Identify Low Resolution Compressed Videos from YouTube}, booktitle = {International Workshop on Computational Forensics}, year = {2009}, pages = {104-115}}
-
Source Video Camera Identification for Multiply Compressed Videos Originating from YouTube
Digital Investigation, 2009, Vol. 6(1-2), pp. 48-60
BibTeX@article{VanHouten2009, author = {Van Houten, Wiger and Geradts, Zeno J.}, title = {Source Video Camera Identification for Multiply Compressed Videos Originating from YouTube}, journal = {Digital Investigation}, year = {2009}, volume = {6}, number = {1-2}, pages = {48-60}}
-
Self-authentication of natural color images in Pascal transform domain
DSP´09: Proceedings of the 16th international conference on Digital Signal Processing
IEEE Press, 2009, pp. 1068-1073
BibTeX@inproceedings{Varsaki2009, author = {Varsaki, E. E. and Fotopoulos, V. and Skodras, A. N.}, title = {Self-authentication of natural color images in Pascal transform domain}, booktitle = {DSP´09: Proceedings of the 16th international conference on Digital Signal Processing}, publisher = {IEEE Press}, year = {2009}, pages = {1068--1073}}
-
Source Camera Identification Forensics Based on Wavelet Features
Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2009. IIH-MSP '09.
2009, pp. 702-705
BibTeX@inproceedings{Wang2009h, author = {Bo Wang and Yiping Guo and Xiangwei Kong and Fanjie Meng}, title = {Source Camera Identification Forensics Based on Wavelet Features}, booktitle = {Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2009. IIH-MSP '09.}, year = {2009}, pages = {702--705}}
-
Source Camera Identification Using Support Vector Machines
Advances in Digital Forensics V
2009, pp. 107-118
BibTeX@inproceedings{Wang2009e, author = {Wang, Bo and Kong, Xiangwei and You, Xingang}, title = {Source Camera Identification Using Support Vector Machines}, booktitle = {Advances in Digital Forensics V}, year = {2009}, pages = {107-118}}
-
What can we learn about the scene structure from three orthogonal vanishing points in images
Pattern Recogn. Lett., Elsevier Science Inc., 2009, Vol. 30(3), pp. 192-202
BibTeX@article{Wang2009d, author = {Wang, Guanghui and Tsui, Hung-Tat and Jonathan Wu, Q. M.}, title = {What can we learn about the scene structure from three orthogonal vanishing points in images}, journal = {Pattern Recogn. Lett.}, publisher = {Elsevier Science Inc.}, year = {2009}, volume = {30}, number = {3}, pages = {192--202}}
-
Understanding Benford´s Law and its Vulnerability in Image Forensics
IEEE International Conference on Multimedia and Expo
2009, pp. 1568-1571
BibTeX@inproceedings{Wang2009j, author = {Wang, Jingwei and Cha, Byung-Ho and Cho, Seong-Ho and Kuo, C. -C. Jay}, title = {Understanding Benford´s Law and its Vulnerability in Image Forensics}, booktitle = {IEEE International Conference on Multimedia and Expo}, year = {2009}, pages = {1568-1571}}
-
Detection of Image Region Duplication Forgery Using Model with Circle Block
Proc. Int. Conf. Multimedia Information Networking and Security MINES ´09
2009, Vol. 1, pp. 25-29
BibTeX@inproceedings{Wang2009, author = {Junwen Wang and Guangjie Liu and Hongyuan Li and Yuewei Dai and Zhiquan Wang}, title = {Detection of Image Region Duplication Forgery Using Model with Circle Block}, booktitle = {Proc. Int. Conf. Multimedia Information Networking and Security MINES ´09}, year = {2009}, volume = {1}, pages = {25--29}}
-
Detection of Resampling Based on Singular Value Decomposition
Proc. Fifth Int. Conf. Image and Graphics ICIG ´09
2009, pp. 879-884
BibTeX@inproceedings{Wang2009a, author = {Ran Wang and Xijian Ping}, title = {Detection of Resampling Based on Singular Value Decomposition}, booktitle = {Proc. Fifth Int. Conf. Image and Graphics ICIG ´09}, year = {2009}, pages = {879--884}}
-
Digital Video Forensics
Department of Computer Science, Dartmouth College, 2009
BibTeX@phdthesis{Wang2009i, author = {Wang, Weihong}, title = {Digital Video Forensics}, school = {Department of Computer Science, Dartmouth College}, year = {2009}}
-
A Survey of Passive Image Tampering Detection
Ho, A. T. S., Shi, Y. Q., Kim, H.-J. & Barni, M. (ed.)
International Workshop on Digital Watermarking
2009, pp. 308-322
BibTeX@inproceedings{Wang2009g, author = {Wang, Wei and Dong, Jing and Tan, Tieniu}, title = {A Survey of Passive Image Tampering Detection}, booktitle = {International Workshop on Digital Watermarking}, year = {2009}, pages = {308-322}}
-
Effective image splicing detection based on image chroma
ICIP´09: Proceedings of the 16th IEEE international conference on Image processing
IEEE Press, 2009, pp. 1249-1252
BibTeX@inproceedings{Wang2009c, author = {Wang, Wei and Dong, Jing and Tan, Tieniu}, title = {Effective image splicing detection based on image chroma}, booktitle = {ICIP´09: Proceedings of the 16th IEEE international conference on Image processing}, publisher = {IEEE Press}, year = {2009}, pages = {1249--1252}}
-
Exposing Digital Forgeries in Video by Detecting Double Quantization
ACM Multimedia and Security Workshop
2009, pp. 39-48
BibTeX@inproceedings{Wang2009f, author = {Wang, Weihong and Farid, Hany}, title = {Exposing Digital Forgeries in Video by Detecting Double Quantization}, booktitle = {ACM Multimedia and Security Workshop}, year = {2009}, pages = {39-48}}
-
Detection of copy-transform-move forgery in color digital image
Jisuanji Gongcheng / Computer Engineering, 2009, Vol. 35(16), pp. 20-22
BibTeX@article{Wang2009b, author = {Wang, Xin and Xuan, Bo and Peng, Si-Long}, title = {Detection of copy-transform-move forgery in color digital image}, journal = {Jisuanji Gongcheng / Computer Engineering}, year = {2009}, volume = {35}, number = {16}, pages = {20-22}}
-
High Performance Java Software for Image Processing
Emory University, 2009
BibTeX@phdthesis{Wendykier2009, author = {Wendykier, Piotr}, title = {High Performance Java Software for Image Processing}, school = {Emory University}, year = {2009}}
-
Printer Forensics Based on Page Document´s Geometric Distortion
IEEE International Conference on Image Processing
2009, pp. 2909-2912
BibTeX@inproceedings{Wu2009, author = {Wu, Yubao and Kong, Xiangwei and You, Xingang and Guo, Yiping}, title = {Printer Forensics Based on Page Document´s Geometric Distortion}, booktitle = {IEEE International Conference on Image Processing}, year = {2009}, pages = {2909-2912}}
-
Camera-Model Identification Using Markovian Transition Probability Matrix
Ho, A. T. S., Shi, Y. Q., Kim, H.-J. & Barni, M. (ed.)
International Workshop on Digital Watermarking
2009, pp. 294-307
BibTeX@inproceedings{Xu2009a, author = {Xu, Guanshuo and Gao, Shang and Shi, Yun Qing and Hu, RuiMin and Su, Wei}, title = {Camera-Model Identification Using Markovian Transition Probability Matrix}, booktitle = {International Workshop on Digital Watermarking}, year = {2009}, pages = {294-307}}
-
Camera brand and model identification using moments of 1-D and 2-D characteristic functions
Proc. 16th IEEE Int Image Processing (ICIP) Conf
2009, pp. 2917-2920
BibTeX@inproceedings{Xu2009, author = {Guanshuo Xu and Yun Qing Shi and Wei Su}, title = {Camera brand and model identification using moments of 1-D and 2-D characteristic functions}, booktitle = {Proc. 16th IEEE Int Image Processing (ICIP) Conf}, year = {2009}, pages = {2917--2920}}
-
Copy-Move Forgery Detection in Digital Image
PCM ´09: Proceedings of the 10th Pacific Rim Conference on Multimedia
Springer-Verlag, 2009, pp. 816-825
BibTeX@inproceedings{Yang2009, author = {Yang, Qing-Chu and Huang, Chung-Lin}, title = {Copy-Move Forgery Detection in Digital Image}, booktitle = {PCM ´09: Proceedings of the 10th Pacific Rim Conference on Multimedia}, publisher = {Springer-Verlag}, year = {2009}, pages = {816--825}}
-
Defeating Fake-Quality MP3
ACM Proceedings of the Multimedia and Security Workshop
2009, pp. 117-124
BibTeX@inproceedings{Yang2009a, author = {Yang, Rui and Shi, Yun Qing and Huang, Jiwu}, title = {Defeating Fake-Quality MP3}, booktitle = {ACM Proceedings of the Multimedia and Security Workshop}, year = {2009}, pages = {117-124}}
-
Adaptive Image Processing: A Computational Intelligence Perspective
Laplante, P. A. (ed.)
CRC Press, 2009
BibTeX@book{Yap2009, author = {Kim-Hui Yap and Ling Guan and Stuart William Perry and Hau San Wong}, title = {Adaptive Image Processing: A Computational Intelligence Perspective}, publisher = {CRC Press}, year = {2009}}
-
Digital Camera Identification Based on Curvelet Transform
IEEE International Conference on Acoustics, Speech, and Signal Processing
2009, pp. 1389-1392
BibTeX@inproceedings{Zhang2009e, author = {Zhang, Chi and Zhang, Hongbin}, title = {Digital Camera Identification Based on Curvelet Transform}, booktitle = {IEEE International Conference on Acoustics, Speech, and Signal Processing}, year = {2009}, pages = {1389-1392}}
-
Detecting logo-removal forgery by inconsistencies of blur
Proc. Int. Conf. Industrial Mechatronics and Automation ICIMA 2009
2009, pp. 32-36
BibTeX@inproceedings{Zhang2009d, author = {Jing Zhang and Yuting Su}, title = {Detecting logo-removal forgery by inconsistencies of blur}, booktitle = {Proc. Int. Conf. Industrial Mechatronics and Automation ICIMA 2009}, year = {2009}, pages = {32--36}}
-
Exposing Digital Video Forgery by Ghost Shadow Artifact
ACM Workshop on Multimedia in Forensics
2009, pp. 49-54
BibTeX@inproceedings{Zhang2009g, author = {Zhang, Jing and Su, Yuting and Zhang, Mingyu}, title = {Exposing Digital Video Forgery by Ghost Shadow Artifact}, booktitle = {ACM Workshop on Multimedia in Forensics}, year = {2009}, pages = {49-54}}
-
Detection of Double-Compression in JPEG2000 Images for Application in Image Forensics
Journal of Multimedia, 2009, Vol. 4(6), pp. 379-388
BibTeX@article{Zhang2009f, author = {Jing Zhang and Haiying Wang and Yuting Su}, title = {Detection of Double-Compression in JPEG2000 Images for Application in Image Forensics}, journal = {Journal of Multimedia}, year = {2009}, volume = {4}, number = {6}, pages = {379-388}}
-
A new approach merging markov and DCT features for image splicing detection
Proc. IEEE Int. Conf. Intelligent Computing and Intelligent Systems ICIS 2009
2009, Vol. 4, pp. 390-394
BibTeX@inproceedings{Zhang2009b, author = {Jing Zhang and Yun Zhao and Yuting Su}, title = {A new approach merging markov and DCT features for image splicing detection}, booktitle = {Proc. IEEE Int. Conf. Intelligent Computing and Intelligent Systems ICIS 2009}, year = {2009}, volume = {4}, pages = {390--394}}
-
Detecting Image Tampering Using Feature Fusion
Proc. Int. Conf. Availability, Reliability and Security ARES ´09
2009, pp. 335-340
BibTeX@inproceedings{Zhang2009a, author = {Pin Zhang and Xiangwei Kong}, title = {Detecting Image Tampering Using Feature Fusion}, booktitle = {Proc. Int. Conf. Availability, Reliability and Security ARES ´09}, year = {2009}, pages = {335--340}}
-
Detecting photographic composites using two-view geometrical constraints
Proc. IEEE Int. Conf. Multimedia and Expo ICME 2009
2009, pp. 1078-1081
BibTeX@inproceedings{Zhang2009c, author = {Wei Zhang and Xiaochun Cao and Zhiyong Feng and Jiawan Zhang and Ping Wang}, title = {Detecting photographic composites using two-view geometrical constraints}, booktitle = {Proc. IEEE Int. Conf. Multimedia and Expo ICME 2009}, year = {2009}, pages = {1078--1081}}
-
Detecting photographic composites using shadows
Proc. IEEE International Conference on Multimedia and Expo ICME 2009
2009, pp. 1042-1045
BibTeX@inproceedings{Zhang2009, author = {Zhang, Wei and Cao, Xiaochun and Zhang, Jiawan and Zhu, Jigui and Wang, Ping}, title = {Detecting photographic composites using shadows}, booktitle = {Proc. IEEE International Conference on Multimedia and Expo ICME 2009}, year = {2009}, pages = {1042--1045}}
-
Image forensics using generalised Benford's Law for accurate detection of unknown JPEG compression in watermarked images
Proc. 16th Int Digital Signal Processing Conf
2009, pp. 1-8
BibTeX@inproceedings{Zhao2009, author = {Xi Zhao and Ho, A. T. S. and Shi, Y. Q.}, title = {Image forensics using generalised Benford's Law for accurate detection of unknown JPEG compression in watermarked images}, booktitle = {Proc. 16th Int Digital Signal Processing Conf}, year = {2009}, pages = {1--8}}
-
A Digital Forgery Image Detection Algorithm Based on Wavelet Homomorphic Filtering
Lecture Notes In Computer Science, Springer-Verlag, 2009, Vol. 5450, pp. 152-160
BibTeX@article{Zheng2009, author = {Zheng, Jiangbin and Liu, Miao}, title = {A Digital Forgery Image Detection Algorithm Based on Wavelet Homomorphic Filtering}, journal = {Lecture Notes In Computer Science}, publisher = {Springer-Verlag}, year = {2009}, volume = {5450}, pages = {152--160}}
-
Scale invariance and noise in natural images
Proc. IEEE 12th Int Computer Vision Conf
2009, pp. 2209-2216
BibTeX@inproceedings{Zoran2009, author = {Zoran, D. and Weiss, Y. }, title = {Scale invariance and noise in natural images}, booktitle = {Proc. IEEE 12th Int Computer Vision Conf}, year = {2009}, pages = {2209--2216}}
-
A fast parallel algorithm for blind estimation of noise variance
University of Stellenbosch, 2009
BibTeX@techreport{ZylMarais2009, author = {Izak van Zyl Marais and Willem Herman Steyn}, title = {A fast parallel algorithm for blind estimation of noise variance}, year = {2009}}
-
Computational Forensics
Geradts, Z. J. M. H., Franke, K. Y. & (Eds.), C. J. V. (ed.)
Springer, 2009, Vol. 5718
BibTeX@proceedings{Geradts2009,, title = {Computational Forensics}, publisher = {Springer}, year = {2009}, volume = {5718}}
-
Multimedia Forensics and Security
Li, C.-T. (ed.)
Hershey, New York, 2009
BibTeX@book{Li2009i,, title = {Multimedia Forensics and Security}, publisher = {Hershey, New York}, year = {2009}}
-
Forensics in Telecommunications, Information and Multimedia
Sorell, M. (ed.)
Springer, 2009
@book{Sorell2009,, title = {Forensics in Telecommunications, Information and Multimedia}, publisher = {Springer}, year = {2009}}
2008
-
Salient region detection and segmentation
ICVS´08: Proceedings of the 6th international conference on Computer vision systems
Springer-Verlag, 2008, pp. 66-75
BibTeX@inproceedings{Achanta2008, author = {Achanta, Radhakrishna and Estrada, Francisco and Wils, Patricia and Süsstrunk, Sabine}, title = {Salient region detection and segmentation}, booktitle = {ICVS´08: Proceedings of the 6th international conference on Computer vision systems}, publisher = {Springer-Verlag}, year = {2008}, pages = {66--75}}
-
Source Camera Identification for Low Resolution Heavily Compressed Images
International Conference on Computational Sciences and Its Applications
2008, pp. 557-567
BibTeX@inproceedings{Alles2008, author = {Alles, Erwin J. and Geradts, Zeno J. and Veenman, Cor. J.}, title = {Source Camera Identification for Low Resolution Heavily Compressed Images}, booktitle = {International Conference on Computational Sciences and Its Applications}, year = {2008}, pages = {557-567}}
-
Image Forensics: Source Identification and Tampering Detection
Universit` a degli Studi di Firenze, 2008
BibTeX@phdthesis{Amerini2008, author = {Irene Amerini}, title = {Image Forensics: Source Identification and Tampering Detection}, school = {Universit` a degli Studi di Firenze}, year = {2008}}
-
A Survey of Copy-Move Forgery Detection Techniques
2008
BibTeX@misc{Bayram2008, author = {Bayram, Sevinc}, title = {A Survey of Copy-Move Forgery Detection Techniques}, year = {2008}}
-
Classification of digital camera-models based on demosaicing artifacts
Digital Investigation, 2008, Vol. 5(1-2), pp. 49 - 59
BibTeX@article{Bayram2008a, author = {Sevinc Bayram and Husrev T. Sencar and Nasir Memon}, title = {Classification of digital camera-models based on demosaicing artifacts}, journal = {Digital Investigation}, year = {2008}, volume = {5}, number = {1-2}, pages = {49 - 59}}
-
Video Copy Detection Based on Source Device Characteristics: A Complementary Approach to Content-Based Methods
ACM International Conference on Multimedia Information Retrieval
2008, pp. 435-442
BibTeX@inproceedings{Bayram2008c, author = {Bayram, Sevinc and Sencar, Husrev T. and Memon, Nasir}, title = {Video Copy Detection Based on Source Device Characteristics: A Complementary Approach to Content-Based Methods}, booktitle = {ACM International Conference on Multimedia Information Retrieval}, year = {2008}, pages = {435-442}}
-
Blind restoration of blurred photographs via AR modelling and MCMC
Proc. 15th IEEE International Conference on Image Processing ICIP 2008
2008, pp. 669-672
BibTeX@inproceedings{Bishop2008, author = {Bishop, T. E. and Molina, R. and Hopgood, J. R.}, title = {Blind restoration of blurred photographs via AR modelling and MCMC}, booktitle = {Proc. 15th IEEE International Conference on Image Processing ICIP 2008}, year = {2008}, pages = {669--672}}
-
Blind Camera Fingerprinting and Image Clustering
IEEE Transactions on Pattern Analysis and Machine Intelligence, 2008, Vol. 30(3), pp. 532-535
BibTeX@article{Bloy2008, author = {Bloy, Greg J.}, title = {Blind Camera Fingerprinting and Image Clustering}, journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence}, year = {2008}, volume = {30}, number = {3}, pages = {532-535}}
-
Global, lokal, digital - Fotojournalismus heute
Elke, G., Neverla, I. & Ammann, I. (ed.)
Chapter Digitale Bildmanipulation und Ethik. Aktuelle Tendenzen im Fotojournalismus.
Herbert von Halem-Verlag, 2008, pp. 108-136
BibTeX@inbook{Buellesbach2008, author = {Büllesbach, Alfred}, title = {Global, lokal, digital - Fotojournalismus heute}, publisher = {Herbert von Halem-Verlag}, year = {2008}, pages = {108-136}}
-
Image Composition Detection Using Object-Based Color Consistency
IEEE International Conference on Signal Processing
2008, pp. 1186-1189
BibTeX@inproceedings{Cao2008a, author = {Cao, Gang and Zhao, Yao and Ni, Rongrong}, title = {Image Composition Detection Using Object-Based Color Consistency}, booktitle = {IEEE International Conference on Signal Processing}, year = {2008}, pages = {1186-1189}}
-
A generalized model for detection of demosaicing characteristics
Proc. IEEE Int Multimedia and Expo Conf
2008, pp. 1513-1516
BibTeX@inproceedings{Cao2008, author = {Hong Cao and Kot, A. C.}, title = {A generalized model for detection of demosaicing characteristics}, booktitle = {Proc. IEEE Int Multimedia and Expo Conf}, year = {2008}, pages = {1513--1516}}
-
Mathematical Optimization in Computer Graphics and Vision
Morgan Kaufman Publishers, 2008
BibTeX@book{Carvalho2008, author = {Paulo Cezar Pinto Carvalho and Luiz Henrique De Figueiredo and Jonas Gomes and Luiz Velho}, title = {Mathematical Optimization in Computer Graphics and Vision}, publisher = {Morgan Kaufman Publishers}, year = {2008}}
-
Blind Identification of Source Cell-Phone Model
IEEE Transactions on Information Forensics and Security, 2008, Vol. 3(3), pp. 553-566
BibTeX@article{Celiktutan2008, author = {Celiktutan, O. and Sankur, B. and Avcibas, I.}, title = {Blind Identification of Source Cell-Phone Model}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2008}, volume = {3}, number = {3}, pages = {553--566}}
-
VQ-Based Oriented Image Tamper Proofing Schemes for Digital Grayscale Images
Proc. Second Int. Symp. Intelligent Information Technology Application IITA ´08
2008, Vol. 2, pp. 1000-1004
BibTeX@inproceedings{Chang2008, author = {Chin-Chen Chang and Jun-Chou Chuang and Yu-Zheng Wang}, title = {VQ-Based Oriented Image Tamper Proofing Schemes for Digital Grayscale Images}, booktitle = {Proc. Second Int. Symp. Intelligent Information Technology Application IITA ´08}, year = {2008}, volume = {2}, pages = {1000--1004}}
-
Determining image origin and integrity using sensor noise
IEEE Transactions on Information Forensics and Security, 2008, Vol. 3(1), pp. 74-90
BibTeX@article{Chen2008, author = {Mo Chen and Jessica Fridrich and Miroslav Goljan and Jan Lukáš}, title = {Determining image origin and integrity using sensor noise}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2008}, volume = {3}, number = {1}, pages = {74--90}}
-
Detection of digital image and video forgeries
New Jersey Institute of Technology, New Jersey Institute of Technology, 2008
BibTeX@phdthesis{Chen2008d, author = {Chen, Wen}, title = {Detection of digital image and video forgeries}, publisher = {New Jersey Institute of Technology}, school = {New Jersey Institute of Technology}, year = {2008}}
-
Detection of Double MPEG Video Compression Using First Digits Statistics
International Workshop on Digital Watermarking
2008
BibTeX@inproceedings{Chen2008c, author = {Chen, Wen and Shi, Yun Qing}, title = {Detection of Double MPEG Video Compression Using First Digits Statistics}, booktitle = {International Workshop on Digital Watermarking}, year = {2008}}
-
Computer Graphics Identification Using Genetic Algorithm
IEEE International Conference on Pattern Recognition
2008
BibTeX@inproceedings{Chen2008b, author = {Chen, Wen and Shi, Yun Qing and Xuan, Guo Rong and Su, Wei}, title = {Computer Graphics Identification Using Genetic Algorithm}, booktitle = {IEEE International Conference on Pattern Recognition}, year = {2008}}
-
Image tampering detection by blocking periodicity analysis in JPEG compressed images
Proc. IEEE 10th Workshop Multimedia Signal Processing
2008, pp. 803-808
BibTeX@inproceedings{Chen2008a, author = {Yi-Lei Chen and Chiou-Ting Hsu}, title = {Image tampering detection by blocking periodicity analysis in JPEG compressed images}, booktitle = {Proc. IEEE 10th Workshop Multimedia Signal Processing}, year = {2008}, pages = {803--808}}
-
A Machine Learning Based Scheme for Double JPEG Compression Detection
International Conference on Pattern Recognition
2008, pp. 1-4
BibTeX@inproceedings{Chunhua2008, author = {Chunhua, Chen and Shi, Yun Qing and Wei, Su}, title = {A Machine Learning Based Scheme for Double JPEG Compression Detection}, booktitle = {International Conference on Pattern Recognition}, year = {2008}, pages = {1-4}}
-
Printer Identification Based on Distance Transform
International Conference on Intelligent Networks and Intelligent Systems
2008, pp. 565-568
BibTeX@inproceedings{Deng2008, author = {Deng, Wei and Chen, Qinghu and Yuan, Feng and Yan, Yuchen}, title = {Printer Identification Based on Distance Transform}, booktitle = {International Conference on Intelligent Networks and Intelligent Systems}, year = {2008}, pages = {565-568}}
-
Digital Single Lens Reflex Camera Identification From Traces of Sensor Dust
IEEE Transactions on Information Forensics and Security, 2008, Vol. 3(3), pp. 539-552
BibTeX@article{Dirik2008, author = {Dirik, A. E. and Sencar, H. T. and Memon, N. }, title = {Digital Single Lens Reflex Camera Identification From Traces of Sensor Dust}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2008}, volume = {3}, number = {3}, pages = {539--552}}
-
A Wavelet-Laplace Variational Technique for Image Deconvolution and Inpainting
IEEE Transactions on Image Processing, 2008, Vol. 17(5), pp. 657-663
BibTeX@article{Dobrosotskaya2008, author = {Dobrosotskaya, J. A. and Bertozzi, A. L. }, title = {A Wavelet-Laplace Variational Technique for Image Deconvolution and Inpainting}, journal = {IEEE Transactions on Image Processing}, year = {2008}, volume = {17}, number = {5}, pages = {657--663}}
-
Run-Length and Edge Statistics Based Approach for Image Splicing Detection
International Workshop on Digital Watermarking
2008, pp. 76-87
BibTeX@inproceedings{Dong2008, author = {Dong, Jing and Wang, Wei and Tan, Tieniu and Shi, Yun Qing}, title = {Run-Length and Edge Statistics Based Approach for Image Splicing Detection}, booktitle = {International Workshop on Digital Watermarking}, year = {2008}, pages = {76-87}}
-
Comparison of Zernike and Tchebichef Moments for Image Tampering Detection Sensitivity and Watermark Recovery
Proc. IEEE Conf. Technologies for Homeland Security
2008, pp. 615-619
BibTeX@inproceedings{Elshoura2008, author = {Elshoura, S. M. and Megherbi, D. B. }, title = {Comparison of Zernike and Tchebichef Moments for Image Tampering Detection Sensitivity and Watermark Recovery}, booktitle = {Proc. IEEE Conf. Technologies for Homeland Security}, year = {2008}, pages = {615--619}}
-
Digital Image Ballistics from JPEG Quantization: A Followup Study
Department of Computer Science, Dartmouth College, 2008(TR2008-638)
BibTeX@techreport{Farid2008, author = {Farid, Hany}, title = {Digital Image Ballistics from JPEG Quantization: A Followup Study}, year = {2008}, number = {TR2008-638}}
-
Digital Image Forensics
Scientific American, 2008, Vol. 6(298), pp. 66-71
BibTeX@article{Farid2008a, author = {Farid, Hany}, title = {Digital Image Forensics}, journal = {Scientific American}, year = {2008}, volume = {6}, number = {298}, pages = {66-71}}
-
Using sensor pattern noise for camera model identification
15th IEEE International Conference on Image Processing ICIP 2008
Image Processing, 2008. ICIP 2008. 15th IEEE International Conference on, 2008, pp. 1296-1299
BibTeX@inproceedings{Filler2008b, author = {Filler, Tomáš and Fridrich, Jessica and Goljan, Miroslav}, title = {Using sensor pattern noise for camera model identification}, booktitle = {15th IEEE International Conference on Image Processing ICIP 2008}, journal = {Image Processing, 2008. ICIP 2008. 15th IEEE International Conference on}, year = {2008}, pages = {1296-1299}}
-
Computational Forensics: An Overview
Srihari, S. & Franke, K. (ed.)
Computational Forensics
Springer Berlin / Heidelberg, 2008, Vol. 5158, pp. 1-10
BibTeX@incollection{Franke2008, author = {Franke, Katrin and Srihari, Sargur}, title = {Computational Forensics: An Overview}, booktitle = {Computational Forensics}, publisher = {Springer Berlin / Heidelberg}, year = {2008}, volume = {5158}, pages = {1-10}}
-
Image authentication by detecting traces of demosaicing
Proc. IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops CVPR Workshops 2008
2008, pp. 1-8
BibTeX@inproceedings{Gallagher2008, author = {Gallagher, A. C. and Tsuhan Chen}, title = {Image authentication by detecting traces of demosaicing}, booktitle = {Proc. IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops CVPR Workshops 2008}, year = {2008}, pages = {1--8}}
-
Image Forgery Identification Using JPEG Intrinsic Fingerprints
Stanford Center for Image Systems Engineering, 2008
BibTeX@techreport{Garg2008, author = {Garg, A. and Hailu, A. and Sridharan, R.}, title = {Image Forgery Identification Using JPEG Intrinsic Fingerprints}, year = {2008}}
-
Illuminant Colour Based Image Forensics
IEEE Region 10 Conference (TENCON 2008)
2008
BibTeX@inproceedings{Gholap2008, author = {Gholap, Sandeep and Bora, P. K.}, title = {Illuminant Colour Based Image Forensics}, booktitle = {IEEE Region 10 Conference (TENCON 2008)}, year = {2008}}
-
Camera identification from cropped and scaled images
III, E. J. D., Wong, P. W., Dittmann, J. & Memon, N. D. (ed.)
Proc. SPIE 6819, 68190E (2008)
Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, SPIE, 2008, Vol. 6819(1), pp. 68190E
BibTeX@conference{Goljan2008, author = {Miroslav Goljan and Jessica Fridrich}, title = {Camera identification from cropped and scaled images}, booktitle = {Proc. SPIE 6819, 68190E (2008)}, journal = {Security, Forensics, Steganography, and Watermarking of Multimedia Contents X}, publisher = {SPIE}, year = {2008}, volume = {6819}, number = {1}, pages = {68190E}}
-
Camera Identification From Printed Images
Delp, E. J., Wong, P. W., Dittmann, J. & Memon, N. (ed.)
SPIE Conference on Security, Forensics, Steganography, and Watermarking of Multimedia Contents
2008, Vol. 6819
BibTeX@inproceedings{Goljan2008a, author = {Goljan, Miroslav and Fridrich, Jessica and Lukáš, Jan}, title = {Camera Identification From Printed Images}, booktitle = {SPIE Conference on Security, Forensics, Steganography, and Watermarking of Multimedia Contents}, year = {2008}, volume = {6819}}
-
IM2GPS: estimating geographic information from a single image
Proc. IEEE Conf. Computer Vision and Pattern Recognition CVPR 2008
2008, pp. 1-8
BibTeX@inproceedings{Hays2008, author = {Hays, J. and Efros, A. A.}, title = {IM2GPS: estimating geographic information from a single image}, booktitle = {Proc. IEEE Conf. Computer Vision and Pattern Recognition CVPR 2008}, year = {2008}, pages = {1--8}}
-
Video Forgery Detection Using Correlation of Noise Residue
IEEE Workshop on Multimedia Signal Processing
2008, pp. 170-174
BibTeX@inproceedings{Hsu2008a, author = {Hsu, Chih-Chung and Hung, Tzu-Yi and Lin, Chia-Wen and Hsu, Chiou-Ting}, title = {Video Forgery Detection Using Correlation of Noise Residue}, booktitle = {IEEE Workshop on Multimedia Signal Processing}, year = {2008}, pages = {170-174}}
-
Statistical fusion of multiple cues for image tampering detection
Proc. 42nd Asilomar Conf. Signals, Systems and Computers
2008, pp. 1386-1390
BibTeX@inproceedings{Hsu2008, author = {Yu-Feng Hsu and Shih-Fu Chang}, title = {Statistical fusion of multiple cues for image tampering detection}, booktitle = {Proc. 42nd Asilomar Conf. Signals, Systems and Computers}, year = {2008}, pages = {1386--1390}}
-
Detection of Copy-Move Forgery in Digital Images Using SIFT Algorithm
Proc. Pacific-Asia Workshop on Computational Intelligence and Industrial Application PACIIA ´08
2008, Vol. 2, pp. 272-276
BibTeX@inproceedings{Huang2008, author = {Huang, Hailing and Guo, Weiqiang and Zhang, Yu}, title = {Detection of Copy-Move Forgery in Digital Images Using SIFT Algorithm}, booktitle = {Proc. Pacific-Asia Workshop on Computational Intelligence and Industrial Application PACIIA ´08}, year = {2008}, volume = {2}, pages = {272--276}}
-
Demosaicking Recognition with Applications in Digital Photo Authentication based on a Quadratic Pixel Correlation Model
Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition
2008
BibTeX@inproceedings{Huang2008a, author = {Yizhen Huang}, title = {Demosaicking Recognition with Applications in Digital Photo Authentication based on a Quadratic Pixel Correlation Model}, booktitle = {Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition}, year = {2008}}
-
IPTC Standard: Information Interchange Model (IIM) - IIM Schema for XMP Specification Version 1.0
IPTC, 2008
BibTeX@standard{IPTC2008, author = {IPTC}, title = {IPTC Standard: Information Interchange Model (IIM) - IIM Schema for XMP Specification Version 1.0}, year = {2008}}
-
Identifying Tampered Regions Using Singular Value Decomposition in Digital Image Forensics
Proc. International Conference on Computer Science and Software Engineering
2008, Vol. 3, pp. 926-930
BibTeX@inproceedings{Kang2008, author = {Kang, XiaoBing and Wei, ShengMin}, title = {Identifying Tampered Regions Using Singular Value Decomposition in Digital Image Forensics}, booktitle = {Proc. International Conference on Computer Science and Software Engineering}, year = {2008}, volume = {3}, pages = {926--930}}
-
Printer Profiling for Forensics and Ballistics
ACM Multimedia and Security Workshop
2008, pp. 3-10
BibTeX@inproceedings{Kee2008, author = {Kee, Eric and Farid, Hany}, title = {Printer Profiling for Forensics and Ballistics}, booktitle = {ACM Multimedia and Security Workshop}, year = {2008}, pages = {3-10}}
-
Forensic techniques for classifying scanner, computer generated and digital camera images
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2008
2008, pp. 1653-1656
BibTeX@inproceedings{Khanna2008, author = {Khanna, N. and Chiu, G. T.-C. and Allebach, J. P. and Delp, E. J. }, title = {Forensic techniques for classifying scanner, computer generated and digital camera images}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2008}, year = {2008}, pages = {1653--1656}}
-
Scanner identification with extension to forgery detection
Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series
2008, Vol. 6819
BibTeX@inproceedings{Khanna2008a, author = {Khanna, N. and Chiu, G.-T.-C. and Allebach, J.-P. and Delp, E.-J.}, title = {Scanner identification with extension to forgery detection}, booktitle = {Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series}, year = {2008}, volume = {6819}}
-
Survey of Scanner and Printer Forensics at Purdue University
International Workshop on Computational Forensics
2008, pp. 22-34
BibTeX@inproceedings{Khanna2008b, author = {Khanna, Nitin and Mikkilineni, Aravind K. and Chiu, George T.-C. and Allebach, Jan P. and Delp, Edward J.}, title = {Survey of Scanner and Printer Forensics at Purdue University}, booktitle = {International Workshop on Computational Forensics}, year = {2008}, pages = {22-34}}
-
Automatic detection and correction of purple fringing using the gradient information and desaturation
Proceedings of the 16th European Signal Processing Conference (EUSIPCO 2008)
2008
BibTeX@inproceedings{Kim2008, author = {Baek-Kyu Kim and Rae-Hong Park}, title = {Automatic detection and correction of purple fringing using the gradient information and desaturation}, booktitle = {Proceedings of the 16th European Signal Processing Conference (EUSIPCO 2008)}, year = {2008}}
-
On the Detectability of Local Resampling in Digital Images
Delp, E. J., Wong, P. W., Dittmann, J. & Memon, N. (ed.)
SPIE Conference on Security, Forensics, Steganography, and Watermarking of Multimedia Contents
2008, Vol. 6819
BibTeX@inproceedings{Kirchner2008a, author = {Kirchner, Matthias}, title = {On the Detectability of Local Resampling in Digital Images}, booktitle = {SPIE Conference on Security, Forensics, Steganography, and Watermarking of Multimedia Contents}, year = {2008}, volume = {6819}}
-
Fast and Reliable Resampling Detection by Spectral Analysis of Fixed Linear Predictor Residue
ACM Multimedia and Security Workshop
2008, pp. 11-20
BibTeX@inproceedings{Kirchner2008c, author = {Kirchner, Matthias}, title = {Fast and Reliable Resampling Detection by Spectral Analysis of Fixed Linear Predictor Residue}, booktitle = {ACM Multimedia and Security Workshop}, year = {2008}, pages = {11-20}}
-
Hiding Traces of Resampling in Digital Images
IEEE Transactions on Information Forensics and Security, 2008, Vol. 3(4), pp. 582-592
BibTeX@article{Kirchner2008, author = {Kirchner, M. and Bohme, R.}, title = {Hiding Traces of Resampling in Digital Images}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2008}, volume = {3}, number = {4}, pages = {582--592}}
-
Using JPEG quantization tables to identify imagery processed by software
Digital Investigation, 2008, Vol. 5, pp. S21-S25
BibTeX@article{Kornblum2008, author = {Jesse D. Kornblum}, title = {Using JPEG quantization tables to identify imagery processed by software}, journal = {Digital Investigation}, year = {2008}, volume = {5}, pages = {S21-S25}}
-
Digital color image processing
Wiley-Interscience, 2008
BibTeX@book{Koschan2008, author = {Koschan, Andreas and Abidi, Mongi}, title = {Digital color image processing}, publisher = {Wiley-Interscience}, year = {2008}}
-
What Does the Sky Tell Us about the Camera?
Forsyth, D., Torr, P. & Zisserman, A. (ed.)
Computer Vision -- ECCV 2008
Springer Berlin / Heidelberg, 2008, Vol. 5305, pp. 354-367
BibTeX@incollection{Lalonde2008, author = {Lalonde, Jean-François and Narasimhan, Srinivasa and Efros, Alexei}, title = {What Does the Sky Tell Us about the Camera?}, booktitle = {Computer Vision -- ECCV 2008}, publisher = {Springer Berlin / Heidelberg}, year = {2008}, volume = {5305}, pages = {354-367}}
-
Detecting Doubly Compressed JPEG Images by Using Mode Based First Digit Features
IEEE Workshop on Multimedia Signal Processing
2008, pp. 730-735
BibTeX@inproceedings{Li2008e, author = {Li, Bin and Shi, Yun Qing and Huang, Jiwu}, title = {Detecting Doubly Compressed JPEG Images by Using Mode Based First Digit Features}, booktitle = {IEEE Workshop on Multimedia Signal Processing}, year = {2008}, pages = {730-735}}
-
Doctored JPEG image detection
Proc. IEEE Int Multimedia and Expo Conf
2008, pp. 253-256
BibTeX@inproceedings{Li2008b, author = {Weihai Li and Nenghai Yu and Yuan Yuan}, title = {Doctored JPEG image detection}, booktitle = {Proc. IEEE Int Multimedia and Expo Conf}, year = {2008}, pages = {253--256}}
-
Doctored JPEG Image Detection
IEEE International Conference on Multimedia and Expo
2008, pp. 253-256
BibTeX@inproceedings{Li2008d, author = {Li, Weihai and Yu, Nenghai and Yuan, Yuan}, title = {Doctored JPEG Image Detection}, booktitle = {IEEE International Conference on Multimedia and Expo}, year = {2008}, pages = {253-256}}
-
Detecting copy-paste Forgery of JPEG Image via Block Artifact Grid Extraction
Proceedings of the 2008 International Workshop on Local and Non-Local Approximation in Image Processing
2008
BibTeX@inproceedings{Li2008, author = {Weihai Li and Yuan Yuan and Nenghai Yu}, title = {Detecting copy-paste Forgery of JPEG Image via Block Artifact Grid Extraction}, booktitle = {Proceedings of the 2008 International Workshop on Local and Non-Local Approximation in Image Processing}, year = {2008}}
-
Image demosaicing: A systematic survey
Proc. of SPIE
2008, Vol. 6822, pp. 68221J-68221J
BibTeX@inproceedings{Li2008c, author = {Li, X. and Gunturk, B. and Zhang, L.}, title = {Image demosaicing: A systematic survey}, booktitle = {Proc. of SPIE}, year = {2008}, volume = {6822}, pages = {68221J--68221J}}
-
Tampered Image Detection Using Image Matching
Proc. Fifth Int. Conf. Computer Graphics, Imaging and Visualisation CGIV ´08
2008, pp. 174-179
BibTeX@inproceedings{Li2008a, author = {Zhenghao Li and Nee, A. Y. C. and Ong, S. K. and Weiguo Gong}, title = {Tampered Image Detection Using Image Matching}, booktitle = {Proc. Fifth Int. Conf. Computer Graphics, Imaging and Visualisation CGIV ´08}, year = {2008}, pages = {174--179}}
-
Localization of tampering in contrast and brightness adjusted images using distributed source coding and expectation maximization
Proc. 15th IEEE Int. Conf. Image Processing ICIP 2008
2008, pp. 2204-2207
BibTeX@inproceedings{Lin2008, author = {Yao-Chung Lin and Varodayan, D. and Fink, T. and Betters, E. and Girod, B. }, title = {Localization of tampering in contrast and brightness adjusted images using distributed source coding and expectation maximization}, booktitle = {Proc. 15th IEEE Int. Conf. Image Processing ICIP 2008}, year = {2008}, pages = {2204--2207}}
-
Automatic Estimation and Removal of Noise from a Single Image
IEEE Transactions on Pattern Analysis and Machine Intelligence, 2008, Vol. 30(2), pp. 299-314
BibTeX@article{Liu2008, author = {Ce Liu and Szeliski, R. and Sing Bing Kang and Zitnick, C. L. and Freeman, W. T.}, title = {Automatic Estimation and Removal of Noise from a Single Image}, journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence}, year = {2008}, volume = {30}, number = {2}, pages = {299--314}}
-
Digital Image Forensics Using Statistical Features and Neural Network Classifier
International Conference on Machine Learning and Cybernetics
2008, pp. 2831-2834
BibTeX@inproceedings{Lu2008, author = {Lu, Wei and Sun, Wei and Huang, Jiwu and Lu, Hong-Tao}, title = {Digital Image Forensics Using Statistical Features and Neural Network Classifier}, booktitle = {International Conference on Machine Learning and Cybernetics}, year = {2008}, pages = {2831-2834}}
-
MPEG Recompression Detection Based on Block Artifacts
SPIE Conference on Security, Forensics, Steganography, and Watermarking of Multimedia Contents
2008
BibTeX@inproceedings{Luo2008, author = {Luo, Weiqi and Wu, Min and Huang, Jiwu}, title = {MPEG Recompression Detection Based on Block Artifacts}, booktitle = {SPIE Conference on Security, Forensics, Steganography, and Watermarking of Multimedia Contents}, year = {2008}}
-
Detection of Resampling Supplemented with Noise Inconsistencies Analysis for Image Forensics
Proc. International Conference on Computational Sciences and Its Applications ICCSA ´08
2008, pp. 546-556
BibTeX@inproceedings{Mahdian2008, author = {Mahdian, B. and Saic, S.}, title = {Detection of Resampling Supplemented with Noise Inconsistencies Analysis for Image Forensics}, booktitle = {Proc. International Conference on Computational Sciences and Its Applications ICCSA ´08}, year = {2008}, pages = {546--556}}
-
Blind methods for detecting image fakery
Proc. 42nd Annual IEEE International Carnahan Conference on Security Technology ICCST 2008
2008, pp. 280-286
BibTeX@inproceedings{Mahdian2008a, author = {Mahdian, B. and Saic, S.}, title = {Blind methods for detecting image fakery}, booktitle = {Proc. 42nd Annual IEEE International Carnahan Conference on Security Technology ICCST 2008}, year = {2008}, pages = {280--286}}
-
Blind Authentication Using Periodic Properties of Interpolation
IEEE Transactions on Information Forensics and Security, 2008, Vol. 3(3), pp. 529-538
BibTeX@article{Mahdian2008d, author = {Mahdian, B. and Saic, S.}, title = {Blind Authentication Using Periodic Properties of Interpolation}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2008}, volume = {3}, number = {3}, pages = {529--538}}
-
Detection of digital processing of images through a realistic model of CCD noise
Proc. 19th International Conference on Pattern Recognition ICPR 2008
2008, pp. 1-4
BibTeX@inproceedings{Maillard2008, author = {Maillard, J.-B. and Levesque, D. and Deschenes, F.}, title = {Detection of digital processing of images through a realistic model of CCD noise}, booktitle = {Proc. 19th International Conference on Pattern Recognition ICPR 2008}, year = {2008}, pages = {1--4}}
-
Confidence Weighting for Sensor Fingerprinting
Computer Vision and Pattern Recognition
2008, pp. 1-6
BibTeX@inproceedings{McCloskey2008, author = {McCloskey, Scott}, title = {Confidence Weighting for Sensor Fingerprinting}, booktitle = {Computer Vision and Pattern Recognition}, year = {2008}, pages = {1-6}}
-
Image acquisition forensics: Forensic analysis to identify imaging source
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2008
2008, pp. 1657-1660
BibTeX@inproceedings{McKay2008, author = {McKay, C. and Swaminathan, A. and Hongmei Gou and Min Wu}, title = {Image acquisition forensics: Forensic analysis to identify imaging source}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2008}, year = {2008}, pages = {1657--1660}}
-
A New Feature-Based Method for Source Camera Identification
Ray, I. & Shenoi, S. (ed.)
Advances in Digital Forensics IV
2008, Vol. 285, pp. 207-218
BibTeX@inproceedings{Meng2008, author = {Meng, Fanjie and Kong, Xiangwei and You, Xingang}, title = {A New Feature-Based Method for Source Camera Identification}, booktitle = {Advances in Digital Forensics IV}, year = {2008}, volume = {285}, pages = {207-218}}
-
Feature Extraction and Image Processing
Academic Press, 2008
BibTeX@book{Nixon2008, author = {Mark S. Nixon and Alberto S. Aguado}, title = {Feature Extraction and Image Processing}, publisher = {Academic Press}, year = {2008}, edition = {2nd}}
-
Using Sensor Dirt for Toolmark Analysis of Digital Photographs
Ray, I. & Shenoi, S. (ed.)
Advances in Digital Forensics IV
2008, Vol. 285, pp. 193-206
BibTeX@inproceedings{Olivier2008a, author = {Olivier, Martin S.}, title = {Using Sensor Dirt for Toolmark Analysis of Digital Photographs}, booktitle = {Advances in Digital Forensics IV}, year = {2008}, volume = {285}, pages = {193-206}}
-
On the Probability of a False Positive Match for Digital Camera Identification based on Sensor Dirt Location
South African Computer Journal, 2008, Vol. 41, pp. 21-28
BibTeX@article{Olivier2008, author = {Olivier, Martin S.}, title = {On the Probability of a False Positive Match for Digital Camera Identification based on Sensor Dirt Location}, journal = {South African Computer Journal}, year = {2008}, volume = {41}, pages = {21-28}}
-
Image Quality Estimation for JPEG-Compressed Images without the Original Image
Stanford Center for Image Systems Engineering, 2008
BibTeX@techreport{Petkov2008, author = {Petkov, Atanas and Cottier, Scott}, title = {Image Quality Estimation for JPEG-Compressed Images without the Original Image}, year = {2008}}
-
Detection of Double-Compression in JPEG Images for Applications in Steganography
IEEE Transactions on Information Forensics and Security, 2008, Vol. 3(2), pp. 247-258
BibTeX@article{Pevny2008, author = {Pevny, T. and Fridrich, J. }, title = {Detection of Double-Compression in JPEG Images for Applications in Steganography}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2008}, volume = {3}, number = {2}, pages = {247--258}}
-
Image tampering detection using Bayer interpolation and JPEG compression
e-Forensics ´08: Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop
ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), 2008, pp. 1-5
BibTeX@inproceedings{Poilpre2008, author = {Poilpré, Marie-Charlotte and Perrot, Patrick and Talbot, Hugues}, title = {Image tampering detection using Bayer interpolation and JPEG compression}, booktitle = {e-Forensics ´08: Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop}, publisher = {ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)}, year = {2008}, pages = {1--5}}
-
A Convolutive Mixing Model for Shifted Double JPEG Compression with Application to Passive Image Authentication
IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
2008, pp. 1661-1664
BibTeX@inproceedings{Qu2008, author = {Qu, Zhenhua and Luo, Weiqi and Huang, Jiwu}, title = {A Convolutive Mixing Model for Shifted Double JPEG Compression with Application to Passive Image Authentication}, booktitle = {IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP)}, year = {2008}, pages = {1661-1664}}
-
Reuters Handbook of Journalism
2008
BibTeX@electronic{REUTERS2008, author = {REUTERS}, title = {Reuters Handbook of Journalism}, year = {2008}}
-
Improving Color Modeling for Alpha Matting
Proceedings of the British Machine Vision Conference 2008, CiteSeerX - Scientific Literature Digital Library and Search Engine [http://citeseerx.ist.psu.edu/oai2] (United States), 2008, Vol. -, pp. 1155 - 1164
BibTeX@article{Rhemann2009, author = {Christoph Rhemann and Carsten Rother and Margrit Gelautz}, title = {Improving Color Modeling for Alpha Matting}, journal = {Proceedings of the British Machine Vision Conference 2008}, year = {2008}, volume = {-}, pages = {1155 - 1164}}
-
3-D Depth Reconstruction from a Single Still Image
International Journal of Computer Vision, Springer Netherlands, 2008, Vol. 76, pp. 53-69
BibTeX@article{Saxena2008, author = {Saxena, Ashutosh and Chung, Sung and Ng, Andrew}, title = {3-D Depth Reconstruction from a Single Still Image}, journal = {International Journal of Computer Vision}, publisher = {Springer Netherlands}, year = {2008}, volume = {76}, pages = {53-69}}
-
Algorithms, Architectures and Information Systems Security
Bagchi, A., Bhattacharya, B. B., Sur-kolay, S. & Nandy, S. C. (ed.)
Chapter Overview of State-of-the-art in Digital Image Forensics
World Scientific Publishing Co., Inc., 2008, pp. 325-348
BibTeX@inbook{Sencar2008, author = {Sencar, Husrev T. and Memon, Nasir}, title = {Algorithms, Architectures and Information Systems Security}, publisher = {World Scientific Publishing Co., Inc.}, year = {2008}, pages = {325-348}}
-
First Digit Law and its Application to Digital Forensics
International Workshop on Digital Watermarking
2008
BibTeX@inproceedings{Shi2008, author = {Shi, Yun Qing}, title = {First Digit Law and its Application to Digital Forensics}, booktitle = {International Workshop on Digital Watermarking}, year = {2008}}
-
Steganalysis Versus Splicing Detection
IWDW ´07: Proceedings of the 6th International Workshop on Digital Watermarking
Springer-Verlag, 2008, pp. 158-172
BibTeX@inproceedings{Shi2008a, author = {Shi, Yun Q. and Chen, Chunhua and Xuan, Guorong and Su, Wei}, title = {Steganalysis Versus Splicing Detection}, booktitle = {IWDW ´07: Proceedings of the 6th International Workshop on Digital Watermarking}, publisher = {Springer-Verlag}, year = {2008}, pages = {158--172}}
-
Conditions for effective detection and identification of primary quantization of re-quantized JPEG images
e-Forensics ´08: Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop
ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), 2008, pp. 1-6
BibTeX@inproceedings{Sorell2008, author = {Sorell, Matthew James}, title = {Conditions for effective detection and identification of primary quantization of re-quantized JPEG images}, booktitle = {e-Forensics ´08: Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop}, publisher = {ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)}, year = {2008}, pages = {1--6}}
-
Simultaneous super-resolution and blind deconvolution
Journal of Physics:Conference Series
2008
BibTeX@conference{Sroubek2008, author = {Sroubek, G Cristobal and J Flusser}, title = {Simultaneous super-resolution and blind deconvolution}, booktitle = {Journal of Physics:Conference Series}, year = {2008}}
-
Blind forensics of contrast enhancement in digital images
Proc. 15th IEEE Int. Conf. Image Processing ICIP 2008
2008, pp. 3112-3115
BibTeX@inproceedings{Stamm2008a, author = {Stamm, M. and Liu, K. J. R.}, title = {Blind forensics of contrast enhancement in digital images}, booktitle = {Proc. 15th IEEE Int. Conf. Image Processing ICIP 2008}, year = {2008}, pages = {3112--3115}}
-
Nearest-Neighbor and Bilinear Resampling Factor Estimation to Detect Blockiness or Blurriness of an Image
Journal of Electronic Imaging, 2008, Vol. 17(2), pp. 94-101
BibTeX@article{Suwendi2008, author = {Suwendi, Ariawan and Allebach, Jan P.}, title = {Nearest-Neighbor and Bilinear Resampling Factor Estimation to Detect Blockiness or Blurriness of an Image}, journal = {Journal of Electronic Imaging}, year = {2008}, volume = {17}, number = {2}, pages = {94-101}}
-
Digital Image Forensics via Intrinsic Fingerprints
IEEE Transactions on Information Forensics and Security, 2008, Vol. 3(1), pp. 101-117
BibTeX@article{Swaminathan2008, author = {Swaminathan, Ashwin and Min Wu and Liu, K. J. R.}, title = {Digital Image Forensics via Intrinsic Fingerprints}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2008}, volume = {3}, number = {1}, pages = {101--117}}
-
A pattern classification framework for theoretical analysis of component forensics
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2008
2008, pp. 1665-1668
BibTeX@inproceedings{Swaminathan2008b, author = {Swaminathan, Ashwin. and Min Wu and Liu, K. J. R.}, title = {A pattern classification framework for theoretical analysis of component forensics}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2008}, year = {2008}, pages = {1665--1668}}
-
Localization of sparse image tampering via random projections
Proc. 15th IEEE Int. Conf. Image Processing ICIP 2008
2008, pp. 2092-2095
BibTeX@inproceedings{Tagliasacchi2008, author = {Tagliasacchi, Marco and Valenzise, Giuseppe and Tubaro, Stefano}, title = {Localization of sparse image tampering via random projections}, booktitle = {Proc. 15th IEEE Int. Conf. Image Processing ICIP 2008}, year = {2008}, pages = {2092--2095}}
-
A fast method for image noise estimation using Laplacian operator and adaptive edge detection
Proc. 3rd International Symposium on Communications, Control and Signal Processing ISCCSP 2008
2008, pp. 1077-1081
BibTeX@inproceedings{Tai2008, author = {Shen-Chuan Tai and Shih-Ming Yang}, title = {A fast method for image noise estimation using Laplacian operator and adaptive edge detection}, booktitle = {Proc. 3rd International Symposium on Communications, Control and Signal Processing ISCCSP 2008}, year = {2008}, pages = {1077--1081}}
-
Adaptive feature selection for digital camera source identification
Proc. IEEE Int. Symp. Circuits and Systems ISCAS 2008
2008, pp. 412-415
BibTeX@inproceedings{Tsai2008, author = {Min-Jen Tsai and Cheng-Sheng Wang}, title = {Adaptive feature selection for digital camera source identification}, booktitle = {Proc. IEEE Int. Symp. Circuits and Systems ISCAS 2008}, year = {2008}, pages = {412--415}}
-
Local invariant feature detectors: a survey
Found. Trends. Comput. Graph. Vis., Now Publishers Inc., 2008, Vol. 3(3), pp. 177-280
BibTeX@article{Tuytelaars2008, author = {Tuytelaars, Tinne and Mikolajczyk, Krystian}, title = {Local invariant feature detectors: a survey}, journal = {Found. Trends. Comput. Graph. Vis.}, publisher = {Now Publishers Inc.}, year = {2008}, volume = {3}, number = {3}, pages = {177--280}}
-
Image Processing for Computer Graphics and Vision
Gries, D. & Schneider, F. B. (ed.)
Springer, 2008
BibTeX@book{Velho2008, author = {Velho, Luiz, and Frery, Alejandro C. and Gomes, Jonas}, title = {Image Processing for Computer Graphics and Vision}, publisher = {Springer}, year = {2008}}
-
Detecting Re-Projected Video
International Workshop on Information Hiding
2008, pp. 72-86
BibTeX@inproceedings{Wang2008b, author = {Wang, Weihong and Farid, Hany}, title = {Detecting Re-Projected Video}, booktitle = {International Workshop on Information Hiding}, year = {2008}, pages = {72-86}}
-
Digital Image Forgery Detection Based on the Consistency of Defocus Blur
Proc. IIHMSP ´08 International Conference on Intelligent Information Hiding and Multimedia Signal Processing
2008, pp. 192-195
BibTeX@inproceedings{Wang2008, author = {Wang, Xin and Xuan, Bo and long Peng, Si}, title = {Digital Image Forgery Detection Based on the Consistency of Defocus Blur}, booktitle = {Proc. IIHMSP ´08 International Conference on Intelligent Information Hiding and Multimedia Signal Processing}, year = {2008}, pages = {192--195}}
-
Estimation of rescaling factor and detection of image splicing
Proc. 11th IEEE Int. Conf. Communication Technology ICCT 2008
2008, pp. 676-679
BibTeX@inproceedings{Weimin2008, author = {Wei Weimin and Wang Shuozhong and Tang Zhenjun}, title = {Estimation of rescaling factor and detection of image splicing}, booktitle = {Proc. 11th IEEE Int. Conf. Communication Technology ICCT 2008}, year = {2008}, pages = {676--679}}
-
Image Processing on Modern CPUs and GPUs
Emory University, 2008(TR-2008-023)
BibTeX@techreport{Wendykier2008, author = {Wendykier, Piotr and Nagy, James G.}, title = {Image Processing on Modern CPUs and GPUs}, year = {2008}, number = {TR-2008-023}}
-
Geometrically robust image content authentication using Zernike moments
Proc. Int Machine Learning and Cybernetics Conf
2008, Vol. 5, pp. 2874-2879
BibTeX@inproceedings{Wo2008, author = {Yan Wo and Guo-Qiang Han and Bo Zhang}, title = {Geometrically robust image content authentication using Zernike moments}, booktitle = {Proc. Int Machine Learning and Cybernetics Conf}, year = {2008}, volume = {5}, pages = {2874--2879}}
-
Detection of Digital Doctoring in Exemplar-Based Inpainted Images
International Conference on Machine Learning and Cybernetics
2008, pp. 1222-1226
BibTeX@inproceedings{Wu2008, author = {Wu, Qiong and Sun, Shao-Jie and Zhu, Wei and Li, Guo-Hui and Tu, Dan}, title = {Detection of Digital Doctoring in Exemplar-Based Inpainted Images}, booktitle = {International Conference on Machine Learning and Cybernetics}, year = {2008}, pages = {1222-1226}}
-
Detecting Digital Audio Forgeries by Checking Frame Offsets
ACM Proceedings of the Multimedia and Security Workshop
2008, pp. 21-26
BibTeX@inproceedings{Yang2008, author = {Yang, Rui and Qu, Zhenhua and Huang, Jiwu}, title = {Detecting Digital Audio Forgeries by Checking Frame Offsets}, booktitle = {ACM Proceedings of the Multimedia and Security Workshop}, year = {2008}, pages = {21-26}}
-
Exposing Digital Forgeries by Detecting Traces of Smoothing
Proc. 9th Int. Conf. for Young Computer Scientists ICYCS 2008
2008, pp. 1440-1445
BibTeX@inproceedings{Ying2008, author = {Chen Ying and Wang Yuping}, title = {Exposing Digital Forgeries by Detecting Traces of Smoothing}, booktitle = {Proc. 9th Int. Conf. for Young Computer Scientists ICYCS 2008}, year = {2008}, pages = {1440--1445}}
-
Recaptured Photo Detection using Specularity Distribution
IEEE International Conference on Image Processing
2008
BibTeX@inproceedings{Yu2008, author = {Yu, Hang and Ng, Tian-Tsong and Sun, Qibin}, title = {Recaptured Photo Detection using Specularity Distribution}, booktitle = {IEEE International Conference on Image Processing}, year = {2008}}
-
Detection of digital forgeries using an image interpolation from digital images
Proc. IEEE Int. Symp. Consumer Electronics ISCE 2008
2008, pp. 1-4
BibTeX@inproceedings{Yun2008, author = {Yong-In Yun and Jung-Beom Lee and Da-un Jung and Dong-Hwan Har and Jong-Soo Choi}, title = {Detection of digital forgeries using an image interpolation from digital images}, booktitle = {Proc. IEEE Int. Symp. Consumer Electronics ISCE 2008}, year = {2008}, pages = {1--4}}
-
Digital Camera Identification Based on Canonical Correlation Analysis
IEEE Workshop on Multimedia Signal Processing
2008, pp. 769-773
BibTeX@inproceedings{Zhang2008d, author = {Zhang, Chi and Zhang, Hongbin}, title = {Digital Camera Identification Based on Canonical Correlation Analysis}, booktitle = {IEEE Workshop on Multimedia Signal Processing}, year = {2008}, pages = {769-773}}
-
A new approach for detecting Copy-Move forgery in digital images
Proc. 11th IEEE Singapore International Conference on Communication Systems ICCS 2008
2008, pp. 362-366
BibTeX@inproceedings{Zhang2008, author = {Zhang, Jing and Feng, Zhanlei and Su, Yuting}, title = {A new approach for detecting Copy-Move forgery in digital images}, booktitle = {Proc. 11th IEEE Singapore International Conference on Communication Systems ICCS 2008}, year = {2008}, pages = {362--366}}
-
Image Blind Forensics Using Artificial Neural Network
Proc. Int Computer Science and Software Engineering Conf
2008, Vol. 4, pp. 847-850
BibTeX@inproceedings{Zhang2008g, author = {Zhen Zhang and Yukun Bian and Xijian Ping}, title = {Image Blind Forensics Using Artificial Neural Network}, booktitle = {Proc. Int Computer Science and Software Engineering Conf}, year = {2008}, volume = {4}, pages = {847--850}}
-
An Effective Algorithm of Image Splicing Detection
Proc. International Conference on Computer Science and Software Engineering
2008, Vol. 1, pp. 1035-1039
BibTeX@inproceedings{Zhang2008a, author = {Zhang, Zhen and Kang, Jiquan and Ren, Yuan}, title = {An Effective Algorithm of Image Splicing Detection}, booktitle = {Proc. International Conference on Computer Science and Software Engineering}, year = {2008}, volume = {1}, pages = {1035--1039}}
-
A survey on passive-blind image forgery by doctor method detection
Proc. Int Machine Learning and Cybernetics Conf
2008, Vol. 6, pp. 3463-3467
BibTeX@inproceedings{Zhang2008c, author = {Zhen Zhang and Yuan Ren and Xi-Jian Ping and Zhi-Yong He and Shan-Zhong Zhang}, title = {A survey on passive-blind image forgery by doctor method detection}, booktitle = {Proc. Int Machine Learning and Cybernetics Conf}, year = {2008}, volume = {6}, pages = {3463--3467}}
-
Study of Image Splicing Detection
International Conference on Intelligent Computing
2008, pp. 1103-1110
BibTeX@inproceedings{Zhang2008b, author = {Zhang, Zhen and Zhou, Ying and Kang, Jiquan and Ren, Yuan}, title = {Study of Image Splicing Detection}, booktitle = {International Conference on Intelligent Computing}, year = {2008}, pages = {1103-1110}}
2007
-
Mit Bildern lügen
Metten, T. (ed.)
Chapter Wörter lügen manchmal, Bilder immer. Wissenschaft nach der Wende zum Bild.
Herbert von Halem Verlag, 2007
BibTeX@inbook{Albrecht2007, author = {Albrecht, Clemens}, title = {Mit Bildern lügen}, publisher = {Herbert von Halem Verlag}, year = {2007}}
-
Wavelet-Based Multiresolution Features for Detecting Duplications in Images
Machine Vision Application
2007, pp. 264-267
BibTeX@inproceedings{Bashar2007, author = {Bashar, Md. Khayrul and Noda, Keiji and Ohnishi, Noboru and Kudo, Hiroaki and Matsumoto, Tetsuya and Takeuchi, Yoshinori}, title = {Wavelet-Based Multiresolution Features for Detecting Duplications in Images}, booktitle = {Machine Vision Application}, year = {2007}, pages = {264-267}}
-
Photometric Stereo with General, Unknown Lighting
International Journal of Computer Vision, Springer Netherlands, 2007, Vol. 72, pp. 239-257
BibTeX@article{Basri2007, author = {Basri, Ronen and Jacobs, David and Kemelmacher, Ira}, title = {Photometric Stereo with General, Unknown Lighting}, journal = {International Journal of Computer Vision}, publisher = {Springer Netherlands}, year = {2007}, volume = {72}, pages = {239-257}}
-
Forensic Audio and Visual Evidence
International Forensic Science Symposium
2007, pp. 372-413
BibTeX@inproceedings{Bijhold2007, author = {Bijhold, Jurrien and Ruifrok, Arnout and Jessen, Michael and Geradts, Zeno J. and Ehrhardt, Sabine and Alberink, Ivo}, title = {Forensic Audio and Visual Evidence}, booktitle = {International Forensic Science Symposium}, year = {2007}, pages = {372-413}}
-
Blind Identification of Cellular Phone Cameras
Delp, E. J. & Wong, P. W. (ed.)
SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents
2007, Vol. 6505
BibTeX@inproceedings{Celiktutan2007a, author = {Celiktutan, Oya and Avcibas, Ismail and Sankur, Bulent}, title = {Blind Identification of Cellular Phone Cameras}, booktitle = {SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents}, year = {2007}, volume = {6505}}
-
Digital Camera Identification
Proc. IEEE 15th Signal Processing and Communications Applications SIU 2007
2007, pp. 1-4
BibTeX@inproceedings{Celiktutan2007, author = {Celiktutan, O. and Sankur, B. and Avcibas, I.}, title = {Digital Camera Identification}, booktitle = {Proc. IEEE 15th Signal Processing and Communications Applications SIU 2007}, year = {2007}, pages = {1--4}}
-
Blind Passive Media Forensics: Motivation and Opportunity
Multimedia Content Analysis and Mining
2007, pp. 57-59
BibTeX@inproceedings{Chang2007, author = {Chang, Shih-Fu}, title = {Blind Passive Media Forensics: Motivation and Opportunity}, booktitle = {Multimedia Content Analysis and Mining}, year = {2007}, pages = {57-59}}
-
Source digital camcorder identification using sensor photo response non-uniformity
III, E. J. D. & Wong, P. W. (ed.)
Proceeding of the SPIE, 2007
Security, Steganography, and Watermarking of Multimedia Contents IX, SPIE, 2007, Vol. 6505(1), pp. 65051G
BibTeX@conference{Chen2007b, author = {Mo Chen and Jessica Fridrich and Miroslav Goljan and Jan Lukaš}, title = {Source digital camcorder identification using sensor photo response non-uniformity}, booktitle = {Proceeding of the SPIE, 2007}, journal = {Security, Steganography, and Watermarking of Multimedia Contents IX}, publisher = {SPIE}, year = {2007}, volume = {6505}, number = {1}, pages = {65051G}}
-
Source Camera Identification Based on Camera Gain Histogram
IEEE International Conference on Image Processing
2007, Vol. 4, pp. IV-429-IV-432
BibTeX@inproceedings{Chen2007e, author = {Chen, Sz-Han and Hsu, Chiou-Ting}, title = {Source Camera Identification Based on Camera Gain Histogram}, booktitle = {IEEE International Conference on Image Processing}, year = {2007}, volume = {4}, pages = {IV-429-IV-432}}
-
Image splicing detection using 2-D phase congruency and statistical moments of characteristic function
Proc. SPIE
2007
BibTeX@inproceedings{Chen2007a, author = {Wen Chen and Yun Q. Shi}, title = {Image splicing detection using 2-D phase congruency and statistical moments of characteristic function}, booktitle = {Proc. SPIE}, year = {2007}}
-
Identifying Computer Graphics using HSV Color Model and Statistical Moments of Characteristic Functions
Proc. IEEE Int Multimedia and Expo Conf
2007, pp. 1123-1126
BibTeX@inproceedings{Chen2007c, author = {Wen Chen and Shi, Y. Q. and Guorong Xuan}, title = {Identifying Computer Graphics using HSV Color Model and Statistical Moments of Characteristic Functions}, booktitle = {Proc. IEEE Int Multimedia and Expo Conf}, year = {2007}, pages = {1123--1126}}
-
Digital still camera forensics
Small Scale Digital Device Forensics Journal, 2007, Vol. 1(1), pp. 1-8
BibTeX@article{Cohen2007, author = {Cohen, K.}, title = {Digital still camera forensics}, journal = {Small Scale Digital Device Forensics Journal}, year = {2007}, volume = {1}, number = {1}, pages = {1--8}}
-
Bildmanipulation: Wie Computer unsere Wirklichkeit verzerren (German)
Deussen, O. (ed.)
Spektrum Akademischer Verlag, 2007, pp. 185
BibTeX@book{Deussen2007, author = {Oliver Deussen}, title = {Bildmanipulation: Wie Computer unsere Wirklichkeit verzerren (German)}, publisher = {Spektrum Akademischer Verlag}, year = {2007}, pages = {185}}
-
New Features to Identify Computer Generated Images
Proc. IEEE International Conference on Image Processing ICIP 2007
2007, Vol. 4, pp. IV-433-IV-436
BibTeX@inproceedings{Dirik2007a, author = {Dirik, A. E. and Bayram, S. and Sencar, H. T. and Memon, N.}, title = {New Features to Identify Computer Generated Images}, booktitle = {Proc. IEEE International Conference on Image Processing ICIP 2007}, year = {2007}, volume = {4}, pages = {IV--433--IV--436}}
-
Source Camera Identification Based on Sensor Dust Characteristics
Proc. IEEE Workshop on Signal Processing Applications for Public Security and Forensics SAFE ´07
2007, pp. 1-6
BibTeX@inproceedings{Dirik2007, author = {Dirik, A. Emir and Sencar, Husrev T. and Memon, Nasir}, title = {Source Camera Identification Based on Sensor Dust Characteristics}, booktitle = {Proc. IEEE Workshop on Signal Processing Applications for Public Security and Forensics SAFE ´07}, year = {2007}, pages = {1--6}}
-
Detecting filtered cloning in digital images
MM&Sec ´07: Proceedings of the 9th workshop on Multimedia & security
ACM, 2007, pp. 43-50
BibTeX@inproceedings{Dybala2007, author = {Dybala, Brandon and Jennings, Brian and Letscher, David}, title = {Detecting filtered cloning in digital images}, booktitle = {MM&Sec ´07: Proceedings of the 9th workshop on Multimedia & security}, publisher = {ACM}, year = {2007}, pages = {43--50}}
-
Photorealistic Rendering: How Realistic Is It?
Vision Sciences
2007
BibTeX@inproceedings{Farid2007a, author = {Farid, Hany and Bravo, Mary J.}, title = {Photorealistic Rendering: How Realistic Is It?}, booktitle = {Vision Sciences}, year = {2007}}
-
Video Stabilization and Enhancement
Department of Computer Science, Dartmouth College, 2007(TR2007-605)
BibTeX@techreport{Farid2007, author = {Farid, Hany and Woodward, Jeffrey B.}, title = {Video Stabilization and Enhancement}, year = {2007}, number = {TR2007-605}}
-
Image upsampling via imposed edge statistics
ACM Trans. Graph., ACM, 2007, Vol. 26(3), pp. 95
BibTeX@article{Fattal2007, author = {Fattal, Raanan}, title = {Image upsampling via imposed edge statistics}, journal = {ACM Trans. Graph.}, publisher = {ACM}, year = {2007}, volume = {26}, number = {3}, pages = {95}}
-
Simulation of an image acquisition system
Proc. th Int Electronics Technology Spring Seminar
2007, pp. 357-360
BibTeX@inproceedings{Florin2007, author = {Florin, T. }, title = {Simulation of an image acquisition system}, booktitle = {Proc. th Int Electronics Technology Spring Seminar}, year = {2007}, pages = {357--360}}
-
Simulation of a Digital Camera Pipeline
Proc. Int. Symp. Signals, Circuits and Systems ISSCS 2007
2007, Vol. 2, pp. 1-4
BibTeX@inproceedings{Florin2007a, author = {Florin, T. }, title = {Simulation of a Digital Camera Pipeline}, booktitle = {Proc. Int. Symp. Signals, Circuits and Systems ISSCS 2007}, year = {2007}, volume = {2}, pages = {1--4}}
-
Das Bild im digitalen Zeitalter - Die Frage nach der Authentizität der Fotografie
2007
BibTeX@misc{Franz2007, author = {Franz, Janina}, title = {Das Bild im digitalen Zeitalter - Die Frage nach der Authentizität der Fotografie}, year = {2007}}
-
Imaging Sensor Noise as Digital X-ray for Revealing Forgeries
International Workshop on Information Hiding
2007, pp. 342-358
BibTeX@inproceedings{Fridrich2007, author = {Fridrich, Jessica and Chen, Mo and Goljan, Miroslav}, title = {Imaging Sensor Noise as Digital X-ray for Revealing Forgeries}, booktitle = {International Workshop on Information Hiding}, year = {2007}, pages = {342-358}}
-
A generalized Benford´s law for JPEG coefficients and its applications in image forensics
Proc. SPIE
2007, Vol. 6505
BibTeX@inproceedings{Fu2007, author = {Dongdong Fu and Yun Q. Shi}, title = {A generalized Benford´s law for JPEG coefficients and its applications in image forensics}, booktitle = {Proc. SPIE}, year = {2007}, volume = {6505}}
-
Forensics for Flatbed Scanners
Delp, E. J. & Wong, P. W. (ed.)
SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents
2007, Vol. 6505
BibTeX@inproceedings{Gloe2007b, author = {Gloe, Thomas and Franz, Elke and Winkler, Antje}, title = {Forensics for Flatbed Scanners}, booktitle = {SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents}, year = {2007}, volume = {6505}}
-
Can we trust digital image forensics?
MULTIMEDIA ´07: Proceedings of the 15th international conference on Multimedia
ACM, 2007, pp. 78-86
BibTeX@inproceedings{Gloe2007, author = {Gloe, Thomas and Kirchner, Matthias and Winkler, Antje and Böhme, Rainer}, title = {Can we trust digital image forensics?}, booktitle = {MULTIMEDIA ´07: Proceedings of the 15th international conference on Multimedia}, publisher = {ACM}, year = {2007}, pages = {78--86}}
-
Identifying Common Source Digital Camera from Image Pairs
IEEE International Conference on Image Processing
2007
BibTeX@inproceedings{Goljan2007, author = {Goljan, Miroslav and Chen, Mo and Fridrich, Jessica}, title = {Identifying Common Source Digital Camera from Image Pairs}, booktitle = {IEEE International Conference on Image Processing}, year = {2007}}
-
Digital Image Forgery Detection Using Artificial Neural Network and Independent Component Analysis
Applied Mathematics and Computation, 2007, Vol. 194(2), pp. 540-543
BibTeX@article{Gopi2007, author = {Gopi, E. S.}, title = {Digital Image Forgery Detection Using Artificial Neural Network and Independent Component Analysis}, journal = {Applied Mathematics and Computation}, year = {2007}, volume = {194}, number = {2}, pages = {540-543}}
-
Noise Features for Image Tampering Detection and Steganalysis
Proc. IEEE Int. Conf. Image Processing ICIP 2007
2007, Vol. 6
BibTeX@inproceedings{Gou2007, author = {Hongmei Gou and Swaminathan, A. and Min Wu}, title = {Noise Features for Image Tampering Detection and Steganalysis}, booktitle = {Proc. IEEE Int. Conf. Image Processing ICIP 2007}, year = {2007}, volume = {6}}
-
Robust scanner identification based on noise features
Proceedings of SPIE
2007, Vol. Volume 6505
BibTeX@inproceedings{Gou2007a, author = {Gou, Hongmei and Swaminathan, Ashwin and Wu, Min}, title = {Robust scanner identification based on noise features}, booktitle = {Proceedings of SPIE}, year = {2007}, volume = {Volume 6505}}
-
Applications of ENF Criterion in Forensic Audio, Video, Computer and Telecommunication Analysis
Forensic Science International, 2007, Vol. 167(2-3), pp. 136-145
BibTeX@article{Grigoras2007, author = {Grigoras, Catalin}, title = {Applications of ENF Criterion in Forensic Audio, Video, Computer and Telecommunication Analysis}, journal = {Forensic Science International}, year = {2007}, volume = {167}, number = {2-3}, pages = {136-145}}
-
Applications of ENF Analysis Method in Forensic Authentication of Digital Audio and Video Recordings
123rd AES Convention
2007
BibTeX@inproceedings{Grigoras2007a, author = {Grigoras, Catalin}, title = {Applications of ENF Analysis Method in Forensic Authentication of Digital Audio and Video Recordings}, booktitle = {123rd AES Convention}, year = {2007}}
-
SVD Based Source Cell-Phone Identification
Proc. IEEE 15th Signal Processing and Communications Applications SIU 2007
2007, pp. 1-4
BibTeX@inproceedings{Gul2007, author = {Gül, Gökhan and Avcibas, Ismail}, title = {SVD Based Source Cell-Phone Identification}, booktitle = {Proc. IEEE 15th Signal Processing and Communications Applications SIU 2007}, year = {2007}, pages = {1--4}}
-
Document Frauds: Identification and Linking Fake Document to Scanners and Printers
International Conference on Theory and Applications
2007, pp. 497-501
BibTeX@inproceedings{Gupta2007, author = {Gupta, Gaurav and Saha, Sanjoy Kumar and Chakraborty, Shayok and Mazumdar, Chandan}, title = {Document Frauds: Identification and Linking Fake Document to Scanners and Printers}, booktitle = {International Conference on Theory and Applications}, year = {2007}, pages = {497-501}}
-
Tamper Detection with Self-Correction Hybrid Spatial-DCT Domains Image Authentication Technique
Proc. IEEE Int Signal Processing and Information Technology Symp
2007, pp. 369-374
BibTeX@inproceedings{Hasan2007, author = {Hasan, Y. M. Y. and Hassan, A. M. }, title = {Tamper Detection with Self-Correction Hybrid Spatial-DCT Domains Image Authentication Technique}, booktitle = {Proc. IEEE Int Signal Processing and Information Technology Symp}, year = {2007}, pages = {369--374}}
-
Image Splicing Detection using Camera Response Function Consistency and Automatic Segmentation
Proc. IEEE Int Multimedia and Expo Conf
2007, pp. 28-31
BibTeX@inproceedings{Hsu2007, author = {Yu-Feng Hsu and Shih-Fu Chang}, title = {Image Splicing Detection using Camera Response Function Consistency and Automatic Segmentation}, booktitle = {Proc. IEEE Int Multimedia and Expo Conf}, year = {2007}, pages = {28--31}}
-
Image Sensor Noise Estimation and Reduction
2007
BibTeX@misc{Ibenthal2007, author = {Achim Ibenthal}, title = {Image Sensor Noise Estimation and Reduction}, year = {2007}}
-
Lighting and Optical Tools for Image Forensics
Department of Computer Science, Dartmouth College, 2007
BibTeX@phdthesis{Johnson2007c, author = {Johnson, Micah Kimo}, title = {Lighting and Optical Tools for Image Forensics}, school = {Department of Computer Science, Dartmouth College}, year = {2007}}
-
Exposing Digital Forgeries in Complex Lighting Environments
IEEE Transactions on Information Forensics and Security, 2007, Vol. 3(2), pp. 450-461
BibTeX@article{Johnson2007, author = {Johnson, Micah Kimo and Farid, Hany}, title = {Exposing Digital Forgeries in Complex Lighting Environments}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2007}, volume = {3}, number = {2}, pages = {450-461}}
-
Exposing Digital Forgeries Through Specular Highlights on the Eye
International Workshop on Information Hiding
2007, pp. 311-325
BibTeX@inproceedings{Johnson2007a, author = {Johnson, Micah Kimo and Farid, Hany}, title = {Exposing Digital Forgeries Through Specular Highlights on the Eye}, booktitle = {International Workshop on Information Hiding}, year = {2007}, pages = {311-325}}
-
An Authentication Method for Copy Areas of Images
Proc. Fourth Int. Conf. Image and Graphics ICIG 2007
2007, pp. 303-306
BibTeX@inproceedings{Ju2007, author = {Shenggen Ju and Jiliu Zhou and Kun He}, title = {An Authentication Method for Copy Areas of Images}, booktitle = {Proc. Fourth Int. Conf. Image and Graphics ICIG 2007}, year = {2007}, pages = {303--306}}
-
Automatic Removal of Chromatic Aberration from a Single Image
Proc. IEEE Conference on Computer Vision and Pattern Recognition CVPR ´07
2007, pp. 1-8
BibTeX@inproceedings{Kang2007, author = {Sing Bing Kang}, title = {Automatic Removal of Chromatic Aberration from a Single Image}, booktitle = {Proc. IEEE Conference on Computer Vision and Pattern Recognition CVPR ´07}, year = {2007}, pages = {1--8}}
-
Printer and Sensor Forensics
Proc. IEEE Workshop Signal Processing Applications for Public Security and Forensics SAFE ´07
2007, pp. 1-8
BibTeX@inproceedings{Khanna2007b, author = {Khanna, Nitin and Mikkilineni, Aravind K. and Chiang, Pei-Ju and Ortiz, Maria V. and Shah, Vivek and Suh, Sungjoo and Chiu, George T.-C. and Allebach, Jan P. and Delp, Edward J.}, title = {Printer and Sensor Forensics}, booktitle = {Proc. IEEE Workshop Signal Processing Applications for Public Security and Forensics SAFE ´07}, year = {2007}, pages = {1--8}}
-
Sensor Forensics: Printers, Cameras and Scanners, They Never Lie
Proc. IEEE Int Multimedia and Expo Conf
2007, pp. 20-23
BibTeX@inproceedings{Khanna2007c, author = {Khanna, N. and Mikkilineni, A. K. and Pei-Ju Chiang and Ortiz, M. V. and Sungjoo Suh and Chiu, G. T.-C. and Allebach, J. P. and Delp, E. J.}, title = {Sensor Forensics: Printers, Cameras and Scanners, They Never Lie}, booktitle = {Proc. IEEE Int Multimedia and Expo Conf}, year = {2007}, pages = {20--23}}
-
Scanner Identification Using Sensor Pattern Noise
Proceedings of SPIE
School of Electrical and Computer Engineering School of Mechanical Engineering Purdue University, West Lafayette, Indiana USA, 2007
BibTeX@inproceedings{Khanna2007, author = {Khanna, Nitin and Mikkilineni, Aravind K. and Chiu, George T. C. and Allebach, Jan P. and Delp, Edward J.}, title = {Scanner Identification Using Sensor Pattern Noise}, booktitle = {Proceedings of SPIE}, year = {2007}}
-
Forensic classification of imaging sensor types
Proceedings of SPIE
2007
BibTeX@inproceedings{Khanna2007a, author = {Khanna, Nitin and Mikkilineni, Aravind K. and Chiu, George T. C. and Allebach, Jan P. and Delp, Edward J.}, title = {Forensic classification of imaging sensor types}, booktitle = {Proceedings of SPIE}, year = {2007}}
-
Image Tamper Detection using Mathematical Morphology
Proc. IEEE Int. Conf. Image Processing ICIP 2007
2007, Vol. 6
BibTeX@inproceedings{Kihara2007, author = {Kihara, M. and Fujiyoshi, M. and Qing Tao Wan and Kiya, H. }, title = {Image Tamper Detection using Mathematical Morphology}, booktitle = {Proc. IEEE Int. Conf. Image Processing ICIP 2007}, year = {2007}, volume = {6}}
-
Tamper Hiding: Defeating Image Forensics
Furon, T., Cayre, F., Doerr, G. & Bas, P. (ed.)
International Workshop on Information Hiding
2007, pp. 326-341
BibTeX@inproceedings{Kirchner2007, author = {Kirchner, Matthias and Böhme, Rainer}, title = {Tamper Hiding: Defeating Image Forensics}, booktitle = {International Workshop on Information Hiding}, year = {2007}, pages = {326-341}}
-
A Survey on Digital Camera Image Forensic Methods
Proc. IEEE Int Multimedia and Expo Conf
2007, pp. 16-19
BibTeX@inproceedings{Lanh2007, author = {Tran Van Lanh and Kai-Sen Chong and Emmanuel, S. and Kankanhalli, M. S. }, title = {A Survey on Digital Camera Image Forensic Methods}, booktitle = {Proc. IEEE Int Multimedia and Expo Conf}, year = {2007}, pages = {16--19}}
-
A Sorted Neighborhood Approach for Detecting Duplicated Regions in Image Forgeries Based on DWT and SVD
Proc. IEEE Int Multimedia and Expo Conf
2007, pp. 1750-1753
BibTeX@inproceedings{Li2007, author = {Guohui Li and Qiong Wu and Dan Tu and Shaojie Sun}, title = {A Sorted Neighborhood Approach for Detecting Duplicated Regions in Image Forgeries Based on DWT and SVD}, booktitle = {Proc. IEEE Int Multimedia and Expo Conf}, year = {2007}, pages = {1750--1753}}
-
Mit Bildern lügen
Metten, T. (ed.)
Herbert von Halem Verlag, 2007
BibTeX@book{Liebert2007, author = {Wolf A. Liebert}, title = {Mit Bildern lügen}, publisher = {Herbert von Halem Verlag}, year = {2007}, edition = {1. Aufl.}}
-
Image Source Coding Forensics via Intrinsic Fingerprints
Proc. IEEE Int Multimedia and Expo Conf
2007, pp. 1127-1130
BibTeX@inproceedings{Lin2007, author = {Lin, W. S. and Tjoa, S. and Zhao, H. V. and Liu, K. J. R.}, title = {Image Source Coding Forensics via Intrinsic Fingerprints}, booktitle = {Proc. IEEE Int Multimedia and Expo Conf}, year = {2007}, pages = {1127--1130}}
-
Sixth-Order Statistics-Based Non-Data-Aided SNR Estimation
IEEE Communications Letters, 2007, Vol. 11(4), pp. 351-353
BibTeX@article{Lopez-Valcarce2007, author = {López-Valcarce, R. and Mosquera, C.}, title = {Sixth-Order Statistics-Based Non-Data-Aided SNR Estimation}, journal = {IEEE Communications Letters}, year = {2007}, volume = {11}, number = {4}, pages = {351--353}}
-
A Novel Method for Detecting Cropped and Recompressed Image Block
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2007
2007, Vol. 2
BibTeX@inproceedings{Luo2007, author = {Weiqi Luo and Zhenhua Qu and Jiwu Huang and Guoping Qiu}, title = {A Novel Method for Detecting Cropped and Recompressed Image Block}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2007}, year = {2007}, volume = {2}}
-
A survey of passive technology for digital image forensics
Frontiers of Computer Science in China, Higher Education Press, co-published with Springer-Verlag GmbH, 2007, Vol. 1, pp. 166-179
BibTeX@article{Luo2007a, author = {Luo, Weiqi and Qu, Zhenhua and Pan, Feng and Huang, Jiwu}, title = {A survey of passive technology for digital image forensics}, journal = {Frontiers of Computer Science in China}, publisher = {Higher Education Press, co-published with Springer-Verlag GmbH}, year = {2007}, volume = {1}, pages = {166-179}}
-
Detection of copy-move forgery using a method based on blur moment invariants.
Forensic Sci Int, Institute of Information Theory and Automation, Academy of Sciences of the Czech Republic, Prague, Czech Republic. mahdian@utia.cas.cz, 2007, Vol. 171(2-3), pp. 180-189
BibTeX@article{Mahdian2007, author = {Babak Mahdian and Stanislav Saic}, title = {Detection of copy-move forgery using a method based on blur moment invariants.}, journal = {Forensic Sci Int}, year = {2007}, volume = {171}, number = {2-3}, pages = {180--189}}
-
On Periodic Properties of Interpolation and Their Application To Image Authentication
Proc. Third Int. Symp. Information Assurance and Security IAS 2007
2007, pp. 439-446
BibTeX@inproceedings{Mahdian2007a, author = {Mahdian, B. and Saic, S.}, title = {On Periodic Properties of Interpolation and Their Application To Image Authentication}, booktitle = {Proc. Third Int. Symp. Information Assurance and Security IAS 2007}, year = {2007}, pages = {439--446}}
-
Detection of Copy Move Forgery Using a Method Based on Blur Moment Invariants
Forensic Science International, 2007, Vol. 171, pp. 180-189
BibTeX@article{Mahdian2007c, author = {Mahdian, Babak and Saic, Stanislav}, title = {Detection of Copy Move Forgery Using a Method Based on Blur Moment Invariants}, journal = {Forensic Science International}, year = {2007}, volume = {171}, pages = {180-189}}
-
Calibration and removal of lateral chromatic aberration in images
Pattern Recognition Letters, 2007, Vol. 28(1), pp. 125 - 135
BibTeX@article{Mallon2007, author = {John Mallon and Paul F. Whelan}, title = {Calibration and removal of lateral chromatic aberration in images}, journal = {Pattern Recognition Letters}, year = {2007}, volume = {28}, number = {1}, pages = {125 - 135}}
-
Detection of Malevolent Changes in Digital Video for Forensic Applications
Delp, E. J. & Wong, P. W. (ed.)
SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents
2007, Vol. 6505
BibTeX@inproceedings{Mondaini2007, author = {Mondaini, N. and Caldelli, Roberto and Piva, Alessandro and Barni, Mauro and Cappellini, Vito}, title = {Detection of Malevolent Changes in Digital Video for Forensic Applications}, booktitle = {SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents}, year = {2007}, volume = {6505}}
-
Detection of Region Duplication Forgery in Digital Images Using Wavelets and Log-Polar Mapping
Computational Intelligence and Multimedia Applications, International Conference on, IEEE Computer Society, 2007, Vol. 3, pp. 371-377
BibTeX@article{Myna2007, author = {A.N. Myna and M.G. Venkateshmurthy and C.G Patil}, title = {Detection of Region Duplication Forgery in Digital Images Using Wavelets and Log-Polar Mapping}, journal = {Computational Intelligence and Multimedia Applications, International Conference on}, publisher = {IEEE Computer Society}, year = {2007}, volume = {3}, pages = {371-377}}
-
Detection of Region Duplication Forgery in Digital Images Using Wavelets and Log-Polar Mapping
Proc. Int Conf. Computational Intelligence and Multimedia Applications Conf
2007, Vol. 3, pp. 371-377
BibTeX@inproceedings{Myrna2007, author = {Myrna, A. N. and Venkateshmurthy, M. G. and Patil, C. G. }, title = {Detection of Region Duplication Forgery in Digital Images Using Wavelets and Log-Polar Mapping}, booktitle = {Proc. Int Conf. Computational Intelligence and Multimedia Applications Conf}, year = {2007}, volume = {3}, pages = {371--377}}
-
Lessons Learned from Online Classification of Photo-Realistic Computer Graphics and Photographs
Department of Electrical Engineering Columbia University New York, NY 10027, 2007
BibTeX@techreport{Ng2007a, author = {Ng, Tian-tsong and Chang, Shih-fu}, title = {Lessons Learned from Online Classification of Photo-Realistic Computer Graphics and Photographs}, year = {2007}}
-
Using Geometry Invariants for Camera Response Function Estimation
Proc. IEEE Conference on Computer Vision and Pattern Recognition CVPR ´07
2007, pp. 1-8
BibTeX@inproceedings{Ng2007, author = {Ng, Tian-Tsong and Chang, Shih-Fu and Tsui, Mao-Pei}, title = {Using Geometry Invariants for Camera Response Function Estimation}, booktitle = {Proc. IEEE Conference on Computer Vision and Pattern Recognition CVPR ´07}, year = {2007}, pages = {1--8}}
-
Sensometrics: Identifying Pen Digitizers by Statistical Multimedia Signal Processing
SPIE Conference on Multimedia on Mobile Devices III
2007
BibTeX@inproceedings{Oermann2007, author = {Oermann, Andrea and Vielhauer, Claus and Dittmann, Jana}, title = {Sensometrics: Identifying Pen Digitizers by Statistical Multimedia Signal Processing}, booktitle = {SPIE Conference on Multimedia on Mobile Devices III}, year = {2007}}
-
Digital Image Processing
Wiley-Interscience, 2007
BibTeX@book{Pratt2007, author = {Pratt, William K.}, title = {Digital Image Processing}, publisher = {Wiley-Interscience}, year = {2007}}
-
Robust Hash for Detecting and Localizing Image Tampering
Proc. IEEE Int. Conf. Image Processing ICIP 2007
2007, Vol. 6
BibTeX@inproceedings{Roy2007, author = {Sujoy Roy and Qibin Sun}, title = {Robust Hash for Detecting and Localizing Image Tampering}, booktitle = {Proc. IEEE Int. Conf. Image Processing ICIP 2007}, year = {2007}, volume = {6}}
-
Changing History: Doctored Photographs Affect Memory for Past Public Events
Applied Cognitive Psychology, 2007, Vol. Volume 21 Issue 8(21), pp. 1005-1022
BibTeX@article{Sacchi2007, author = {Sacchi, Dario L. M. and Agnoli, Franca and Loftus, Elizabeth F.}, title = {Changing History: Doctored Photographs Affect Memory for Past Public Events}, journal = {Applied Cognitive Psychology}, year = {2007}, volume = {Volume 21 Issue 8}, number = {21}, pages = {1005-1022}}
-
The use of Photoshop
2007
BibTeX@electronic{Schlesinger2007, author = {David Schlesinger}, title = {The use of Photoshop}, year = {2007}}
-
Overview of State-of-Art in Digital Image Forensics
Proc. of WSPC
2007
BibTeX@inproceedings{Sencar2007, author = {H. T. Sencar and N. Memon}, title = {Overview of State-of-Art in Digital Image Forensics}, booktitle = {Proc. of WSPC}, year = {2007}}
-
A natural image model approach to splicing detection
MM&Sec ´07: Proceedings of the 9th workshop on Multimedia & security
ACM, 2007, pp. 51-62
BibTeX@inproceedings{Shi2007, author = {Shi, Yun Q. and Chen, Chunhua and Chen, Wen}, title = {A natural image model approach to splicing detection}, booktitle = {MM&Sec ´07: Proceedings of the 9th workshop on Multimedia & security}, publisher = {ACM}, year = {2007}, pages = {51--62}}
-
Reduction of blocking artifacts in JPEG compressed images
Digital Signal Processing, 2007, Vol. 17(1), pp. 225 - 243
BibTeX@article{Singh2007, author = {Sukhwinder Singh and Vinod Kumar and H.K. Verma}, title = {Reduction of blocking artifacts in JPEG compressed images}, journal = {Digital Signal Processing}, year = {2007}, volume = {17}, number = {1}, pages = {225 - 243}}
-
Image noise estimation using color information
HP Laboratories Israel HPL-2005-2(R.1), 2007
BibTeX@techreport{Staelin2007, author = {Carl Staelin and Hila Nachlieli}, title = {Image noise estimation using color information}, year = {2007}}
-
Improvements on Sensor Noise Based Source Camera Identification
Proc. IEEE International Conference on Multimedia and Expo
2007, pp. 24-27
BibTeX@inproceedings{Sutcu2007a, author = {Sutcu, Y. and Bayram, S. and Sencar, H. T. and Memon, N.}, title = {Improvements on Sensor Noise Based Source Camera Identification}, booktitle = {Proc. IEEE International Conference on Multimedia and Expo}, year = {2007}, pages = {24--27}}
-
Tamper Detection Based on Regularity of Wavelet Transform Coefficients
IEEE International Conference on Image Processing
2007
BibTeX@inproceedings{Sutcu2007, author = {Sutcu, Yagiz and Coskun, Baris and Sencar, Husrev T. and Memon, Nasir}, title = {Tamper Detection Based on Regularity of Wavelet Transform Coefficients}, booktitle = {IEEE International Conference on Image Processing}, year = {2007}}
-
A Component Estimation Framework for Information Forensics
Proc. IEEE 9th Workshop Multimedia Signal Processing MMSP 2007
2007, pp. 397-400
BibTeX@inproceedings{Swaminathan2007, author = {Swaminathan, Ashwin and Min Wu and Liu, K. J. R.}, title = {A Component Estimation Framework for Information Forensics}, booktitle = {Proc. IEEE 9th Workshop Multimedia Signal Processing MMSP 2007}, year = {2007}, pages = {397--400}}
-
Nonintrusive Component Forensics of Visual Sensors Using Output Images
IEEE Transactions on Information Forensics and Security, 2007, Vol. 2(1), pp. 91-106
BibTeX@article{Swaminathan2007b, author = {Swaminathan, Ashwin and Min Wu and K. J. Ray Liu}, title = {Nonintrusive Component Forensics of Visual Sensors Using Output Images}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2007}, volume = {2}, number = {1}, pages = {91--106}}
-
Intrinsic Fingerprints for Image Authentication and Steganalysis
SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents
2007
BibTeX@inproceedings{Swaminathan2007d, author = {Swaminathan, Ashwin and Wu, Min and Liu, K. J. Ray}, title = {Intrinsic Fingerprints for Image Authentication and Steganalysis}, booktitle = {SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents}, year = {2007}}
-
Optimization of Input Pattern for Semi Non-Intrusive Component Forensics of Digital Cameras
IEEE International Conference on Acoustics, Speech and Signal Processing
2007, pp. 225-228
BibTeX@inproceedings{Swaminathan2007e, author = {Swaminathan, Ashwin and Wu, Min and Liu, K. J. Ray}, title = {Optimization of Input Pattern for Semi Non-Intrusive Component Forensics of Digital Cameras}, booktitle = {IEEE International Conference on Acoustics, Speech and Signal Processing}, year = {2007}, pages = {225-228}}
-
Transform Coder Classification for Digital Image Forensics
Proc. IEEE Int. Conf. Image Processing ICIP 2007
2007, Vol. 6
BibTeX@inproceedings{Tjoa2007a, author = {Tjoa, S. and Lin, W. S. and Liu, K. J. R.}, title = {Transform Coder Classification for Digital Image Forensics}, booktitle = {Proc. IEEE Int. Conf. Image Processing ICIP 2007}, year = {2007}, volume = {6}}
-
Block Size Forensic Analysis in Digital Images
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2007
2007, Vol. 1
BibTeX@inproceedings{Tjoa2007, author = {Tjoa, S. and Lin, W. S. and Zhao, H. V. and Liu, K. J. R.}, title = {Block Size Forensic Analysis in Digital Images}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2007}, year = {2007}, volume = {1}}
-
Camera/Mobile Phone Source Identification for Digital Forensics
IEEE International Confernece on Acoustics, Speech, and Signal Processing
2007, Vol. 2, pp. II-221-II-224
BibTeX@inproceedings{Tsai2007, author = {Tsai, Min-Jen and Lai, Cheng-Liang and Liu, Jung}, title = {Camera/Mobile Phone Source Identification for Digital Forensics}, booktitle = {IEEE International Confernece on Acoustics, Speech, and Signal Processing}, year = {2007}, volume = {2}, pages = {II-221-II-224}}
-
Wavelet-based Light Reconstruction from a Single Image
CRV ´07: Proceedings of the Fourth Canadian Conference on Computer and Robot Vision
IEEE Computer Society, 2007, pp. 305-312
BibTeX@inproceedings{Upright2007, author = {Upright, Cameron and Cobzas, Dana and Jagersand, Martin}, title = {Wavelet-based Light Reconstruction from a Single Image}, booktitle = {CRV ´07: Proceedings of the Fourth Canadian Conference on Computer and Robot Vision}, publisher = {IEEE Computer Society}, year = {2007}, pages = {305--312}}
-
Identifying Source Cell Phone using Chromatic Aberration
Sampat, N., DiCarlo, J. M. & Martin, R. A. (ed.)
Proc. IEEE International Conference on Multimedia and Expo
Digital Photography II, SPIE, 2007, Vol. 6069(1), pp. 883-886
BibTeX@inproceedings{Van2007, author = {Lanh Tran Van and Emmanuel, S. and Kankanhalli, M. S.}, title = {Identifying Source Cell Phone using Chromatic Aberration}, booktitle = {Proc. IEEE International Conference on Multimedia and Expo}, journal = {Digital Photography II}, publisher = {SPIE}, year = {2007}, volume = {6069}, number = {1}, pages = {883--886}}
-
Exposing Digital Forgeries in Interlaced and Deinterlaced Video
IEEE Transactions on Information Forensics and Security, 2007, Vol. 2(3), pp. 438-449
BibTeX@article{Wang2007, author = {Weihong Wang and Farid, H.}, title = {Exposing Digital Forgeries in Interlaced and Deinterlaced Video}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2007}, volume = {2}, number = {3}, pages = {438--449}}
-
Exposing Digital Forgeries in Video by Detecting Duplication
ACM Multimedia and Security Workshop
2007, pp. 35-42
BibTeX@inproceedings{Wang2007b, author = {Wang, Weihong and Farid, Hany}, title = {Exposing Digital Forgeries in Video by Detecting Duplication}, booktitle = {ACM Multimedia and Security Workshop}, year = {2007}, pages = {35-42}}
-
Detecting Digital Image Forgeries by Measuring Inconsistencies of Blocking Artifact
Proc. IEEE International Conference on Multimedia and Expo
2007, Vol. EUPISCO, pp. 12-15
BibTeX@inproceedings{Ye2007, author = {Ye, Shuiming and Sun, Qibin and Chang, Ee-Chien}, title = {Detecting Digital Image Forgeries by Measuring Inconsistencies of Blocking Artifact}, booktitle = {Proc. IEEE International Conference on Multimedia and Expo}, year = {2007}, volume = {EUPISCO}, pages = {12--15}}
-
Detecting Digital Image Forgeries Through Weighted Local Entropy
Proc. IEEE International Symposium on Signal Processing and Information Technology
2007, pp. 62-67
BibTeX@inproceedings{Zhang2007, author = {Zhang, Chi and Zhang, Hongbin}, title = {Detecting Digital Image Forgeries Through Weighted Local Entropy}, booktitle = {Proc. IEEE International Symposium on Signal Processing and Information Technology}, year = {2007}, pages = {62--67}}
-
Blur Detection of Digital Forgery Using Mathematical Morphology
Nguyen, N., Grzech, A., Howlett, R. & Jain, L. (ed.)
Agent and Multi-Agent Systems: Technologies and Applications
Springer Berlin Heidelberg, 2007, Vol. 4496, pp. 990-998
BibTeX@incollection{Zhou2007a, author = {Zhou, Linna and Wang, Dongming and Guo, Yunbiao and Zhang, Jingfei}, title = {Blur Detection of Digital Forgery Using Mathematical Morphology}, booktitle = {Agent and Multi-Agent Systems: Technologies and Applications}, publisher = {Springer Berlin Heidelberg}, year = {2007}, volume = {4496}, pages = {990-998}}
-
Blur Detection of Digital Forgery Using Mathematical Morphology
KES-AMSTA ´07: Proceedings of the 1st KES International Symposium on Agent and Multi-Agent Systems
Springer-Verlag, 2007, pp. 990-998
BibTeX@inproceedings{Zhou2007, author = {Zhou, Linna and Wang, Dongming and Guo, Yunbiao and Zhang, Jingfei}, title = {Blur Detection of Digital Forgery Using Mathematical Morphology}, booktitle = {KES-AMSTA ´07: Proceedings of the 1st KES International Symposium on Agent and Multi-Agent Systems}, publisher = {Springer-Verlag}, year = {2007}, pages = {990--998}}
2006
-
Algorithm Theoretical Basis Document for Decorrelation Stretch
Jet Propulsion Laboratory 4800 Oak Grove Drive Pasadena, CA 91109, 2006
BibTeX@techreport{Alley2006, author = {Ronald E. Alley}, title = {Algorithm Theoretical Basis Document for Decorrelation Stretch}, year = {2006}}
-
Image manipulation detection
Journal of Electronic Imaging, SPIE, 2006, Vol. 15(4), pp. 041102
BibTeX@article{Bayram2006a, author = {Bayram, Sevinc and Avcıbaş, İsmail and Sankur, Bülent and Memon, Nasir}, title = {Image manipulation detection}, journal = {Journal of Electronic Imaging}, publisher = {SPIE}, year = {2006}, volume = {15}, number = {4}, pages = {041102}}
-
Improvements on source camera-model identification based on CFA interpolation
Proc. of the WG 11.9 Intl. Conf. on Digital Forensics
Proc. of the WG 11.9 Intl. Conf. on Digital Forensics, 2006
BibTeX@inproceedings{Bayram2006, author = {Sevinç Bayram and Husrev T. Sencar and Nasir D. Memon}, title = {Improvements on source camera-model identification based on CFA interpolation}, booktitle = {Proc. of the WG 11.9 Intl. Conf. on Digital Forensics}, journal = {Proc. of the WG 11.9 Intl. Conf. on Digital Forensics}, year = {2006}}
-
Experimentations with source camera identification and Online Social Networks
Journal of Ambient Intelligence and Humanized Computing, Springer Berlin / Heidelberg, 2006, Vol. -, pp. 1-10
BibTeX@article{Castiglione, author = {Castiglione, Aniello and Cattaneo, Giuseppe and Cembalo, Maurizio and Ferraro Petrillo, Umberto}, title = {Experimentations with source camera identification and Online Social Networks}, journal = {Journal of Ambient Intelligence and Humanized Computing}, publisher = {Springer Berlin / Heidelberg}, year = {2006}, volume = {-}, pages = {1-10}}
-
Source Cell-phone Identification
Proc. IEEE 14th Signal Processing and Communications Applications
2006, pp. 1-3
BibTeX@inproceedings{Celiktutan2006, author = {Celiktutan, O. and Avcibas, I. and Sankur, B. and Ayerden, N. P. and Capar, C. }, title = {Source Cell-phone Identification}, booktitle = {Proc. IEEE 14th Signal Processing and Communications Applications}, year = {2006}, pages = {1--3}}
-
Source camera identification using footprints from lens aberration
Sampat, N., DiCarlo, J. M. & Martin, R. A. (ed.)
Proc. SPIE
Digital Photography II, SPIE, 2006, Vol. 6069(1), pp. 60690J
BibTeX@inproceedings{Choi2006, author = {Kai San Choi and Edmund Y. Lam and Kenneth K. Y. Wong}, title = {Source camera identification using footprints from lens aberration}, booktitle = {Proc. SPIE}, journal = {Digital Photography II}, publisher = {SPIE}, year = {2006}, volume = {6069}, number = {1}, pages = {60690J}}
-
Source Camera Identification by JPEG Compression Statistics for Image Forensics
IEEE Region 10 Conference (TENCON 2006)
2006
BibTeX@inproceedings{Choi2006a, author = {Choi, Kai San and Lam, Edmund Y. and Wong, Kenneth K. Y.}, title = {Source Camera Identification by JPEG Compression Statistics for Image Forensics}, booktitle = {IEEE Region 10 Conference (TENCON 2006)}, year = {2006}}
-
Automatic Source Camera Identification using Intrinsic Lens Radial Distortion
Optics Express, 2006, Vol. 14(24), pp. 11551-11565
BibTeX@article{Choi2006c, author = {Choi, Kai San and Lam, Edmund Y. and Wong, Kenneth K. Y.}, title = {Automatic Source Camera Identification using Intrinsic Lens Radial Distortion}, journal = {Optics Express}, year = {2006}, volume = {14}, number = {24}, pages = {11551-11565}}
-
Feature Selection in Source Camera Identification
IEEE International Conference on Systems, Man and Cybernetics
2006, pp. 3176-3180
BibTeX@inproceedings{Choi2006d, author = {Choi, Kai San and Lam, Edmund Y. and Wong, Kenneth K. Y.}, title = {Feature Selection in Source Camera Identification}, booktitle = {IEEE International Conference on Systems, Man and Cybernetics}, year = {2006}, pages = {3176-3180}}
-
Detection of forgery in digital video
The 10th World MultiConference on Systemics Cybernetics and Informatics
2006, Vol. V, pp. 229-233
BibTeX@inproceedings{De2006, author = {De, A. and Chadha, H. and Gupta, S.}, title = {Detection of forgery in digital video}, booktitle = {The 10th World MultiConference on Systemics Cybernetics and Informatics}, year = {2006}, volume = {V}, pages = {229--233}}
-
Digital Image Forensics for Identifying Computer Generated and Digital Camera Images
Proc. IEEE Int Image Processing Conf
2006, pp. 2313-2316
BibTeX@inproceedings{Dehnie2006, author = {Dehnie, S. and Sencar, T. and Memon, N. }, title = {Digital Image Forensics for Identifying Computer Generated and Digital Camera Images}, booktitle = {Proc. IEEE Int Image Processing Conf}, year = {2006}, pages = {2313--2316}}
-
Exposing digital forgeries in scientific images
MM&Sec ´06: Proceedings of the 8th workshop on Multimedia and security
ACM, 2006, pp. 29-36
BibTeX@inproceedings{Farid2006, author = {Farid, Hany}, title = {Exposing digital forgeries in scientific images}, booktitle = {MM&Sec ´06: Proceedings of the 8th workshop on Multimedia and security}, publisher = {ACM}, year = {2006}, pages = {29--36}}
-
Digital Image Ballistics from JPEG Quantization
Department of Computer Science, Dartmouth College, 2006(TR2006-583)
BibTeX@techreport{Farid2006a, author = {Farid, Hany}, title = {Digital Image Ballistics from JPEG Quantization}, year = {2006}, number = {TR2006-583}}
-
Digital Doctoring: How to tell the real from the fake
Significance, 2006, Vol. 3(4), pp. 162-166
BibTeX@article{Farid2006b, author = {Farid, Hany}, title = {Digital Doctoring: How to tell the real from the fake}, journal = {Significance}, year = {2006}, volume = {3}, number = {4}, pages = {162-166}}
-
Removing camera shake from a single photograph
SIGGRAPH ´06: ACM SIGGRAPH 2006 Papers
ACM, 2006, pp. 787-794
BibTeX@inproceedings{Fergus2006, author = {Fergus, Rob and Singh, Barun and Hertzmann, Aaron and Roweis, Sam T. and Freeman, William T.}, title = {Removing camera shake from a single photograph}, booktitle = {SIGGRAPH ´06: ACM SIGGRAPH 2006 Papers}, publisher = {ACM}, year = {2006}, pages = {787--794}}
-
Detection of Image Splicing Based on Hilbert-Huang Transform and Moments of Characteristic Functions with Wavelet Decomposition
Jeon, B. (ed.)
International Workshop on Digital Watermarking
2006, pp. 177-187
BibTeX@inproceedings{Fu2006, author = {Fu, Dongdong and Shi, Yun Qing and Su, Wei}, title = {Detection of Image Splicing Based on Hilbert-Huang Transform and Moments of Characteristic Functions with Wavelet Decomposition}, booktitle = {International Workshop on Digital Watermarking}, year = {2006}, pages = {177-187}}
-
Covariant Derivatives and Vision
Leonardis, A., Bischof, H. & Pinz, A. (ed.)
Computer Vision -- ECCV 2006
Springer Berlin Heidelberg, 2006, Vol. 3954, pp. 56-69
BibTeX@incollection{Georgiev2006, author = {Georgiev, Todor}, title = {Covariant Derivatives and Vision}, booktitle = {Computer Vision -- ECCV 2006}, publisher = {Springer Berlin Heidelberg}, year = {2006}, volume = {3954}, pages = {56-69}}
-
Digital Image Forgery Detection using Artificial Neural Network and Auto Regressive Coefficients
Proc. Canadian Conference on Electrical and Computer Engineering CCECE ´06
2006, pp. 194-197
BibTeX@inproceedings{Gopi2006, author = {Gopi, E. S. and Lakshmanan, N. and Gokul, T. and KumaraGanesh, S. and Shah, P. R.}, title = {Digital Image Forgery Detection using Artificial Neural Network and Auto Regressive Coefficients}, booktitle = {Proc. Canadian Conference on Electrical and Computer Engineering CCECE ´06}, year = {2006}, pages = {194--197}}
-
Random Walks for Image Segmentation
IEEE Trans. on Pattern Analysis and Machine Intelligence, 2006, Vol. 28(11), pp. 1768-1783
BibTeX@article{Grady2006, author = {Leo Grady}, title = {Random Walks for Image Segmentation}, journal = {IEEE Trans. on Pattern Analysis and Machine Intelligence}, year = {2006}, volume = {28}, number = {11}, pages = {1768--1783}}
-
Putting Objects in Perspective
Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition
2006, Vol. 2, pp. 2137-2144
BibTeX@inproceedings{Hoiem2006, author = {Hoiem, D. and Efros, A. A. and Hebert, M.}, title = {Putting Objects in Perspective}, booktitle = {Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition}, year = {2006}, volume = {2}, pages = {2137--2144}}
-
Detecting Image Splicing using Geometry Invariants and Camera Characteristics Consistency
Proc. IEEE Int Multimedia and Expo Conf
2006, pp. 549-552
BibTeX@inproceedings{Hsu2006, author = {Hsu, Y.-F. and Chang, S.-F. }, title = {Detecting Image Splicing using Geometry Invariants and Camera Characteristics Consistency}, booktitle = {Proc. IEEE Int Multimedia and Expo Conf}, year = {2006}, pages = {549--552}}
-
Characterization of digital image noise properties based on RAW data
Proc. SPIE 6059, Image Quality and System Performance III, 2006, Vol. 6059, pp. 60590A-60590A-12
BibTeX@article{Hytti2006, author = {Hytti, Heli T.}, title = {Characterization of digital image noise properties based on RAW data}, journal = {Proc. SPIE 6059, Image Quality and System Performance III}, year = {2006}, volume = {6059}, pages = {60590A-60590A-12}}
-
Exposing Digital Forgeries by Detecting Traces of Image Splicing
Proc. 8th Int Signal Processing Conf
2006, Vol. 2
BibTeX@inproceedings{Jing2006, author = {Jing, W. and Hongbin, Z. }, title = {Exposing Digital Forgeries by Detecting Traces of Image Splicing}, booktitle = {Proc. 8th Int Signal Processing Conf}, year = {2006}, volume = {2}}
-
Exposing digital forgeries through chromatic aberration
MM&Sec ´06: Proceedings of the 8th workshop on Multimedia and security
ACM, 2006, pp. 48-55
BibTeX@inproceedings{Johnson2006, author = {Johnson, Micah Kimo and Farid, Hany}, title = {Exposing digital forgeries through chromatic aberration}, booktitle = {MM&Sec ´06: Proceedings of the 8th workshop on Multimedia and security}, publisher = {ACM}, year = {2006}, pages = {48--55}}
-
Metric Measurements on a Plane from a Single Image
Department of Computer Science, Dartmouth College, 2006(TR2006-579)
BibTeX@techreport{Johnson2006a, author = {Johnson, Micah Kimo and Farid, Hany}, title = {Metric Measurements on a Plane from a Single Image}, year = {2006}, number = {TR2006-579}}
-
Exposing Digital Forgeries Through Chromatic Aberration
ACM Multimedia and Security Workshop
2006, pp. 48-55
BibTeX@inproceedings{Johnson2006b, author = {Johnson, Micah Kimo and Farid, Hany}, title = {Exposing Digital Forgeries Through Chromatic Aberration}, booktitle = {ACM Multimedia and Security Workshop}, year = {2006}, pages = {48-55}}
-
Detecting Doctored JPEG Images Via DCT Coefficient Analysis
Lecture Notes in Computer Science, 2006, Vol. 3953/2006, pp. 423-435
BibTeX@article{JunfengHe2006, author = {Junfeng He, Zhouchen Lin, Lifeng Wang and Xiaoou Tang}, title = {Detecting Doctored JPEG Images Via DCT Coefficient Analysis}, journal = {Lecture Notes in Computer Science}, year = {2006}, volume = {3953/2006}, pages = {423-435}}
-
A survey of forensic characterization methods for physical devices
Digital Investigation, 2006, Vol. 3(Supplement 1), pp. 17 - 28
BibTeX@article{Khanna2006, author = {Nitin Khanna and Aravind K. Mikkilineni and Anthony F. Martone and Gazi N. Ali and George T.-C. Chiu and Jan P. Allebach and Edward J. Delp}, title = {A survey of forensic characterization methods for physical devices}, journal = {Digital Investigation}, year = {2006}, volume = {3}, number = {Supplement 1}, pages = {17 - 28}}
-
An Efficient Match-based Duplication Detection Algorithm
Canadian Conference on Computer and Robot Vision
2006
BibTeX@inproceedings{Langille2006, author = {Langille, Aaron and Gong, Minglun}, title = {An Efficient Match-based Duplication Detection Algorithm}, booktitle = {Canadian Conference on Computer and Robot Vision}, year = {2006}}
-
Detecting False Captioning Using Common Sense Reasoning
Digital Investigation, 2006, Vol. 3(Supplement 1), pp. 65-70
BibTeX@article{Lee2006, author = {Lee, Sangwon and Shamma, David A. and Gooch, Bruce}, title = {Detecting False Captioning Using Common Sense Reasoning}, journal = {Digital Investigation}, year = {2006}, volume = {3}, number = {Supplement 1}, pages = {65-70}}
-
Noise Estimation from a Single Image
Proc. IEEE Computer Society Conference on Computer Vision and Pattern Recognition
2006, Vol. 1, pp. 901-908
BibTeX@inproceedings{Liu2006, author = {Liu, Ce and Freeman, W. T. and Szeliski, R. and Kang, Sing Bing}, title = {Noise Estimation from a Single Image}, booktitle = {Proc. IEEE Computer Society Conference on Computer Vision and Pattern Recognition}, year = {2006}, volume = {1}, pages = {901--908}}
-
Image Based Source Camera Identification using Demosaicking
Proc. IEEE 8th Workshop on Multimedia Signal Processing
2006, pp. 419-424
BibTeX@inproceedings{Long2006, author = {Yangjing Long and Yizhen Huang}, title = {Image Based Source Camera Identification using Demosaicking}, booktitle = {Proc. IEEE 8th Workshop on Multimedia Signal Processing}, year = {2006}, pages = {419--424}}
-
Blind Fake Image Detection Scheme Using SVD
IEICE Transactions on Communications (Institute of Electronics, Information and Communication Engineers), 2006, Vol. E89-B, pp. 1726-1728
BibTeX@article{Lu2006, author = {Lu, Wei and Chung, Fu-Lai and Lu, Hongtao}, title = {Blind Fake Image Detection Scheme Using SVD}, journal = {IEICE Transactions on Communications (Institute of Electronics, Information and Communication Engineers)}, year = {2006}, volume = {E89-B}, pages = {1726-1728}}
-
Blind fake image detection scheme using SVD
IEICE TRANS. COMMUN, 2006, Vol. E89-B(5), pp. 1726-1728
BibTeX@article{Lu2006a, author = {Lu, Wei and Chung, Fu-lai and Lu, Hongtao}, title = {Blind fake image detection scheme using SVD}, journal = {IEICE TRANS. COMMUN}, year = {2006}, volume = {E89-B}, number = {5}, pages = {1726-1728}}
-
Detecting Digital Image Forgeries Using Sensor Pattern Noise
Delp, E. J. & Wong, P. W. (ed.)
SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents
2006, Vol. 6072
BibTeX@inproceedings{Lukas2006b, author = {Lukáš, Jan and Fridrich, Jessica and Goljan, Miroslav}, title = {Detecting Digital Image Forgeries Using Sensor Pattern Noise}, booktitle = {SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents}, year = {2006}, volume = {6072}}
-
Digital camera identification from sensor pattern noise
IEEE Transactions on Information Forensics and Security, 2006, Vol. 1(2), pp. 205-214
BibTeX@article{Lukas2006, author = {Lukáš, J. and Fridrich, J. and Goljan, M.}, title = {Digital camera identification from sensor pattern noise}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2006}, volume = {1}, number = {2}, pages = {205--214}}
-
Fast Wavelet Image Denoising Based on Local Variance and Edge Analysis
International Journal of Intelligent Technology, 2006, Vol. 1(2), pp. 165-175
BibTeX@article{Luo2006a, author = {Gaoyong Luo}, title = {Fast Wavelet Image Denoising Based on Local Variance and Edge Analysis}, journal = {International Journal of Intelligent Technology}, year = {2006}, volume = {1}, number = {2}, pages = {165--175}}
-
Robust Detection of Region-Duplication Forgery in Digital Image
Pattern Recognition, International Conference on, IEEE Computer Society, 2006, Vol. 4, pp. 746-749
BibTeX@article{Luo2006, author = {Weiqi Luo and Jiwu Huang and Guoping Qiu}, title = {Robust Detection of Region-Duplication Forgery in Digital Image}, journal = {Pattern Recognition, International Conference on}, publisher = {IEEE Computer Society}, year = {2006}, volume = {4}, pages = {746-749}}
-
Forensics of Things
IEEE Southwest Symposium on Image Analysis and Interpretation
2006, pp. 149-152
BibTeX@inproceedings{Martone2006, author = {Martone, Anthony F. and Mikkilineni, Aravind K. and Delp, Edward J.}, title = {Forensics of Things}, booktitle = {IEEE Southwest Symposium on Image Analysis and Interpretation}, year = {2006}, pages = {149-152}}
-
JPEG compression history estimation for color images
IEEE Transactions on Image Processing, 2006, Vol. 15(6), pp. 1365-1378
BibTeX@article{Neelamani2006, author = {Neelamani, R. and de Queiroz, R. and Fan, Zhigang and Dash, S. and Baraniuk, R. G.}, title = {JPEG compression history estimation for color images}, journal = {IEEE Transactions on Image Processing}, year = {2006}, volume = {15}, number = {6}, pages = {1365--1378}}
-
An Online System for Classifying Computer Graphics Images from Natural Photographs
SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents
2006
BibTeX@inproceedings{Ng2006a, author = {Ng, Tian-Tsong and Chang, Shih-Fu}, title = {An Online System for Classifying Computer Graphics Images from Natural Photographs}, booktitle = {SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents}, year = {2006}}
-
Passive-blind Image Forensics
In Multimedia Security Technologies for Digital Rights
2006
BibTeX@inproceedings{Ng2006, author = {Ng, Tian-tsong and Chang, Shih-fu and Lin, Ching-yung and Sun, Qibin}, title = {Passive-blind Image Forensics}, booktitle = {In Multimedia Security Technologies for Digital Rights}, year = {2006}}
-
Multimedia Security Technologies for Digital Rights
Chapter Passive-Blind Image Forensics
Elsevier, 2006, pp. 383-412
BibTeX@inbook{Ng2006b, author = {Ng, Tian-Tsong and Chang, Shih-Fu and Lin, Ching-Yung and Sun, Qibin}, title = {Multimedia Security Technologies for Digital Rights}, publisher = {Elsevier}, year = {2006}, pages = {383-412}}
-
On Resampling Detection and its Application to Detect Image Tampering
Proc. IEEE International Conference on Multimedia and Expo
2006, pp. 1325-1328
BibTeX@inproceedings{Prasad2006, author = {Prasad, S. and Ramakrishnan, K. R.}, title = {On Resampling Detection and its Application to Detect Image Tampering}, booktitle = {Proc. IEEE International Conference on Multimedia and Expo}, year = {2006}, pages = {1325--1328}}
-
Is it Fake or Real?
Brazilian Symposium of Computer Graphics and Image Processing
2006
BibTeX@inproceedings{Rocha2006, author = {Rocha, Anderson and Goldenstein, Siome}, title = {Is it Fake or Real?}, booktitle = {Brazilian Symposium of Computer Graphics and Image Processing}, year = {2006}}
-
Automatic source camera identification using the intrinsic lens radial distortion
Optics Express, 2006, Vol. 14(14), pp. 11551-11565
BibTeX@article{San2006, author = {Choi Kai San and Lam, Edmund Y. and Wong, Kenneth K. Y.}, title = {Automatic source camera identification using the intrinsic lens radial distortion}, journal = {Optics Express}, year = {2006}, volume = {14}, number = {14}, pages = {11551-11565}}
-
Image Tampering Identification using Blind Deconvolution
Proc. IEEE Int Image Processing Conf
2006, pp. 2309-2312
BibTeX@inproceedings{Swaminathan2006, author = {Swaminathan, Ashwin and Min Wu and Liu, K. J. R.}, title = {Image Tampering Identification using Blind Deconvolution}, booktitle = {Proc. IEEE Int Image Processing Conf}, year = {2006}, pages = {2309--2312}}
-
Non-Intrusive Forensic Analysis of Visual Sensors Using Output Images
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2008
2006, Vol. 5
BibTeX@inproceedings{Swaminathan2006a, author = {Swaminathan, Ashwin and Min Wu and Liu, K. J. R.}, title = {Non-Intrusive Forensic Analysis of Visual Sensors Using Output Images}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2008}, year = {2006}, volume = {5}}
-
Component Forensics of Digital Cameras: A Non-Intrusive Approach
Proc. 40th Annual Conf. Information Sciences and Systems
2006, pp. 1194-1199
BibTeX@inproceedings{Swaminathan2006c, author = {Swaminathan, Ashwin and Wu, M. and Liu, K. J. R.}, title = {Component Forensics of Digital Cameras: A Non-Intrusive Approach}, booktitle = {Proc. 40th Annual Conf. Information Sciences and Systems}, year = {2006}, pages = {1194--1199}}
-
Using Image Features to Identify Camera Sources
IEEE International Conference on Acoustics, Speech, and Signal Processing
2006, Vol. 2
BibTeX@inproceedings{Tsai2006, author = {Tsai, Min-Jen and Wu, Guan-Hui}, title = {Using Image Features to Identify Camera Sources}, booktitle = {IEEE International Conference on Acoustics, Speech, and Signal Processing}, year = {2006}, volume = {2}}
-
Three dimensional reconstruction of structured scenes based on vanishing points
Proceedings of the 7th Pacific Rim conference on Advances in Multimedia Information Processing
Springer-Verlag, 2006, pp. 935-942
BibTeX@inproceedings{Wang2006a, author = {Wang, Guanghui and Wang, Shewei and Gao, Xiang and Li, Yubing}, title = {Three dimensional reconstruction of structured scenes based on vanishing points}, booktitle = {Proceedings of the 7th Pacific Rim conference on Advances in Multimedia Information Processing}, publisher = {Springer-Verlag}, year = {2006}, pages = {935--942}}
-
Exposing Digital Forgeries in Video by Detecting Double MPEG Compression
ACM Multimedia and Security Workshop
2006, pp. 37-47
BibTeX@inproceedings{Wang2006d, author = {Wang, Weihong and Farid, Hany}, title = {Exposing Digital Forgeries in Video by Detecting Double MPEG Compression}, booktitle = {ACM Multimedia and Security Workshop}, year = {2006}, pages = {37-47}}
-
On Discrimination between Photorealistic and Photographic Images
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2006
2006, Vol. 2, pp. II
BibTeX@inproceedings{Wang2006, author = {Wang, Ying and Moulin, P.}, title = {On Discrimination between Photorealistic and Photographic Images}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2006}, year = {2006}, volume = {2}, pages = {II}}
-
Detecting Differences Between Photographs and Computer Generated Images
International Conference on Signal Processing, Pattern Recognition, and Applications
2006, pp. 268-273
BibTeX@inproceedings{Wu2006, author = {Wu, Jie and Kamath, Markad V. and Poehlman, Skip}, title = {Detecting Differences Between Photographs and Computer Generated Images}, booktitle = {International Conference on Signal Processing, Pattern Recognition, and Applications}, year = {2006}, pages = {268-273}}
-
Resampling Detection in Information Forensics
Journal of Computer Applications, 2006, Vol. 26(11), pp. 2596-2597
BibTeX@article{Zhu2006, author = {Zhu, Xiu Ming and Xuan, Guo Rong and Yao, Qiu Ming and Tong, Xue Feng and Shi, Yun Qing}, title = {Resampling Detection in Information Forensics}, journal = {Journal of Computer Applications}, year = {2006}, volume = {26}, number = {11}, pages = {2596-2597}}
2005
-
Image Processing
Wiley-Interscience, 2005
BibTeX@book{Acharya2005, author = {Acharya, Tinku and Ray, Ajoy K}, title = {Image Processing}, publisher = {Wiley-Interscience}, year = {2005}}
-
A new method for vanishing points detection in 3d reconstruction from a single view
Proceedings of the ISPRS Commission V, Citeseer, 2005, pp. 197-210
BibTeX@article{Aguilera2005, author = {Aguilera, DG and Lahoz, J.G. and Codes, J.F.}, title = {A new method for vanishing points detection in 3d reconstruction from a single view}, journal = {Proceedings of the ISPRS Commission V}, publisher = {Citeseer}, year = {2005}, pages = {197--210}}
-
Identification of Inkjet Printers for Forensic Applications
International Conference on Digital Printing Technologies
2005, pp. 235-238
BibTeX@inproceedings{Arslan2005, author = {Arslan, Osman and Kumontoy, Roy M. and Chiang, Pei-Ju and Mikkilineni, Aravind K. and Allebach, Jan P. and Chiu, George T.-C. and Delp, Edward J.}, title = {Identification of Inkjet Printers for Forensic Applications}, booktitle = {International Conference on Digital Printing Technologies}, year = {2005}, pages = {235-238}}
-
Image manipulation detection with binary similarity measures
Proc. European Signal Processing
2005
BibTeX@inproceedings{Bayram2005a, author = {Bayram, Sevinc and Avcıbaş, İsmail and Sankur, Bülent and Memon, Nasir}, title = {Image manipulation detection with binary similarity measures}, booktitle = {Proc. European Signal Processing}, year = {2005}}
-
Source camera identification based on CFA interpolation
Proc. IEEE International Conference on Image Processing ICIP 2005
2005, Vol. 3, pp. III-69-72
BibTeX@inproceedings{Bayram2005, author = {Bayram, S. and Sencar, H. and Memon, N. and Avcibas, I.}, title = {Source camera identification based on CFA interpolation}, booktitle = {Proc. IEEE International Conference on Image Processing ICIP 2005}, year = {2005}, volume = {3}, pages = {III--69-72}}
-
A non-local algorithm for image denoising
Proc. IEEE Computer Society Conference on Computer Vision and Pattern Recognition CVPR 2005
2005, Vol. 2, pp. 60-65 vol. 2
BibTeX@inproceedings{Buades2005, author = {Buades, A. and Coll, B. and Morel, J.-M. }, title = {A non-local algorithm for image denoising}, booktitle = {Proc. IEEE Computer Society Conference on Computer Vision and Pattern Recognition CVPR 2005}, year = {2005}, volume = {2}, pages = {60--65 vol. 2}}
-
Creating Realistic Shadows of Composited Objects
Proc. Seventh IEEE Workshops Application of Computer Vision WACV/MOTIONS ´05 Volume 1
2005, Vol. 1, pp. 294-299
BibTeX@inproceedings{Cao2005, author = {Xiaochun Cao and Shah, M. }, title = {Creating Realistic Shadows of Composited Objects}, booktitle = {Proc. Seventh IEEE Workshops Application of Computer Vision WACV/MOTIONS ´05 Volume 1}, year = {2005}, volume = {1}, pages = {294--299}}
-
Camera calibration and light source estimation from images with shadows
Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition CVPR 2005
2005, Vol. 2, pp. 918-923
BibTeX@inproceedings{Cao2005a, author = {Xiaochun Cao and Shah, M.}, title = {Camera calibration and light source estimation from images with shadows}, booktitle = {Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition CVPR 2005}, year = {2005}, volume = {2}, pages = {918--923}}
-
Distinguishing paintings from photographs
Computer Vision and Image Understanding, 2005, Vol. 100(3), pp. 249 - 273
BibTeX@article{Cutzu2005, author = {Florin Cutzu and Riad Hammoud and Alex Leykin}, title = {Distinguishing paintings from photographs}, journal = {Computer Vision and Image Understanding}, year = {2005}, volume = {100}, number = {3}, pages = {249 - 273}}
-
Detection of linear and cubic interpolation in JPEG compressed images
Proc. 2nd Canadian Conference on Computer and Robot Vision
2005, pp. 65-72
BibTeX@inproceedings{Gallagher2005, author = {Gallagher, A. C.}, title = {Detection of linear and cubic interpolation in JPEG compressed images}, booktitle = {Proc. 2nd Canadian Conference on Computer and Robot Vision}, year = {2005}, pages = {65--72}}
-
A universal noise removal algorithm with an impulse detector
IEEE Transactions on Image Processing, 2005, Vol. 14(11), pp. 1747-1754
BibTeX@article{Garnett2005, author = {R. Garnett and Huegerich, T. and Chui, C. and Wenjie He}, title = {A universal noise removal algorithm with an impulse detector}, journal = {IEEE Transactions on Image Processing}, year = {2005}, volume = {14}, number = {11}, pages = {1747--1754}}
-
Image reconstruction invariant to relighting
Eurographics 2005
2005, pp. 61-64
BibTeX@inproceedings{Georgiev2005, author = {Georgiev, Todor}, title = {Image reconstruction invariant to relighting}, booktitle = {Eurographics 2005}, year = {2005}, pages = {61--64}}
-
Vision, healing brush, and fiber bundles
Proc. SPIE 5666, Human Vision and Electronic Imaging X
2005, Vol. 293
BibTeX@inproceedings{Georgiev2005a, author = {Todor Georgiev}, title = {Vision, healing brush, and fiber bundles}, booktitle = {Proc. SPIE 5666, Human Vision and Electronic Imaging X}, year = {2005}, volume = {293}}
-
Digital detectives reveal art forgeries
Computing in Science & Engineering, 2005, Vol. 7(2), pp. 5-8
BibTeX@article{Gorder2005, author = {Gorder, P. F.}, title = {Digital detectives reveal art forgeries}, journal = {Computing in Science & Engineering}, year = {2005}, volume = {7}, number = {2}, pages = {5--8}}
-
Random walks for interactive alpha-matting
IASTED International Conference on Visualization, Imaging and Image Processing - VIIP
CiteSeerX - Scientific Literature Digital Library and Search Engine [http://citeseerx.ist.psu.edu/oai2] (United States), ACTA Press, 2005
BibTeX@conference{Grady2005, author = {Leo Grady and Thomas Schiwietz and Shmuel Aharon and Imaging and Rüdiger Westermann}, title = {Random walks for interactive alpha-matting}, booktitle = {IASTED International Conference on Visualization, Imaging and Image Processing - VIIP}, publisher = {ACTA Press}, year = {2005}}
-
Automatic photo pop-up
ACM SIGGRAPH 2005 Papers
ACM, 2005, pp. 577-584
BibTeX@inproceedings{Hoiem2005, author = {Hoiem, Derek and Efros, Alexei A. and Hebert, Martial}, title = {Automatic photo pop-up}, booktitle = {ACM SIGGRAPH 2005 Papers}, publisher = {ACM}, year = {2005}, pages = {577--584}}
-
Digital Image Tampering Synthesis and Identification
-, 2005
BibTeX@phdthesis{Hsiao2005, author = {Dun-Yu Hsiao}, title = {Digital Image Tampering Synthesis and Identification}, school = {-}, year = {2005}}
-
Detecting Digital Tampering by Blur Estimation
International Workshop on Systematic Approaches to Digital Forensic Engineering
2005, pp. 264-278
BibTeX@inproceedings{Hsiao2005a, author = {Hsiao, Dun-Yu and Pei, Soo-Chang}, title = {Detecting Digital Tampering by Blur Estimation}, booktitle = {International Workshop on Systematic Approaches to Digital Forensic Engineering}, year = {2005}, pages = {264-278}}
-
Can Digital Image Forgery Detection be Unevadable? A Case Study: Color Filter Array Interpolation Statistical Feature Recovery
Li, S., Pereira, F., Shum, H.-Y. & Tescher, A. G. (ed.)
SPIE Conference on Visual Communications and Image Processing
2005, Vol. 5960
BibTeX@inproceedings{Huang2005, author = {Huang, Yizhen}, title = {Can Digital Image Forgery Detection be Unevadable? A Case Study: Color Filter Array Interpolation Statistical Feature Recovery}, booktitle = {SPIE Conference on Visual Communications and Image Processing}, year = {2005}, volume = {5960}}
-
Exposing Digital Forgeries by Detecting Inconsistencies in Lighting
ACM Multimedia and Security Workshop
2005, pp. 1-10
BibTeX@inproceedings{Johnson2005, author = {Johnson, Micah Kimo and Farid, Hany}, title = {Exposing Digital Forgeries by Detecting Inconsistencies in Lighting}, booktitle = {ACM Multimedia and Security Workshop}, year = {2005}, pages = {1-10}}
-
Elimination of color fringes in digital photographs caused by lateral chromatic aberration
Proceedings of the XX International Symposium CIPA
2005, Vol. 26, pp. 403-408
BibTeX@inproceedings{Kaufmann2005, author = {Kaufmann, Viktor and Ladstädter, Richard}, title = {Elimination of color fringes in digital photographs caused by lateral chromatic aberration}, booktitle = {Proceedings of the XX International Symposium CIPA}, year = {2005}, volume = {26}, pages = {403--408}}
-
Image reconstruction in SNR units: a general method for SNR measurement.
Magn Reson Med, Laboratory of Cardiac Energetics, National Heart, Lung and Blood Institute, National Institutes of Health, DHHS, Bethesda, Maryland 20892-1061, USA. kellman@nih.gov, 2005, Vol. 54(6), pp. 1439-1447
BibTeX@article{Kellman2005, author = {Peter Kellman and Elliot R McVeigh}, title = {Image reconstruction in SNR units: a general method for SNR measurement.}, journal = {Magn Reson Med}, year = {2005}, volume = {54}, number = {6}, pages = {1439--1447}}
-
A practical single image based approach for estimating illumination distribution from shadows
Proc. Tenth IEEE Int. Conf. Computer Vision ICCV 2005
2005, Vol. 1, pp. 266-271
BibTeX@inproceedings{Kim2005, author = {Taeone Kim and Ki-Sang Hong}, title = {A practical single image based approach for estimating illumination distribution from shadows}, booktitle = {Proc. Tenth IEEE Int. Conf. Computer Vision ICCV 2005}, year = {2005}, volume = {1}, pages = {266--271}}
-
Determining the radiometric response function from a single grayscale image
Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition CVPR 2005
2005, Vol. 2, pp. 66-73
BibTeX@inproceedings{Lin2005a, author = {Lin, S. and Zhang, L.}, title = {Determining the radiometric response function from a single grayscale image}, booktitle = {Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition CVPR 2005}, year = {2005}, volume = {2}, pages = {66--73}}
-
Detecting Doctored Images Using Camera Response Normality and Consistency
CVPR ´05: Proceedings of the 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR´05) - Volume 1
IEEE Computer Society, 2005, pp. 1087-1092
BibTeX@inproceedings{Lin2005, author = {Lin, Zhouchen and Wang, Rongrong and Tang, Xiaoou and Shum, Heung-Yeung}, title = {Detecting Doctored Images Using Camera Response Normality and Consistency}, booktitle = {CVPR ´05: Proceedings of the 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR´05) - Volume 1}, publisher = {IEEE Computer Society}, year = {2005}, pages = {1087--1092}}
-
A new CFA interpolation framework
Signal Processing, 2005, Vol. 86, pp. 1559-1579
BibTeX@article{Lukac2005, author = {Lukac, Rastislav and Plataniotis, Konstantinos N. and Hatzinakos, Dimitrios and Aleksic, Marko}, title = {A new CFA interpolation framework}, journal = {Signal Processing}, year = {2005}, volume = {86}, pages = {1559-1579}}
-
Determining digital image origin using sensor imperfections
Said, A. & Apostolopoulos, J. G. (ed.)
Proceedings of the SPIE
Image and Video Communications and Processing 2005, SPIE, 2005, Vol. 5685(1), pp. 249-260
BibTeX@conference{Lukas2005a, author = {Jan Lukáš and Jessica Fridrich and Miroslav Goljan}, title = {Determining digital image origin using sensor imperfections}, booktitle = {Proceedings of the SPIE}, journal = {Image and Video Communications and Processing 2005}, publisher = {SPIE}, year = {2005}, volume = {5685}, number = {1}, pages = {249-260}}
-
Digital "bullet scratches" for images
Proc. IEEE International Conference on Image Processing ICIP 2005
2005, Vol. 3, pp. III-65-8
BibTeX@inproceedings{Lukas2005, author = {Jan Lukáš and Fridrich, J. and Goljan, M.}, title = {Digital "bullet scratches" for images}, booktitle = {Proc. IEEE International Conference on Image Processing ICIP 2005}, year = {2005}, volume = {3}, pages = {III--65-8}}
-
Natural Image Statistics for Digital Image Forensics
Department of Computer Science, Dartmouth College, 2005
BibTeX@phdthesis{Lyu2005a, author = {Lyu, Siwei}, title = {Natural Image Statistics for Digital Image Forensics}, school = {Department of Computer Science, Dartmouth College}, year = {2005}}
-
How Realistic is Photorealistic?
IEEE Transactions on Signal Processing, 2005, Vol. 53(2), pp. 845-850
BibTeX@article{Lyu2005, author = {Lyu, Siwei and Farid, Hany}, title = {How Realistic is Photorealistic?}, journal = {IEEE Transactions on Signal Processing}, year = {2005}, volume = {53}, number = {2}, pages = {845-850}}
-
Printer Forensics Using SVM Techniques
International Conference on Digital Printing Technologies
2005, pp. 223-226
BibTeX@inproceedings{Mikkilineni2005a, author = {Mikkilineni, Aravind K. and Arslan, Osman and Chiang, Pei-Ju and Kumontoy, Roy M. and Allebach, Jan P. and Chiu, George T.-C. and Delp, Edward J.}, title = {Printer Forensics Using SVM Techniques}, booktitle = {International Conference on Digital Printing Technologies}, year = {2005}, pages = {223-226}}
-
Printer identification based on graylevel co-occurrence features for security and forensic applications
III, E. J. D. & Wong, P. W. (ed.)
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII
Security, Steganography, and Watermarking of Multimedia Contents VII, SPIE, 2005, Vol. 5681(1), pp. 430-440
BibTeX@conference{Mikkilineni2005, author = {Aravind K. Mikkilineni and Pei-Ju Chiang and Gazi N. Ali and George T. C. Chiu and Jan P. Allebach and Edward J. Delp III}, title = {Printer identification based on graylevel co-occurrence features for security and forensic applications}, booktitle = {Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII}, journal = {Security, Steganography, and Watermarking of Multimedia Contents VII}, publisher = {SPIE}, year = {2005}, volume = {5681}, number = {1}, pages = {430-440}}
-
Columbia Photographic Images and Photorealistic Computer Graphics Dataset
ADVENT Technical Report, 203-2004-3, Columbia University, 2005
BibTeX@techreport{Ng2005, author = {Ng, Tian-Tsong and Chang, Shih-Fu and Hsu, Yu-Feng and Pepeljugoski, Martin}, title = {Columbia Photographic Images and Photorealistic Computer Graphics Dataset}, year = {2005}}
-
Physics-motivated Features for Distinguishing Photographic Images and Computer Graphics
ACM Multimedia
2005
BibTeX@inproceedings{Ng2005a, author = {Ng, Tian-Tsong and Chang, Shih-Fu and Hsu, Yu-Feng and Xie, Lexing and Tsui, Mao-Pei}, title = {Physics-motivated Features for Distinguishing Photographic Images and Computer Graphics}, booktitle = {ACM Multimedia}, year = {2005}}
-
Forensic Analysis of Digital Image Tampering
Advances in Digital Forensics, 2005, Vol. 194, pp. 259-270
BibTeX@article{Peterson2005, author = {Peterson, Gilbert}, title = {Forensic Analysis of Digital Image Tampering}, journal = {Advances in Digital Forensics}, year = {2005}, volume = {194}, pages = {259--270}}
-
Statistical Tools for Digital Forensics
Lecture Notes in Computer Science, 2005, Vol. 3200/2005, pp. 128-147
BibTeX@article{Popescu2004a, author = {Popescu, Alin C. and Farid, Hany}, title = {Statistical Tools for Digital Forensics}, journal = {Lecture Notes in Computer Science}, year = {2005}, volume = {3200/2005}, pages = {128-147}}
-
Exposing digital forgeries in color filter array interpolated images
IEEE Transactions on Signal Processing, 2005, Vol. 53(10), pp. 3948-3959
BibTeX@article{Popescu2005, author = {Popescu, Alin C. and Farid, Hany}, title = {Exposing digital forgeries in color filter array interpolated images}, journal = {IEEE Transactions on Signal Processing}, year = {2005}, volume = {53}, number = {10}, pages = {3948--3959}}
-
Exposing digital forgeries by detecting traces of resampling
IEEE Transactions on Signal Processing, 2005, Vol. 53(2), pp. 758-767
BibTeX@article{Popescu2005b, author = {Popescu, Alin C. and Farid, Hany}, title = {Exposing digital forgeries by detecting traces of resampling}, journal = {IEEE Transactions on Signal Processing}, year = {2005}, volume = {53}, number = {2}, pages = {758--767}}
-
Digital image reconstruction: Deblurring and denoising
Annu. Rev. Astron. Astrophys., 2005, Vol. 43, pp. 139-94
BibTeX@article{Puettner2005, author = {R.C. Puetter and T.R. Gosnell and Amos Yahil}, title = {Digital image reconstruction: Deblurring and denoising}, journal = {Annu. Rev. Astron. Astrophys.}, year = {2005}, volume = {43}, pages = {139--94}}
-
Robust estimation approach for blind denoising
IEEE Transactions on Image Processing, 2005, Vol. 14(11), pp. 1755-1765
BibTeX@article{Rabie2005, author = {Rabie, T.}, title = {Robust estimation approach for blind denoising}, journal = {IEEE Transactions on Image Processing}, year = {2005}, volume = {14}, number = {11}, pages = {1755--1765}}
-
Characterizing and Estimating Block DCT Image Compression Quantization Parameters
Proc. Conf Signals, Systems and Computers Record of the Thirty-Ninth Asilomar Conf
2005, pp. 1230-1234
BibTeX@inproceedings{Samadani2005, author = {Samadani, R.}, title = {Characterizing and Estimating Block DCT Image Compression Quantization Parameters}, booktitle = {Proc. Conf Signals, Systems and Computers Record of the Thirty-Ninth Asilomar Conf}, year = {2005}, pages = {1230--1234}}
-
Digital image tamper detection tools
Forschungszentrum Karlsruhe, Germany, 2005
BibTeX@mastersthesis{Voruganti2005, author = {Voruganti, Arun Kumar Raj}, title = {Digital image tamper detection tools}, school = {Forschungszentrum Karlsruhe, Germany}, year = {2005}}
-
Single view metrology from scene constraints
Image Vision Comput., Butterworth-Heinemann, 2005, Vol. 23(9), pp. 831-840
BibTeX@article{Wang2005, author = {Wang, Guanghui and Hu, Zhanyi and Wu, Fuchao and Tsui, Hung-Tat}, title = {Single view metrology from scene constraints}, journal = {Image Vision Comput.}, publisher = {Butterworth-Heinemann}, year = {2005}, volume = {23}, number = {9}, pages = {831--840}}
2004
-
Application of principal components analysis and gaussian mixture models to printer identification
International Conference on Digital Printing Technologies
2004, pp. 301-305
BibTeX@inproceedings{Ali2004, author = {Ali, Gazi N. and Chiang, Pei-Ju and Mikkilineni, Aravind K. and Chiu, George T.-C. and Delp, Edward J. and Allebach, Jan P.}, title = {Application of principal components analysis and gaussian mixture models to printer identification}, booktitle = {International Conference on Digital Printing Technologies}, year = {2004}, pages = {301-305}}
-
Using Extended File Information (EXIF) File Headers in Digital Evidence Analysis
International Journal of Digital Evidence, 2004, Vol. 2(3), pp. 1-5
BibTeX@article{Alvarez2004, author = {Alvarez, Paul}, title = {Using Extended File Information (EXIF) File Headers in Digital Evidence Analysis}, journal = {International Journal of Digital Evidence}, year = {2004}, volume = {2}, number = {3}, pages = {1-5}}
-
On image denoising methods
Technical Note, CMLA (Centre de Mathematiques et de Leurs Applications, 2004
BibTeX@techreport{AntoniBuades2004, author = {Antoni Buades, Bartomeu Coll, Jean Michel Morel}, title = {On image denoising methods}, year = {2004}}
-
A classifier design for detecting image manipulations
Proc. International Conference on Image Processing ICIP ´04
2004, Vol. 4, pp. 2645-2648 Vol. 4
BibTeX@inproceedings{Avcibas2004, author = {Avcibas, I. and Bayram, S. and Memon, N. and Ramkumar, M. and Sankur, B.}, title = {A classifier design for detecting image manipulations}, booktitle = {Proc. International Conference on Image Processing ICIP ´04}, year = {2004}, volume = {4}, pages = {2645--2648 Vol. 4}}
-
Forensic Imaging
Proceedings of the 14 th International Forensic Science Symposium, Lyon
2004
BibTeX@inproceedings{Bijhold2004, author = {Bijhold, J.and Geradts,Z. and Klasen, L.}, title = {Forensic Imaging}, booktitle = {Proceedings of the 14 th International Forensic Science Symposium, Lyon}, year = {2004}}
-
Creating and Detecting Doctored and Virtual Images: Implications to The Child Pornography Prevention Act
Department of Computer Science, Dartmouth College, 2004(TR2004-518)
BibTeX@techreport{Farid2004, author = {Farid, Hany}, title = {Creating and Detecting Doctored and Virtual Images: Implications to The Child Pornography Prevention Act}, year = {2004}, number = {TR2004-518}}
-
Photoshop healing brush: a tool for seamless cloning
2004
BibTeX@misc{Georgiev2004, author = {Georgiev, Todor}, title = {Photoshop healing brush: a tool for seamless cloning}, year = {2004}}
-
Digital Image Processing Using MATLAB®
Prentice Hall, 2004
BibTeX@book{Gonzalez2004, author = {Gonzalez, Rafael C. and Woods, Richard E. and Eddins, Steven L.}, title = {Digital Image Processing Using MATLAB®}, publisher = {Prentice Hall}, year = {2004}}
-
Modeling the space of camera response functions
IEEE Transactions on Pattern Analysis and Machine Intelligence, 2004, Vol. 26(10), pp. 1272-1282
BibTeX@article{Grossberg2004a, author = {Grossberg, M. D. and Nayar, S. K.}, title = {Modeling the space of camera response functions}, journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence}, year = {2004}, volume = {26}, number = {10}, pages = {1272--1282}}
-
Efficient Near-Duplicate Detection and Sub-image Retrieval
ACM International Conference on Multimedia
2004, pp. 869-876
BibTeX@inproceedings{Ke2004, author = {Ke, Yan and Sukthankar, Rahul and Huston, Larry}, title = {Efficient Near-Duplicate Detection and Sub-image Retrieval}, booktitle = {ACM International Conference on Multimedia}, year = {2004}, pages = {869-876}}
-
An efficient parts-based near-duplicate and sub-image retrieval system
MULTIMEDIA ´04: Proceedings of the 12th annual ACM international conference on Multimedia
ACM, 2004, pp. 869-876
BibTeX@inproceedings{Ke2004a, author = {Ke, Yan and Sukthankar, Rahul and Huston, Larry}, title = {An efficient parts-based near-duplicate and sub-image retrieval system}, booktitle = {MULTIMEDIA ´04: Proceedings of the 12th annual ACM international conference on Multimedia}, publisher = {ACM}, year = {2004}, pages = {869--876}}
-
Blind source camera identification
Proc. International Conference on Image Processing ICIP ´04
2004, Vol. 1, pp. 709-712
BibTeX@inproceedings{Kharrazi2004, author = {Mehdi Kharrazi and Sencar, H. T. and Memon, N.}, title = {Blind source camera identification}, booktitle = {Proc. International Conference on Image Processing ICIP ´04}, year = {2004}, volume = {1}, pages = {709--712}}
-
Distinctive image features from scale-invariant keypoints
International journal of computer vision, Springer, 2004, Vol. 60(2), pp. 91-110
BibTeX@article{Lowe2004, author = {Lowe, David G}, title = {Distinctive image features from scale-invariant keypoints}, journal = {International journal of computer vision}, publisher = {Springer}, year = {2004}, volume = {60}, number = {2}, pages = {91--110}}
-
Printer Identification Based on Textural Features
International Conference on Digital Printing Technologies
2004, pp. 306-311
BibTeX@inproceedings{Mikkilineni2004, author = {Mikkilineni, Aravind K. and Chiang, Pei-Ju and Ali, Gazi N. and Chiu, George T.-C. and Allebach, Jan P. and Delp, Edward J.}, title = {Printer Identification Based on Textural Features}, booktitle = {International Conference on Digital Printing Technologies}, year = {2004}, pages = {306-311}}
-
A model for image splicing
Proc. International Conference on Image Processing ICIP ´04
2004, Vol. 2, pp. 1169-1172
BibTeX@inproceedings{Ng2004a, author = {Ng, T.-T. and Chang, S.-F.}, title = {A model for image splicing}, booktitle = {Proc. International Conference on Image Processing ICIP ´04}, year = {2004}, volume = {2}, pages = {1169--1172}}
-
Blind Detection of Digital Photomontage using Higher Order Statistics
Columbia University, 2004(201-2004-1)
BibTeX@techreport{Ng2004b, author = {Tian-Tsong Ng and Shih-Fu Chang}, title = {Blind Detection of Digital Photomontage using Higher Order Statistics}, year = {2004}, number = {201-2004-1}}
-
Classifying Photographic and Photorealistic Computer Graphic Images using Natural Image Statistics
ADVENT Technical Report, 220-2006-6, Columbia University, 2004
BibTeX@techreport{Ng2004c, author = {Ng, Tian-Tsong and Chang, Shih-Fu}, title = {Classifying Photographic and Photorealistic Computer Graphic Images using Natural Image Statistics}, year = {2004}}
-
A Data Set of Authentic and Spliced Image Blocks
ADVENT Technical Report, 203-2004-3, Columbia University, 2004
BibTeX@techreport{Ng2004d, author = {Ng, Tian-Tsong and Chang, Shih-Fu}, title = {A Data Set of Authentic and Spliced Image Blocks}, year = {2004}}
-
Blind detection of photomontage using higher order statistics
Proc. International Symposium on Circuits and Systems ISCAS ´04
2004, Vol. 5, pp. V-688 - V-691
BibTeX@inproceedings{Ng2004, author = {Tian-Tsong Ng and Shih-Fu Chang and Qibin Sun}, title = {Blind detection of photomontage using higher order statistics}, booktitle = {Proc. International Symposium on Circuits and Systems ISCAS ´04}, year = {2004}, volume = {5}, pages = {V-688 -- V-691}}
-
Blind Detection of Photomontage Using Higher Order Statistics
International Symposium on Circuits and Systems
2004, pp. 688 - 691
BibTeX@inproceedings{Ng2004e, author = {Ng, Tian-Tsong and Chang, Shih-Fu and Sun, Qibin}, title = {Blind Detection of Photomontage Using Higher Order Statistics}, booktitle = {International Symposium on Circuits and Systems}, year = {2004}, pages = {688 -- 691}}
-
Eyes for relighting
SIGGRAPH ´04: ACM SIGGRAPH 2004 Papers
ACM, 2004, pp. 704-711
BibTeX@inproceedings{Nishino2004, author = {Nishino, Ko and Nayar, Shree K.}, title = {Eyes for relighting}, booktitle = {SIGGRAPH ´04: ACM SIGGRAPH 2004 Papers}, publisher = {ACM}, year = {2004}, pages = {704--711}}
-
Statistical Tools for Digital Image Forensics
Dartmouth College, 2004
BibTeX@phdthesis{Popescu2004, author = {Popescu, Alin C.}, title = {Statistical Tools for Digital Image Forensics}, school = {Dartmouth College}, year = {2004}}
-
Exposing digital forgeries by detecting duplicated image regions
Department of Computer Science Dartmouth College Hanover NH 03755, 2004(TR2004-515)
BibTeX@techreport{Popescu2004b, author = {Popescu, Alin C. and Farid, Hany}, title = {Exposing digital forgeries by detecting duplicated image regions}, year = {2004}, number = {TR2004-515}}
-
Full blind denoising through noise covariance estimation using Gaussian scale mixtures in the wavelet domain
Proc. International Conference on Image Processing ICIP ´04
2004, Vol. 2, pp. 1217-1220 Vol.2
BibTeX@inproceedings{Portilla2004, author = {Portilla, J.}, title = {Full blind denoising through noise covariance estimation using Gaussian scale mixtures in the wavelet domain}, booktitle = {Proc. International Conference on Image Processing ICIP ´04}, year = {2004}, volume = {2}, pages = {1217--1220 Vol.2}}
-
Von der Retusche zum Fake: Entwicklung, Methoden und Aspekte der Bildbearbeitung in der Pressefotografie
Hochschule für Angewandte Wissenschaften Hamburg, GRIN Verlag, 2004
BibTeX@mastersthesis{Rosendahl2004, author = {Rosendahl, E.}, title = {Von der Retusche zum Fake: Entwicklung, Methoden und Aspekte der Bildbearbeitung in der Pressefotografie}, publisher = {GRIN Verlag}, school = {Hochschule für Angewandte Wissenschaften Hamburg}, year = {2004}}
-
What´s in a picture? The temptation of image manipulation
The Journal of Cell Biology, 2004, Vol. 166(1), pp. 11-15
BibTeX@article{Rossner2004, author = {Rossner, Mike and Yamada, Kenneth M.}, title = {What´s in a picture? The temptation of image manipulation}, journal = {The Journal of Cell Biology}, year = {2004}, volume = {166}, number = {1}, pages = {11-15}}
-
Fundamentals of Probability and Statistics for Engineers
Wiley-Interscience, 2004
BibTeX@book{Soong2004, author = {Soong, T.T.}, title = {Fundamentals of Probability and Statistics for Engineers}, publisher = {Wiley-Interscience}, year = {2004}}
-
Forensic Analysis of Digital Image Tampering
AIR FORCE INSTITUTE OF TECHNOLOGY, 2004
BibTeX@mastersthesis{Sturak2004, author = {Sturak, JonathanR}, title = {Forensic Analysis of Digital Image Tampering}, school = {AIR FORCE INSTITUTE OF TECHNOLOGY}, year = {2004}}
-
Poisson matting
SIGGRAPH ´04: ACM SIGGRAPH 2004 Papers
ACM, 2004, pp. 315-321
BibTeX@inproceedings{Sun2004, author = {Sun, Jian and Jia, Jiaya and Tang, Chi-Keung and Shum, Heung-Yeung}, title = {Poisson matting}, booktitle = {SIGGRAPH ´04: ACM SIGGRAPH 2004 Papers}, publisher = {ACM}, year = {2004}, pages = {315--321}}
-
Image hashing resilient to geometric and filtering operations
Proc. IEEE 6th Workshop Multimedia Signal Processing
2004, pp. 355-358
BibTeX@inproceedings{Swaminathan2004, author = {Swaminathan, Ashwin and Yinian Mao and Min Wu}, title = {Image hashing resilient to geometric and filtering operations}, booktitle = {Proc. IEEE 6th Workshop Multimedia Signal Processing}, year = {2004}, pages = {355--358}}
-
Single view based measurement on space planes
Journal of Computer Science and Technology, Science Press, 2004, Vol. 19, pp. 374-382
BibTeX@article{Wang2004, author = {Wang, Guang-Hui and Hu, Zhan-Yi and Wu, Fu-Chao}, title = {Single view based measurement on space planes}, journal = {Journal of Computer Science and Technology}, publisher = {Science Press}, year = {2004}, volume = {19}, pages = {374-382}}
2003
-
Automated selection of DAB-labeled tissue for immunohistochemical quantification.
J Histochem Cytochem, Laboratory of Reparative Biology and Bioengineering, Department of Plastic Surgery, University of Texas M. D. Anderson Cancer Center and University of Texas Center for Biomedical Engineering, Houston 77030, USA., 2003, Vol. 51(5), pp. 575-584
BibTeX@article{Brey2003, author = {Eric M Brey and Zahid Lalani and Carol Johnston and Mark Wong and Larry V McIntire and Pauline J Duke and Charles W Patrick}, title = {Automated selection of DAB-labeled tissue for immunohistochemical quantification.}, journal = {J Histochem Cytochem}, year = {2003}, volume = {51}, number = {5}, pages = {575--584}}
-
Identification of Bitmap Compression History: JPEG Detection and Quantizer Estimation
IEEE Transactions on Image Processing, 2003, Vol. 12(2), pp. 230-235
BibTeX@article{Fan2003, author = {Fan, Zhigang and de Queiroz, Ricardo}, title = {Identification of Bitmap Compression History: JPEG Detection and Quantizer Estimation}, journal = {IEEE Transactions on Image Processing}, year = {2003}, volume = {12}, number = {2}, pages = {230-235}}
-
Higher-order Wavelet Statistics and their Application to Digital Forensics
Proc. Conference on Computer Vision and Pattern Recognition Workshop CVPRW ´03
2003, Vol. 8, pp. 94
BibTeX@inproceedings{Farid2003, author = {Farid, Hany and Lyu, Siwei}, title = {Higher-order Wavelet Statistics and their Application to Digital Forensics}, booktitle = {Proc. Conference on Computer Vision and Pattern Recognition Workshop CVPRW ´03}, year = {2003}, volume = {8}, pages = {94}}
-
Detection of Copy Move Forgery in Digital Images
Digital Forensic Research Workshop
2003
BibTeX@inproceedings{Fridrich2003, author = {Fridrich, Jessica and Soukal, David and Lukáš, Jan}, title = {Detection of Copy Move Forgery in Digital Images}, booktitle = {Digital Forensic Research Workshop}, year = {2003}}
-
What is the space of camera response functions?
Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition
2003, Vol. 2
BibTeX@inproceedings{Grossberg2003, author = {Grossberg, M. D. and Nayar, S. K.}, title = {What is the space of camera response functions?}, booktitle = {Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition}, year = {2003}, volume = {2}}
-
Determining the camera response from images: what is knowable?
IEEE Transactions on Pattern Analysis and Machine Intelligence, 2003, Vol. 25(11), pp. 1455-1467
BibTeX@article{Grossberg2003a, author = {Grossberg, M. D. and Nayar, S. K.}, title = {Determining the camera response from images: what is knowable?}, journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence}, year = {2003}, volume = {25}, number = {11}, pages = {1455--1467}}
-
Bilder, die lügen
der Geschichte der Bundesrepublik Deutschland, S. H. (ed.)
Bouvier Verlag Bonn, 2003
BibTeX@book{Huettler2003, author = {Hüttler, Hans Walter and Rösgen, Petra}, title = {Bilder, die lügen}, publisher = {Bouvier Verlag Bonn}, year = {2003}}
-
Fundamental study on identification of CMOS cameras
ur Rahman, Z., Schowengerdt, R. A. & Reichenbach, S. E. (ed.)
Visual Information Processing XII
Visual Information Processing XII, SPIE, 2003, Vol. 5108(1), pp. 202-209
BibTeX@conference{Kurosawa2003, author = {Kenji Kurosawa and Naoki Saitoh}, title = {Fundamental study on identification of CMOS cameras}, booktitle = {Visual Information Processing XII}, journal = {Visual Information Processing XII}, publisher = {SPIE}, year = {2003}, volume = {5108}, number = {1}, pages = {202-209}}
-
Differences of edge properties in photographs and paintings
Proc. Int. Conf. Image Processing ICIP 2003
2003, Vol. 3
BibTeX@inproceedings{Leykin2003, author = {Leykin, A. and Cutzu, F. }, title = {Differences of edge properties in photographs and paintings}, booktitle = {Proc. Int. Conf. Image Processing ICIP 2003}, year = {2003}, volume = {3}}
-
Estimation of primary quantization matrix in double compressed jpeg images
Proc. of DFRWS
2003
BibTeX@inproceedings{Lukas2003, author = {Jan Lukáš and Jessica Fridrich}, title = {Estimation of primary quantization matrix in double compressed jpeg images}, booktitle = {Proc. of DFRWS}, year = {2003}}
-
JPEG compression history estimation for color images
Proc. International Conference on Image Processing ICIP 2003
2003, Vol. 3, pp. III-245-8 vol.2
BibTeX@inproceedings{Neelamani2003, author = {Neelamani, R. and de Queiroz, R. and Fan, Zhigang and Baraniuk, R.}, title = {JPEG compression history estimation for color images}, booktitle = {Proc. International Conference on Image Processing ICIP 2003}, year = {2003}, volume = {3}, pages = {III--245-8 vol.2}}
-
Multichannel blind iterative image restoration
IEEE Transactions on Image Processing, 2003, Vol. 12(9), pp. 1094-1106
BibTeX@article{Sroubek2003, author = {Sroubek, F. and Flusser, J.}, title = {Multichannel blind iterative image restoration}, journal = {IEEE Transactions on Image Processing}, year = {2003}, volume = {12}, number = {9}, pages = {1094--1106}}
-
Estimating the directions to light sources using images of eye for reconstructing 3D human face
Department of Information and Image Sciences, Chiba University, 2003
BibTeX@techreport{Tsumara2003, author = {Tsumura, Norimichi and Dang, Minh Nguyet and Makino, Takao and Miyake, Yoichi}, title = {Estimating the directions to light sources using images of eye for reconstructing 3D human face}, year = {2003}}
2002
-
Discrimination of inkjet-printed counterfeits by spur marks and feature extraction by spatial frequency analysis
SPIE Conference on Optical Security and Counterfeit Deterrence Techniques IV
2002, pp. 129-137
BibTeX@inproceedings{Akao2002, author = {Akao, Yoshinori and Kobayashi, Kazuhiko and Sugawara, Shigeru and Seki, Yoko}, title = {Discrimination of inkjet-printed counterfeits by spur marks and feature extraction by spatial frequency analysis}, booktitle = {SPIE Conference on Optical Security and Counterfeit Deterrence Techniques IV}, year = {2002}, pages = {129-137}}
-
Adaptive Blind Signal and Image Processing
Wiley-Interscience, 2002
BibTeX@book{Cichocki2002, author = {Andrzej Cichocki and Shun-ichi Amari}, title = {Adaptive Blind Signal and Image Processing}, publisher = {Wiley-Interscience}, year = {2002}}
-
Digital Camera Identification
Journal of Forensic Identification, 2002, Vol. 52(5), pp. 621-631
BibTeX@article{Geradts2002, author = {Geradts, Zeno J. and Bijhold, Jurrien and Kieft, Martijn and Kurosawa, Kenji and Kuroki, Kenro and Saitoh, Naoki}, title = {Digital Camera Identification}, journal = {Journal of Forensic Identification}, year = {2002}, volume = {52}, number = {5}, pages = {621-631}}
-
Digital Image Processing
Springer, 2002
BibTeX@book{Jaehne2002, author = {Jähne, Bernd}, title = {Digital Image Processing}, publisher = {Springer}, year = {2002}, edition = {5}}
-
An Approach to Individual Video Camera Identification
Journal of Forensic Sciences, 2002, Vol. 47(1), pp. 97-102
BibTeX@article{Kuroki2002, author = {Kuroki, Kenro and Kurosawa, Kenji and Saitoh, Naoki}, title = {An Approach to Individual Video Camera Identification}, journal = {Journal of Forensic Sciences}, year = {2002}, volume = {47}, number = {1}, pages = {97-102}}
-
Demosaicking methods for Bayer color arrays
Journal of Electronic imaging, International Society for Optics and Photonics, 2002, Vol. 11(3), pp. 306-315
BibTeX@article{Ramanath2002, author = {Ramanath, R. and Snyder, W.E. and Bilbro, G.L. and Sander, W.A.}, title = {Demosaicking methods for Bayer color arrays}, journal = {Journal of Electronic imaging}, publisher = {International Society for Optics and Photonics}, year = {2002}, volume = {11}, number = {3}, pages = {306--315}}
-
CCD Fingerprint Method for Digital Still Cameras
SPIE Conference on Investigative Image Processing II
2002, pp. 37-48
BibTeX@inproceedings{Saitoh2002, author = {Saitoh, Naoki and Kurosawa, Kenji and Kuroki, Kenro and Akiba, Norimitsu and Geradts, Zeno J. and Bijhold, Jurrien}, title = {CCD Fingerprint Method for Digital Still Cameras}, booktitle = {SPIE Conference on Investigative Image Processing II}, year = {2002}, pages = {37-48}}
-
Super-resolution enhancement of native digital video versus digitized NTSC sequences
Proc. Fifth IEEE Southwest Symp. Image Analysis and Interpretation
2002, pp. 193-197
BibTeX@inproceedings{Schultz2002, author = {Schultz, R. R. }, title = {Super-resolution enhancement of native digital video versus digitized NTSC sequences}, booktitle = {Proc. Fifth IEEE Southwest Symp. Image Analysis and Interpretation}, year = {2002}, pages = {193--197}}
-
Document Verification and Traceability Through Image Quality Analysis
International Conference on Digital Printing Technologies
2002, pp. 214-217
BibTeX@inproceedings{Wolin2002, author = {Wolin, Dave}, title = {Document Verification and Traceability Through Image Quality Analysis}, booktitle = {International Conference on Digital Printing Technologies}, year = {2002}, pages = {214-217}}
-
Detection and restoration of tampered JPEG compressed images
J. Syst. Softw., Elsevier Science Inc., 2002, Vol. 64(2), pp. 151-161
BibTeX@article{Wu2002, author = {Wu, Hsien-Chu and Chang, Chin-Chen}, title = {Detection and restoration of tampered JPEG compressed images}, journal = {J. Syst. Softw.}, publisher = {Elsevier Science Inc.}, year = {2002}, volume = {64}, number = {2}, pages = {151--161}}
2001
-
US Secure Hash Algorithm 1 (SHA1)
Network Working Group, 2001(Request for Comments: 3174)
BibTeX@standard{Eastlake2001, author = {D. Eastlake and P. Jones}, title = {US Secure Hash Algorithm 1 (SHA1)}, year = {2001}, number = {Request for Comments: 3174}}
-
Blind inverse gamma correction
IEEE Transactions on Image Processing, 2001, Vol. 10(10), pp. 1428-1433
BibTeX@article{Farid2001, author = {Farid, H.}, title = {Blind inverse gamma correction}, journal = {IEEE Transactions on Image Processing}, year = {2001}, volume = {10}, number = {10}, pages = {1428--1433}}
-
Blind removal of image non-linearities
Proc. Eighth IEEE Int. Conf. Computer Vision ICCV 2001
2001, Vol. 1, pp. 76-81
BibTeX@inproceedings{Farid2001a, author = {Farid, Hany and Popescu, Alin C.}, title = {Blind removal of image non-linearities}, booktitle = {Proc. Eighth IEEE Int. Conf. Computer Vision ICCV 2001}, year = {2001}, volume = {1}, pages = {76--81}}
-
Methods for Identification of Images Acquired with Digital Cameras
Bramble, S. K., Carapezza, E. M. & Rudin, L. I. (ed.)
SPIE Conference on Enabling Technologies for Law Enforcement and Security
2001, Vol. 4232, pp. 505-512
BibTeX@inproceedings{Geradts2001, author = {Geradts, Zeno J. and Bijhold, Jurrien and Kieft, Martijn and Kurosawa, Kenji and Kuroki, Kenro and Saitoh, Naoki}, title = {Methods for Identification of Images Acquired with Digital Cameras}, booktitle = {SPIE Conference on Enabling Technologies for Law Enforcement and Security}, year = {2001}, volume = {4232}, pages = {505-512}}
-
Surface fitting approach for reducing blocking artifacts in low bit-rate DCT decoded images
Proc. IEEE Region 10 Int. Conf. TENCON Electrical and Electronic Technology
2001, Vol. 1, pp. 23-27
BibTeX@inproceedings{Kieu2001, author = {Kieu, T. and Nguyen, D. T. }, title = {Surface fitting approach for reducing blocking artifacts in low bit-rate DCT decoded images}, booktitle = {Proc. IEEE Region 10 Int. Conf. TENCON Electrical and Electronic Technology}, year = {2001}, volume = {1}, pages = {23--27}}
-
Aerial video surveillance and exploitation
Proceedings of the IEEE, 2001, Vol. 89(10), pp. 1518-1539
BibTeX@article{Kumar2001, author = {Kumar, R. and Sawhney, H. and Samarasekera, S. and Hsu, S. and Hai Tao and Yanlin Guo and Hanna, K. and Pope, A. and Wildes, R. and Hirvonen, D. and Hansen, M. and Burt, P.}, title = {Aerial video surveillance and exploitation}, journal = {Proceedings of the IEEE}, year = {2001}, volume = {89}, number = {10}, pages = {1518--1539}}
-
Quantigraphic Imaging: Estimating the camera response and exposures from differently exposed images
Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition CVPR 2001
2001, Vol. 1
BibTeX@inproceedings{Mann2001, author = {Mann, S. and Mann, R.}, title = {Quantigraphic Imaging: Estimating the camera response and exposures from differently exposed images}, booktitle = {Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition CVPR 2001}, year = {2001}, volume = {1}}
-
Quantitative evaluation of convolution-based methods for medical image interpolation
Medical Image Analysis, Elsevier Science, 2001, Vol. 5(2), pp. 111-126
BibTeX@article{Meijering2001, author = {Meijering, Erik HW and Niessen, Wiro J and Viergever, Max A and others}, title = {Quantitative evaluation of convolution-based methods for medical image interpolation}, journal = {Medical Image Analysis}, publisher = {Elsevier Science}, year = {2001}, volume = {5}, number = {2}, pages = {111--126}}
-
Automatic estimation of the projected light source direction
Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition CVPR 2001
2001, Vol. 1
BibTeX@inproceedings{Nillius2001, author = {Nillius, P. and Eklundh, J. O. }, title = {Automatic estimation of the projected light source direction}, booktitle = {Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition CVPR 2001}, year = {2001}, volume = {1}}
-
A New Technique for Authentication of Image/Video for Multimedia Applications
International Multimedia Conference on Multimedia and Security: New Challenges
2001, pp. 23-26
BibTeX@inproceedings{Tzeng2001, author = {Tzeng, Chih-Hsuan and Tsai, Wen-Hsiang}, title = {A New Technique for Authentication of Image/Video for Multimedia Applications}, booktitle = {International Multimedia Conference on Multimedia and Security: New Challenges}, year = {2001}, pages = {23-26}}
2000
-
The New Cognitive Neurosciences
Gazzaniga, M. S. (ed.)
Chapter 24 Lightness Perception and Lightness Illusions
The new cognitive neurosciences, MIT Press, 2000, pp. 339-351
BibTeX@inbook{Adelson2000, author = {Adelson, Edward H.}, title = {The New Cognitive Neurosciences}, journal = {The new cognitive neurosciences}, publisher = {MIT Press}, year = {2000}, pages = {339--351}, edition = {2nd}}
-
Anisotropic feature-preserving denoising of height fields and bivariate data
Graphics interface
2000, Vol. 11(10), pp. 145-152
BibTeX@inproceedings{Desbrun2000, author = {Desbrun, Mathieu and Meyer, Mark and Schröder, Peter and Barr, Alan H}, title = {Anisotropic feature-preserving denoising of height fields and bivariate data}, booktitle = {Graphics interface}, year = {2000}, volume = {11}, number = {10}, pages = {145--152}}
-
Maximum likelihood estimation of JPEG quantization table in the identification of bitmap compression history
Proc. Int Image Processing Conf
2000, Vol. 1, pp. 948-951
BibTeX@inproceedings{Fan2000, author = {Zhigang Fan and de Queiroz, R.}, title = {Maximum likelihood estimation of JPEG quantization table in the identification of bitmap compression history}, booktitle = {Proc. Int Image Processing Conf}, year = {2000}, volume = {1}, pages = {948--951}}
-
Using vanishing points for camera calibration and coarse 3D reconstruction from a single image
The Visual Computer, Springer-Verlag, 2000, Vol. 16, pp. 396-410
BibTeX@article{Guillou2000, author = {Guillou, E and Meneveaux, D. and Maisel, E. and Bouatouch, K.}, title = {Using vanishing points for camera calibration and coarse 3D reconstruction from a single image}, journal = {The Visual Computer}, publisher = {Springer-Verlag}, year = {2000}, volume = {16}, pages = {396-410}}
-
Multiple view geometry in computer vision
Cambridge Univ Press, 2000, Vol. 2
BibTeX@book{Hartley2000, author = {Hartley, Richard. and Zisserman, Andrew}, title = {Multiple view geometry in computer vision}, publisher = {Cambridge Univ Press}, year = {2000}, volume = {2}}
-
Independent component analysis: algorithms and applications
Neural Networks, 2000, Vol. 13(4-5), pp. 411 - 430
BibTeX@article{Hyvaerinen2000, author = {A. Hyvärinen and E. Oja}, title = {Independent component analysis: algorithms and applications}, journal = {Neural Networks}, year = {2000}, volume = {13}, number = {4-5}, pages = {411 - 430}}
-
Information technology --JPEG 2000 image coding system: Core coding system Recommendation T.800
ITU (International Telecommunication Union), 2000
BibTeX@standard{ITUT2000, author = {ITU-T and ISO/IEC}, title = {Information technology --JPEG 2000 image coding system: Core coding system Recommendation T.800}, year = {2000}}
-
Digital Image Authentication Using Image Filtering Techniques
Conference on Scientific Computing
2000
BibTeX@inproceedings{Lukas2000, author = {Lukáš, Jan}, title = {Digital Image Authentication Using Image Filtering Techniques}, booktitle = {Conference on Scientific Computing}, year = {2000}}
-
A comparison of SNR estimation techniques for the AWGN channel
IEEE Transactions on Communications, 2000, Vol. 48(10), pp. 1681-1691
BibTeX@article{Pauluzzi2000, author = {Pauluzzi, D. R. and Beaulieu, N. C.}, title = {A comparison of SNR estimation techniques for the AWGN channel}, journal = {IEEE Transactions on Communications}, year = {2000}, volume = {48}, number = {10}, pages = {1681--1691}}
1999
-
Photo Fakery: The History and Techniques of Photographic Deception and Manipulation
Brassey´s, 1999
BibTeX@book{Brugioni1999, author = {Brugioni, Dino A.}, title = {Photo Fakery: The History and Techniques of Photographic Deception and Manipulation}, publisher = {Brassey´s}, year = {1999}}
-
JPEG Compression Metric as a Quality Aware Image Transcoding
Proceedings of USITS' 99: The 2nd USENIX Symposium on Internet Technologies & Systems
1999
BibTeX@inproceedings{Chandra1999, author = {Surendar Chandra and Carla Schlatter Elli}, title = {JPEG Compression Metric as a Quality Aware Image Transcoding}, booktitle = {Proceedings of USITS' 99: The 2nd USENIX Symposium on Internet Technologies & Systems}, year = {1999}}
-
Single view metrology
Proc. Seventh IEEE Int Computer Vision Conf. The
1999, Vol. 1, pp. 434-441
BibTeX@inproceedings{Criminisi1999, author = {Criminisi, A. and Reid, I. and Zisserman, A.}, title = {Single view metrology}, booktitle = {Proc. Seventh IEEE Int Computer Vision Conf. The}, year = {1999}, volume = {1}, pages = {434--441}}
-
Detecting Digital Forgeries Using Bispectral Analysis
AI Lab, Massachusetts Institute of Technology, 1999(AIM-1657)
BibTeX@techreport{Farid1999, author = {Farid, Hany}, title = {Detecting Digital Forgeries Using Bispectral Analysis}, year = {1999}, number = {AIM-1657}}
-
Spatially adaptive statistical modeling of wavelet image coefficients and its application to denoising
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 1999
1999, Vol. 6, pp. 3253-3256 vol.6
BibTeX@inproceedings{KivancMihcak1999, author = {Kivanc Mihcak, M. and Kozintsev, I. and Ramchandran, K.}, title = {Spatially adaptive statistical modeling of wavelet image coefficients and its application to denoising}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 1999}, year = {1999}, volume = {6}, pages = {3253--3256 vol.6}}
-
Low-complexity image denoising based on statistical modeling of wavelet coefficients
IEEE Signal Processing Letters, 1999, Vol. 6(12), pp. 300-303
BibTeX@article{KivancMihcak1999a, author = {Kivanc Mihcak, M. and Kozintsev, I. and Ramchandran, K. and Moulin, P.}, title = {Low-complexity image denoising based on statistical modeling of wavelet coefficients}, journal = {IEEE Signal Processing Letters}, year = {1999}, volume = {6}, number = {12}, pages = {300--303}}
-
CCD fingerprint method-identification of a video camera from videotaped images
Proc. Int. Conf. Image Processing ICIP 99
1999, Vol. 3, pp. 537-540
BibTeX@inproceedings{Kurosawa1999, author = {Kurosawa, K. and Kuroki, K. and Saitoh, N. }, title = {CCD fingerprint method-identification of a video camera from videotaped images}, booktitle = {Proc. Int. Conf. Image Processing ICIP 99}, year = {1999}, volume = {3}, pages = {537--540}}
-
Estimation of image noise variance
IEE Proceedings -Vision, Image and Signal Processing, 1999, Vol. 146(2), pp. 80-84
BibTeX@article{Rank1999, author = {Rank, K. and Lendl, M. and Unbehauen, R. }, title = {Estimation of image noise variance}, journal = {IEE Proceedings -Vision, Image and Signal Processing}, year = {1999}, volume = {146}, number = {2}, pages = {80--84}}
-
Object matching algorithms using robust Hausdorff distance measures
IEEE Transactions on Image Processing, 1999, Vol. 8(3), pp. 425-429
BibTeX@article{Sim1999, author = {Sim, Dong-Gyu and Kwon, Oh-Kyu and Park, Rae-Hong}, title = {Object matching algorithms using robust Hausdorff distance measures}, journal = {IEEE Transactions on Image Processing}, year = {1999}, volume = {8}, number = {3}, pages = {425--429}}
1998
-
Design of practical color filter array interpolation algorithms for digital cameras .2
Proc. International Conference on Image Processing ICIP 98
1998, Vol. 1, pp. 488-492
BibTeX@inproceedings{Adams1998, author = {Adams, J. E. , Jr.}, title = {Design of practical color filter array interpolation algorithms for digital cameras .2}, booktitle = {Proc. International Conference on Image Processing ICIP 98}, year = {1998}, volume = {1}, pages = {488--492}}
-
Information Technology -- Digital Compression and Coding of Continuous-tone Still Images -- Requirements and Guidelines Recommendation T.87
ITU (International Telecommunication Union), 1998
BibTeX@standard{ITUT1998, author = {ITU-T and ISO/IEC}, title = {Information Technology -- Digital Compression and Coding of Continuous-tone Still Images -- Requirements and Guidelines Recommendation T.87}, year = {1998}}
-
A pyramid approach to subpixel registration based on intensity
IEEE Transactions on Image Processing, 1998, Vol. 7(1), pp. 27-41
BibTeX@article{Thevenaz1998, author = {Thevenaz, P. and Ruttimann, Urs E. and Unser, M.}, title = {A pyramid approach to subpixel registration based on intensity}, journal = {IEEE Transactions on Image Processing}, year = {1998}, volume = {7}, number = {1}, pages = {27--41}}
1997
-
Fotos, die lügen. Politik mit gefälschten Bildern (German Edition)
Jaubert, A. (ed.)
Hain Verlag, Bodenheim, 1997
BibTeX@book{Jaubert1992, author = {Jaubert, Alain}, title = {Fotos, die lügen. Politik mit gefälschten Bildern (German Edition)}, publisher = {Hain Verlag, Bodenheim}, year = {1997}}
-
Analysis of Variance in Statistical Image Processing
Cambridge University Press, 1997
BibTeX@book{Kurz1997, author = {Ludwik Kurz and M. Hafed Benteftifa}, title = {Analysis of Variance in Statistical Image Processing}, publisher = {Cambridge University Press}, year = {1997}}
1996
-
Fast Noise Variance Estimation
Computer Vision and Image Understanding, 1996, Vol. 64(2), pp. 300 - 302
BibTeX@article{Immerkaer1996, author = {Immerkær, John}, title = {Fast Noise Variance Estimation}, journal = {Computer Vision and Image Understanding}, year = {1996}, volume = {64}, number = {2}, pages = {300 - 302}}
-
Noise removal via Bayesian wavelet coring
Proc. Conf. Int Image Processing
1996, Vol. 1, pp. 379-382
BibTeX@inproceedings{Simoncelli1996, author = {Simoncelli, E. P. and Adelson, E. H.}, title = {Noise removal via Bayesian wavelet coring}, booktitle = {Proc. Conf. Int Image Processing}, year = {1996}, volume = {1}, pages = {379--382}}
-
Steerable wedge filters for local orientation analysis
IEEE Trans. Image Processing, 1996, Vol. 5(9), pp. 1377-1382
BibTeX@article{Simoncelli1996a, author = {Simoncelli, E. P. and Farid, Hany}, title = {Steerable wedge filters for local orientation analysis}, journal = {IEEE Trans. Image Processing}, year = {1996}, volume = {5}, number = {9}, pages = {1377--1382}}
1995
-
Image Analysis for the Biological Sciences
John Wiley & Sons, 1995
BibTeX@book{Glasbey1995, author = {Glasbey, C. A. and Horgan, G. W.}, title = {Image Analysis for the Biological Sciences}, publisher = {John Wiley & Sons}, year = {1995}}
1993
-
Comparing images using the Hausdorff distance
IEEE Transactions on Pattern Analysis and Machine Intelligence, 1993, Vol. 15(9), pp. 850-863
BibTeX@article{Huttenlocher1993, author = {Huttenlocher, D. P. and Klanderman, G. A. and Rucklidge, W. J.}, title = {Comparing images using the Hausdorff distance}, journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence}, year = {1993}, volume = {15}, number = {9}, pages = {850--863}}
-
A multi-resolution technique for comparing images using the Hausdorff distance
Proc. CVPR ´93. IEEE Computer Society Conference on Computer Vision and Pattern Recognition
1993, pp. 705-706
BibTeX@inproceedings{Huttenlocher1993b, author = {Huttenlocher, D. P. and Rucklidge, W. J. }, title = {A multi-resolution technique for comparing images using the Hausdorff distance}, booktitle = {Proc. CVPR ´93. IEEE Computer Society Conference on Computer Vision and Pattern Recognition}, year = {1993}, pages = {705--706}}
1992
-
TIFF
Adobe Developers Association, 1992(6)
BibTeX@standard{Adobe1992, author = {Adobe Systems Incorporated}, title = {TIFF}, year = {1992}, number = {6}}
-
Correcting chromatic aberrations using image warping
Proc. CVPR ´92. IEEE Computer Society Conf Computer Vision and Pattern Recognition
1992, pp. 684-687
BibTeX@inproceedings{Boult1992, author = {Boult, T. E. and Wolberg, G. }, title = {Correcting chromatic aberrations using image warping}, booktitle = {Proc. CVPR ´92. IEEE Computer Society Conf Computer Vision and Pattern Recognition}, year = {1992}, pages = {684--687}}
-
JPEG File Interchange Format
C-Cube Microsystems, 1992(1)
BibTeX@standard{Hamilton1992, author = {Eric Hamilton}, title = {JPEG File Interchange Format}, year = {1992}, number = {1}}
-
Information Technology -- Digital Compression and Coding of Continuous-tone Still Images -- Requirements and Guidelines Recommendation T.81
ITU (International Telecommunication Union), 1992
BibTeX@standard{ITUT1992, author = {ITU-T and ISO/IEC}, title = {Information Technology -- Digital Compression and Coding of Continuous-tone Still Images -- Requirements and Guidelines Recommendation T.81}, year = {1992}}
-
Nonlinear total variation based noise removal algorithms
Physica D: Nonlinear Phenomena, 1992, Vol. 60(1-4), pp. 259 - 268
BibTeX@article{Rudin1992, author = {Leonid I. Rudin and Stanley Osher and Emad Fatemi}, title = {Nonlinear total variation based noise removal algorithms}, journal = {Physica D: Nonlinear Phenomena}, year = {1992}, volume = {60}, number = {1-4}, pages = {259 - 268}}
1990
-
A Fast Parallel Algorithm for Blind Estimation of Noise Variance
IEEE Transactions on Pattern Analysis and Machine Intelligence, IEEE Computer Society, 1990, Vol. 12, pp. 216-223
BibTeX@article{Meer1990, author = {P. Meer and J.M. Jolion and A. Rosenfeld}, title = {A Fast Parallel Algorithm for Blind Estimation of Noise Variance}, journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence}, publisher = {IEEE Computer Society}, year = {1990}, volume = {12}, pages = {216-223}}
1989
-
Fundamentals of Digital Image Processing
Prentice Hall, 1989
BibTeX@book{Jain1989, author = {Jain, Anil K.}, title = {Fundamentals of Digital Image Processing}, publisher = {Prentice Hall}, year = {1989}}
1988
-
Algorithms for Clustering Data
Prentice Hall, 1988
BibTeX@book{Jain1988, author = {Jain, Anil K. and Dubes, Richard C.}, title = {Algorithms for Clustering Data}, publisher = {Prentice Hall}, year = {1988}}
-
An edge detection model based on non-linear laplacefiltering
Gelsema, E. & Kanal, L. (ed.)
Pattern Recognition and Artificial Intelligence
Pattern Recognition and Artificial Intelligence, Elsevier Science Publishers B.V. (North-Holland), 1988, pp. 63-73
BibTeX@inproceedings{VanVliet1988, author = {Van Vliet, Lucas J. and Young, Ian T. and Beckers, Guus L.}, title = {An edge detection model based on non-linear laplacefiltering}, booktitle = {Pattern Recognition and Artificial Intelligence}, journal = {Pattern Recognition and Artificial Intelligence}, publisher = {Elsevier Science Publishers B.V. (North-Holland)}, year = {1988}, pages = {63-73}}
1976
-
Color imaging array
1976(3,971,065)
BibTeX@patent{Bayer1976, author = {Bryce E. Bayer}, title = {Color imaging array}, year = {1976}, number = {3,971,065}}