Digital Image Forensic - Methoden: Literatur

Info

X

[de] Eine aktuellere Version dieser Seite finden sie hier:
Methoden - Literatur

[en] The current version of this site has moved to:
Methoden - Literatur

Literatur

Letzte Version: 3.09.1 Build 3396 - 28. Sep. 201p



2015

  1. W. Zhao & H. Liu
    An Image Forensic Technique Based on 2D Lighting Estimation Using Spherical Harmonic Frames
    Zha, H., Chen, X., Wang, L. & Miao, Q. (ed.)
    Computer Vision
    Springer Berlin Heidelberg, 2015, Vol. 546, pp. 325-334
    DOI: 10.1007/978-3-662-48558-3_33
    BibTeX
    @incollection{Zhao2015b,
     author = {Zhao, Wenyong and Liu, Hong},
     title = {An Image Forensic Technique Based on 2D Lighting Estimation Using Spherical Harmonic Frames},
     booktitle = {Computer Vision},
     publisher = {Springer Berlin Heidelberg},
     year = {2015},
     volume = {546},
     pages = {325--334}}
    
  2. E. Achimescu, R.O. Preda, N. Vizireanu & I. Pirnog
    Multiple Point Android Digital Image Authentication
    Proc. Int Signals, Circuits and Systems (ISSCS) Symp
    2015, pp. 1-4
    DOI: 10.1109/ISSCS.2015.7203945
    BibTeX
    @inproceedings{Achimescu2015,
     author = {Achimescu, E. and Preda, R. O. and Vizireanu, N. and Pirnog, I.},
     title = {Multiple Point Android Digital Image Authentication},
     booktitle = {Proc. Int Signals, Circuits and Systems (ISSCS) Symp},
     year = {2015},
     pages = {1--4}}
    
  3. S. Agarwal & S. Chand
    Image Forgery Detection Using Multi Scale Entropy Filter and Local Phase Quantization
    I.J. Image, Graphics and Signal Processing, 2015
    DOI: 10.5815/ijigsp.2015.10.08
    BibTeX
    @article{Agarwal2015,
     author = {Agarwal, Saurabh and Chand, Satish},
     title = {Image Forgery Detection Using Multi Scale Entropy Filter and Local Phase Quantization},
     journal = {I.J. Image, Graphics and Signal Processing},
     year = {2015}}
    
  4. S. Agarwal & S. Chand
    Anti-forensics of JPEG Images Using Interpolation
    I.J. Image, Graphics and Signal Processing, 2015, Vol. 12, pp. 10-17
    DOI: 10.5815/ijigsp.2015.12.02
    BibTeX
    @article{Agarwal2015a,
     author = {Agarwal, Saurabh and Chand, Satish},
     title = {Anti-forensics of JPEG Images Using Interpolation},
     journal = {I.J. Image, Graphics and Signal Processing},
     year = {2015},
     volume = {12},
     pages = {10--17}}
    
  5. H.M. Ahmed & S.R. Salim
    A Method for Detect Forgery from Images
    Eng.& Tech.Journal, 2015, Vol. 33(2)
    DOI: 10.1109/ceec.2014.6958558
    BibTeX
    @article{Ahmed2015,
     author = {Ahmed, Hanaa Mohsin and Salim, Sabaa Rakan},
     title = {A Method for Detect Forgery from Images},
     journal = {Eng.& Tech.Journal},
     year = {2015},
     volume = {33},
     number = {2}}
    
  6. H.M. Ahmed & S.R. Salim
    Method for Detect and Extract Forgery from Images
    Al - Mansour Journal, 2015
    BibTeX
    @article{Ahmed2015a,
     author = {Ahmed, Hanaa Mohsin and Salim, Sabaa Rakan},
     title = {Method for Detect and Extract Forgery from Images},
     journal = {Al - Mansour Journal},
     year = {2015}}
    
  7. F. Alanazi & A. Jones
    The Value of Metadata in Digital Forensics
    Proc. European Intelligence and Security Informatics Conf
    2015, pp. 182
    DOI: 10.1109/EISIC.2015.26
    BibTeX
    @inproceedings{Alanazi2015,
     author = {Alanazi, F. and Jones, A.},
     title = {The Value of Metadata in Digital Forensics},
     booktitle = {Proc. European Intelligence and Security Informatics Conf},
     year = {2015},
     pages = {182}}
    
  8. A. Alani & Z. Al-Khanjari
    Detection Techniques of Digital Image Forgery by Using Images Metadata in Digital Investigation
    Proc. of the Int. Academic Conf. on Law, Politics & Management
    Al-Khanjari,, 2015
    BibTeX
    @inproceedings{Alani2015,
     author = {Alani, A. and Al-Khanjari, Z.},
     title = {Detection Techniques of Digital Image Forgery by Using Images Metadata in Digital Investigation},
     booktitle = {Proc. of the Int. Academic Conf. on Law, Politics & Management},
     journal = {Al-Khanjari,},
     year = {2015}}
    
  9. M. Al-Ani, F. Khelifi, A. Lawgaly & A. Bouridane
    A Novel Image Filtering Approach for Sensor Fingerprint Estimation in Source Camera Identification
    Proc. 12th IEEE Int Advanced Video and Signal Based Surveillance (AVSS) Conf
    2015, pp. 1-5
    DOI: 10.1109/AVSS.2015.7301808
    BibTeX
    @inproceedings{Al-Ani2015,
     author = {Al-Ani, Mustafa and Khelifi, Fouad and Lawgaly, Ashref and Bouridane, Ahmed},
     title = {A Novel Image Filtering Approach for Sensor Fingerprint Estimation in Source Camera Identification},
     booktitle = {Proc. 12th IEEE Int Advanced Video and Signal Based Surveillance (AVSS) Conf},
     year = {2015},
     pages = {1--5}}
    
  10. A.S. Alfraih, J.A. Briffa & S. Wesemeyer
    Cloning Localization Approach Using K-means Clustering and Support Vector Machine
    Journal of Electronic Imaging, 2015, Vol. 24(4), pp. 043019
    DOI: 10.1117/1.JEI.24.4.043019
    BibTeX
    @article{Alfraih2015,
     author = {Alfraih, Areej S. and Briffa, Johann A. and Wesemeyer, Stephan},
     title = {Cloning Localization Approach Using K-means Clustering and Support Vector Machine},
     journal = {Journal of Electronic Imaging},
     year = {2015},
     volume = {24},
     number = {4},
     pages = {043019}}
    
  11. A.S. Alfraih, J.A. Briffa & S. Wesemeyer
    Cloning Localization Based on Feature Extraction and K-means Clustering
    Digital-Forensics and Watermarking, Springer, 2015
    DOI: 10.1007/978-3-319-19321-2_31
    BibTeX
    @article{Alfraih2015a,
     author = {Alfraih, Areej S. and Briffa, Johann A. and Wesemeyer, Stephan},
     title = {Cloning Localization Based on Feature Extraction and K-means Clustering},
     journal = {Digital-Forensics and Watermarking},
     publisher = {Springer},
     year = {2015}}
    
  12. O.M. Al-Qershi & B.E. Khoo
    Enhanced Matching Method for Copy-move Forgery Detection by Means of Zernike Moments
    Digital-Forensics and Watermarking, Springer, 2015
    DOI: 10.1007/978-3-319-19321-2_37
    BibTeX
    @article{Al-Qershi2015,
     author = {Al-Qershi, Osamah M. and Khoo, Bee Ee},
     title = {Enhanced Matching Method for Copy-move Forgery Detection by Means of Zernike Moments},
     journal = {Digital-Forensics and Watermarking},
     publisher = {Springer},
     year = {2015}}
    
  13. R.A. Alsanussi, H.E. Shamardan, Mostafa & S.M. Mostafa
    Detection of Copy-move Forgery in Images Containing Flipped and Random-shaped Tampered Regions
    Egyptian Computer Science Journal, ECS, 2015, Vol. 36(6), pp. 80-95
    BibTeX
    @article{Alsanussi2015,
     author = {Alsanussi, Reem A. and Shamardan, Hossam Eldeen and Mostafa and Mostafa, Sami M.},
     title = {Detection of Copy-move Forgery in Images Containing Flipped and Random-shaped Tampered Regions},
     journal = {Egyptian Computer Science Journal, ECS},
     year = {2015},
     volume = {36},
     number = {6},
     pages = {80--95}}
    
  14. I. Amerini
    A Feature-based Forensic Procedure for Splicing Forgeries Detection
    Mathematical Problems in Engineering, 2015, Vol. 2015(653164)
    DOI: 10.1155/2015/653164
    BibTeX
    @article{Amerini2015b,
     author = {Amerini, Irene},
     title = {A Feature-based Forensic Procedure for Splicing Forgeries Detection},
     journal = {Mathematical Problems in Engineering},
     year = {2015},
     volume = {2015},
     number = {653164}}
    
  15. I. Amerini, R. Becarelli, B. Bertini & R. Caldelli
    Acquisition Source Identification through a Blind Image Classification
    Image Processing, IET, 2015, Vol. 9(4), pp. 329-337
    DOI: 10.1049/iet-ipr.2014.0316
    BibTeX
    @article{Amerini2015a,
     author = {Amerini, Irene and Becarelli, R. and Bertini, B. and Caldelli, R.},
     title = {Acquisition Source Identification through a Blind Image Classification},
     journal = {Image Processing, IET},
     year = {2015},
     volume = {9},
     number = {4},
     pages = {329--337}}
    
  16. I. Amerini, R. Caldelli, A.D. Bimbo, A.D. Fuccia, A.P. Rizzo & L. Saravo
    Detection of Manipulations on Printed Images to Address Crime Scene Analysis: A Case Study
    Forensic Science International, 2015
    DOI: 10.1016/j.forsciint.2015.03.020
    BibTeX
    @article{Amerini2015,
     author = {Amerini, Irene and Caldelli, Roberto and Bimbo, Alberto Del and Fuccia, Andrea Di and Rizzo, Anna Paola and Saravo, Luigi},
     title = {Detection of Manipulations on Printed Images to Address Crime Scene Analysis: A Case Study},
     journal = {Forensic Science International},
     year = {2015}}
    
  17. B. Arbab-Zavar, X. Wei, J.D. Bustard, M.S. Nixon & C.-T. Li
    On Forensic Use of Biometrics
    Ho/Handbook of Digital Forensics of Multimedia Data and Devices
    Wiley-Blackwell, 2015, pp. 270-304
    DOI: 10.1002/9781118705773.ch7
    BibTeX
    @incollection{Arbab-Zavar2015,
     author = {Arbab-Zavar, Banafshe and Wei, Xingjie and Bustard, John D. and Nixon, Mark S. and Li, Chang-Tsun},
     title = {On Forensic Use of Biometrics},
     booktitle = {Ho/Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-Blackwell},
     year = {2015},
     pages = {270--304}}
    
  18. E. Ardizzone, A.R. Bruno & G. Mazzola
    Copy-move Forgery Detection by Matching Triangles of Keypoints
    IEEE Transactions on Information Forensics and Security, 2015, Vol. 10(10), pp. 2084-2094
    DOI: 10.1109/TIFS.2015.2445742
    BibTeX
    @article{Ardizzone2015a,
     author = {Ardizzone, Edoardo and Bruno, Arcangelo Ranieri. and Mazzola, Giuseppe},
     title = {Copy-move Forgery Detection by Matching Triangles of Keypoints},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2015},
     volume = {10},
     number = {10},
     pages = {2084--2094}}
    
  19. E. Ardizzone & G. Mazzola
    A Tool to Support the Creation of Datasets of Tampered Videos
    Image Analysis and Processing — ICIAP 2015
    Springer, 2015, pp. 665-675
    DOI: 10.1007/978-3-319-23234-8_61
    BibTeX
    @incollection{Ardizzone2015,
     author = {Ardizzone, Edoardo and Mazzola, Giuseppe},
     title = {A Tool to Support the Creation of Datasets of Tampered Videos},
     booktitle = {Image Analysis and Processing — ICIAP 2015},
     publisher = {Springer},
     year = {2015},
     pages = {665--675}}
    
  20. M. Arun Anoop
    Image Forgery and Its Detection: A Survey
    Proc. Int Innovations in Information, Embedded and Communication Systems (ICIIECS) Conf
    2015, pp. 1-9
    DOI: 10.1109/ICIIECS.2015.7193253
    BibTeX
    @inproceedings{ArunAnoop2015,
     author = {Arun Anoop, M.},
     title = {Image Forgery and Its Detection: A Survey},
     booktitle = {Proc. Int Innovations in Information, Embedded and Communication Systems (ICIIECS) Conf},
     year = {2015},
     pages = {1--9}}
    
  21. A. Arun, A. Vimala, Y.C. Joshya & C.A. Murugan
    Adaptive Neuro Fuzzy Classifier Based Digital Image Forgery Detection Using Color Illumination
    International Journal of Advanced Engineering and Global Technology, 2015, Vol. 3(2)
    BibTeX
    @article{Arun2015,
     author = {Arun, Anusree and Vimala, A. and Joshya, Y. Camy and Murugan, C. Arul},
     title = {Adaptive Neuro Fuzzy Classifier Based Digital Image Forgery Detection Using Color Illumination},
     journal = {International Journal of Advanced Engineering and Global Technology},
     year = {2015},
     volume = {3},
     number = {2}}
    
  22. K. Bahrami, A. Kot, L. Li & H. Li
    Blurred Image Splicing Localization by Exposing Blur Type Inconsistency
    Information Forensics and Security, IEEE Transactions on, 2015, Vol. 10(99), pp. 999-1009
    DOI: 10.1109/TIFS.2015.2394231
    BibTeX
    @article{Bahrami2015,
     author = {Bahrami, K. and Kot, A. and Li, L. and Li, H.},
     title = {Blurred Image Splicing Localization by Exposing Blur Type Inconsistency},
     journal = {Information Forensics and Security, IEEE Transactions on},
     year = {2015},
     volume = {10},
     number = {99},
     pages = {999--1009}}
    
  23. K. Bahrami & A.C. Kot
    Image Splicing Localization Based on Blur Type Inconsistency
    Proc. IEEE Int Circuits and Systems (ISCAS) Symp
    Institute of Electrical & Electronics Engineers (IEEE), 2015, pp. 1042-1045
    DOI: 10.1109/ISCAS.2015.7168815
    BibTeX
    @inproceedings{Bahrami2015a,
     author = {Bahrami, K. and Kot, A. C.},
     title = {Image Splicing Localization Based on Blur Type Inconsistency},
     booktitle = {Proc. IEEE Int Circuits and Systems (ISCAS) Symp},
     publisher = {Institute of Electrical & Electronics Engineers (IEEE)},
     year = {2015},
     pages = {1042--1045}}
    
  24. M. Barni, M. Fontani & B. Tondi
    Universal Counterforensics of Multiple Compressed JPEG Images
    Digital-Forensics and Watermarking, Springer, 2015
    DOI: 10.1007/978-3-319-19321-2_3
    BibTeX
    @article{Barni2015,
     author = {Barni, Mauro and Fontani, Marco and Tondi, Benedetta},
     title = {Universal Counterforensics of Multiple Compressed JPEG Images},
     journal = {Digital-Forensics and Watermarking},
     publisher = {Springer},
     year = {2015}}
    
  25. A. Bartle & A. Langley
    Analysis of Photo Response Non-uniformity (PRNU)
    Journal of Homicide and Major Incident, 2015, Vol. 10(2), pp. 45-57
    DOI: 10.1016/j.forsciint.2012.12.018
    BibTeX
    @article{Bartle2015,
     author = {Bartle, Anna and Langley, Andy},
     title = {Analysis of Photo Response Non-uniformity (PRNU)},
     journal = {Journal of Homicide and Major Incident},
     year = {2015},
     volume = {10},
     number = {2},
     pages = {45--57}}
    
  26. S. Bayram, H.T. Sencar & N. Memon
    Sensor Fingerprint Identification through Composite Fingerprints and Group Testing
    Information Forensics and Security, IEEE Transactions on, 2015, Vol. 10(3), pp. 597-612
    DOI: 10.1109/TIFS.2014.2385634
    BibTeX
    @article{Bayram2015,
     author = {Bayram, Sevinc and Sencar, H. T. and Memon, N.},
     title = {Sensor Fingerprint Identification through Composite Fingerprints and Group Testing},
     journal = {Information Forensics and Security, IEEE Transactions on},
     year = {2015},
     volume = {10},
     number = {3},
     pages = {597--612}}
    
  27. M.A. Bennet, R.K. Krishna, G.S. Babu & B.S. Jayavignesh
    Performance analysis of forgery detection of JPEG image compression
    Proc. Online Int. Conf. Green Engineering and Technologies (IC-GET)
    2015, pp. 1-12
    DOI: 10.1109/GET.2015.7453773
    BibTeX
    @inproceedings{Bennet2015,
     author = {Bennet, M. A. and Krishna, R. K. and Babu, G. S. and Jayavignesh, B. S.},
     title = {Performance analysis of forgery detection of JPEG image compression},
     booktitle = {Proc. Online Int. Conf. Green Engineering and Technologies (IC-GET)},
     year = {2015},
     pages = {1--12}}
    
  28. F. Bertini, R. Sharma, A. Iannì & D. Montesi
    Smartphone Verification and User Profiles Linking across Social Networks by Camera Fingerprinting
    Digital Forensics and Cyber Crime, Springer, 2015
    DOI: 10.1007/978-3-319-25512-5_12
    BibTeX
    @article{Bertini2015b,
     author = {Bertini, Flavio and Sharma, Rajesh and Iannì, Andrea and Montesi, Danilo},
     title = {Smartphone Verification and User Profiles Linking across Social Networks by Camera Fingerprinting},
     journal = {Digital Forensics and Cyber Crime},
     publisher = {Springer},
     year = {2015}}
    
  29. F. Bertini, R. Sharma, A. Iannì & D. Montesi
    Smartphone Verification and User Profiles Linking across Social Networks by Camera Fingerprinting
    James, J. & Breitinger, F. (ed.)
    Digital Forensics and Cyber Crime
    Springer International Publishing, 2015, Vol. 157, pp. 176-186
    DOI: 10.1007/978-3-319-25512-5_12
    BibTeX
    @incollection{Bertini2015,
     author = {Bertini, Flavio and Sharma, Rajesh and Iannì, Andrea and Montesi, Danilo},
     title = {Smartphone Verification and User Profiles Linking across Social Networks by Camera Fingerprinting},
     booktitle = {Digital Forensics and Cyber Crime},
     publisher = {Springer International Publishing},
     year = {2015},
     volume = {157},
     pages = {176--186}}
    
  30. F. Bertini, R. Sharma, A. Iann\i & D. Montesi
    Profile Resolution across Multilayer Networks through Smartphone Camera Fingerprint
    Proceedings of the 19th International Database Engineering &38, Applications Symposium
    ACM, 2015, pp. 23-32
    DOI: 10.1145/2790755.2790765
    BibTeX
    @inproceedings{Bertini2015a,
     author = {Bertini, Flavio and Sharma, Rajesh and Iann\i, Andrea and Montesi, Danilo},
     title = {Profile Resolution across Multilayer Networks through Smartphone Camera Fingerprint},
     booktitle = {Proceedings of the 19th International Database Engineering &38, Applications Symposium},
     publisher = {ACM},
     year = {2015},
     pages = {23--32}}
    
  31. X.-L. Bi, C.-M. Pun & X.-C. Yuan
    Over-segmentation Based Image Forgery Detection
    Proc of the International Conference on Electronic Science and Automation Control (ESAC 2015)
    2015
    DOI: 10.2991/esac-15.2015.7
    BibTeX
    @inproceedings{Bi2015,
     author = {Bi, Xiu-Li and Pun, Chi-Man and Yuan, Xiao-Chen},
     title = {Over-segmentation Based Image Forgery Detection},
     booktitle = {Proc of the International Conference on Electronic Science and Automation Control (ESAC 2015)},
     year = {2015}}
    
  32. T. Bianchi & A. Piva
    Image and Video Processing History Recovery
    Ho/Handbook of Digital Forensics of Multimedia Data and Devices
    Wiley-Blackwell, 2015, pp. 572-611
    DOI: 10.1002/9781118705773.ch15
    BibTeX
    @incollection{Bianchi2015,
     author = {Bianchi, Tiziano and Piva, Alessandro},
     title = {Image and Video Processing History Recovery},
     booktitle = {Ho/Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-Blackwell},
     year = {2015},
     pages = {572--611}}
    
  33. P. Binnar & V. Mane
    Robust Technique of Localizing Blurred Image Splicing Based on Exposing Blur Type Inconsistency
    Proc. Int. Conf. Applied and Theoretical Computing and Communication Technology (iCATccT)
    2015, pp. 398-402
    DOI: 10.1109/ICATCCT.2015.7456916
    BibTeX
    @inproceedings{Binnar2015,
     author = {Binnar, P. and Mane, V.},
     title = {Robust Technique of Localizing Blurred Image Splicing Based on Exposing Blur Type Inconsistency},
     booktitle = {Proc. Int. Conf. Applied and Theoretical Computing and Communication Technology (iCATccT)},
     year = {2015},
     pages = {398--402}}
    
  34. I.N. Blokhin & S.N. Ilchenko
    Fake As a Format of Modern Journalism: The Information Reliability Problem
    Indian Journal of Science and Technology, 2015, Vol. 8(Special Issue 10)
    DOI: 10.17485/ijst/2015/v8is(10)/84840
    BibTeX
    @article{Blokhin2015,
     author = {Blokhin, Igor Nikolaevich and Ilchenko, Sergey Nikolaevich},
     title = {Fake As a Format of Modern Journalism: The Information Reliability Problem},
     journal = {Indian Journal of Science and Technology},
     year = {2015},
     volume = {8},
     number = {Special Issue 10}}
    
  35. T.K. Boaz & C.J. Prabhakar
    Localization Overlaid Text Based on Noise Inconsistencies
    Advanced Computational Intelligence: An International Journal, 2015
    BibTeX
    @article{Boaz2015,
     author = {Boaz, Too Kipyego and Prabhakar, C. J.},
     title = {Localization Overlaid Text Based on Noise Inconsistencies},
     journal = {Advanced Computational Intelligence: An International Journal},
     year = {2015}}
    
  36. W. Burger & M.J. Burge
    Digital Image Processing: An Algorithmic Introduction Using Java
    Springer, 2015
    DOI: 10.1007/978-1-84800-195-4_1
    BibTeX
    @book{Burger2015,
     author = {Burger, Wilhelm and Burge, Mark J.},
     title = {Digital Image Processing: An Algorithmic Introduction Using Java},
     publisher = {Springer},
     year = {2015},
     edition = {3rd}}
    
  37. R. Caldelli, I. Amerini & A. Costanzo
    SIFT Match Removal and Keypoint Preservation through Dominant Orientation Shift
    Proc. of the 23rd European Signal Processing Conference (EUSIPCO) 2015
    Institute of Electrical & Electronics Engineers (IEEE), 2015
    DOI: 10.1109/eusipco.2015.7362747
    BibTeX
    @inproceedings{Caldelli2015,
     author = {Caldelli, R. and Amerini, Irene and Costanzo, A.},
     title = {SIFT Match Removal and Keypoint Preservation through Dominant Orientation Shift},
     booktitle = {Proc. of the 23rd European Signal Processing Conference (EUSIPCO) 2015},
     publisher = {Institute of Electrical & Electronics Engineers (IEEE)},
     year = {2015}}
    
  38. G. Cao, Y. Chen, G. Zong & Y. Chen
    Detection of copy-move forgery in digital image using locality preserving projections
    Proc. 8th Int. Congress Image and Signal Processing (CISP)
    2015, pp. 599-603
    DOI: 10.1109/CISP.2015.7407949
    BibTeX
    @inproceedings{Cao2015c,
     author = {Cao, G. and Chen, Y. and Zong, G. and Chen, Y.},
     title = {Detection of copy-move forgery in digital image using locality preserving projections},
     booktitle = {Proc. 8th Int. Congress Image and Signal Processing (CISP)},
     year = {2015},
     pages = {599--603}}
    
  39. G. Cao, Y. Wang, Y. Zhao, R. Ni & C. Lin
    On the Security of Image Manipulation Forensics
    Ho, Y.-S., Sang, J., Ro, Y., Kim, J. & Wu, F. (ed.)
    Advances in Multimedia Information Processing - PCM 2015
    Advances in Multimedia Information Processing -- PCM 2015, Springer Science + Business Media, 2015, Vol. 9314, pp. 97-105
    DOI: 10.1007/978-3-319-24075-6_10
    BibTeX
    @incollection{Cao2015b,
     author = {Cao, Gang and Wang, Yongbin and Zhao, Yao and Ni, Rongrong and Lin, Chunyu},
     title = {On the Security of Image Manipulation Forensics},
     booktitle = {Advances in Multimedia Information Processing - PCM 2015},
     journal = {Advances in Multimedia Information Processing -- PCM 2015},
     publisher = {Springer Science + Business Media},
     year = {2015},
     volume = {9314},
     pages = {97--105}}
    
  40. X. Cao, H. Zhao, C. Wang & W. Zhang
    Image Composite Authentication Using a Single Shadow Observation
    Science China Information Sciences, Science China Press, 2015, pp. 1-13
    DOI: 10.1007/s11432-015-5296-8
    BibTeX
    @article{Cao2015a,
     author = {Cao, XiaoChun and Zhao, HanDong and Wang, Chuan and Zhang, Wei},
     title = {Image Composite Authentication Using a Single Shadow Observation},
     journal = {Science China Information Sciences},
     publisher = {Science China Press},
     year = {2015},
     pages = {1--13}}
    
  41. Y. Cao, T. Gao, G. Sheng, L. Fan & L. Gao
    A New Anti-forensic Scheme--hiding the Single JPEG Compression Trace for Digital Image.
    J Forensic Sci, College of Information Technical Science, Nankai University, No 94, Weijin Road, Tianjin, Nankai District, 300071, China., College of Information Technical Science, Nankai University, No 94, Weijin Road, Tianjin, Nankai District, 300071, China., 2015, Vol. 60(1), pp. 197-205
    DOI: 10.1111/1556-4029.12618
    BibTeX
    @article{Cao2015,
     author = {Cao, Yanjun and Gao, Tiegang and Sheng, Guorui and Fan, Li and Gao, Lin},
     title = {A New Anti-forensic Scheme--hiding the Single JPEG Compression Trace for Digital Image.},
     journal = {J Forensic Sci},
     school = {College of Information Technical Science, Nankai University, No 94, Weijin Road, Tianjin, Nankai District, 300071, China.},
     year = {2015},
     volume = {60},
     number = {1},
     pages = {197--205}}
    
  42. M. Carnein, P. Schöttle & R. Böhme
    Forensics of High-quality JPEG Images with Color Subsampling
    Information Forensics and Security (WIFS), 2015 IEEE International Workshop on
    Institute of Electrical & Electronics Engineers (IEEE), 2015, pp. 1-6
    DOI: 10.1109/WIFS.2015.7368556
    BibTeX
    @inproceedings{Carnein2015,
     author = {Carnein, M. and Schöttle, P. and Böhme, R.},
     title = {Forensics of High-quality JPEG Images with Color Subsampling},
     booktitle = {Information Forensics and Security (WIFS), 2015 IEEE International Workshop on},
     publisher = {Institute of Electrical & Electronics Engineers (IEEE)},
     year = {2015},
     pages = {1--6}}
    
  43. M. Carnein, P. Schöttle & R. Böhme
    Forensics of high-quality JPEG images with color subsampling
    Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)
    2015, pp. 1-6
    DOI: 10.1109/WIFS.2015.7368556
    BibTeX
    @inproceedings{Carnein2015a,
     author = {Carnein, M. and Schöttle, P. and Böhme, R.},
     title = {Forensics of high-quality JPEG images with color subsampling},
     booktitle = {Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)},
     year = {2015},
     pages = {1--6}}
    
  44. T. Carvalho, F.A. Faria, H. Pedrini, R.S. Torres & A. Rocha
    Illuminant-based Transformed Spaces for Image Forensics
    IEEE Transactions on Information Forensics and Security, 2015, Vol. PP(99), pp. 1
    DOI: 10.1109/TIFS.2015.2506548
    BibTeX
    @article{Carvalho2015a,
     author = {Carvalho, T. and Faria, F. A. and Pedrini, H. and Torres, R. S. and Rocha, A.},
     title = {Illuminant-based Transformed Spaces for Image Forensics},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2015},
     volume = {PP},
     number = {99},
     pages = {1}}
    
  45. T. Carvalho, H. Farid & E. Kee
    Exposing Photo Manipulation from User-guided 3D Lighting Analysis
    IS&T/SPIE Electronic Imaging
    Proc. SPIE, 2015, Vol. 9409, pp. 940902-940902-10
    DOI: 10.1117/12.2075544
    BibTeX
    @inproceedings{Carvalho2015,
     author = {Carvalho, Tiago and Farid, Hany and Kee, Eric},
     title = {Exposing Photo Manipulation from User-guided 3D Lighting Analysis},
     booktitle = {IS&T/SPIE Electronic Imaging},
     journal = {Proc. SPIE},
     year = {2015},
     volume = {9409},
     pages = {940902-940902-10}}
    
  46. G. Cattaneo, U. Ferraro Petrillo, G. Roscigno & C. Fusco
    A PNU-based Technique to Detect Forged Regions in Digital Images
    Battiato, S., Blanc-Talon, J., Gallo, G., Philips, W., Popescu, D. & Scheunders, P. (ed.)
    Advanced Concepts for Intelligent Vision Systems
    Advanced Concepts for Intelligent Vision Systems, Springer, 2015, Vol. 9386, pp. 486-498
    DOI: 10.1007/978-3-319-25903-1_42
    BibTeX
    @article{Cattaneo2015,
     author = {Cattaneo, Giuseppe and Ferraro Petrillo, Umberto and Roscigno, Gianluca and Fusco, Carmine},
     title = {A PNU-based Technique to Detect Forged Regions in Digital Images},
     booktitle = {Advanced Concepts for Intelligent Vision Systems},
     journal = {Advanced Concepts for Intelligent Vision Systems},
     publisher = {Springer},
     year = {2015},
     volume = {9386},
     pages = {486--498}}
    
  47. J. Charpe & A. Bhattacharya
    Revealing Image Forgery through Image Manipulation Detection
    Proc. Global Conf. Communication Technologies (GCCT)
    2015, pp. 723-727
    DOI: 10.1109/GCCT.2015.7342759
    BibTeX
    @inproceedings{Charpe2015,
     author = {Charpe, J. and Bhattacharya, A.},
     title = {Revealing Image Forgery through Image Manipulation Detection},
     booktitle = {Proc. Global Conf. Communication Technologies (GCCT)},
     year = {2015},
     pages = {723--727}}
    
  48. B. Chen, G. Coatrieux, J. Wu, Z. Dong, J. Coatrieux & H. Shu
    Fast Computation of Sliding Discrete Tchebichef Moments and Its Application in Duplicated Regions Detection
    IEEE Transactions on Signal Processing, Institute of Electrical and Electronics Engineers (IEEE), 2015, Vol. 63(20), pp. 5424-5436
    DOI: 10.1109/TSP.2015.2451107
    BibTeX
    @article{Chen2015b,
     author = {Chen, B. and Coatrieux, G. and Wu, J. and Dong, Z. and Coatrieux, J. and Shu, H.},
     title = {Fast Computation of Sliding Discrete Tchebichef Moments and Its Application in Duplicated Regions Detection},
     journal = {IEEE Transactions on Signal Processing},
     publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
     year = {2015},
     volume = {63},
     number = {20},
     pages = {5424--5436}}
    
  49. C. Chen & M.C. Stamm
    Camera Model Identification Framework Using an Ensemble of Demosaicing Features
    Information Forensics and Security (WIFS), 2015 IEEE International Workshop on
    2015, pp. 1-6
    DOI: 10.1109/WIFS.2015.7368573
    BibTeX
    @inproceedings{Chen2015a,
     author = {Chen, Chen and Stamm, M. C.},
     title = {Camera Model Identification Framework Using an Ensemble of Demosaicing Features},
     booktitle = {Information Forensics and Security (WIFS), 2015 IEEE International Workshop on},
     year = {2015},
     pages = {1--6}}
    
  50. J. Chen, X. Kang, Y. Liu & Z.J. Wang
    Median Filtering Forensics Based on Convolutional Neural Networks
    Signal Processing Letters, IEEE, 2015, Vol. 22(11), pp. 1849-1853
    DOI: 10.1109/LSP.2015.2438008
    BibTeX
    @article{Chen2015,
     author = {Chen, J. and Kang, X. and Liu, Y. and Wang, Z. J.},
     title = {Median Filtering Forensics Based on Convolutional Neural Networks},
     journal = {Signal Processing Letters, IEEE},
     year = {2015},
     volume = {22},
     number = {11},
     pages = {1849--1853}}
    
  51. L.M. Chen
    Images, Videos, and Bigdata
    Mathematical Problems in Data Science
    Springer, 2015
    DOI: 10.1007/978-3-319-25127-1_5
    BibTeX
    @incollection{Chen2015c,
     author = {Chen, Li M.},
     title = {Images, Videos, and Bigdata},
     booktitle = {Mathematical Problems in Data Science},
     publisher = {Springer},
     year = {2015}}
    
  52. S. Chen, S. Tan, B. Li & J. Huang
    Automatic Detection of Object-based Forgery in Advanced Video
    IEEE Transactions on Circuits and Systems for Video Technology, Institute of Electrical and Electronics Engineers (IEEE), 2015, Vol. PP(11), pp. 2138-2151
    DOI: 10.1109/TCSVT.2015.2473436
    BibTeX
    @article{Chen2015d,
     author = {Chen, Shengda and Tan, Shunquan and Li, Bin and Huang, Jiwu},
     title = {Automatic Detection of Object-based Forgery in Advanced Video},
     journal = {IEEE Transactions on Circuits and Systems for Video Technology},
     publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
     year = {2015},
     volume = {PP},
     number = {11},
     pages = {2138--2151}}
    
  53. P.K. Chiluka, S.R. Das, M.H. Assaf, S.N. Biswas, S. Morton, E.M. Petriu & V. Groza
    Digital Wavelet Transform Based Image Forgery Detection Using Post -processing
    Proc of SDPS 2015, 2015
    BibTeX
    @article{Chiluka2015,
     author = {Chiluka, Praveen K. and Das, Sunil R. and Assaf, Mansour H. and Biswas, Satyendra N. and Morton, Scott and Petriu, Emil M. and Groza, Voicu},
     title = {Digital Wavelet Transform Based Image Forgery Detection Using Post -processing},
     journal = {Proc of SDPS 2015},
     year = {2015}}
    
  54. Christopher & T.A. Kovashka
    Who’s behind the Camera? Identifying the Authorship of a Photograph
    arXiv, 2015
    BibTeX
    @article{Christopher2015,
     author = {Christopher and Kovashka, Thomas Adriana},
     title = {Who’s behind the Camera? Identifying the Authorship of a Photograph},
     journal = {arXiv},
     year = {2015}}
    
  55. X. Chu
    Fundamental Limits in Multimedia Forensics and Anti-forensics
    Faculty of the Graduate School of the University of Maryland, Department of Electrical and Computer Engineering University of Maryland, 2015
    BibTeX
    @phdthesis{Chu2015a,
     author = {Chu, X.},
     title = {Fundamental Limits in Multimedia Forensics and Anti-forensics},
     school = {Faculty of the Graduate School of the University of Maryland},
     year = {2015}}
    
  56. X. Chu, Y. Chen, M. Stamm & K. Liu
    Information Theoretical Limit of Media Forensics: The Forensicability
    IEEE Transactions on Information Forensics and Security, 2015, Vol. PP(99), pp. 1
    DOI: 10.1109/TIFS.2015.2510820
    BibTeX
    @article{Chu2015e,
     author = {Chu, X. and Chen, Y. and Stamm, M. and Liu, K.},
     title = {Information Theoretical Limit of Media Forensics: The Forensicability},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2015},
     volume = {PP},
     number = {99},
     pages = {1}}
    
  57. X. Chu, M.C. Stamm, Y. Chen & K.J.R. Liu
    On Antiforensic Concealability with Rate-distortion Tradeoff
    Image Processing, IEEE Transactions on, 2015, Vol. 24(3), pp. 1087-1100
    DOI: 10.1109/TIP.2015.2390137
    BibTeX
    @article{Chu2015,
     author = {Chu, X. and Stamm, M. C. and Chen, Y. and Liu, K. J. R.},
     title = {On Antiforensic Concealability with Rate-distortion Tradeoff},
     journal = {Image Processing, IEEE Transactions on},
     year = {2015},
     volume = {24},
     number = {3},
     pages = {1087--1100}}
    
  58. D. Codreanu, A. Peninou & F. Sedes
    Video Spatio-Temporal Filtering Based on Cameras and Target Objects Trajectories -- Videosurveillance Forensic Framework
    Proc. 10th Int Availability, Reliability and Security (ARES) Conf
    2015, pp. 611-617
    DOI: 10.1109/ARES.2015.102
    BibTeX
    @inproceedings{Codreanu2015,
     author = {Codreanu, D. and Peninou, A. and Sedes, F.},
     title = {Video Spatio-Temporal Filtering Based on Cameras and Target Objects Trajectories -- Videosurveillance Forensic Framework},
     booktitle = {Proc. 10th Int Availability, Reliability and Security (ARES) Conf},
     year = {2015},
     pages = {611--617}}
    
  59. V. Conotter, P. Comesana & F. Perez-Gonzalez
    Forensic Detection of Processing Operator Chains: Recovering the History of Filtered JPEG Images
    Information Forensics and Security, IEEE Transactions on, 2015(99)
    DOI: 10.1109/TIFS.2015.2424195
    BibTeX
    @article{Conotter2015,
     author = {Conotter, V. and Comesana, P. and Perez-Gonzalez, F.},
     title = {Forensic Detection of Processing Operator Chains: Recovering the History of Filtered JPEG Images},
     journal = {Information Forensics and Security, IEEE Transactions on},
     year = {2015},
     number = {99}}
    
  60. V. Conotter, P. Comesaña & F. Pérez-González
    Forensic Detection of Processing Operator Chains: Recovering the History of Filtered JPEG Images
    IEEE Transactions on Information Forensics and Security, 2015, Vol. 10(11), pp. 2257-2269
    DOI: 10.1109/TIFS.2015.2424195
    BibTeX
    @article{Conotter2015a,
     author = {Conotter, V. and Comesaña, P. and Pérez-González, F.},
     title = {Forensic Detection of Processing Operator Chains: Recovering the History of Filtered JPEG Images},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2015},
     volume = {10},
     number = {11},
     pages = {2257--2269}}
    
  61. suisse de la presse Consiglio svizzero della stampa & S.P. Conseil
    Richtlinien Zur «erklärung Der Pflichten Und Rechte Der Journalistinnen Und Journalisten»
    2015
    BibTeX
    @electronic{SchweizerPresserat2015,
     author = {suisse de la presse Consiglio svizzero della stampa and Conseil, Schweizer Presserat},
     title = {Richtlinien Zur «erklärung Der Pflichten Und Rechte Der Journalistinnen Und Journalisten»},
     year = {2015}}
    
  62. J.R. Corripio, A.L.S. Orozco & L.J.G. Villalba
    Unsupervised Classification of Mobile Device Images
    ICIT 2015 The 7th International Conference on Information Technology
    2015
    DOI: 10.15849/icit.2015.0014
    BibTeX
    @inproceedings{Corripio2015,
     author = {Corripio, Jocelin Rosales and Orozco, Ana Lucila Sandoval and Villalba, Luis Javier García},
     title = {Unsupervised Classification of Mobile Device Images},
     booktitle = {ICIT 2015 The 7th International Conference on Information Technology},
     year = {2015}}
    
  63. J.R. Corripio, A.L.S. Orozco & L.J.G. Villalba
    New Technique of Forensic Analysis for Digital Cameras in Mobile Devices
    Proc of the 7th International Conference on Information Technology ICIT
    2015
    DOI: 10.15849/icit.2015.0105
    BibTeX
    @inproceedings{Corripio2015a,
     author = {Corripio, Jocelin Rosales and Orozco, Ana Lucila Sandoval and Villalba, Luis Javier García},
     title = {New Technique of Forensic Analysis for Digital Cameras in Mobile Devices},
     booktitle = {Proc of the 7th International Conference on Information Technology ICIT},
     year = {2015}}
    
  64. D. Cozzolino, G. Poggi & L. Verdoliva
    Splicebuster: A New Blind Image Splicing Detector
    Information Forensics and Security (WIFS), 2015 IEEE International Workshop on
    2015, pp. 1-6
    DOI: 10.1109/WIFS.2015.7368565
    BibTeX
    @inproceedings{Cozzolino2015,
     author = {Cozzolino, D. and Poggi, G. and Verdoliva, L.},
     title = {Splicebuster: A New Blind Image Splicing Detector},
     booktitle = {Information Forensics and Security (WIFS), 2015 IEEE International Workshop on},
     year = {2015},
     pages = {1--6}}
    
  65. D. Cozzolino, G. Poggi & L. Verdoliva
    Efficient Dense-field Copy-move Forgery Detection
    IEEE Transactions on Information Forensics and Security, 2015
    DOI: 10.1109/TIFS.2015.2455334
    BibTeX
    @article{Cozzolino2015a,
     author = {Cozzolino, D. and Poggi, G. and Verdoliva, L.},
     title = {Efficient Dense-field Copy-move Forgery Detection},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2015}}
    
  66. L. D'Amiano, D. Cozzolino, G. Poggi & L. Verdoliva
    Video Forgery Detection and Localization Based on 3D Patchmatch
    Proc. IEEE Int Multimedia & Expo Workshops (ICMEW) Conf
    2015, pp. 1-6
    DOI: 10.1109/ICMEW.2015.7169805
    BibTeX
    @inproceedings{DAmiano2015,
     author = {D'Amiano, L. and Cozzolino, D. and Poggi, G. and Verdoliva, L.},
     title = {Video Forgery Detection and Localization Based on 3D Patchmatch},
     booktitle = {Proc. IEEE Int Multimedia & Expo Workshops (ICMEW) Conf},
     year = {2015},
     pages = {1--6}}
    
  67. L. D’Amiano, D. Cozzolino, G. Poggi & L. Verdoliva
    Video Forgery Detection and Localization Based on 3D Patchmatch
    Proc. IEEE Int Multimedia & Expo Workshops (ICMEW) Conf, 2015
    DOI: 10.1109/icmew.2015.7169805
    BibTeX
    @article{D’Amiano2015,
     author = {D’Amiano, L. and Cozzolino, D. and Poggi, G. and Verdoliva, L.},
     title = {Video Forgery Detection and Localization Based on 3D Patchmatch},
     journal = {Proc. IEEE Int Multimedia & Expo Workshops (ICMEW) Conf},
     year = {2015}}
    
  68. P. Dangale, P. Amage, S. Ubale, D. Jadhav & G.M. Gaikwad
    Image Validation by Demosaicing
    International Journal of Advanced Research in Computer and Communication Engineering, 2015, Vol. 4(4), pp. 118-121
    DOI: 10.17148/ijarcce.2015.4329
    BibTeX
    @article{Dangale2015,
     author = {Dangale, P. and Amage, P. and Ubale, S. and Jadhav, D. and Gaikwad, G. M.},
     title = {Image Validation by Demosaicing},
     journal = {International Journal of Advanced Research in Computer and Communication Engineering},
     year = {2015},
     volume = {4},
     number = {4},
     pages = {118--121}}
    
  69. D.-T. Dang-Nguyen, C. Pasquini, V. Conotter & G. Boato
    Raise: A Raw Images Dataset for Digital Image Forensics
    Proceedings of the 6th ACM Multimedia Systems Conference
    ACM, 2015, pp. 219-224
    DOI: 10.1145/2713168.2713194
    BibTeX
    @inproceedings{Dang-Nguyen2015,
     author = {Dang-Nguyen, Duc-Tien and Pasquini, Cecilia and Conotter, Valentina and Boato, Giulia},
     title = {Raise: A Raw Images Dataset for Digital Image Forensics},
     booktitle = {Proceedings of the 6th ACM Multimedia Systems Conference},
     publisher = {ACM},
     year = {2015},
     pages = {219--224}}
    
  70. R. Davarzani, S. Mozaffari & Kh.Yaghmaie
    Image Authentication Using LBP-based Perceptual Image Hashing
    Journal of AI and Data Mining, 2015
    BibTeX
    @article{Davarzani2015,
     author = {Davarzani, R. and Mozaffari, S. and Kh.Yaghmaie},
     title = {Image Authentication Using LBP-based Perceptual Image Hashing},
     journal = {Journal of AI and Data Mining},
     year = {2015}}
    
  71. A. De Rosa, M. Fontani, M. Massai, A. Piva & M. Barni
    Second-order Statistics Analysis to Cope with Contrast Enhancement Counter-forensics
    Signal Processing Letters, IEEE, 2015, Vol. 22(8), pp. 1132-1136
    DOI: 10.1109/LSP.2015.2389241
    BibTeX
    @article{DeRosa2015,
     author = {De Rosa, A. and Fontani, M. and Massai, M. and Piva, A. and Barni, Mauro},
     title = {Second-order Statistics Analysis to Cope with Contrast Enhancement Counter-forensics},
     journal = {Signal Processing Letters, IEEE},
     year = {2015},
     volume = {22},
     number = {8},
     pages = {1132--1136}}
    
  72. L. Debiasi
    A Forensic Analysis of the CASIA-iris V4 Database
    Inst f. Angewandte Informatik an der Paris-Lodron-Universität Salzburg, Inst f. Angewandte Informatik an der Paris-Lodron-Universität Salzburg, 2015
    BibTeX
    @mastersthesis{Debiasi2015b,
     author = {Debiasi, Luca},
     title = {A Forensic Analysis of the CASIA-iris V4 Database},
     school = {Inst f. Angewandte Informatik an der Paris-Lodron-Universität Salzburg},
     year = {2015}}
    
  73. L. Debiasi & A. Uhl
    Blind Biometric Source Sensor Recognition Using Advanced PRNU Fingerprints
    Proc. of the 23rd European Signal Processing Conference (EUSIPCO) 2015
    2015
    DOI: 10.1109/eusipco.2015.7362489
    BibTeX
    @inproceedings{Debiasi2015,
     author = {Debiasi, Luca and Uhl, Andreas},
     title = {Blind Biometric Source Sensor Recognition Using Advanced PRNU Fingerprints},
     booktitle = {Proc. of the 23rd European Signal Processing Conference (EUSIPCO) 2015},
     year = {2015}}
    
  74. L. Debiasi & A. Uhl
    Techniques for a Forensic Analysis of the CASia-IRis V4 Database
    Proc. Int Biometrics and Forensics (IWBF) Workshop
    2015, pp. 1-6
    DOI: 10.1109/IWBF.2015.7110236
    BibTeX
    @inproceedings{Debiasi2015a,
     author = {Debiasi, L. and Uhl, A.},
     title = {Techniques for a Forensic Analysis of the CASia-IRis V4 Database},
     booktitle = {Proc. Int Biometrics and Forensics (IWBF) Workshop},
     year = {2015},
     pages = {1--6}}
    
  75. S. Dhevana & C. Jayasri
    A Bayesian Classifier Approach for Glcm Based Image Forgery Detection
    International Journal of Engineering Research & Technology, 2015, Vol. 4(2)
    BibTeX
    @article{Dhevana2015,
     author = {Dhevana, S. and Jayasri, C.},
     title = {A Bayesian Classifier Approach for Glcm Based Image Forgery Detection},
     journal = {International Journal of Engineering Research & Technology},
     year = {2015},
     volume = {4},
     number = {2}}
    
  76. F. Ding, G. Zhu, J. Yang, J. Xie & Y.Q. Shi
    Edge Perpendicular Binary Coding for USM Sharpening Detection
    IEEE Signal Processing Letters, 2015, Vol. 22(3), pp. 327-331
    DOI: 10.1109/LSP.2014.2359033
    BibTeX
    @article{Ding2015,
     author = {Ding, F. and Zhu, G. and Yang, J. and Xie, J. and Shi, Y. Q.},
     title = {Edge Perpendicular Binary Coding for USM Sharpening Detection},
     journal = {IEEE Signal Processing Letters},
     year = {2015},
     volume = {22},
     number = {3},
     pages = {327--331}}
    
  77. A. Ebrahimi, S. Ibrahim, E. Ghazizadeh & M. Alizadeh
    Paint-doctored JPEG Image Forensics Based on Blocking Artifacts
    Proc. Int Computing and Communication (IEMCON) Conf. and Workshop
    2015, pp. 1-5
    DOI: 10.1109/IEMCON.2015.7344427
    BibTeX
    @inproceedings{Ebrahimi2015,
     author = {Ebrahimi, Ali and Ibrahim, Subariah and Ghazizadeh, Eghbal and Alizadeh, Mojtaba},
     title = {Paint-doctored JPEG Image Forensics Based on Blocking Artifacts},
     booktitle = {Proc. Int Computing and Communication (IEMCON) Conf. and Workshop},
     year = {2015},
     pages = {1--5}}
    
  78. A. Ebrahimi, S. Ibrahim, E. Ghazizadeh & M. Alizadeh
    Paint-doctored JPEG image forensics based on blocking artifacts
    Proc. Int. Conf. and Workshop Computing and Communication (IEMCON)
    2015, pp. 1-5
    DOI: 10.1109/IEMCON.2015.7344427
    BibTeX
    @inproceedings{Ebrahimi2015a,
     author = {Ebrahimi, A. and Ibrahim, S. and Ghazizadeh, E. and Alizadeh, M.},
     title = {Paint-doctored JPEG image forensics based on blocking artifacts},
     booktitle = {Proc. Int. Conf. and Workshop Computing and Communication (IEMCON)},
     year = {2015},
     pages = {1--5}}
    
  79. J.G.R. Elwin & G. Kousalya
    Image Forgery Detection Using Multidimensional Spectral Hashing Based Polar Cosine Transform
    Indian Journal of Science and Technology, 2015, Vol. 8(S9), pp. 128-139
    DOI: 10.17485/ijst/2015/v8is9/54344
    BibTeX
    @article{Elwin2015,
     author = {Elwin, J. Granty Regina and Kousalya, G.},
     title = {Image Forgery Detection Using Multidimensional Spectral Hashing Based Polar Cosine Transform},
     journal = {Indian Journal of Science and Technology},
     year = {2015},
     volume = {8},
     number = {S9},
     pages = {128--139}}
    
  80. M. Emam, Q. Han & X. Niu
    PCET Based Copy-move Forgery Detection in Images under Geometric Transforms
    Multimedia Tools and Applications, Springer US, 2015, pp. 1-15
    DOI: 10.1007/s11042-015-2872-2
    BibTeX
    @article{Emam2015a,
     author = {Emam, Mahmoud and Han, Qi and Niu, Xiamu},
     title = {PCET Based Copy-move Forgery Detection in Images under Geometric Transforms},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer US},
     year = {2015},
     pages = {1--15}}
    
  81. M. Emam, Q. Han, L. Yu, Y. Zhang & X. Niu
    A Passive Technique for Detecting Copy-move Forgery with Rotation Based on Polar Complex Exponential Transform
    Proc. SPIE 9631, Seventh International Conference on Digital Image Processing (ICDIP 2015)
    Proc. SPIE, 2015, Vol. 9631, pp. 963104-963104-6
    DOI: 10.1117/12.2196997
    BibTeX
    @inproceedings{Emam2015,
     author = {Emam, Mahmoud and Han, Qi and Yu, Liyang and Zhang, Ye and Niu, Xiamu},
     title = {A Passive Technique for Detecting Copy-move Forgery with Rotation Based on Polar Complex Exponential Transform},
     booktitle = {Proc. SPIE 9631, Seventh International Conference on Digital Image Processing (ICDIP 2015)},
     journal = {Proc. SPIE},
     year = {2015},
     volume = {9631},
     pages = {963104-963104-6}}
    
  82. G. Fahmy
    Integer DCT Convergence for JPEG-75 Forensics for Images
    Journal of Information Assurance and Security, 2015, Vol. 10, pp. 80-88
    BibTeX
    @article{Fahmy2015a,
     author = {Fahmy, Gamal},
     title = {Integer DCT Convergence for JPEG-75 Forensics for Images},
     journal = {Journal of Information Assurance and Security},
     year = {2015},
     volume = {10},
     pages = {80--88}}
    
  83. G. Fahmy, A. Alqallaf & R. Wurtz
    Phase based detection of JPEG counter forensics
    Proc. and Systems (ICECS) 2015 IEEE Int. Conf. Electronics, Circuits
    2015, pp. 37-40
    DOI: 10.1109/ICECS.2015.7440243
    BibTeX
    @inproceedings{Fahmy2015b,
     author = {Fahmy, G. and Alqallaf, A. and Wurtz, R.},
     title = {Phase based detection of JPEG counter forensics},
     booktitle = {Proc. and Systems (ICECS) 2015 IEEE Int. Conf. Electronics, Circuits},
     year = {2015},
     pages = {37--40}}
    
  84. O.M. Fahmy
    An Efficient Clustering Technique for Cameras Identification Using Sensor Pattern Noise
    Proc. Int Systems, Signals and Image Processing (IWSSIP) Conf
    2015, pp. 249-252
    DOI: 10.1109/IWSSIP.2015.7314223
    BibTeX
    @inproceedings{Fahmy2015,
     author = {Fahmy, O. M.},
     title = {An Efficient Clustering Technique for Cameras Identification Using Sensor Pattern Noise},
     booktitle = {Proc. Int Systems, Signals and Image Processing (IWSSIP) Conf},
     year = {2015},
     pages = {249--252}}
    
  85. J. Fan, T. Chen & J. Cao
    Image Tampering Detection Using Noise Histogram Features
    Proc. IEEE Int Digital Signal Processing (DSP) Conf
    2015, pp. 1044-1048
    DOI: 10.1109/ICDSP.2015.7252037
    BibTeX
    @inproceedings{Fan2015b,
     author = {Fan, Jiayuan and Chen, Tao and Cao, Jiuwen},
     title = {Image Tampering Detection Using Noise Histogram Features},
     booktitle = {Proc. IEEE Int Digital Signal Processing (DSP) Conf},
     year = {2015},
     pages = {1044--1048}}
    
  86. W. Fan
    Towards Digital Image Anti-Forensics via Image RestorationVers l’anti-criminalistique en images numériques via la restauration d’images
    Université Grenoble Alpes, Université Grenoble Alpes, 2015
    BibTeX
    @phdthesis{Fan2015a,
     author = {Fan, Wei},
     title = {Towards Digital Image Anti-Forensics via Image RestorationVers l’anti-criminalistique en images numériques via la restauration d’images},
     school = {Université Grenoble Alpes},
     year = {2015}}
    
  87. W. Fan, K. Wang & F. Cayre
    General-purpose Image Forensics Using Patch Likelihood under Image Statistical Models
    Proc. IEEE Int Information Forensics and Security (WIFS) Workshop
    Institute of Electrical & Electronics Engineers (IEEE), 2015, pp. 1-6
    DOI: 10.1109/WIFS.2015.7368606
    BibTeX
    @inproceedings{Fan2015e,
     author = {Fan, W. and Wang, K. and Cayre, F.},
     title = {General-purpose Image Forensics Using Patch Likelihood under Image Statistical Models},
     booktitle = {Proc. IEEE Int Information Forensics and Security (WIFS) Workshop},
     publisher = {Institute of Electrical & Electronics Engineers (IEEE)},
     year = {2015},
     pages = {1--6}}
    
  88. W. Fan, K. Wang & F. Cayre
    General-purpose image forensics using patch likelihood under image statistical models
    Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)
    2015, pp. 1-6
    DOI: 10.1109/WIFS.2015.7368606
    BibTeX
    @inproceedings{Fan2015f,
     author = {Fan, W. and Wang, K. and Cayre, F.},
     title = {General-purpose image forensics using patch likelihood under image statistical models},
     booktitle = {Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)},
     year = {2015},
     pages = {1--6}}
    
  89. W. Fan, K. Wang, F. Cayre & Z. Xiong
    Median Filtered Image Quality Enhancement and Anti-forensics Via Variational Deconvolution
    Information Forensics and Security, IEEE Transactions on, 2015, Vol. 10(99), pp. 1076-1091
    DOI: 10.1109/TIFS.2015.2398362
    BibTeX
    @article{Fan2015,
     author = {Fan, W. and Wang, K. and Cayre, F. and Xiong, Z.},
     title = {Median Filtered Image Quality Enhancement and Anti-forensics Via Variational Deconvolution},
     journal = {Information Forensics and Security, IEEE Transactions on},
     year = {2015},
     volume = {10},
     number = {99},
     pages = {1076--1091}}
    
  90. W. Fan, K. Wang, F. Cayre & Z. Xiong
    Median Filtered Image Quality Enhancement and Anti-Forensics via Variational Deconvolution
    #IEEE_J_IFS#, 2015, Vol. 10(5), pp. 1076-1091
    DOI: 10.1109/TIFS.2015.2398362
    BibTeX
    @article{Fan2015c,
     author = {Fan, W. and Wang, K. and Cayre, F. and Xiong, Z.},
     title = {Median Filtered Image Quality Enhancement and Anti-Forensics via Variational Deconvolution},
     journal = {#IEEE_J_IFS#},
     year = {2015},
     volume = {10},
     number = {5},
     pages = {1076--1091}}
    
  91. Y. Fan, P. Carre & C. Fernandez-Maloigne
    Image Splicing Detection with Local Illumination Estimation
    Proc. IEEE Int Image Processing (ICIP) Conf
    2015, pp. 2940-2944
    DOI: 10.1109/ICIP.2015.7351341
    BibTeX
    @inproceedings{Fan2015d,
     author = {Fan, Yu and Carre, Philippe and Fernandez-Maloigne, Christine},
     title = {Image Splicing Detection with Local Illumination Estimation},
     booktitle = {Proc. IEEE Int Image Processing (ICIP) Conf},
     year = {2015},
     pages = {2940--2944}}
    
  92. S. ..J. .. Fang & H. ..Y. .. Ge
    Chapter 65. Detecting Image Authenticity Based on Lambert Illumination Model and Shadows
    Network Security and Communication Engineering
    Network Security and Communication Engineering, Informa UK Limited, 2015, pp. 313-316
    DOI: 10.1201/b18660-70
    BibTeX
    @incollection{Fang2015,
     author = {Fang, S. . J. . and Ge, H. . Y. .},
     title = {Chapter 65. Detecting Image Authenticity Based on Lambert Illumination Model and Shadows},
     booktitle = {Network Security and Communication Engineering},
     journal = {Network Security and Communication Engineering},
     publisher = {Informa UK Limited},
     year = {2015},
     pages = {313--316}}
    
  93. G.M. Farinella, M.V. Giuffrida, V. Digiacomo & S. Battiato
    On Blind Source Camera Identification
    Battiato, S., Blanc-Talon, J., Gallo, G., Philips, W., Popescu, D. & Scheunders, P. (ed.)
    Advanced Concepts for Intelligent Vision Systems
    Advanced Concepts for Intelligent Vision Systems, Springer International Publishing, 2015, Vol. 9386, pp. 464-473
    DOI: 10.1007/978-3-319-25903-1_40
    BibTeX
    @incollection{Farinella2015,
     author = {Farinella, Giovanni Maria and Giuffrida, M. V. and Digiacomo, V. and Battiato, Sebastiano},
     title = {On Blind Source Camera Identification},
     booktitle = {Advanced Concepts for Intelligent Vision Systems},
     journal = {Advanced Concepts for Intelligent Vision Systems},
     publisher = {Springer International Publishing},
     year = {2015},
     volume = {9386},
     pages = {464--473}}
    
  94. P. Ferrara, M. Fontani, T. Bianchi, A. De Rosa, A. Piva & M. Barni
    Unsupervised Fusion for Forgery Localization Exploiting Background Information
    Proc. IEEE Int Multimedia & Expo Workshops (ICMEW) Conf
    2015, pp. 1-6
    DOI: 10.1109/ICMEW.2015.7169770
    BibTeX
    @inproceedings{Ferrara2015,
     author = {Ferrara, P. and Fontani, M. and Bianchi, T. and De Rosa, A. and Piva, A. and Barni, Mauro},
     title = {Unsupervised Fusion for Forgery Localization Exploiting Background Information},
     booktitle = {Proc. IEEE Int Multimedia & Expo Workshops (ICMEW) Conf},
     year = {2015},
     pages = {1--6}}
    
  95. A. Ferreira, L.C. Navarro, G. Pinheiro, J.A. dos Santos & A. Rocha
    Laser Printer Attribution: Exploring New Features and Beyond
    Forensic Science International, Elsevier BV, 2015, Vol. 247(0), pp. 105-125
    DOI: 10.1016/j.forsciint.2014.11.030
    BibTeX
    @article{Ferreira2015,
     author = {Ferreira, Anselmo and Navarro, Luiz C. and Pinheiro, Giuliano and dos Santos, Jefersson A. and Rocha, Anderson},
     title = {Laser Printer Attribution: Exploring New Features and Beyond},
     journal = {Forensic Science International},
     publisher = {Elsevier BV},
     year = {2015},
     volume = {247},
     number = {0},
     pages = {105--125}}
    
  96. Y. Fusheng & T. Gao
    A Novel Image Splicing Forensic Algorithm Based on Generalized DCT Coefficient-pair Histogram
    Tan, T., Ruan, Q., Wang, S., Ma, H. & Di, K. (ed.)
    Advances in Image and Graphics Technologies
    Springer Berlin Heidelberg, 2015, Vol. 525, pp. 63-71
    DOI: 10.1007/978-3-662-47791-5_8
    BibTeX
    @incollection{Fusheng2015,
     author = {Fusheng, Yang and Gao, Tiegang},
     title = {A Novel Image Splicing Forensic Algorithm Based on Generalized DCT Coefficient-pair Histogram},
     booktitle = {Advances in Image and Graphics Technologies},
     publisher = {Springer Berlin Heidelberg},
     year = {2015},
     volume = {525},
     pages = {63--71}}
    
  97. S. Gao
    A Hybrid Approach for Camera-model Detection
    International Journal of Security and Its Applications, 2015, Vol. 9(8)
    DOI: 10.14257/ijsia.2015.9.8.24
    BibTeX
    @article{Gao2015,
     author = {Gao, Shang},
     title = {A Hybrid Approach for Camera-model Detection},
     journal = {International Journal of Security and Its Applications},
     year = {2015},
     volume = {9},
     number = {8}}
    
  98. L.A. Gatys, A.S. Ecker & M. Bethge
    A Neural Algorithm of Artistic Style
    arXiv, 2015
    BibTeX
    @article{Gatys2015,
     author = {Gatys, Leon A. and Ecker, Alexander S. and Bethge, Matthias},
     title = {A Neural Algorithm of Artistic Style},
     journal = {arXiv},
     year = {2015}}
    
  99. H. Ge & S. Fang
    Detecting Image Forgery Using Linear Constraints Based on Shading and Shadows
    Proceedings of the International Conference on Informative and Cybernetics for Computational Social Systems (ICCSS) 2015
    2015, pp. 116-121
    DOI: 10.1109/iccss.2015.7281160
    BibTeX
    @inproceedings{Ge2015,
     author = {Ge, Huayong and Fang, Shujuan},
     title = {Detecting Image Forgery Using Linear Constraints Based on Shading and Shadows},
     booktitle = {Proceedings of the International Conference on Informative and Cybernetics for Computational Social Systems (ICCSS) 2015},
     year = {2015},
     pages = {116--121}}
    
  100. N.I. Glumov, A.V. Kuznetsov & V.V. Myasnikov
    Algorithms for Detection of Plain Copy-move Regions in Digital Images
    Pattern Recognition and Image Analysis, Pleiades Publishing, 2015, Vol. 25(3), pp. 423-429
    DOI: 10.1134/S1054661815030074
    BibTeX
    @article{Glumov2015,
     author = {Glumov, N. I. and Kuznetsov, A. V. and Myasnikov, V. V.},
     title = {Algorithms for Detection of Plain Copy-move Regions in Digital Images},
     journal = {Pattern Recognition and Image Analysis},
     publisher = {Pleiades Publishing},
     year = {2015},
     volume = {25},
     number = {3},
     pages = {423--429}}
    
  101. A. Gubrud
    The Effect of Image Preprocessing Techniques and Varying JPEG Quality on the Identifiability of Digital Image Splicing Forgery
    Arizona State University, Arizona State University, 2015
    BibTeX
    @mastersthesis{Gubrud2015,
     author = {Gubrud, Aaron},
     title = {The Effect of Image Preprocessing Techniques and Varying JPEG Quality on the Identifiability of Digital Image Splicing Forgery},
     school = {Arizona State University},
     year = {2015}}
    
  102. A. Gupta, S. Gupta & A. Mehra
    Video Authentication in Digital Forensic
    Proc. Int Futuristic Trends Computational Analysis and Knowledge Management (ABLAZE) Conf
    2015, pp. 659-663
    DOI: 10.1109/ABLAZE.2015.7154945
    BibTeX
    @inproceedings{Gupta2015,
     author = {Gupta, A. and Gupta, S. and Mehra, A.},
     title = {Video Authentication in Digital Forensic},
     booktitle = {Proc. Int Futuristic Trends Computational Analysis and Knowledge Management (ABLAZE) Conf},
     year = {2015},
     pages = {659--663}}
    
  103. E. Gürbüz, G. Ulutaş & M. Ulutaş
    Rotation invariant copy move forgery detection method
    Proc. 9th Int. Conf. Electrical and Electronics Engineering (ELECO)
    2015, pp. 202-206
    DOI: 10.1109/ELECO.2015.7394451
    BibTeX
    @inproceedings{Guerbuez2015,
     author = {Gürbüz, E. and Ulutaş, G. and Ulutaş, M.},
     title = {Rotation invariant copy move forgery detection method},
     booktitle = {Proc. 9th Int. Conf. Electrical and Electronics Engineering (ELECO)},
     year = {2015},
     pages = {202--206}}
    
  104. F. Hakimi & M. Hariri
    Image - Splicing Forgery Detection Based on Improved LBP and K-nearest Neighbors Algorithm
    Electronics Information & Planning, 2015
    BibTeX
    @article{Hakimi2015,
     author = {Hakimi, Fahime and Hariri, Mahdi},
     title = {Image - Splicing Forgery Detection Based on Improved LBP and K-nearest Neighbors Algorithm},
     journal = {Electronics Information & Planning},
     year = {2015}}
    
  105. F. Hakimi, M. Hariri & F. GharehBaghi
    Image Splicing Forgery Detection Using Local Binary Pattern and Discrete Wavelet Transform
    Proc. 2nd Int. Conf. Knowledge-Based Engineering and Innovation (KBEI)
    2015, pp. 1074-1077
    DOI: 10.1109/KBEI.2015.7436195
    BibTeX
    @inproceedings{Hakimi2015a,
     author = {Hakimi, F. and Hariri, M. and GharehBaghi, F.},
     title = {Image Splicing Forgery Detection Using Local Binary Pattern and Discrete Wavelet Transform},
     booktitle = {Proc. 2nd Int. Conf. Knowledge-Based Engineering and Innovation (KBEI)},
     year = {2015},
     pages = {1074--1077}}
    
  106. H. Han, Y. Li, S. Niu & Z. Gong
    Tamper detection based on the consistency of quantization error caused by multiple JPEG compression
    Proc. IEEE 16th Int. Conf. Communication Technology (ICCT)
    2015, pp. 314-319
    DOI: 10.1109/ICCT.2015.7399850
    BibTeX
    @inproceedings{Han2015,
     author = {Han, Hongli and Li, Yezhou and Niu, Shaozhang and Gong, Zhenzhen},
     title = {Tamper detection based on the consistency of quantization error caused by multiple JPEG compression},
     booktitle = {Proc. IEEE 16th Int. Conf. Communication Technology (ICCT)},
     year = {2015},
     pages = {314--319}}
    
  107. F.S. Hashem & G. Sulong
    Passive Aproaches for Detecting Image Tampering: A Review
    Jurnal Teknologi, 2015, Vol. 73(2), pp. 31-36
    DOI: 10.11113/jt.v73.4189
    BibTeX
    @article{Hashem2015,
     author = {Hashem, Fatma Salman and Sulong, Ghazali},
     title = {Passive Aproaches for Detecting Image Tampering: A Review},
     journal = {Jurnal Teknologi},
     year = {2015},
     volume = {73},
     number = {2},
     pages = {31--36}}
    
  108. M.F. Hashmi, A. Hambarde & A. Keskar
    Fast and Robust Copy-move Forgery Detection Using SURF and Wavelets
    2015
    BibTeX
    @electronic{Hashmi2015a,
     author = {Hashmi, M. F. and Hambarde, A. and Keskar, A.},
     title = {Fast and Robust Copy-move Forgery Detection Using SURF and Wavelets},
     year = {2015}}
    
  109. M.F. Hashmi & A.G. Keskar
    Block and Fuzzy Techniques Based Forensic Tool for Detection Classification of Image Forgery
    J Electr Eng Technol., 2015, pp. 709-718
    DOI: 10.5370/jeet.2015.10.4.1886
    BibTeX
    @article{Hashmi2015,
     author = {Hashmi, Mohammad Farukh and Keskar, Avinash G.},
     title = {Block and Fuzzy Techniques Based Forensic Tool for Detection Classification of Image Forgery},
     journal = {J Electr Eng Technol.},
     year = {2015},
     pages = {709--718}}
    
  110. H. Hel-Or & I. Yerushalmy
    Camera-based Image Forgery Detection
    Ho, A. T. S. & Li, S. (ed.)
    Handbook of Digital Forensics of Multimedia Data and Devices
    Wiley-IEEE Press, 2015, pp. 704-
    DOI: 10.1002/9781118705773.ch14
    BibTeX
    @inbook{Hel-Or2015,
     author = {Hel-Or, Hagit and Yerushalmy, Ido},
     title = {Camera-based Image Forgery Detection},
     booktitle = {Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-IEEE Press},
     year = {2015},
     pages = {704-}}
    
  111. A.T.S. Ho & S. Li
    Digital Image Forensics with Statistical Analysis
    Handbook of Digital Forensics of Multimedia Data and Devices
    Wiley-IEEE Press, 2015, pp. 704-
    DOI: 10.1002/9781118705773.ch13
    BibTeX
    @inbook{Ho2015,
     author = {Ho, Anthony T. S. and Li, Shujun},
     title = {Digital Image Forensics with Statistical Analysis},
     booktitle = {Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-IEEE Press},
     year = {2015},
     pages = {704-}}
    
  112. A.T.S. Ho & S. Li
    Printer and Scanner Forensics
    Handbook of Digital Forensics of Multimedia Data and Devices
    Wiley-IEEE Press, 2015, pp. 704-
    DOI: 10.1002/9781118705773.ch10
    BibTeX
    @inbook{Ho2015a,
     author = {Ho, Anthony T. S. and Li, Shujun},
     title = {Printer and Scanner Forensics},
     booktitle = {Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-IEEE Press},
     year = {2015},
     pages = {704-}}
    
  113. A.T.S. Ho & S. Li
    Digital Image Forensics with Statistical Analysis
    Handbook of Digital Forensics of Multimedia Data and Devices
    Wiley-IEEE Press, 2015, pp. 704-
    DOI: 10.1002/9781118705773.ch13
    BibTeX
    @inbook{Ho2015b,
     author = {Ho, Anthony T. S. and Li, Shujun},
     title = {Digital Image Forensics with Statistical Analysis},
     booktitle = {Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-IEEE Press},
     year = {2015},
     pages = {704-}}
    
  114. A.T.S. Ho & S. Li
    Multimedia Analytics for Image Collection Forensics
    Handbook of Digital Forensics of Multimedia Data and Devices
    Wiley-IEEE Press, 2015, pp. 704-
    DOI: 10.1002/9781118705773.ch8
    BibTeX
    @inbook{Ho2015c,
     author = {Ho, Anthony T. S. and Li, Shujun},
     title = {Multimedia Analytics for Image Collection Forensics},
     booktitle = {Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-IEEE Press},
     year = {2015},
     pages = {704-}}
    
  115. B. Hoogeboom, I. Alberink & D. Vrijdag
    Photogrammetry in Digital Forensics
    Ho, A. T. S. & Li, S. (ed.)
    Handbook of Digital Forensics of Multimedia Data and Devices
    Wiley-IEEE Press, 2015, pp. 704-
    DOI: 10.1002/9781118705773.ch5
    BibTeX
    @inbook{Hoogeboom2015,
     author = {Hoogeboom, Bart and Alberink, Ivo and Vrijdag, Derk},
     title = {Photogrammetry in Digital Forensics},
     booktitle = {Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-IEEE Press},
     year = {2015},
     pages = {704-}}
    
  116. J. Hou & Y. Cheng
    Expose Spliced Photographic Basing on Boundary and Noise Features
    IEICE TRANSACTIONS on Information and Systems, 2015, Vol. E98-D(7)
    DOI: 10.1587/transinf.2014edl8232
    BibTeX
    @article{Hou2015,
     author = {Hou, Jun and Cheng, Yan},
     title = {Expose Spliced Photographic Basing on Boundary and Noise Features},
     journal = {IEICE TRANSACTIONS on Information and Systems},
     year = {2015},
     volume = {E98-D},
     number = {7}}
    
  117. C.-M. Hsu, J.-C. Lee & W.-K. Chen
    An Efficient Detection Algorithm for Copy-move Forgery
    Proc. 10th Asia Joint Conf. Information Security (AsiaJCIS)
    2015, pp. 33-36
    DOI: 10.1109/AsiaJCIS.2015.16
    BibTeX
    @inproceedings{Hsu2015,
     author = {Hsu, Chen-Ming and Lee, Jen-Chun and Chen, Wei-Kuei},
     title = {An Efficient Detection Algorithm for Copy-move Forgery},
     booktitle = {Proc. 10th Asia Joint Conf. Information Security (AsiaJCIS)},
     year = {2015},
     pages = {33--36}}
    
  118. W.-C. Hu, J.-S. Dai & J.-S. Jian
    Effective Composite Image Detection Method Based on Feature Inconsistency of Image Components
    Digital Signal Processing, 2015, Vol. 39(0), pp. 50-62
    DOI: 10.1016/j.dsp.2015.01.006
    BibTeX
    @article{Hu2015,
     author = {Hu, Wu-Chih and Dai, Jing-Siou and Jian, Jhih-Syuan},
     title = {Effective Composite Image Detection Method Based on Feature Inconsistency of Image Components},
     journal = {Digital Signal Processing},
     year = {2015},
     volume = {39},
     number = {0},
     pages = {50--62}}
    
  119. D.-Y. Huang, C.-N. Huang, W.-C. Hu & C.-H. Chou
    Robustness of Copy-move Forgery Detection under High JPEG Compression Artifacts
    Multimedia Tools and Applications, Springer, 2015, pp. 1
    DOI: 10.1007/s11042-015-3152-x
    BibTeX
    @article{Huang2015a,
     author = {Huang, Deng-Yuan and Huang, Ching-Ning and Hu, Wu-Chih and Chou, Chih-Hung},
     title = {Robustness of Copy-move Forgery Detection under High JPEG Compression Artifacts},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2015},
     pages = {1}}
    
  120. Y. Huang, J. Zhang & H. Huang
    Camera Model Identification with Unknown Models
    IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers (IEEE), 2015, Vol. 10(12), pp. 2692-2704
    DOI: 10.1109/TIFS.2015.2474836
    BibTeX
    @article{Huang2015,
     author = {Huang, Y. and Zhang, J. and Huang, H.},
     title = {Camera Model Identification with Unknown Models},
     journal = {IEEE Transactions on Information Forensics and Security},
     publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
     year = {2015},
     volume = {10},
     number = {12},
     pages = {2692--2704}}
    
  121. T.K. Huynh, K.V. Huynh, T. Le-Tien & S.C. Nguyen
    A Survey on Image Forgery Detection Techniques
    Computing & Communication Technologies - Research, Innovation, and Vision for the Future (RIVF), 2015 IEEE RIVF International Conference on
    2015, pp. 71-76
    DOI: 10.1109/RIVF.2015.7049877
    BibTeX
    @inproceedings{Huynh2015,
     author = {Huynh, Tu K. and Huynh, Khoa V. and Le-Tien, Thuong and Nguyen, Sy C.},
     title = {A Survey on Image Forgery Detection Techniques},
     booktitle = {Computing & Communication Technologies - Research, Innovation, and Vision for the Future (RIVF), 2015 IEEE RIVF International Conference on},
     year = {2015},
     pages = {71--76}}
    
  122. T. Huynh-Kha, T. Le-Tien, S.H. Viet-Uyen & K. Huynh-Van
    The efficiency of applying DWT and feature extraction into copy-move images detection
    Proc. Int. Conf. Advanced Technologies for Communications (ATC)
    2015, pp. 44-49
    DOI: 10.1109/ATC.2015.7388368
    BibTeX
    @inproceedings{Huynh-Kha2015,
     author = {Huynh-Kha, T. and Le-Tien, T. and Viet-Uyen, S. Ha and Huynh-Van, K.},
     title = {The efficiency of applying DWT and feature extraction into copy-move images detection},
     booktitle = {Proc. Int. Conf. Advanced Technologies for Communications (ATC)},
     year = {2015},
     pages = {44--49}}
    
  123. R.W. Ibrahim, Z. Moghaddasi, H.A. Jalab & R.M. Noor
    Fractional Differential Texture Descriptors Based on the Machado Entropy for Image Splicing Detection
    Entropy, 2015, Vol. 17(7), pp. 4775
    DOI: 10.3390/e17074775
    BibTeX
    @article{Ibrahim2015,
     author = {Ibrahim, Rabha W. and Moghaddasi, Zahra and Jalab, Hamid A. and Noor, Rafidah Md},
     title = {Fractional Differential Texture Descriptors Based on the Machado Entropy for Image Splicing Detection},
     journal = {Entropy},
     year = {2015},
     volume = {17},
     number = {7},
     pages = {4775}}
    
  124. M.M. Isaac & M. Wilscy
    Copy-move Forgery Detection Based on Harris Corner Points and BRISK
    Proceedings of the Third International Symposium on Women in Computing and Informatics
    ACM, 2015, pp. 394-399
    DOI: 10.1145/2791405.2791453
    BibTeX
    @inproceedings{Isaac2015,
     author = {Isaac, Meera Mary and Wilscy, M.},
     title = {Copy-move Forgery Detection Based on Harris Corner Points and BRISK},
     booktitle = {Proceedings of the Third International Symposium on Women in Computing and Informatics},
     publisher = {ACM},
     year = {2015},
     pages = {394--399}}
    
  125. M.M. Isaac & M. Wilscy
    Image Forgery Detection Based on Gabor Wavelets and Local Phase Quantization
    Procedia Computer Science, 2015, Vol. 58, pp. 76-83
    DOI: 10.1016/j.procs.2015.08.016
    BibTeX
    @article{Isaac2015a,
     author = {Isaac, Meera Mary and Wilscy, M.},
     title = {Image Forgery Detection Based on Gabor Wavelets and Local Phase Quantization},
     journal = {Procedia Computer Science},
     year = {2015},
     volume = {58},
     pages = {76--83}}
    
  126. M. Iuliani, G. Fabbri & A. Piva
    Image Splicing Detection Based on General Perspective Constraints
    Information Forensics and Security (WIFS), 2015 IEEE International Workshop on
    2015, pp. 1-6
    DOI: 10.1109/WIFS.2015.7368598
    BibTeX
    @inproceedings{Iuliani2015,
     author = {Iuliani, M. and Fabbri, G. and Piva, A.},
     title = {Image Splicing Detection Based on General Perspective Constraints},
     booktitle = {Information Forensics and Security (WIFS), 2015 IEEE International Workshop on},
     year = {2015},
     pages = {1--6}}
    
  127. B.G. Jeong, Y.H. Moon & I.K. Eom
    Blind Identification of Image Manipulation Type Using Mixed Statistical Moments
    Journal of Electronic Imaging, 2015, Vol. 24(1), pp. 013029
    DOI: 10.1117/1.JEI.24.1.013029
    BibTeX
    @article{Jeong2015,
     author = {Jeong, Bo Gyu and Moon, Yong Ho and Eom, Il Kyu},
     title = {Blind Identification of Image Manipulation Type Using Mixed Statistical Moments},
     journal = {Journal of Electronic Imaging},
     year = {2015},
     volume = {24},
     number = {1},
     pages = {013029}}
    
  128. V. Joshi & S. Jain
    Tampering Detection in Digital Video - a Review of Temporal Fingerprints Based Techniques
    Proc. 2nd Int Computing for Sustainable Global Development (INDIACom) Conf
    2015, pp. 1121-1124
    BibTeX
    @inproceedings{Joshi2015,
     author = {Joshi, V. and Jain, S.},
     title = {Tampering Detection in Digital Video - a Review of Temporal Fingerprints Based Techniques},
     booktitle = {Proc. 2nd Int Computing for Sustainable Global Development (INDIACom) Conf},
     year = {2015},
     pages = {1121--1124}}
    
  129. T. Julliand, V. Nozick & H. Talbot
    Automated Image Splicing Detection from Noise Estimation in Raw Images
    Proc. th Int Imaging for Crime Prevention and Detection (ICDP-15) Conf
    2015, pp. 1-6
    DOI: 10.1049/ic.2015.0111
    BibTeX
    @inproceedings{Julliand2015,
     author = {Julliand, T. and Nozick, V. and Talbot, H.},
     title = {Automated Image Splicing Detection from Noise Estimation in Raw Images},
     booktitle = {Proc. th Int Imaging for Crime Prevention and Detection (ICDP-15) Conf},
     year = {2015},
     pages = {1--6}}
    
  130. T. Julliand, V. Nozick & H. Talbot
    Image Noise and Digital Image Forensics
    IWDW
    2015
    DOI: 10.1007/978-3-319-31960-5_1
    BibTeX
    @inproceedings{Julliand2015a,
     author = {Julliand, Thibaut and Nozick, Vincent and Talbot, Hugues},
     title = {Image Noise and Digital Image Forensics},
     booktitle = {IWDW},
     year = {2015}}
    
  131. D.-J. Jung, D.-K. Hyun & H.-K. Lee
    Recaptured Video Detection Based on Sensor Pattern Noise
    EURASIP Journal on Image and Video Processing, Springer, 2015, Vol. 2015(1), pp. 1
    DOI: 10.1186/s13640-015-0096-z
    BibTeX
    @article{Jung2015,
     author = {Jung, Dae-Jin and Hyun, Dai-Kyung and Lee, Heung-Kyu},
     title = {Recaptured Video Detection Based on Sensor Pattern Noise},
     journal = {EURASIP Journal on Image and Video Processing},
     publisher = {Springer},
     year = {2015},
     volume = {2015},
     number = {1},
     pages = {1}}
    
  132. N. Kalka, N. Bartlow, B. Cukic & A. Ross
    A Preliminary Study on Identifying Sensors from Iris Images
    2015 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)
    Institute of Electrical & Electronics Engineers (IEEE), 2015
    DOI: 10.1109/CVPRW.2015.7301319
    BibTeX
    @inproceedings{Kalka2015,
     author = {Kalka, Nathan and Bartlow, Nick and Cukic, Bojan and Ross, Arun},
     title = {A Preliminary Study on Identifying Sensors from Iris Images},
     booktitle = {2015 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)},
     publisher = {Institute of Electrical & Electronics Engineers (IEEE)},
     year = {2015}}
    
  133. X. Kang, J. Liu, H. Liu & Z.J. Wang
    Forensics and Counter Anti-forensics of Video Inter-frame Forgery
    Multimedia Tools and Applications, 2015, pp. 1-21
    DOI: 10.1007/s11042-015-2762-7
    BibTeX
    @article{Kang2015a,
     author = {Kang, Xiangui and Liu, Jingxian and Liu, Hongmei and Wang, Z. Jane},
     title = {Forensics and Counter Anti-forensics of Video Inter-frame Forgery},
     journal = {Multimedia Tools and Applications},
     year = {2015},
     pages = {1--21}}
    
  134. X. Kang, T. Qin & H. Zeng
    Countering Median Filtering Anti-forensics and Performance Evaluation of Forensics against Intentional Attacks
    Proc. IEEE China Summit and Int Signal and Information Processing (ChinaSIP) Conf
    2015, pp. 483-487
    DOI: 10.1109/ChinaSIP.2015.7230449
    BibTeX
    @inproceedings{Kang2015,
     author = {Kang, Xiangui and Qin, Tengfei and Zeng, Hui},
     title = {Countering Median Filtering Anti-forensics and Performance Evaluation of Forensics against Intentional Attacks},
     booktitle = {Proc. IEEE China Summit and Int Signal and Information Processing (ChinaSIP) Conf},
     year = {2015},
     pages = {483--487}}
    
  135. A. Karaküçük & A.E. Dirik
    Adaptive Photo-response Non-uniformity Noise Removal against Image Source Attribution
    Digital Investigation, 2015, Vol. 12(0), pp. 66-76
    DOI: 10.1016/j.diin.2015.01.017
    BibTeX
    @article{Karakuecuek2015,
     author = {Karaküçük, Ahmet and Dirik, Ahmet Emir},
     title = {Adaptive Photo-response Non-uniformity Noise Removal against Image Source Attribution},
     journal = {Digital Investigation},
     year = {2015},
     volume = {12},
     number = {0},
     pages = {66--76}}
    
  136. A. Karaküçük, A.E. Dirik, H.T. Sencar & N.D. Memon
    Recent Advances in Counter PRNU Based Source Attribution and Beyond
    IS&T/SPIE Electronic Imaging
    Proc. SPIE, 2015, Vol. 9409, pp. 94090N-94090N-11
    DOI: 10.1117/12.2182458
    BibTeX
    @inproceedings{Karakuecuek2015a,
     author = {Karaküçük, Ahmet and Dirik, Ahmet E. and Sencar, Hüsrev T. and Memon, Nasir D.},
     title = {Recent Advances in Counter PRNU Based Source Attribution and Beyond},
     booktitle = {IS&T/SPIE Electronic Imaging},
     journal = {Proc. SPIE},
     year = {2015},
     volume = {9409},
     pages = {94090N-94090N-11}}
    
  137. A. Kashyap, B. Suresh, M. Agrawal, H. Gupta & S.D. Joshi
    Detection of Splicing Forgery Using Wavelet Decomposition
    Proc. Int Computing, Communication Automation (ICCCA) Conf
    2015, pp. 843-848
    DOI: 10.1109/CCAA.2015.7148492
    BibTeX
    @inproceedings{Kashyap2015,
     author = {Kashyap, A. and Suresh, B. and Agrawal, M. and Gupta, H. and Joshi, S. D.},
     title = {Detection of Splicing Forgery Using Wavelet Decomposition},
     booktitle = {Proc. Int Computing, Communication Automation (ICCCA) Conf},
     year = {2015},
     pages = {843--848}}
    
  138. C. Kauba & A. Uhl
    Fingerprint Recognition under the Influence of Image Sensor Ageing
    Department of Computer Sciences, University of Salzburg, Department of Computer Sciences, University of Salzburg, 2015
    DOI: 10.1109/iwbf.2016.7449683
    BibTeX
    @techreport{Kauba2015,
     author = {Kauba, Christof and Uhl, Andreas},
     title = {Fingerprint Recognition under the Influence of Image Sensor Ageing},
     school = {Department of Computer Sciences, University of Salzburg},
     year = {2015}}
    
  139. A. Kaur & S. Malhotra
    Passive Image Forensic Method to Detect Resampling Forgery in Digital Images
    IOSR Journal of Computer Engineering (IOSR-JCE), 2015, Vol. 17(3), pp. 47-52
    BibTeX
    @article{Kaur2015,
     author = {Kaur, Amaninder and Malhotra, Sheenam},
     title = {Passive Image Forensic Method to Detect Resampling Forgery in Digital Images},
     journal = {IOSR Journal of Computer Engineering (IOSR-JCE)},
     year = {2015},
     volume = {17},
     number = {3},
     pages = {47--52}}
    
  140. M. Kaur & S. Gupta
    Evaluation of image forensic cues for fusion
    Proc. Third Int. Conf. Image Information Processing (ICIIP)
    2015, pp. 301-305
    DOI: 10.1109/ICIIP.2015.7414785
    BibTeX
    @inproceedings{Kaur2015a,
     author = {Kaur, M. and Gupta, S.},
     title = {Evaluation of image forensic cues for fusion},
     booktitle = {Proc. Third Int. Conf. Image Information Processing (ICIIP)},
     year = {2015},
     pages = {301--305}}
    
  141. R. Kaushik, R.K. Bajaj & J. Mathew
    On Image Forgery Detection Using Two Dimensional Discrete Cosine Transform and Statistical Moments
    Procedia Computer Science, 2015, Vol. 70, pp. 130-136
    DOI: 10.1016/j.procs.2015.10.058
    BibTeX
    @article{Kaushik2015,
     author = {Kaushik, Rajeev and Bajaj, Rakesh Kumar and Mathew, Jimson},
     title = {On Image Forgery Detection Using Two Dimensional Discrete Cosine Transform and Statistical Moments},
     journal = {Procedia Computer Science},
     year = {2015},
     volume = {70},
     pages = {130--136}}
    
  142. Ke
    An Efficient Blind Detection Algorithm of Median Filtered Image
    International Journal of Hybrid Information Technology, 2015, Vol. 8(1), pp. 181-192
    DOI: 10.14257/ijhit.2015.8.1.16
    BibTeX
    @article{Ke2015,
     author = {Ke},
     title = {An Efficient Blind Detection Algorithm of Median Filtered Image},
     journal = {International Journal of Hybrid Information Technology},
     year = {2015},
     volume = {8},
     number = {1},
     pages = {181--192}}
    
  143. A. Kharboutly, W.P. , G. Subsol & D. Hoa
    Improving Sensor Noise Analysis for CT-scanner Identification
    Proc. of the 23rd European Signal Processing Conference (EUSIPCO) 2015
    2015
    DOI: 10.1109/eusipco.2015.7362817
    BibTeX
    @inproceedings{Kharboutly2015,
     author = {Kharboutly, Anas and , William Puech and Subsol, Gerard and Hoa, Denis},
     title = {Improving Sensor Noise Analysis for CT-scanner Identification},
     booktitle = {Proc. of the 23rd European Signal Processing Conference (EUSIPCO) 2015},
     year = {2015}}
    
  144. A. Kharboutly, W. Puech, G. Subsol & D. Hoa
    Advanced Sensor Noise Analysis for CT-scanner Identification from Its 3D Images
    Image Processing Theory, Tools and Applications (IPTA), 2015 International Conference on
    2015, pp. 325-330
    DOI: 10.1109/IPTA.2015.7367158
    BibTeX
    @inproceedings{Kharboutly2015a,
     author = {Kharboutly, A. and Puech, W. and Subsol, G. and Hoa, D.},
     title = {Advanced Sensor Noise Analysis for CT-scanner Identification from Its 3D Images},
     booktitle = {Image Processing Theory, Tools and Applications (IPTA), 2015 International Conference on},
     year = {2015},
     pages = {325--330}}
    
  145. K. Khuspe & V. Mane
    Robust Image Forgery Localization and Recognition in Copy-move Using Bag of Features and SVM
    Communication, Information & Computing Technology (ICCICT), 2015 International Conference on
    2015, pp. 1-5
    DOI: 10.1109/ICCICT.2015.7045718
    BibTeX
    @inproceedings{Khuspe2015,
     author = {Khuspe, Kalyani and Mane, Vanita},
     title = {Robust Image Forgery Localization and Recognition in Copy-move Using Bag of Features and SVM},
     booktitle = {Communication, Information & Computing Technology (ICCICT), 2015 International Conference on},
     year = {2015},
     pages = {1--5}}
    
  146. M. Kirchner
    Thinking beyond the Block: Block Matching for Copy--move Forgery Detection Revisited
    Alattar, A. M., Memon, N. D. & Heitzenrater, C. D. (ed.)
    IS&T/SPIE Electronic Imaging
    2015, Vol. 9409, pp. 940903-940903-12
    DOI: 10.1117/12.2082789
    BibTeX
    @inproceedings{Kirchner2015,
     author = {Kirchner, Matthias},
     title = {Thinking beyond the Block: Block Matching for Copy--move Forgery Detection Revisited},
     booktitle = {IS&T/SPIE Electronic Imaging},
     year = {2015},
     volume = {9409},
     pages = {940903-940903-12}}
    
  147. T.A. Kohale, S.D. Chede & P.R. Lakhe
    Forgery of Copy Move Image Detection Technique by Integrating Block and Feature Based Method
    International Journal of Advanced Research in Computer and Communication Engineering, 2015, Vol. 4(1)
    DOI: 10.17148/ijarcce.2015.4129
    BibTeX
    @article{Kohale2015,
     author = {Kohale, Tushant A. and Chede, S. D. and Lakhe, P. R.},
     title = {Forgery of Copy Move Image Detection Technique by Integrating Block and Feature Based Method},
     journal = {International Journal of Advanced Research in Computer and Communication Engineering},
     year = {2015},
     volume = {4},
     number = {1}}
    
  148. P. Koniusz & A. Cherian
    Dictionary Learning and Sparse Coding for Third-order Super-symmetric Tensors
    arxiv, 2015
    BibTeX
    @article{Koniuz2015,
     author = {Koniusz, Piotr and Cherian, Anoop},
     title = {Dictionary Learning and Sparse Coding for Third-order Super-symmetric Tensors},
     journal = {arxiv},
     year = {2015}}
    
  149. P.A. Koshy & K.N. Nair
    Exposing Image Forgery through Contrast Enhancement
    International Journal of Science and Research (IJSR), 2015, Vol. 4(12), pp. 1044-1048
    DOI: 10.21275/v4i12.nov152185
    BibTeX
    @article{Koshy2015,
     author = {Koshy, Priya Ann and Nair, Kavitha N.},
     title = {Exposing Image Forgery through Contrast Enhancement},
     journal = {International Journal of Science and Research (IJSR)},
     year = {2015},
     volume = {4},
     number = {12},
     pages = {1044--1048}}
    
  150. P. Kovesi
    Good Colour Maps: How to Design Them
    arXiv:1509.03700, 2015
    BibTeX
    @article{Kovesi2015,
     author = {Kovesi, Peter},
     title = {Good Colour Maps: How to Design Them},
     journal = {arXiv:1509.03700},
     year = {2015}}
    
  151. C. Kraetzer & J. Dittmann
    Considerations on the Benchmarking of Media Forensics
    Proc. 23rd European Signal Processing Conf. (EUSIPCO)
    2015, pp. 61-65
    DOI: 10.1109/EUSIPCO.2015.7362345
    BibTeX
    @inproceedings{Kraetzer2015,
     author = {Kraetzer, C. and Dittmann, J.},
     title = {Considerations on the Benchmarking of Media Forensics},
     booktitle = {Proc. 23rd European Signal Processing Conf. (EUSIPCO)},
     year = {2015},
     pages = {61--65}}
    
  152. C. Kraetzer & J. Dittmann
    Microphone Forensics
    Ho/Handbook of Digital Forensics of Multimedia Data and Devices
    Wiley-Blackwell, 2015, pp. 411-441
    DOI: 10.1002/9781118705773.ch11
    BibTeX
    @incollection{Kraetzer2015a,
     author = {Kraetzer, Christian and Dittmann, Jana},
     title = {Microphone Forensics},
     booktitle = {Ho/Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-Blackwell},
     year = {2015},
     pages = {411--441}}
    
  153. N. Kulkarni & V. Mane
    Source Camera Identification Using GLCM
    Proc. IEEE Int. Advance Computing Conf. (IACC)
    2015, pp. 1242-1246
    DOI: 10.1109/IADCC.2015.7154900
    BibTeX
    @inproceedings{Kulkarni2015,
     author = {Kulkarni, Nilambari and Mane, Vanita},
     title = {Source Camera Identification Using GLCM},
     booktitle = {Proc. IEEE Int. Advance Computing Conf. (IACC)},
     year = {2015},
     pages = {1242--1246}}
    
  154. S. Kumar, J.V. Desai & S. Mukherjee
    Copy Move Forgery Detection in Contrast Variant Environment Using Binary DCT Vectors
    I.J. Image, Graphics and Signal Processing, 2015(6), pp. 38-44
    DOI: 10.5815/ijigsp.2015.06.05
    BibTeX
    @article{Kumar2015,
     author = {Kumar, Sunil and Desai, J. V. and Mukherjee, Shaktidev},
     title = {Copy Move Forgery Detection in Contrast Variant Environment Using Binary DCT Vectors},
     journal = {I.J. Image, Graphics and Signal Processing},
     year = {2015},
     number = {6},
     pages = {38--44}}
    
  155. Y.-N. Lai, T.-G. Gao, J.-X. Li & G.-R. Sheng
    Forensic Detection of Median Filtering in Digital Images Using the Coefficient-pair Histogram of DCT Value and LBP Pattern
    Huang, D.-S., Bevilacqua, V. & Premaratne, P. (ed.)
    Intelligent Computing Theories and Methodologies
    Springer International Publishing, 2015, Vol. 9225, pp. 421-432
    DOI: 10.1007/978-3-319-22180-9_41
    BibTeX
    @incollection{Lai2015,
     author = {Lai, Yun-Ni and Gao, Tie-Gang and Li, Jia-Xin and Sheng, Guo-Rui},
     title = {Forensic Detection of Median Filtering in Digital Images Using the Coefficient-pair Histogram of DCT Value and LBP Pattern},
     booktitle = {Intelligent Computing Theories and Methodologies},
     publisher = {Springer International Publishing},
     year = {2015},
     volume = {9225},
     pages = {421--432}}
    
  156. K.-f. Lau, N.-f. Law & W.-c. Siu
    Use of Sensor Noise for Source Identification
    Proc. Int Noise and Fluctuations (ICNF) Conf
    Institute of Electrical and Electronics Engineers (IEEE), 2015, pp. 1-6
    DOI: 10.1109/ICNF.2015.7288548
    BibTeX
    @inproceedings{Lau2015,
     author = {Lau, Kwun-fung and Law, Ngai-fong and Siu, Wan-chi},
     title = {Use of Sensor Noise for Source Identification},
     booktitle = {Proc. Int Noise and Fluctuations (ICNF) Conf},
     publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
     year = {2015},
     pages = {1--6}}
    
  157. J.-C. Lee
    Copy-move Image Forgery Detection Based on Gabor Magnitude
    Journal of Visual Communication and Image Representation, 2015, Vol. 31, pp. 320-334
    DOI: 10.1016/j.jvcir.2015.07.007
    BibTeX
    @article{Lee2015b,
     author = {Lee, Jen-Chun},
     title = {Copy-move Image Forgery Detection Based on Gabor Magnitude},
     journal = {Journal of Visual Communication and Image Representation},
     year = {2015},
     volume = {31},
     pages = {320--334}}
    
  158. J.-C. Lee, C.-P. Chang & W.-K. Chen
    Detection of Copy--move Image Forgery Using Histogram of Orientated Gradients
    Information Sciences, 2015(0), pp. -
    DOI: 10.1016/j.ins.2015.03.009
    BibTeX
    @article{Lee2015,
     author = {Lee, Jen-Chun and Chang, Chien-Ping and Chen, Wei-Kuei},
     title = {Detection of Copy--move Image Forgery Using Histogram of Orientated Gradients},
     journal = {Information Sciences},
     year = {2015},
     number = {0},
     pages = {-}}
    
  159. S.-H. Lee, T.-W. Oh, K. Kim & H.-Y. Lee
    Digital Camera Identification Using Sensor Pattern Noise
    Proceedings of the Second International Conference on Information Security and Digital Forensics (ISDF2015)
    2015, pp. 30-35
    BibTeX
    @inproceedings{Lee2015a,
     author = {Lee, Sang-Hyeong and Oh, Tae-Woo and Kim, Kibom and Lee, Hae-Yeoun},
     title = {Digital Camera Identification Using Sensor Pattern Noise},
     booktitle = {Proceedings of the Second International Conference on Information Security and Digital Forensics (ISDF2015)},
     year = {2015},
     pages = {30--35}}
    
  160. M.D. Leom, C.J. DOrazio, G. Deegan & K.K.R. Choo
    Forensic Collection and Analysis of Thumbnails in Android
    Proc. IEEE Trustcom/BigDataSE/ISPA
    2015, Vol. 1, pp. 1059-1066
    DOI: 10.1109/Trustcom.2015.483
    BibTeX
    @inproceedings{Leom2015,
     author = {Leom, M. D. and DOrazio, C. J. and Deegan, G. and Choo, K. K. R.},
     title = {Forensic Collection and Analysis of Thumbnails in Android},
     booktitle = {Proc. IEEE Trustcom/BigDataSE/ISPA},
     year = {2015},
     volume = {1},
     pages = {1059--1066}}
    
  161. J. Lepsoy, S. Kim, D. Atnafu & H.J. Kim
    Metadata protection scheme for JPEG privacy security using hierarchical and group-based models
    Proc. 5th Int. Conf. Information Communication Technology and Accessibility (ICTA)
    2015, pp. 1-5
    DOI: 10.1109/ICTA.2015.7426905
    BibTeX
    @inproceedings{Lepsoy2015,
     author = {Lepsoy, J. and Kim, S. and Atnafu, D. and Kim, H. J.},
     title = {Metadata protection scheme for JPEG privacy security using hierarchical and group-based models},
     booktitle = {Proc. 5th Int. Conf. Information Communication Technology and Accessibility (ICTA)},
     year = {2015},
     pages = {1--5}}
    
  162. T. Le-Tien, T. Huynh-Ngoc, T. Huynh-Kha & L. Marie
    Zernike Moment-based Approach for Detecting Duplicated Image Regions by a Modified Method to Reduce Geometrical and Numerical Errors
    Gervasi, O., Murgante, B., Misra, S., Gavrilova, M. L., Rocha, A. M. A. C., Torre, C., Taniar, D. & Apduhan, B. O. (ed.)
    Computational Science and Its Applications -- ICCSA 2015
    Springer International Publishing, 2015, Vol. 9158, pp. 458-475
    DOI: 10.1007/978-3-319-21410-8_36
    BibTeX
    @incollection{Le-Tien2015,
     author = {Le-Tien, Thuong and Huynh-Ngoc, Tan and Huynh-Kha, Tu and Marie, Luong},
     title = {Zernike Moment-based Approach for Detecting Duplicated Image Regions by a Modified Method to Reduce Geometrical and Numerical Errors},
     booktitle = {Computational Science and Its Applications -- ICCSA 2015},
     publisher = {Springer International Publishing},
     year = {2015},
     volume = {9158},
     pages = {458--475}}
    
  163. B. Li, T.T. Ng, X. Li, S. Tan & J. Huang
    Statistical Model of JPEG Noises and Its Application in Quantization Step Estimation
    IEEE Transactions on Image Processing, 2015, Vol. 24(5), pp. 1471-1484
    DOI: 10.1109/TIP.2015.2405477
    BibTeX
    @article{Li2015g,
     author = {Li, B. and Ng, T. T. and Li, X. and Tan, S. and Huang, J.},
     title = {Statistical Model of JPEG Noises and Its Application in Quantization Step Estimation},
     journal = {IEEE Transactions on Image Processing},
     year = {2015},
     volume = {24},
     number = {5},
     pages = {1471--1484}}
    
  164. B. Li, T.-T. Ng, X. Li, S. Tan & J. Huang
    Revealing the Trace of High-quality JPEG Compression through Quantization Noise Analysis
    Information Forensics and Security, IEEE Transactions on, 2015, Vol. 10(3), pp. 558-573
    DOI: 10.1109/TIFS.2015.2389148
    BibTeX
    @article{Li2015a,
     author = {Li, Bin and Ng, Tian-Tsong and Li, Xiaolong and Tan, Shunquan and Huang, Jiwu},
     title = {Revealing the Trace of High-quality JPEG Compression through Quantization Noise Analysis},
     journal = {Information Forensics and Security, IEEE Transactions on},
     year = {2015},
     volume = {10},
     number = {3},
     pages = {558--573}}
    
  165. C. Li, Q. Ma, L. Xiao, M. Li & A. Zhang
    Image Splicing Detection Based on Markov Features in Qdct Domain
    Huang, D.-S., Jo, K.-H. & Hussain, A. (ed.)
    Intelligent Computing Theories and Methodologies
    Advanced Intelligent Computing Theories and Applications, Springer International Publishing, 2015, Vol. 9226, pp. 170-176
    DOI: 10.1007/978-3-319-22186-1_17
    BibTeX
    @incollection{Li2015c,
     author = {Li, Ce and Ma, Qiang and Xiao, Limei and Li, Ming and Zhang, Aihua},
     title = {Image Splicing Detection Based on Markov Features in Qdct Domain},
     booktitle = {Intelligent Computing Theories and Methodologies},
     journal = {Advanced Intelligent Computing Theories and Applications},
     publisher = {Springer International Publishing},
     year = {2015},
     volume = {9226},
     pages = {170--176}}
    
  166. J. Li, X. Li, B. Yang & X. Sun
    Segmentation-based Image Copy-move Forgery Detection Scheme
    Information Forensics and Security, IEEE Transactions on, 2015, Vol. 10(3), pp. 507-518
    DOI: 10.1109/TIFS.2014.2381872
    BibTeX
    @article{Li2015,
     author = {Li, Jian and Li, Xiaolong and Yang, Bin and Sun, Xingming},
     title = {Segmentation-based Image Copy-move Forgery Detection Scheme},
     journal = {Information Forensics and Security, IEEE Transactions on},
     year = {2015},
     volume = {10},
     number = {3},
     pages = {507--518}}
    
  167. J. Li, Y. Zhao & R. Ni
    Detection of Seam Carving and Contrast Enhancement Operation Chain
    Proc. Int. Conf. Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP)
    2015, pp. 235-238
    DOI: 10.1109/IIH-MSP.2015.89
    BibTeX
    @inproceedings{Li2015i,
     author = {Li, J. and Zhao, Y. and Ni, R.},
     title = {Detection of Seam Carving and Contrast Enhancement Operation Chain},
     booktitle = {Proc. Int. Conf. Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP)},
     year = {2015},
     pages = {235--238}}
    
  168. R. Li, C. Kotropoulos, C.T. Li & Y. Guan
    Random Subspace Method for Source Camera Identification
    Proc. IEEE 25th Int. Workshop Machine Learning for Signal Processing (MLSP)
    2015, pp. 1-5
    DOI: 10.1109/MLSP.2015.7324339
    BibTeX
    @inproceedings{Li2015f,
     author = {Li, R. and Kotropoulos, C. and Li, C. T. and Guan, Y.},
     title = {Random Subspace Method for Source Camera Identification},
     booktitle = {Proc. IEEE 25th Int. Workshop Machine Learning for Signal Processing (MLSP)},
     year = {2015},
     pages = {1--5}}
    
  169. R. Li, C.-T. Li & Y. Guan
    A Compact Representation of Sensor Fingerprint for Camera Identification and Fingerprint Matching
    Proc. IEEE Int Acoustics, Speech and Signal Processing (ICASSP) Conf
    2015, pp. 1777-1781
    DOI: 10.1109/ICASSP.2015.7178276
    BibTeX
    @inproceedings{Li2015d,
     author = {Li, Ruizhe and Li, Chang-Tsun and Guan, Yu},
     title = {A Compact Representation of Sensor Fingerprint for Camera Identification and Fingerprint Matching},
     booktitle = {Proc. IEEE Int Acoustics, Speech and Signal Processing (ICASSP) Conf},
     year = {2015},
     pages = {1777--1781}}
    
  170. R. Li, C.-T. Li & Y. Guan
    Incremental Update of Feature Extractor for Camera Identification
    Proc. IEEE Int Image Processing (ICIP) Conf
    2015, pp. 324-328
    DOI: 10.1109/ICIP.2015.7350813
    BibTeX
    @inproceedings{Li2015e,
     author = {Li, Ruizhe and Li, Chang-Tsun and Guan, Yu},
     title = {Incremental Update of Feature Extractor for Camera Identification},
     booktitle = {Proc. IEEE Int Image Processing (ICIP) Conf},
     year = {2015},
     pages = {324--328}}
    
  171. S. Li, M.K. Dhami & A.T.S. Ho
    Standards and Best Practices in Digital and Multimedia Forensics
    Ho, A. T. S. & Li, S. (ed.)
    Ho/Handbook of Digital Forensics of Multimedia Data and Devices
    Chapter 2
    Wiley-IEEE Press, 2015, pp. 38-93
    DOI: 10.1002/9781118705773.ch2
    BibTeX
    @inbook{Li2015j,
     author = {Li, Shujun and Dhami, Mandeep K. and Ho, Anthony T. S.},
     title = {Standards and Best Practices in Digital and Multimedia Forensics},
     booktitle = {Ho/Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-IEEE Press},
     year = {2015},
     pages = {38--93}}
    
  172. S. Li & A.T.S. Ho
    Digital Forensics Laboratories in Operation
    Ho/Handbook of Digital Forensics of Multimedia Data and Devices
    Chapter 1
    Wiley-IEEE Press, 2015, pp. 1-37
    DOI: 10.1002/9781118705773.ch1
    BibTeX
    @inbook{Li2015k,
     author = {Li, Shujun and Ho, Anthony T. S.},
     title = {Digital Forensics Laboratories in Operation},
     booktitle = {Ho/Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-IEEE Press},
     year = {2015},
     pages = {1--37}}
    
  173. Y. Li & J. Zhou
    Anti-forensics of Lossy Predictive Image Compression
    Signal Processing Letters, IEEE, 2015, Vol. 22(12), pp. 2219-2223
    DOI: 10.1109/LSP.2015.2472561
    BibTeX
    @article{Li2015b,
     author = {Li, Yuanman and Zhou, Jiantao},
     title = {Anti-forensics of Lossy Predictive Image Compression},
     journal = {Signal Processing Letters, IEEE},
     year = {2015},
     volume = {22},
     number = {12},
     pages = {2219--2223}}
    
  174. Y. Li & J. Zhou
    Anti-Forensics of Lossy Predictive Image Compression
    #IEEE_J_SPL#, 2015, Vol. 22(12), pp. 2219-2223
    DOI: 10.1109/LSP.2015.2472561
    BibTeX
    @article{Li2015h,
     author = {Li, Y. and Zhou, J.},
     title = {Anti-Forensics of Lossy Predictive Image Compression},
     journal = {#IEEE_J_SPL#},
     year = {2015},
     volume = {22},
     number = {12},
     pages = {2219--2223}}
    
  175. Z. Liang, G. Yang, X. Ding & L. Li
    An Efficient Forgery Detection Algorithm for Object Removal by Exemplar-based Image Inpainting
    Journal of Visual Communication and Image Representation, 2015(0), pp. -
    DOI: 10.1016/j.jvcir.2015.03.004
    BibTeX
    @article{Liang2015,
     author = {Liang, Zaoshan and Yang, Gaobo and Ding, Xiangling and Li, Leida},
     title = {An Efficient Forgery Detection Algorithm for Object Removal by Exemplar-based Image Inpainting},
     journal = {Journal of Visual Communication and Image Representation},
     year = {2015},
     number = {0},
     pages = {-}}
    
  176. C.S. Lin, C.C. Chen & Y.C. Chang
    An Efficiency Enhanced Cluster Expanding Block Algorithm for Copy-move Forgery Detection
    Proc. Int Intelligent Networking and Collaborative Systems (INCOS) Conf
    2015, pp. 228-231
    DOI: 10.1109/INCoS.2015.90
    BibTeX
    @inproceedings{Lin2015,
     author = {Lin, C. S. and Chen, C. C. and Chang, Y. C.},
     title = {An Efficiency Enhanced Cluster Expanding Block Algorithm for Copy-move Forgery Detection},
     booktitle = {Proc. Int Intelligent Networking and Collaborative Systems (INCOS) Conf},
     year = {2015},
     pages = {228--231}}
    
  177. B. Liu & C.-M. Pun
    Splicing Forgery Exposure in Digital Image by Detecting Noise Discrepancies
    International Journal of Computer and Communication Engineering, 2015, Vol. 4(1), pp. 33-38
    DOI: 10.7763/IJCCE.2015.V4.378
    BibTeX
    @article{Liu2015,
     author = {Liu, Bo and Pun, Chi-Man},
     title = {Splicing Forgery Exposure in Digital Image by Detecting Noise Discrepancies},
     journal = {International Journal of Computer and Communication Engineering},
     year = {2015},
     volume = {4},
     number = {1},
     pages = {33--38}}
    
  178. B.-b. Liu, X. Wei & J. Yan
    Enhancing Sensor Pattern Noise for Source Camera Identification: An Empirical Evaluation
    Proc. of the The 3rd ACM Workshop on Information Hiding and Multimedia Security, 2015
    DOI: 10.1145/2756601.2756614
    BibTeX
    @article{Liu2015b,
     author = {Liu, Bei-bei and Wei, Xingjie and Yan, Jeff},
     title = {Enhancing Sensor Pattern Noise for Source Camera Identification: An Empirical Evaluation},
     journal = {Proc. of the The 3rd ACM Workshop on Information Hiding and Multimedia Security},
     year = {2015}}
    
  179. Q. Liu, A. Sung, Z. Chen & L. Chen
    Exposing Image Tampering with the Same Quantization Matrix
    Baughman, A. K., Gao, J., Pan, J.-Y. & Petrushin, V. A. (ed.)
    Multimedia Data Mining and Analytics
    Springer International Publishing, 2015, pp. 327-343
    DOI: 10.1007/978-3-319-14998-1_15
    BibTeX
    @incollection{Liu2015a,
     author = {Liu, Qingzhong and Sung, AndrewH. and Chen, Zhongxue and Chen, Lei},
     title = {Exposing Image Tampering with the Same Quantization Matrix},
     booktitle = {Multimedia Data Mining and Analytics},
     publisher = {Springer International Publishing},
     year = {2015},
     pages = {327--343}}
    
  180. Y. Liu & T. Huang
    Exposing Video Inter-frame Forgery by Zernike Opponent Chromaticity Moments and Coarseness Analysis
    Multimedia Systems, Springer Berlin Heidelberg, 2015, pp. 1-16
    DOI: 10.1007/s00530-015-0478-1
    BibTeX
    @article{Liu2015c,
     author = {Liu, Yuqing and Huang, Tianqiang},
     title = {Exposing Video Inter-frame Forgery by Zernike Opponent Chromaticity Moments and Coarseness Analysis},
     journal = {Multimedia Systems},
     publisher = {Springer Berlin Heidelberg},
     year = {2015},
     pages = {1--16}}
    
  181. B. Mahdian, A. Novozamsky & S. Saic
    Detecting Cyclostationarity in Re-captured LCD Screens
    Forensic Research, 2015
    DOI: 10.1109/icip.2015.7350872
    BibTeX
    @article{Mahdian2015a,
     author = {Mahdian, Babak and Novozamsky, Adam and Saic, Stanislav},
     title = {Detecting Cyclostationarity in Re-captured LCD Screens},
     journal = {Forensic Research},
     year = {2015}}
    
  182. B. Mahdian, A. Novozámský & S. Saic
    Determination of Stop-criterion for Incremental Methods Constructing Camera Sensor Fingerprint
    Shi, Y.-Q., Kim, H. J., Pérez-González, F. & Yang, C.-N. (ed.)
    Digital-Forensics and Watermarking
    Springer International Publishing, 2015, Vol. 9023, pp. 47-59
    DOI: 10.1007/978-3-319-19321-2_4
    BibTeX
    @incollection{Mahdian2015,
     author = {Mahdian, Babak and Novozámský, Adam and Saic, Stanislav},
     title = {Determination of Stop-criterion for Incremental Methods Constructing Camera Sensor Fingerprint},
     booktitle = {Digital-Forensics and Watermarking},
     publisher = {Springer International Publishing},
     year = {2015},
     volume = {9023},
     pages = {47--59}}
    
  183. B. Mahdian, A. Novozámský & S. Saic
    Identification of Aliasing-based Patterns in Re-captured LCD Screens
    ICIP
    2015
    BibTeX
    @inproceedings{Mahdian2015b,
     author = {Mahdian, Babak and Novozámský, Adam and Saic, Stanislav},
     title = {Identification of Aliasing-based Patterns in Re-captured LCD Screens},
     booktitle = {ICIP},
     year = {2015}}
    
  184. B. Mahdian, A. Novozámský & S. Saic
    Determination of Stop-criterion for Incremental Methods Constructing Camera Sensor Fingerprint
    Digital-Forensics and Watermarking
    Digital-Forensics and Watermarking, Springer, 2015, pp. 47-59
    DOI: 10.1007/978-3-319-19321-2_4
    BibTeX
    @article{Mahdian2015c,
     author = {Mahdian, Babak and Novozámský, Adam and Saic, Stanislav},
     title = {Determination of Stop-criterion for Incremental Methods Constructing Camera Sensor Fingerprint},
     booktitle = {Digital-Forensics and Watermarking},
     journal = {Digital-Forensics and Watermarking},
     publisher = {Springer},
     year = {2015},
     pages = {47--59}}
    
  185. T. Mahmood, T. Nawaz, R. Ashraf, M. Shah, Z. Khan, A. Irtaza & Z. Mehmood
    A Survey on Block Based Copy Move Image Forgery Detection Techniques
    Emerging Technologies (ICET), 2015 International Conference on
    2015, pp. 1-6
    DOI: 10.1109/ICET.2015.7389169
    BibTeX
    @inproceedings{Mahmood2015,
     author = {Mahmood, T. and Nawaz, T. and Ashraf, R. and Shah, M. and Khan, Z. and Irtaza, A. and Mehmood, Z.},
     title = {A Survey on Block Based Copy Move Image Forgery Detection Techniques},
     booktitle = {Emerging Technologies (ICET), 2015 International Conference on},
     year = {2015},
     pages = {1--6}}
    
  186. P. Malik & K. Karthik
    Detection of Purple Fringing Aberration Patterns and Its Application to Forensic Analysis of Spliced Images
    Proc. Int Advances in Computing, Communications and Informatics (ICACCI) Conf
    2015, pp. 1421-1427
    DOI: 10.1109/ICACCI.2015.7275812
    BibTeX
    @inproceedings{Malik2015,
     author = {Malik, Parveen and Karthik, Kannan},
     title = {Detection of Purple Fringing Aberration Patterns and Its Application to Forensic Analysis of Spliced Images},
     booktitle = {Proc. Int Advances in Computing, Communications and Informatics (ICACCI) Conf},
     year = {2015},
     pages = {1421--1427}}
    
  187. A.V. Malviya & S.A. Ladhake
    Copy move forgery detection using low complexity feature extraction
    Proc. IEEE UP Section Conf. Electrical Computer and Electronics (UPCON)
    2015, pp. 1-5
    DOI: 10.1109/UPCON.2015.7456688
    BibTeX
    @inproceedings{Malviya2015,
     author = {Malviya, A. V. and Ladhake, S. A.},
     title = {Copy move forgery detection using low complexity feature extraction},
     booktitle = {Proc. IEEE UP Section Conf. Electrical Computer and Electronics (UPCON)},
     year = {2015},
     pages = {1--5}}
    
  188. V.T. Manu & B.M. Mehtre
    Visual Artifacts Based Image Splicing Detection in Uncompressed Images
    Proc. Vision and Information Security (CGVIS) 2015 IEEE Int. Conf. Computer Graphics
    2015, Vol. 11/16, pp. 145-150
    DOI: 10.1109/CGVIS.2015.7449911
    BibTeX
    @inproceedings{Manu2015,
     author = {Manu, V. T. and Mehtre, B. M.},
     title = {Visual Artifacts Based Image Splicing Detection in Uncompressed Images},
     booktitle = {Proc. Vision and Information Security (CGVIS) 2015 IEEE Int. Conf. Computer Graphics},
     year = {2015},
     volume = {11/16},
     pages = {145--150}}
    
  189. F. Marra, G. Poggi, F. Roli, C. Sansone & L. Verdoliva
    Counter-forensics in Machine Learning Based Forgery Detection
    Alattar, A. M., Memon, N. D. & Heitzenrater, C. D. (ed.)
    IS&T/SPIE Electronic Imaging
    Proc. SPIE, 2015, Vol. 9409, pp. 94090L-94090L-11
    DOI: 10.1117/12.2182173
    BibTeX
    @inproceedings{Marra2015,
     author = {Marra, Francesco and Poggi, Giovanni and Roli, Fabio and Sansone, Carlo and Verdoliva, Luisa},
     title = {Counter-forensics in Machine Learning Based Forgery Detection},
     booktitle = {IS&T/SPIE Electronic Imaging},
     journal = {Proc. SPIE},
     year = {2015},
     volume = {9409},
     pages = {94090L-94090L-11}}
    
  190. F. Marra, G. Poggi, C. Sansone & L. Verdoliva
    Evaluation of Residual-based Local Features for Camera Model Identification
    New Trends in Image Analysis and Processing -- ICIAP 2015 Workshops
    New Trends in Image Analysis and Processing, Springer Science + Business Media, 2015, pp. 11-18
    DOI: 10.1007/978-3-319-23222-5_2
    BibTeX
    @incollection{Marra2015a,
     author = {Marra, Francesco and Poggi, Giovanni and Sansone, Carlo and Verdoliva, Luisa},
     title = {Evaluation of Residual-based Local Features for Camera Model Identification},
     booktitle = {New Trends in Image Analysis and Processing -- ICIAP 2015 Workshops},
     journal = {New Trends in Image Analysis and Processing},
     publisher = {Springer Science + Business Media},
     year = {2015},
     pages = {11--18}}
    
  191. F. Marra, G. Poggi, C. Sansone & L. Verdoliva
    Evaluation of Residual-based Local Features for Camera Model Identification
    New Trends in Image Analysis and Processing -- ICIAP 2015 Workshops, Springer, 2015
    DOI: 10.1007/978-3-319-23222-5_2
    BibTeX
    @article{Marra2015b,
     author = {Marra, Francesco and Poggi, Giovanni and Sansone, Carlo and Verdoliva, Luisa},
     title = {Evaluation of Residual-based Local Features for Camera Model Identification},
     journal = {New Trends in Image Analysis and Processing -- ICIAP 2015 Workshops},
     publisher = {Springer},
     year = {2015}}
    
  192. F. Marturana, S. Tacconi & G.F. Italiano
    A Machine Learning-Based Approach to Digital Triage
    Ho/Handbook of Digital Forensics of Multimedia Data and Devices
    Wiley-IEEE Press, 2015, pp. 94-132
    DOI: 10.1002/9781118705773.ch3
    BibTeX
    @inbook{Marturana2015,
     author = {Marturana, Fabio and Tacconi, Simone and Italiano, Giuseppe F.},
     title = {A Machine Learning-Based Approach to Digital Triage},
     booktitle = {Ho/Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-IEEE Press},
     year = {2015},
     pages = {94--132}}
    
  193. O. Mayer & M.C. Stamm
    Anti-forensics of Chromatic Aberration
    IS&T/SPIE Electronic Imaging
    Proc. SPIE, 2015, Vol. 9409, pp. 94090M-94090M-9
    DOI: 10.1117/12.2182457
    BibTeX
    @inproceedings{Mayer2015,
     author = {Mayer, Owen and Stamm, Matthew C.},
     title = {Anti-forensics of Chromatic Aberration},
     booktitle = {IS&T/SPIE Electronic Imaging},
     journal = {Proc. SPIE},
     year = {2015},
     volume = {9409},
     pages = {94090M-94090M-9}}
    
  194. A. Meenakshi Sundaram & C. Nandini
    CBFD: Coherence Based Forgery Detection technique in image forensics analysis
    Proc. Computer Science and Technology (ICERECT) 2015 Int. Conf. Emerging Research in Electronics
    2015, pp. 192-197
    DOI: 10.1109/ERECT.2015.7499011
    BibTeX
    @inproceedings{MeenakshiSundaram2015,
     author = {Meenakshi Sundaram, A. and Nandini, C.},
     title = {CBFD: Coherence Based Forgery Detection technique in image forensics analysis},
     booktitle = {Proc. Computer Science and Technology (ICERECT) 2015 Int. Conf. Emerging Research in Electronics},
     year = {2015},
     pages = {192--197}}
    
  195. A. Meenakshi Sundaram & C. Nandini
    CBFD: Coherence Based Forgery Detection technique in image forensics analysis
    Proc. Computer Science and Technology (ICERECT) 2015 Int. Conf. Emerging Research in Electronics
    2015, pp. 192-197
    DOI: 10.1109/ERECT.2015.7499011
    BibTeX
    @inproceedings{MeenakshiSundaram2015a,
     author = {Meenakshi Sundaram, A. and Nandini, C.},
     title = {CBFD: Coherence Based Forgery Detection technique in image forensics analysis},
     booktitle = {Proc. Computer Science and Technology (ICERECT) 2015 Int. Conf. Emerging Research in Electronics},
     year = {2015},
     pages = {192--197}}
    
  196. A.V. Mire, S.B. Dhok, N.J. Mistry & P.D. Porey
    Factor Histogram Based Forgery Localization in Double Compressed JPEG\ Images
    Procedia Computer Science, 2015, Vol. 54, pp. 690-696
    DOI: 10.1016/j.procs.2015.06.081
    BibTeX
    @article{Mire2015,
     author = {Mire, Archana V. and Dhok, S. B. and Mistry, N. J. and Porey, P. D.},
     title = {Factor Histogram Based Forgery Localization in Double Compressed JPEG\ Images},
     journal = {Procedia Computer Science},
     year = {2015},
     volume = {54},
     pages = {690--696}}
    
  197. Z. Moghaddasi, H.A. Jalab & R.M. Noor
    A Comparison Study on SVD-based Features in Different Transforms for Image Splicing Detection
    Proc. IEEE Int Consumer Electronics - Taiwan (ICCE-TW) Conf
    2015, pp. 13-14
    DOI: 10.1109/ICCE-TW.2015.7216815
    BibTeX
    @inproceedings{Moghaddasi2015,
     author = {Moghaddasi, Z. and Jalab, H. A. and Noor, R. M.},
     title = {A Comparison Study on SVD-based Features in Different Transforms for Image Splicing Detection},
     booktitle = {Proc. IEEE Int Consumer Electronics - Taiwan (ICCE-TW) Conf},
     year = {2015},
     pages = {13--14}}
    
  198. E. Mohebbian & M. Hariri
    Increase the efficiency of DCT method for detection of copy-move forgery in complex and smooth images
    Proc. 2nd Int. Conf. Knowledge-Based Engineering and Innovation (KBEI)
    2015, pp. 436-440
    DOI: 10.1109/KBEI.2015.7436084
    BibTeX
    @inproceedings{Mohebbian2015,
     author = {Mohebbian, E. and Hariri, M.},
     title = {Increase the efficiency of DCT method for detection of copy-move forgery in complex and smooth images},
     booktitle = {Proc. 2nd Int. Conf. Knowledge-Based Engineering and Innovation (KBEI)},
     year = {2015},
     pages = {436--440}}
    
  199. M. Moltisanti, A. Paratore, S. Battiato & L. Saravo
    Image Manipulation on Facebook for Forensics Evidence
    Image Processing Laboratory Dipartimento di Matematica e Informatica Universita degli Studi di Catania, Image Processing Laboratory Dipartimento di Matematica e Informatica Universita degli Studi di Catania, 2015
    BibTeX
    @techreport{Moltisanti2015,
     author = {Moltisanti, Marco and Paratore, Antonino and Battiato, Sebastiano and Saravo, Luigi},
     title = {Image Manipulation on Facebook for Forensics Evidence},
     school = {Image Processing Laboratory Dipartimento di Matematica e Informatica Universita degli Studi di Catania},
     year = {2015}}
    
  200. M. Moltisanti, A. Paratore, S. Battiato & L. Saravo
    Image Manipulation on Facebook for Forensics Evidence
    Image Analysis and Processing — ICIAP 2015
    Springer, 2015, pp. 506-517
    DOI: 10.1007/978-3-319-23234-8_47
    BibTeX
    @incollection{Moltisanti2015a,
     author = {Moltisanti, Marco and Paratore, Antonino and Battiato, Sebastiano and Saravo, Luigi},
     title = {Image Manipulation on Facebook for Forensics Evidence},
     booktitle = {Image Analysis and Processing — ICIAP 2015},
     publisher = {Springer},
     year = {2015},
     pages = {506--517}}
    
  201. P. Mookdarsanit, L. Soimart, M. Ketcham & N. Hnoohom
    Detecting Image Forgery Using XOR and Determinant of Pixels for Image Forensics
    Proc. 11th Int. Conf. Signal-Image Technology Internet-Based Systems (SITIS)
    2015, pp. 613-616
    DOI: 10.1109/SITIS.2015.78
    BibTeX
    @inproceedings{Mookdarsanit2015,
     author = {Mookdarsanit, P. and Soimart, L. and Ketcham, M. and Hnoohom, N.},
     title = {Detecting Image Forgery Using XOR and Determinant of Pixels for Image Forensics},
     booktitle = {Proc. 11th Int. Conf. Signal-Image Technology Internet-Based Systems (SITIS)},
     year = {2015},
     pages = {613--616}}
    
  202. P. Mookdarsanit, L. Soimart, M. Ketcham & N. Hnoohom
    Detecting Image Forgery Using XOR and Determinant of Pixels for Image Forensics
    Proc. 11th Int. Conf. Signal-Image Technology Internet-Based Systems (SITIS)
    2015, pp. 613-616
    DOI: 10.1109/SITIS.2015.78
    BibTeX
    @inproceedings{Mookdarsanit2015a,
     author = {Mookdarsanit, P. and Soimart, L. and Ketcham, M. and Hnoohom, N.},
     title = {Detecting Image Forgery Using XOR and Determinant of Pixels for Image Forensics},
     booktitle = {Proc. 11th Int. Conf. Signal-Image Technology Internet-Based Systems (SITIS)},
     year = {2015},
     pages = {613--616}}
    
  203. A.M. Moussa
    A Fast and Accurate Algorithm for Copy-move Forgery Detection
    Computer Engineering Systems (ICCES), 2015 Tenth International Conference on
    2015, pp. 281-285
    DOI: 10.1109/ICCES.2015.7393060
    BibTeX
    @inproceedings{Moussa2015,
     author = {Moussa, A. M.},
     title = {A Fast and Accurate Algorithm for Copy-move Forgery Detection},
     booktitle = {Computer Engineering Systems (ICCES), 2015 Tenth International Conference on},
     year = {2015},
     pages = {281--285}}
    
  204. R. Ni, Y. Zhao & X. Zhai
    Recaptured Images Forensics Based on Color Moments and DCT Coefficients Features
    Journal of Information Hiding and Multimedia Signal Processing, 2015, Vol. 6(2), pp. 323-333
    BibTeX
    @article{Ni2015,
     author = {Ni, Rongrong and Zhao, Yao and Zhai, Xiaobo},
     title = {Recaptured Images Forensics Based on Color Moments and DCT Coefficients Features},
     journal = {Journal of Information Hiding and Multimedia Signal Processing},
     year = {2015},
     volume = {6},
     number = {2},
     pages = {323--333}}
    
  205. N. Nirmalkar, S. Kamble & S. Kakde
    A Review of Image Forgery Techniques and Their Detection
    Proc. Int Innovations in Information, Embedded and Communication Systems (ICIIECS) Conf
    2015, pp. 1-5
    DOI: 10.1109/ICIIECS.2015.7193177
    BibTeX
    @inproceedings{Nirmalkar2015,
     author = {Nirmalkar, N. and Kamble, S. and Kakde, S.},
     title = {A Review of Image Forgery Techniques and Their Detection},
     booktitle = {Proc. Int Innovations in Information, Embedded and Communication Systems (ICIIECS) Conf},
     year = {2015},
     pages = {1--5}}
    
  206. E. Nowroozi & A. Zakerolhosseini
    Double JPEG Compression Detection Using Statistical Analysis
    dvances in Computer Science: an International Journal, 2015, Vol. 4(15), pp. 70-76
    BibTeX
    @article{Nowroozi2015,
     author = {Nowroozi, Ehsan and Zakerolhosseini, Ali},
     title = {Double JPEG Compression Detection Using Statistical Analysis},
     journal = {dvances in Computer Science: an International Journal},
     year = {2015},
     volume = {4},
     number = {15},
     pages = {70--76}}
    
  207. P.A. Nugraha, R.W. Ciptasari & B. Pudjoatmojo
    A photo composite detection based on eye specular highlights using pixel-based approach
    Proc. 3rd Int Information and Communication Technology (ICoICT ) Conf
    2015, pp. 195-200
    DOI: 10.1109/ICoICT.2015.7231421
    BibTeX
    @inproceedings{Nugraha2015,
     author = {Nugraha, P. A. and Ciptasari, R. W. and Pudjoatmojo, B.},
     title = {A photo composite detection based on eye specular highlights using pixel-based approach},
     booktitle = {Proc. 3rd Int Information and Communication Technology (ICoICT ) Conf},
     year = {2015},
     pages = {195--200}}
    
  208. A.L.S. Orozco, L.J.G. Villalba, D.M.A. González, J.R. Corripio, J. Hernandez-Castro & S.J. Gibson
    Smartphone Image Acquisition Forensics Using Sensor Fingerprint
    IET Computer Vision, 2015
    DOI: 10.1049/iet-cvi.2014.0243
    BibTeX
    @article{Orozco2015,
     author = {Orozco, Ana Lucila Sandoval and Villalba, Luis Javier García and González, David Manuel Arenas and Corripio, Jocelin Rosales and Hernandez-Castro, Julio and Gibson, Stuart James},
     title = {Smartphone Image Acquisition Forensics Using Sensor Fingerprint},
     journal = {IET Computer Vision},
     year = {2015}}
    
  209. A.L.S. Orozco, L.J.G. Villalba, D.M.A. González, J.R. Corripio, J. Hernandez-Castro & S.J. Gibson
    Smartphone image acquisition forensics using sensor fingerprint
    IET Comput Vision, 2015, Vol. 9(5), pp. 723-731
    DOI: 10.1049/iet-cvi.2014.0243
    BibTeX
    @article{Orozco2015a,
     author = {Orozco, A. L. Sandoval and Villalba, L. J. García and González, D. M. Arenas and Corripio, J. R. and Hernandez-Castro, J. and Gibson, S. J.},
     title = {Smartphone image acquisition forensics using sensor fingerprint},
     journal = {IET Comput Vision},
     year = {2015},
     volume = {9},
     number = {5},
     pages = {723--731}}
    
  210. J. Ou & J. Ni
    Blind Estimation of Affine Transformation Using 2D Cyclostationarity of Resampled Images
    Proc. SPIE, 2015, Vol. 9811, pp. 98110L-98110L-9
    DOI: 10.1117/12.2205468
    BibTeX
    @article{Ou2015,
     author = {Ou, Junhai and Ni, Jiangqun},
     title = {Blind Estimation of Affine Transformation Using 2D Cyclostationarity of Resampled Images},
     journal = {Proc. SPIE},
     year = {2015},
     volume = {9811},
     pages = {98110L-98110L-9}}
    
  211. X. Pan
    Digital Image Forensics with Statistical Analysis
    Ho, A. T. S. & Li, S. (ed.)
    Handbook of Digital Forensics of Multimedia Data and Devices
    Wiley-IEEE Press, 2015, pp. 704-
    DOI: 10.1002/9781118705773.ch13
    BibTeX
    @inbook{Pan2015,
     author = {Pan, Xunyu},
     title = {Digital Image Forensics with Statistical Analysis},
     booktitle = {Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-IEEE Press},
     year = {2015},
     pages = {704-}}
    
  212. R.C. Pandey, R. Agrawal, S.K. Singh & K.K. Shukla
    Passive Copy Move Forgery Detection Using SURF, HOG and SIFT Features
    Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014
    Springer, 2015
    DOI: 10.1007/978-3-319-11933-5_74
    BibTeX
    @incollection{Pandey2015,
     author = {Pandey, Ramesh Chand and Agrawal, Rishabh and Singh, Sanjay Kumar and Shukla, K. K.},
     title = {Passive Copy Move Forgery Detection Using SURF, HOG and SIFT Features},
     booktitle = {Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014},
     publisher = {Springer},
     year = {2015}}
    
  213. Peng
    Towards an Image Blurring Detection Approach Based on Color Filter Array
    Proc. of the International Conference on Mechatronics, Electronic, Industrial and Control Engineering (MEIC 2015)
    2015
    DOI: 10.2991/meic-15.2015.55
    BibTeX
    @inproceedings{Peng2015,
     author = {Peng},
     title = {Towards an Image Blurring Detection Approach Based on Color Filter Array},
     booktitle = {Proc. of the International Conference on Mechatronics, Electronic, Industrial and Control Engineering (MEIC 2015)},
     year = {2015}}
    
  214. A. Peng, H. Zeng, X. Lin & X. Kang
    Countering Anti-forensics of Image Resampling
    Proc. IEEE Int Image Processing (ICIP) Conf
    2015, pp. 3595-3599
    DOI: 10.1109/ICIP.2015.7351474
    BibTeX
    @inproceedings{Peng2015b,
     author = {Peng, Anjie and Zeng, Hui and Lin, Xiaodan and Kang, Xiangui},
     title = {Countering Anti-forensics of Image Resampling},
     booktitle = {Proc. IEEE Int Image Processing (ICIP) Conf},
     year = {2015},
     pages = {3595--3599}}
    
  215. A. Peng, H. Zeng, X. Lin & X. Kang
    Countering anti-forensics of image resampling
    Proc. IEEE Int. Conf. Image Processing (ICIP)
    2015, pp. 3595-3599
    DOI: 10.1109/ICIP.2015.7351474
    BibTeX
    @inproceedings{Peng2015e,
     author = {Peng, A. and Zeng, H. and Lin, X. and Kang, X.},
     title = {Countering anti-forensics of image resampling},
     booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)},
     year = {2015},
     pages = {3595--3599}}
    
  216. B. Peng, W. Wang, J. Dong & T. Tan
    Detection of Computer Generated Faces in Videos Based on Pulse Signal
    Proc. IEEE China Summit and Int Signal and Information Processing (ChinaSIP) Conf
    2015, pp. 841-845
    DOI: 10.1109/ChinaSIP.2015.7230523
    BibTeX
    @inproceedings{Peng2015a,
     author = {Peng, Bo and Wang, Wei and Dong, Jing and Tan, Tieniu},
     title = {Detection of Computer Generated Faces in Videos Based on Pulse Signal},
     booktitle = {Proc. IEEE China Summit and Int Signal and Information Processing (ChinaSIP) Conf},
     year = {2015},
     pages = {841--845}}
    
  217. B. Peng, W. Wang, J. Dong & T. Tan
    Improved 3D Lighting Environment Estimation for Image Forgery Detection
    Information Forensics and Security (WIFS), 2015 IEEE International Workshop on
    2015, pp. 1-6
    DOI: 10.1109/WIFS.2015.7368587
    BibTeX
    @inproceedings{Peng2015d,
     author = {Peng, Bo and Wang, Wei and Dong, Jing and Tan, Tieniu},
     title = {Improved 3D Lighting Environment Estimation for Image Forgery Detection},
     booktitle = {Information Forensics and Security (WIFS), 2015 IEEE International Workshop on},
     year = {2015},
     pages = {1--6}}
    
  218. F. Peng, Y. Zhu & M. Long
    Identification of Natural Images and Computer Generated Graphics Using Multi-fractal Differences of PRNU
    Algorithms and Architectures for Parallel Processing, Springer, 2015
    DOI: 10.1007/978-3-319-27122-4_15
    BibTeX
    @article{Peng2015c,
     author = {Peng, Fei and Zhu, Yin and Long, Min},
     title = {Identification of Natural Images and Computer Generated Graphics Using Multi-fractal Differences of PRNU},
     journal = {Algorithms and Architectures for Parallel Processing},
     publisher = {Springer},
     year = {2015}}
    
  219. F. Perez-Gonzalez, I. Gonzalez-Iglesias, M. Masciopinto & P. Comesana
    Fast Sequential Forensic Camera Identification
    arxiv, 2015
    BibTeX
    @article{Perez-Gonzalez2015,
     author = {Perez-Gonzalez, F. and Gonzalez-Iglesias, I. and Masciopinto, M. and Comesana, P.},
     title = {Fast Sequential Forensic Camera Identification},
     journal = {arxiv},
     year = {2015}}
    
  220. S. Pittala, E. Whiting & H. Farid
    A 3-D Stability Analysis of Lee Harvey Oswald in the Backyard Photo
    JDFSL, 2015, Vol. 10(3), pp. 87-98
    BibTeX
    @article{Pittala2015,
     author = {Pittala, Srivamshi and Whiting, Emily and Farid, Hany},
     title = {A 3-D Stability Analysis of Lee Harvey Oswald in the Backyard Photo},
     journal = {JDFSL},
     year = {2015},
     volume = {10},
     number = {3},
     pages = {87--98}}
    
  221. S. Pollard, G. Adams & S. Simske
    Forensic Identification of Printed Documents
    Ho/Handbook of Digital Forensics of Multimedia Data and Devices
    Wiley-Blackwell, 2015, pp. 442-479
    DOI: 10.1002/9781118705773.ch12
    BibTeX
    @incollection{Pollard2015,
     author = {Pollard, Stephen and Adams, Guy and Simske, Steven},
     title = {Forensic Identification of Printed Documents},
     booktitle = {Ho/Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-Blackwell},
     year = {2015},
     pages = {442--479}}
    
  222. D. Prakash, P. Kalwad, V. Peddigari & P. Srinivasa
    Automatic Reflection Removal Using Reflective Layer Image Information
    Consumer Electronics (ICCE), 2015 IEEE International Conference on
    2015, pp. 548-551
    DOI: 10.1109/ICCE.2015.7066520
    BibTeX
    @inproceedings{Prakash2015,
     author = {Prakash, Divya and Kalwad, Pramati and Peddigari, Venkat and Srinivasa, Phanish},
     title = {Automatic Reflection Removal Using Reflective Layer Image Information},
     booktitle = {Consumer Electronics (ICCE), 2015 IEEE International Conference on},
     year = {2015},
     pages = {548--551}}
    
  223. S.V. Priyan & S.K. Srivatsa
    Detection of Duplicate Region and Hybrid Non-local Means Filtering for Denoising with Quantization Matrix Estimation for JPEG Error Analysis
    Indian Journal of Science and Technology, 2015, Vol. 8(28)
    DOI: 10.17485/ijst/2015/v8i28/70923
    BibTeX
    @article{Priyan2015,
     author = {Priyan, S. Vishnu and Srivatsa, S. K.},
     title = {Detection of Duplicate Region and Hybrid Non-local Means Filtering for Denoising with Quantization Matrix Estimation for JPEG Error Analysis},
     journal = {Indian Journal of Science and Technology},
     year = {2015},
     volume = {8},
     number = {28}}
    
  224. C.-M. Pun, X.-C. Yuan & X.-L. Bi
    Image Forgery Detection Using Adaptive Over-segmentation and Feature Points Matching
    Information Forensics and Security, IEEE Transactions on, 2015(99)
    DOI: 10.1109/TIFS.2015.2423261
    BibTeX
    @article{Pun2015,
     author = {Pun, Chi-Man and Yuan, Xiao-Chen and Bi, Xiu-Li},
     title = {Image Forgery Detection Using Adaptive Over-segmentation and Feature Points Matching},
     journal = {Information Forensics and Security, IEEE Transactions on},
     year = {2015},
     number = {99}}
    
  225. E.P. Purwandari
    Image Splicing Detection Based on Demosaicking and Wavelet Transformation
    Jurnal Ilmu Komputer dan Informasi, 2015
    BibTeX
    @article{Purwandari2015,
     author = {Purwandari, Endina Putri},
     title = {Image Splicing Detection Based on Demosaicking and Wavelet Transformation},
     journal = {Jurnal Ilmu Komputer dan Informasi},
     year = {2015}}
    
  226. T. Qiao, F. Retraint, R. Cogranne & T.H. Thai
    Source Camera Device Identification Based on Raw Images
    2015
    DOI: 10.1109/icip.2015.7351518
    BibTeX
    @electronic{Qiao2015,
     author = {Qiao, Tong and Retraint, Florent and Cogranne, Rémi and Thai, Thanh Hai},
     title = {Source Camera Device Identification Based on Raw Images},
     year = {2015}}
    
  227. E. Quiring & M. Kirchner
    Fragile Sensor Fingerprint Camera Identification
    Proc. of the 7th IEEE International Workshop on Information Forensics and Security 2015 (WIFS)
    2015
    DOI: 10.1109/wifs.2015.7368580
    BibTeX
    @inproceedings{Quiring2015,
     author = {Quiring, Erwin and Kirchner, Matthias},
     title = {Fragile Sensor Fingerprint Camera Identification},
     booktitle = {Proc. of the 7th IEEE International Workshop on Information Forensics and Security 2015 (WIFS)},
     year = {2015}}
    
  228. M.A. Qureshi & M. Deriche
    A Bibliography of Pixel-based Blind Image Forgery Detection Techniques
    Signal Processing: Image Communication, 2015, Vol. 39, Part A, pp. 46-74
    DOI: 10.1016/j.image.2015.08.008
    BibTeX
    @article{Qureshi2015,
     author = {Qureshi, Muhammad Ali and Deriche, Mohamed},
     title = {A Bibliography of Pixel-based Blind Image Forgery Detection Techniques},
     journal = {Signal Processing: Image Communication},
     year = {2015},
     volume = {39, Part A},
     pages = {46--74}}
    
  229. R.M. Rad & K. Wong
    Digital Image Forgery Detection by Edge Analysis
    Proc. IEEE Int Consumer Electronics - Taiwan (ICCE-TW) Conf
    2015, pp. 19-20
    DOI: 10.1109/ICCE-TW.2015.7216848
    BibTeX
    @inproceedings{Rad2015,
     author = {Rad, R. M. and Wong, Koksheik},
     title = {Digital Image Forgery Detection by Edge Analysis},
     booktitle = {Proc. IEEE Int Consumer Electronics - Taiwan (ICCE-TW) Conf},
     year = {2015},
     pages = {19--20}}
    
  230. R. Rajkumar & K.M. Singh
    Digital Image Forgery Detection Using SIFT Feature
    Proc. Int Advanced Computing and Communication (ISACC) Symp
    2015, pp. 186-191
    DOI: 10.1109/ISACC.2015.7377340
    BibTeX
    @inproceedings{Rajkumar2015,
     author = {Rajkumar, R. and Singh, K. M.},
     title = {Digital Image Forgery Detection Using SIFT Feature},
     booktitle = {Proc. Int Advanced Computing and Communication (ISACC) Symp},
     year = {2015},
     pages = {186--191}}
    
  231. H. Ravi, A.V. Subramanyam & S. Emmanuel
    Forensic Analysis of Linear and Non Linear Image Filtering Using Quantization Noise
    2015 IEEE International Conference on Image Processing (ICIP)
    Institute of Electrical & Electronics Engineers (IEEE), 2015
    DOI: 10.1109/icip.2015.7350986
    BibTeX
    @inproceedings{Ravi2015,
     author = {Ravi, Hareesh and Subramanyam, A. V. and Emmanuel, Sabu},
     title = {Forensic Analysis of Linear and Non Linear Image Filtering Using Quantization Noise},
     booktitle = {2015 IEEE International Conference on Image Processing (ICIP)},
     publisher = {Institute of Electrical & Electronics Engineers (IEEE)},
     year = {2015}}
    
  232. R.S. Remya & A.B. Beevi
    Novel Video Camera Authentication Based on Peak to Correlation Energy of Clustered Sensor Pattern Noise
    Proc. IEEE Int Engineering and Technology (ICETECH) Conf
    2015, pp. 1-5
    DOI: 10.1109/ICETECH.2015.7274998
    BibTeX
    @inproceedings{Remya2015,
     author = {Remya, R. S. and Beevi, A. B.},
     title = {Novel Video Camera Authentication Based on Peak to Correlation Energy of Clustered Sensor Pattern Noise},
     booktitle = {Proc. IEEE Int Engineering and Technology (ICETECH) Conf},
     year = {2015},
     pages = {1--5}}
    
  233. P.D. Reshma & C. Arunvinodh
    Image Forgery Detection Using SVM Classifier
    Proc. Int Innovations in Information, Embedded and Communication Systems (ICIIECS) Conf
    2015, pp. 1-5
    DOI: 10.1109/ICIIECS.2015.7193202
    BibTeX
    @inproceedings{Reshma2015,
     author = {Reshma, P. D. and Arunvinodh, C.},
     title = {Image Forgery Detection Using SVM Classifier},
     booktitle = {Proc. Int Innovations in Information, Embedded and Communication Systems (ICIIECS) Conf},
     year = {2015},
     pages = {1--5}}
    
  234. K.H. Rhee
    Median Filtering Detection Using Latent Growth Modeling
    Journal of the Institute of Electrolnic Engineers of Korea, 2015(1), pp. 61-68
    BibTeX
    @article{Rhee2015,
     author = {Rhee, Kang Hyeon},
     title = {Median Filtering Detection Using Latent Growth Modeling},
     journal = {Journal of the Institute of Electrolnic Engineers of Korea},
     year = {2015},
     number = {1},
     pages = {61--68}}
    
  235. K.H. Rhee
    Median Filtering Detection of Digital Images Using Pixel Gradients
    IEIE Transactions on Smart Processing & Computing, 2015, Vol. 4(4), pp. 195-201
    DOI: 10.5573/ieiespc.2015.4.4.195
    BibTeX
    @article{Rhee2015a,
     author = {Rhee, Kang Hyeon},
     title = {Median Filtering Detection of Digital Images Using Pixel Gradients},
     journal = {IEIE Transactions on Smart Processing & Computing},
     year = {2015},
     volume = {4},
     number = {4},
     pages = {195--201}}
    
  236. C. Riess, S. Pfaller & E. Angelopoulou
    Reflectance Normalization in Illumination-based Image Manipulation Detection
    New Trends in Image Analysis and Processing, 2015
    BibTeX
    @article{Riess2015,
     author = {Riess, Christian and Pfaller, Sven and Angelopoulou, Elli},
     title = {Reflectance Normalization in Illumination-based Image Manipulation Detection},
     journal = {New Trends in Image Analysis and Processing},
     year = {2015}}
    
  237. S. Rocchi, R. Simlinger, M. Moeslinger, J. Murray, G. Hadfi & M. John
    Use of Specialized Security Techniques to Enhance the Authenticity of Surveillance
    Book of Abstracts, Presentations and Papers of the 12 th Symposium on International Safeguards: Linking Strategy, Implementation and People, Vienna (Austria), 20-24 Oct 2014
    2015, pp. 491
    BibTeX
    @inproceedings{Rocchi2015,
     author = {Rocchi, S. and Simlinger, R. and Moeslinger, M. and Murray, J. and Hadfi, G. and John, M.},
     title = {Use of Specialized Security Techniques to Enhance the Authenticity of Surveillance},
     booktitle = {Book of Abstracts, Presentations and Papers of the 12 th Symposium on International Safeguards: Linking Strategy, Implementation and People, Vienna (Austria), 20-24 Oct 2014},
     year = {2015},
     pages = {491}}
    
  238. F. Rodríguez-Santos, G. Delgado-Gutierréz, L. Palacios-Luengas & R. Vazquéz-Medina
    Practical implementation of a methodology for digital images authentication using forensics techniques
    CSIJ Advances in Computer Science: an International Journal, 2015, Vol. 4(18)
    BibTeX
    @article{Rodriguez-Santos2015,
     author = {Rodríguez-Santos, Francisco and Delgado-Gutierréz, Guillermo and Palacios-Luengas, Leonardo and Vazquéz-Medina, Rubén},
     title = {Practical implementation of a methodology for digital images authentication using forensics techniques},
     journal = {CSIJ Advances in Computer Science: an International Journal},
     year = {2015},
     volume = {4},
     number = {18}}
    
  239. C. Ruiz, S. Arroyo, I. Krsteski, P. Dago, J. Sanchez, L. Perez-Freire, A. De Rosa, M. Fontani, A. Costanzo, A. Piva, D. Ariu, L. Piras, R. Ahumada & M. Jerian
    The MAVEN Project: Management and Authenticity Verification of Multimedia Contents
    Proc. IEEE Int Multimedia Expo Workshops (ICMEW) Conf
    Institute of Electrical & Electronics Engineers (IEEE), 2015, pp. 1-4
    DOI: 10.1109/icmew.2015.7169825
    BibTeX
    @inproceedings{Ruiz2015,
     author = {Ruiz, C. and Arroyo, S. and Krsteski, I. and Dago, P. and Sanchez, J. and Perez-Freire, L. and De Rosa, A. and Fontani, M. and Costanzo, A. and Piva, A. and Ariu, D. and Piras, L. and Ahumada, R. and Jerian, M.},
     title = {The MAVEN Project: Management and Authenticity Verification of Multimedia Contents},
     booktitle = {Proc. IEEE Int Multimedia Expo Workshops (ICMEW) Conf},
     publisher = {Institute of Electrical & Electronics Engineers (IEEE)},
     year = {2015},
     pages = {1--4}}
    
  240. K. Saini & I. p.C. m. d.A. o. d. Shabnampreet Kaur, Forensic document examination
    Forensic Examination of Computer-manipulated Documents Using Image Processing Techniques
    Egyptian Journal of Forensic Sciences, 2015(0), pp. -
    DOI: 10.1016/j.ejfs.2015.03.001
    BibTeX
    @article{Saini2015,
     author = {Saini, Komal and Shabnampreet Kaur, Forensic document examination, Image processing Computer manipulated documents Alterations of documents},
     title = {Forensic Examination of Computer-manipulated Documents Using Image Processing Techniques},
     journal = {Egyptian Journal of Forensic Sciences},
     year = {2015},
     number = {0},
     pages = {-}}
    
  241. V.K. Sanap & V.M. Mane
    Region Duplication Forgery Detection in Digital Images Using 2D-DWT and SVD
    Proc. Int. Conf. Applied and Theoretical Computing and Communication Technology (iCATccT)
    2015, pp. 599-604
    DOI: 10.1109/ICATCCT.2015.7456955
    BibTeX
    @inproceedings{Sanap2015,
     author = {Sanap, V. K. and Mane, V. M.},
     title = {Region Duplication Forgery Detection in Digital Images Using 2D-DWT and SVD},
     booktitle = {Proc. Int. Conf. Applied and Theoretical Computing and Communication Technology (iCATccT)},
     year = {2015},
     pages = {599--604}}
    
  242. P. Sanas & P. Gupta
    Image Recapture Discovery Algorithms: A Survey
    IJSR, International Journal of Science and Research, 2015, Vol. 4(11), pp. 926-929
    DOI: 10.21275/v4i11.nov151302
    BibTeX
    @article{Sanas2015,
     author = {Sanas, P. and Gupta, P.},
     title = {Image Recapture Discovery Algorithms: A Survey},
     journal = {IJSR},
     publisher = {International Journal of Science and Research},
     year = {2015},
     volume = {4},
     number = {11},
     pages = {926--929}}
    
  243. A. Sandoval Orozco, J. Corripio, L. García Villalba & J. Hernández Castro
    Image Source Acquisition Identification of Mobile Devices Based on the Use of Features
    Multimedia Tools and Applications, Springer US, 2015, pp. 1-25
    DOI: 10.1007/s11042-015-2633-2
    BibTeX
    @article{SandovalOrozco2015,
     author = {Sandoval Orozco, AnaLucila and Corripio, JocelinRosales and García Villalba, LuisJavier and Hernández Castro, JulioCésar},
     title = {Image Source Acquisition Identification of Mobile Devices Based on the Use of Features},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer US},
     year = {2015},
     pages = {1--25}}
    
  244. A.L. Sandoval Orozco, D.M. Arenas González, L.J. García Villalba & J. Hernández-Castro
    Analysis of Errors in EXIF Metadata on Mobile Devices
    Multimedia Tools and Applications, Springer, 2015, Vol. 74(13), pp. 4735
    DOI: 10.1007/s11042-013-1837-6
    BibTeX
    @article{SandovalOrozco2015a,
     author = {Sandoval Orozco, Ana Lucila and Arenas González, David Manuel and García Villalba, Luis Javier and Hernández-Castro, Julio},
     title = {Analysis of Errors in EXIF Metadata on Mobile Devices},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2015},
     volume = {74},
     number = {13},
     pages = {4735}}
    
  245. J. Satiro, K. Nasrollahi, P.L. Correia & T.B. Moeslund
    Super-resolution of facial images in forensics scenarios
    Proc. Tools and Applications (IPTA) 2015 Int. Conf. Image Processing Theory
    2015, pp. 55-60
    DOI: 10.1109/IPTA.2015.7367096
    BibTeX
    @inproceedings{Satiro2015,
     author = {Satiro, J. and Nasrollahi, K. and Correia, P. L. and Moeslund, T. B.},
     title = {Super-resolution of facial images in forensics scenarios},
     booktitle = {Proc. Tools and Applications (IPTA) 2015 Int. Conf. Image Processing Theory},
     year = {2015},
     pages = {55--60}}
    
  246. R. Satta
    Sensor Pattern Noise Matching Based on Reliability Map for Source Camera Identification
    electronic, 2015
    BibTeX
    @misc{Satta2015,
     author = {Satta, Riccardo},
     title = {Sensor Pattern Noise Matching Based on Reliability Map for Source Camera Identification},
     year = {2015}}
    
  247. R. Satta & A. Ciardulli
    Sensor Pattern Noise and Image Similarity for Picture-to-identity Linking
    IET Comput Vision, 2015, Vol. 9(5), pp. 711-722
    DOI: 10.1049/iet-cvi.2014.0320
    BibTeX
    @article{Satta2015a,
     author = {Satta, R. and Ciardulli, A.},
     title = {Sensor Pattern Noise and Image Similarity for Picture-to-identity Linking},
     journal = {IET Comput Vision},
     year = {2015},
     volume = {9},
     number = {5},
     pages = {711--722}}
    
  248. S. Saxena
    Video Inpainting Detection Using Inconsistencies in Optical Flow
    Indraprastha Institute of Information Technology, Delhi (IIIT-D), India, Indraprastha Institute of Information Technology, Delhi (IIIT-D), India, 2015
    BibTeX
    @mastersthesis{Saxena2015,
     author = {Saxena, Shobhita},
     title = {Video Inpainting Detection Using Inconsistencies in Optical Flow},
     school = {Indraprastha Institute of Information Technology, Delhi (IIIT-D), India},
     year = {2015}}
    
  249. V. Schetinger & T.J.C. MM Oliveira, R da Silva
    Humans Are Easily Fooled by Digital Images
    arxiv, 2015
    BibTeX
    @article{Schetinger2015,
     author = {Schetinger, Victor and MM Oliveira, R da Silva, T. J. Carvalho},
     title = {Humans Are Easily Fooled by Digital Images},
     journal = {arxiv},
     year = {2015}}
    
  250. J. Schindelin, C.T. Rueden, M.C. Hiner & K.W. Eliceiri
    The Imagej Ecosystem: An Open Platform for Biomedical Image Analysis.
    Mol Reprod Dev, Laboratory for Optical and Computational Instrumentation, University of Wisconsin at Madison, Madison, Wisconsin., Laboratory for Optical and Computational Instrumentation, University of Wisconsin at Madison, Madison, Wisconsin., 2015, Vol. 82(7-8), pp. 518-529
    DOI: 10.1002/mrd.22489
    BibTeX
    @article{Schindelin2015,
     author = {Schindelin, Johannes and Rueden, Curtis T. and Hiner, Mark C. and Eliceiri, Kevin W.},
     title = {The Imagej Ecosystem: An Open Platform for Biomedical Image Analysis.},
     journal = {Mol Reprod Dev},
     school = {Laboratory for Optical and Computational Instrumentation, University of Wisconsin at Madison, Madison, Wisconsin.},
     year = {2015},
     volume = {82},
     number = {7-8},
     pages = {518--529}}
    
  251. R. Sekhar & R.S. Shaji
    A Study on Segmentation-based Copy-move Forgery Detection Using DAISY Descriptor
    Proceedings of the International Conference on Soft Computing Systems
    Springer Science mathplus Business Media, 2015, pp. 223-233
    DOI: 10.1007/978-81-322-2674-1_23
    BibTeX
    @incollection{Sekhar2015,
     author = {Sekhar, Resmi and Shaji, R. S.},
     title = {A Study on Segmentation-based Copy-move Forgery Detection Using DAISY Descriptor},
     booktitle = {Proceedings of the International Conference on Soft Computing Systems},
     publisher = {Springer Science mathplus Business Media},
     year = {2015},
     pages = {223--233}}
    
  252. M. Shandilya, R. Naskar & R. Dixit
    Detection of Geometric Transformations in Copy-move Forgery of Digital Images
    Proc. Annual IEEE India Conf. (INDICON)
    2015, pp. 1-6
    DOI: 10.1109/INDICON.2015.7443141
    BibTeX
    @inproceedings{Shandilya2015,
     author = {Shandilya, M. and Naskar, R. and Dixit, R.},
     title = {Detection of Geometric Transformations in Copy-move Forgery of Digital Images},
     booktitle = {Proc. Annual IEEE India Conf. (INDICON)},
     year = {2015},
     pages = {1--6}}
    
  253. S. Shang & X. Kong
    Printer and Scanner Forensics
    Ho, A. T. S. & Li, S. (ed.)
    Handbook of Digital Forensics of Multimedia Data and Devices
    Chapter 10
    Wiley-IEEE Press, 2015, pp. 704-
    DOI: 10.1002/9781118705773.ch10
    BibTeX
    @inbook{Shang2015,
     author = {Shang, Shize and Kong, Xiangwei},
     title = {Printer and Scanner Forensics},
     booktitle = {Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-IEEE Press},
     year = {2015},
     pages = {704-}}
    
  254. A. Sharma & P. Singh
    A Comparative Study of Frequency Domain Based Approaches for Image Tamper Detection
    Proc. TENCON 2015 - 2015 IEEE Region 10 Conf
    2015, pp. 1-4
    DOI: 10.1109/TENCON.2015.7372903
    BibTeX
    @inproceedings{Sharma2015a,
     author = {Sharma, A. and Singh, P.},
     title = {A Comparative Study of Frequency Domain Based Approaches for Image Tamper Detection},
     booktitle = {Proc. TENCON 2015 - 2015 IEEE Region 10 Conf},
     year = {2015},
     pages = {1--4}}
    
  255. S. Sharma & U. Ghanekar
    A Rotationally Invariant Texture Descriptor to Detect Copy Move Forgery in Medical Images
    Computational Intelligence & Communication Technology (CICT), 2015 IEEE International Conference on
    2015, pp. 795-798
    DOI: 10.1109/CICT.2015.88
    BibTeX
    @inproceedings{Sharma2015,
     author = {Sharma, Surbhi and Ghanekar, Umesh},
     title = {A Rotationally Invariant Texture Descriptor to Detect Copy Move Forgery in Medical Images},
     booktitle = {Computational Intelligence & Communication Technology (CICT), 2015 IEEE International Conference on},
     year = {2015},
     pages = {795--798}}
    
  256. Z. Shi, X. Shen, H. Chen & X. Li
    Blind Detection of Image Splicing Based on Fuzzy Run-length
    Proc. IEEE Int Computer and Information Technology, Ubiquitous Computing and Communications, Dependable, Autonomic and Secure Computing, Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM) Conf
    2015, pp. 915-920
    DOI: 10.1109/CIT/IUCC/DASC/PICOM.2015.137
    BibTeX
    @inproceedings{Shi2015,
     author = {Shi, Z. and Shen, X. and Chen, H. and Li, X.},
     title = {Blind Detection of Image Splicing Based on Fuzzy Run-length},
     booktitle = {Proc. IEEE Int Computer and Information Technology, Ubiquitous Computing and Communications, Dependable, Autonomic and Secure Computing, Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM) Conf},
     year = {2015},
     pages = {915--920}}
    
  257. F.Y. Shih & J.K. Jackson
    Copy-cover Image Forgery Detection in Parallel Processing
    Int. J. Patt. Recogn. Artif. Intell., 2015
    BibTeX
    @article{Shih2015a,
     author = {Shih, Frank Y. and Jackson, Jason K.},
     title = {Copy-cover Image Forgery Detection in Parallel Processing},
     journal = {Int. J. Patt. Recogn. Artif. Intell.},
     year = {2015}}
    
  258. Y. Shih, D. Krishnan, F. Durand & W.T. Freeman
    Reflection Removal Using Ghosting Cues
    Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2015
    The IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2015
    BibTeX
    @inproceedings{Shih2015,
     author = {Shih, YiChang and Krishnan, Dilip and Durand, Fredo and Freeman, William T.},
     title = {Reflection Removal Using Ghosting Cues},
     booktitle = {Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2015},
     journal = {The IEEE Conference on Computer Vision and Pattern Recognition (CVPR)},
     year = {2015}}
    
  259. M.V.K. Shingote & A. Kumar
    Survey on Recapture Detection Algorithms
    International Journal of Advanced Research in Computer and Communication Engineering, 2015, Vol. 4(12)
    BibTeX
    @article{Shingote2015a,
     author = {Shingote, Mr Vinayak K. and Kumar, Ashish},
     title = {Survey on Recapture Detection Algorithms},
     journal = {International Journal of Advanced Research in Computer and Communication Engineering},
     year = {2015},
     volume = {4},
     number = {12}}
    
  260. V.K. Shingote & R. Kabara
    Image Authentication by Detecting Demosaicing
    International Journal of Advanced Research in Computer and Communication Engineering, 2015, Vol. 4(5), pp. 256-259
    BibTeX
    @article{Shingote2015,
     author = {Shingote, Vinayak K. and Kabara, Ruhi},
     title = {Image Authentication by Detecting Demosaicing},
     journal = {International Journal of Advanced Research in Computer and Communication Engineering},
     year = {2015},
     volume = {4},
     number = {5},
     pages = {256--259}}
    
  261. E. Silva, T. Carvalho, A. Ferreira & A. Rocha
    Going Deeper into Copy-move Forgery Detection: Exploring Image Telltales Via Multi-scale Analysis and Voting Processes
    Journal of Visual Communication and Image Representation, Elsevier BV, 2015, Vol. 29(0), pp. 16-32
    DOI: 10.1016/j.jvcir.2015.01.016
    BibTeX
    @article{Silva2015,
     author = {Silva, Ewerton and Carvalho, Tiago and Ferreira, Anselmo and Rocha, Anderson},
     title = {Going Deeper into Copy-move Forgery Detection: Exploring Image Telltales Via Multi-scale Analysis and Voting Processes},
     journal = {Journal of Visual Communication and Image Representation},
     publisher = {Elsevier BV},
     year = {2015},
     volume = {29},
     number = {0},
     pages = {16--32}}
    
  262. N. Singh & R. Bansal
    Analysis of Benford´s Law in Digital Image Forensics
    Proc. Int Signal Processing and Communication (ICSC) Conf
    2015, pp. 413-418
    DOI: 10.1109/ICSPCom.2015.7150688
    BibTeX
    @inproceedings{Singh2015b,
     author = {Singh, N. and Bansal, R.},
     title = {Analysis of Benford´s Law in Digital Image Forensics},
     booktitle = {Proc. Int Signal Processing and Communication (ICSC) Conf},
     year = {2015},
     pages = {413--418}}
    
  263. N. Singh & R. Bansal
    Analysis of Benford's law in digital image forensics
    Proc. Int. Conf. Signal Processing and Communication (ICSC)
    2015, pp. 413-418
    DOI: 10.1109/ICSPCom.2015.7150688
    BibTeX
    @inproceedings{Singh2015c,
     author = {Singh, N. and Bansal, R.},
     title = {Analysis of Benford's law in digital image forensics},
     booktitle = {Proc. Int. Conf. Signal Processing and Communication (ICSC)},
     year = {2015},
     pages = {413--418}}
    
  264. V. Singh, P. Pant & R. Tripathi
    Detection of Frame Duplication Type of Forgery in Digital Video Using Sub-block Based Features
    James, J. & Breitinger, F. (ed.)
    Digital Forensics and Cyber Crime
    Springer International Publishing, 2015, Vol. 157, pp. 29-38
    DOI: 10.1007/978-3-319-25512-5_3
    BibTeX
    @incollection{Singh2015,
     author = {Singh, VivekKumar and Pant, Pallav and Tripathi, RameshChandra},
     title = {Detection of Frame Duplication Type of Forgery in Digital Video Using Sub-block Based Features},
     booktitle = {Digital Forensics and Cyber Crime},
     publisher = {Springer International Publishing},
     year = {2015},
     volume = {157},
     pages = {29--38}}
    
  265. V.K. Singh & R.C. Tripathi
    Fast Rotation Invariant Detection of Region Duplication Attacks Even on Uniform Background Containing Digital Images
    Procedia Computer Science, 2015, Vol. 54, pp. 772-780
    DOI: 10.1016/j.procs.2015.06.091
    BibTeX
    @article{Singh2015a,
     author = {Singh, Vivek Kumar and Tripathi, R. C.},
     title = {Fast Rotation Invariant Detection of Region Duplication Attacks Even on Uniform Background Containing Digital Images},
     journal = {Procedia Computer Science},
     year = {2015},
     volume = {54},
     pages = {772--780}}
    
  266. J.J. Sonu, G. Krishnalal & R.V.P. Jagathy
    Revealing Image Forgery on Digital Images by a Pplying Contrast Enhancement
    International Journal of Computer Applications, 2015
    BibTeX
    @article{Sonu2015,
     author = {Sonu, John Jacob and Krishnalal, G. and Jagathy, Raj V. P.},
     title = {Revealing Image Forgery on Digital Images by a Pplying Contrast Enhancement},
     journal = {International Journal of Computer Applications},
     year = {2015}}
    
  267. A.R. Soobhany, K.P. Lam, P. Fletcher & D.J. Collins
    Mobile Camera Source Identification with SVD
    Innovations and Advances in Computing, Informatics, Systems Sciences, Networking and Engineering
    Springer, 2015
    DOI: 10.1007/978-3-319-06773-5_18
    BibTeX
    @incollection{Soobhany2015,
     author = {Soobhany, A. R. and Lam, K. P. and Fletcher, P. and Collins, D. J.},
     title = {Mobile Camera Source Identification with SVD},
     booktitle = {Innovations and Advances in Computing, Informatics, Systems Sciences, Networking and Engineering},
     publisher = {Springer},
     year = {2015}}
    
  268. S.T.S. Sornalatha, S.D. Mahalakshmi & K. Vijayalakshmi
    Detecting Contrast Enhancement Based Image Forgeries by Parallel Approach
    Proc. 2nd Int Electronics and Communication Systems (ICECS) Conf
    2015, pp. 1162-1167
    DOI: 10.1109/ECS.2015.7124767
    BibTeX
    @inproceedings{Sornalatha2015,
     author = {Sornalatha, S. T. S. and Mahalakshmi, S. D. and Vijayalakshmi, K.},
     title = {Detecting Contrast Enhancement Based Image Forgeries by Parallel Approach},
     booktitle = {Proc. 2nd Int Electronics and Communication Systems (ICECS) Conf},
     year = {2015},
     pages = {1162--1167}}
    
  269. J. Spangenberg
    Soziale Medien Und Journalistische Berichterstattung
    Digitale Politikvermittlung, Springer, 2015
    DOI: 10.1007/978-3-658-06571-3_8
    BibTeX
    @article{Spangenberg2015,
     author = {Spangenberg, Jochen},
     title = {Soziale Medien Und Journalistische Berichterstattung},
     journal = {Digitale Politikvermittlung},
     publisher = {Springer},
     year = {2015}}
    
  270. M. Steinebach, Y. Yannikos, S. Zmudzinski & C. Winter
    Advanced Multimedia File Carving
    Ho/Handbook of Digital Forensics of Multimedia Data and Devices
    Wiley-Blackwell, 2015, pp. 219-269
    DOI: 10.1002/9781118705773.ch6
    BibTeX
    @incollection{Steinebach2015,
     author = {Steinebach, Martin and Yannikos, York and Zmudzinski, Sascha and Winter, Christian},
     title = {Advanced Multimedia File Carving},
     booktitle = {Ho/Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-Blackwell},
     year = {2015},
     pages = {219--269}}
    
  271. P.-C. Su, P.-L. Suei, M.-K. Chang & J. Lain
    Forensic and Anti-forensic Techniques for Video Shot Editing in H.264/AVC
    Journal of Visual Communication and Image Representation, 2015(0), pp. -
    DOI: 10.1016/j.jvcir.2015.02.006
    BibTeX
    @article{Su2015,
     author = {Su, Po-Chyi and Suei, Pei-Lun and Chang, Min-Kuan and Lain, Jie},
     title = {Forensic and Anti-forensic Techniques for Video Shot Editing in H.264/AVC},
     journal = {Journal of Visual Communication and Image Representation},
     year = {2015},
     number = {0},
     pages = {-}}
    
  272. X. Sun, Y. Li, S. Niu & Y. Huang
    The Detecting System of Image Forgeries with Noise Features and EXIF Information
    Journal of Systems Science and Complexity, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, 2015, Vol. 28(5), pp. 1164-1176
    DOI: 10.1007/s11424-015-4023-2
    BibTeX
    @article{Sun2015,
     author = {Sun, Xiaoting and Li, Yezhou and Niu, Shaozhang and Huang, Yanli},
     title = {The Detecting System of Image Forgeries with Noise Features and EXIF Information},
     journal = {Journal of Systems Science and Complexity},
     publisher = {Academy of Mathematics and Systems Science, Chinese Academy of Sciences},
     year = {2015},
     volume = {28},
     number = {5},
     pages = {1164--1176}}
    
  273. F. Sur & M. Grédiac
    Measuring the Noise of Digital Imaging Sensors by Stacking Raw Images Affected by Vibrations and Illumination Flickering
    SIAM Journal on Imaging Sciences, 2015, Vol. 8(1), pp. 611-643
    DOI: 10.1137/140977035
    BibTeX
    @article{Sur2015,
     author = {Sur, Frédéric and Grédiac, Michel},
     title = {Measuring the Noise of Digital Imaging Sensors by Stacking Raw Images Affected by Vibrations and Illumination Flickering},
     journal = {SIAM Journal on Imaging Sciences},
     year = {2015},
     volume = {8},
     number = {1},
     pages = {611--643}}
    
  274. A. Sutardja, O. Ramadan & Y. Zhao
    Forensic Methods for Detecting Image Manipulation - Copy Move
    Electrical Engineering and Computer Sciences University of California at Berkeley, Electrical Engineering and Computer Sciences University of California at Berkeley, 2015
    BibTeX
    @techreport{Sutardja2015,
     author = {Sutardja, Anthony and Ramadan, Omar and Zhao, Yan},
     title = {Forensic Methods for Detecting Image Manipulation - Copy Move},
     school = {Electrical Engineering and Computer Sciences University of California at Berkeley},
     year = {2015}}
    
  275. A. Sutardja & Y. Zhao
    Digital Image Manipulation Forensics
    Electrical Engineering and Computer Sciences University of California at Berkeley, Electrical Engineering and Computer Sciences University of California at Berkeley, 2015
    BibTeX
    @techreport{Sutardja2015a,
     author = {Sutardja, Anthony and Zhao, Yan},
     title = {Digital Image Manipulation Forensics},
     school = {Electrical Engineering and Computer Sciences University of California at Berkeley},
     year = {2015}}
    
  276. A. Taimori, F. Razzazi, A. Behrad, A. Ahmadi & M. Babaie-Zadeh
    Quantization-unaware Double JPEG Compression Detection
    Journal of Mathematical Imaging and Vision, Springer US, 2015, pp. 1-18
    DOI: 10.1007/s10851-015-0602-z
    BibTeX
    @article{Taimori2015,
     author = {Taimori, Ali and Razzazi, Farbod and Behrad, Alireza and Ahmadi, Ali and Babaie-Zadeh, Massoud},
     title = {Quantization-unaware Double JPEG Compression Detection},
     journal = {Journal of Mathematical Imaging and Vision},
     publisher = {Springer US},
     year = {2015},
     pages = {1--18}}
    
  277. Y. Tan, B. Wang, M. Zhao, X. Kong & M. Li
    Patch-based Sensor Pattern Noise for Camera Source Identification
    School of Information and Communication Engineering Dalian University of Technology Dalian, Liaoning, 116024, P. R. China, School of Information and Communication Engineering Dalian University of Technology Dalian, Liaoning, 116024, P. R. China, 2015
    DOI: 10.1109/chinasip.2015.7230528
    BibTeX
    @techreport{Tan2015,
     author = {Tan, Yue and Wang, Bo and Zhao, Meijuan and Kong, Xiangwei and Li, Ming},
     title = {Patch-based Sensor Pattern Noise for Camera Source Identification},
     school = {School of Information and Communication Engineering Dalian University of Technology Dalian, Liaoning, 116024, P. R. China},
     year = {2015}}
    
  278. K.A. Tatkare & V. Mane
    Fusion of SIFT and Hue Moments Features for Cloning Tamper Detection
    Proc. Int. Conf. Applied and Theoretical Computing and Communication Technology (iCATccT)
    2015, pp. 409-414
    DOI: 10.1109/ICATCCT.2015.7456918
    BibTeX
    @inproceedings{Tatkare2015,
     author = {Tatkare, K. A. and Mane, V.},
     title = {Fusion of SIFT and Hue Moments Features for Cloning Tamper Detection},
     booktitle = {Proc. Int. Conf. Applied and Theoretical Computing and Communication Technology (iCATccT)},
     year = {2015},
     pages = {409--414}}
    
  279. S. Teerakanok & U. Tetsutaro
    Enhancment of Image Tampering Detection Using JPEG's Quantization and Re-interpolation Processes
    Proc. IEEE 39th Annual Computer Software and Applications Conf. (COMPSAC)
    2015, Vol. 3, pp. 35-39
    DOI: 10.1109/COMPSAC.2015.167
    BibTeX
    @inproceedings{Teerakanok2015,
     author = {Teerakanok, S. and Tetsutaro, U.},
     title = {Enhancment of Image Tampering Detection Using JPEG's Quantization and Re-interpolation Processes},
     booktitle = {Proc. IEEE 39th Annual Computer Software and Applications Conf. (COMPSAC)},
     year = {2015},
     volume = {3},
     pages = {35--39}}
    
  280. T.H. Thai, F. Retraint & R. Cogranne
    Generalized Signal-dependent Noise Model and Parameter Estimation for Natural Images
    Signal Processing, 2015(0), pp. -
    DOI: 10.1016/j.sigpro.2015.02.020
    BibTeX
    @article{Thai2015,
     author = {Thai, Thanh Hai and Retraint, Florent and Cogranne, Rémi},
     title = {Generalized Signal-dependent Noise Model and Parameter Estimation for Natural Images},
     journal = {Signal Processing},
     year = {2015},
     number = {0},
     pages = {-}}
    
  281. T.H. Thai, F. Retraint & R. Cogranne
    Camera Model Identification Based on DCT\ Coefficient Statistics
    Digital Signal Processing, 2015(0), pp. -
    DOI: 10.1016/j.dsp.2015.01.002
    BibTeX
    @article{Thai2015a,
     author = {Thai, Thanh Hai and Retraint, Florent and Cogranne, Rémi},
     title = {Camera Model Identification Based on DCT\ Coefficient Statistics},
     journal = {Digital Signal Processing},
     year = {2015},
     number = {0},
     pages = {-}}
    
  282. T. Thongkamwitoon, H. Muammar & P.L. Dragotti
    An Image Recapture Detection Algorithm Based on Learning Dictionaries of Edge Profiles
    IEEE Transactions on Information Forensics and Security, 2015, Vol. 10(5), pp. 953-968
    DOI: 10.1109/TIFS.2015.2392566
    BibTeX
    @article{Thongkamwitoon2015,
     author = {Thongkamwitoon, T. and Muammar, H. and Dragotti, P. L.},
     title = {An Image Recapture Detection Algorithm Based on Learning Dictionaries of Edge Profiles},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2015},
     volume = {10},
     number = {5},
     pages = {953--968}}
    
  283. N. Tiwari, D. Dubey & A. Goyal
    Reducing Forged Features Using Tampered and Inconsistent Image Detection Techniques in Digital Image Processing
    Proc. Fifth Int Communication Systems and Network Technologies (CSNT) Conf
    2015, pp. 564-567
    DOI: 10.1109/CSNT.2015.286
    BibTeX
    @inproceedings{Tiwari2015,
     author = {Tiwari, N. and Dubey, D. and Goyal, A.},
     title = {Reducing Forged Features Using Tampered and Inconsistent Image Detection Techniques in Digital Image Processing},
     booktitle = {Proc. Fifth Int Communication Systems and Network Technologies (CSNT) Conf},
     year = {2015},
     pages = {564--567}}
    
  284. D. Tralic, S. Grgic, X. Sun & P.L. Rosin
    Combining Cellular Automata and Local Binary Patterns for Copy-move Forgery Detection
    Multimedia Tools and Applications, Springer, 2015, pp. 1
    DOI: 10.1007/s11042-015-2961-2
    BibTeX
    @article{Tralic2015,
     author = {Tralic, Dijana and Grgic, Sonja and Sun, Xianfang and Rosin, Paul L.},
     title = {Combining Cellular Automata and Local Binary Patterns for Copy-move Forgery Detection},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2015},
     pages = {1}}
    
  285. A. Tuama, F. Comby & M. Chaumont
    Source Camera Model Identification Using Features from Contaminated Sensor Noise
    The 14th International Workshop on Digital-forensics and Watermarking IWDW 2015, 2015
    BibTeX
    @article{Tuama2015,
     author = {Tuama, Amel and Comby, Frederic and Chaumont, Marc},
     title = {Source Camera Model Identification Using Features from Contaminated Sensor Noise},
     journal = {The 14th International Workshop on Digital-forensics and Watermarking IWDW 2015},
     year = {2015}}
    
  286. S. Turk, O. Bingol & G. Ulutas
    Detection of Copy-move Forgery Using Dogcode
    Proc. 23th Signal Processing and Communications Applications Conf. (SIU)
    2015, pp. 2366-2369
    DOI: 10.1109/SIU.2015.7130356
    BibTeX
    @inproceedings{Turk2015,
     author = {Turk, Salih and Bingol, Ozkan and Ulutas, Guzin},
     title = {Detection of Copy-move Forgery Using Dogcode},
     booktitle = {Proc. 23th Signal Processing and Communications Applications Conf. (SIU)},
     year = {2015},
     pages = {2366--2369}}
    
  287. D.M. Uliyan, H.A. Jalab & A.W.A. Wahab
    Copy Move Image Forgery Detection Using Hessian and Center Symmetric Local Binary Pattern
    Proc. IEEE Confernece Open Systems (ICOS)
    2015, pp. 7-11
    DOI: 10.1109/ICOS.2015.7377269
    BibTeX
    @inproceedings{Uliyan2015,
     author = {Uliyan, D. M. and Jalab, H. A. and Wahab, A. W. A.},
     title = {Copy Move Image Forgery Detection Using Hessian and Center Symmetric Local Binary Pattern},
     booktitle = {Proc. IEEE Confernece Open Systems (ICOS)},
     year = {2015},
     pages = {7--11}}
    
  288. B. Ustubioglu, S. Ayas, H. Dogan & G. Ulutas
    Image Forgery Detection Based on Colour SIFT
    Proc. 23th Signal Processing and Communications Applications Conf. (SIU)
    2015, pp. 1741-1744
    DOI: 10.1109/SIU.2015.7130189
    BibTeX
    @inproceedings{Ustubioglu2015,
     author = {Ustubioglu, Beste and Ayas, Selen and Dogan, Hulya and Ulutas, Guzin},
     title = {Image Forgery Detection Based on Colour SIFT},
     booktitle = {Proc. 23th Signal Processing and Communications Applications Conf. (SIU)},
     year = {2015},
     pages = {1741--1744}}
    
  289. B. Ustubioglu, G. Muzaffer, G. Ulutas, V. Nabiyev & M. Ulutas
    A novel keypoint based forgery detection method based on local phase quantization and SIFT
    Proc. 9th Int. Conf. Electrical and Electronics Engineering (ELECO)
    2015, pp. 185-189
    DOI: 10.1109/ELECO.2015.7394438
    BibTeX
    @inproceedings{Ustubioglu2015c,
     author = {Ustubioglu, B. and Muzaffer, G. and Ulutas, G. and Nabiyev, V. and Ulutas, M.},
     title = {A novel keypoint based forgery detection method based on local phase quantization and SIFT},
     booktitle = {Proc. 9th Int. Conf. Electrical and Electronics Engineering (ELECO)},
     year = {2015},
     pages = {185--189}}
    
  290. B. Ustubioglu, V. Nabiyev, G. Ulutas & M. Ulutas
    Image Forgery Detection Using Colour Moments
    Proc. 38th Int Telecommunications and Signal Processing (TSP) Conf
    2015, pp. 540-544
    DOI: 10.1109/TSP.2015.7296321
    BibTeX
    @inproceedings{Ustubioglu2015b,
     author = {Ustubioglu, B. and Nabiyev, V. and Ulutas, G. and Ulutas, M.},
     title = {Image Forgery Detection Using Colour Moments},
     booktitle = {Proc. 38th Int Telecommunications and Signal Processing (TSP) Conf},
     year = {2015},
     pages = {540--544}}
    
  291. B. Ustubioglu, G. Ulutas, V. Nabiyev & M. Ulutas
    Image Forgery Detection Based on Energy Probability
    Proc. 23th Signal Processing and Communications Applications Conf. (SIU)
    2015, pp. 919-922
    DOI: 10.1109/SIU.2015.7129980
    BibTeX
    @inproceedings{Ustubioglu2015a,
     author = {Ustubioglu, Beste and Ulutas, Guzin and Nabiyev, Vasif and Ulutas, Mustafa},
     title = {Image Forgery Detection Based on Energy Probability},
     booktitle = {Proc. 23th Signal Processing and Communications Applications Conf. (SIU)},
     year = {2015},
     pages = {919--922}}
    
  292. G. Valenzise, S. Tubaro & M. Tagliasacchi
    Anti-Forensics of Multimedia Data and Countermeasures
    Ho/Handbook of Digital Forensics of Multimedia Data and Devices
    Wiley-Blackwell, 2015, pp. 612-651
    DOI: 10.1002/9781118705773.ch16
    BibTeX
    @incollection{Valenzise2015,
     author = {Valenzise, Giuseppe and Tubaro, Stefano and Tagliasacchi, Marco},
     title = {Anti-Forensics of Multimedia Data and Countermeasures},
     booktitle = {Ho/Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-Blackwell},
     year = {2015},
     pages = {612--651}}
    
  293. D. Valsesia, G. Coluccia, T. Bianchi & E. Magli
    Compressed Fingerprint Matching and Camera Identification Via Random Projections
    IEEE Transactions on Information Forensics and Security, 2015, Vol. 10(7), pp. 1472-1485
    DOI: 10.1109/TIFS.2015.2415461
    BibTeX
    @article{Valsesia2015,
     author = {Valsesia, D. and Coluccia, G. and Bianchi, T. and Magli, E.},
     title = {Compressed Fingerprint Matching and Camera Identification Via Random Projections},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2015},
     volume = {10},
     number = {7},
     pages = {1472--1485}}
    
  294. D. Valsesia, G. Coluccia, T. Bianchi & E. Magli
    Image Retrieval Based on Compressed Camera Sensor Fingerprints
    Proc. IEEE Int Multimedia and Expo (ICME) Conf
    2015, pp. 1-6
    DOI: 10.1109/ICME.2015.7177454
    BibTeX
    @inproceedings{Valsesia2015a,
     author = {Valsesia, D. and Coluccia, G. and Bianchi, T. and Magli, E.},
     title = {Image Retrieval Based on Compressed Camera Sensor Fingerprints},
     booktitle = {Proc. IEEE Int Multimedia and Expo (ICME) Conf},
     year = {2015},
     pages = {1--6}}
    
  295. D. Valsesia, G. Coluccia, T. Bianchi & E. Magli
    Large-scale Image Retrieval Based on Compressed Camera Identification
    IEEE Transactions on Multimedia, 2015, Vol. 17(9), pp. 1439-1449
    DOI: 10.1109/TMM.2015.2455417
    BibTeX
    @article{Valsesia2015b,
     author = {Valsesia, D. and Coluccia, G. and Bianchi, T. and Magli, E.},
     title = {Large-scale Image Retrieval Based on Compressed Camera Identification},
     journal = {IEEE Transactions on Multimedia},
     year = {2015},
     volume = {17},
     number = {9},
     pages = {1439--1449}}
    
  296. D. Valsesia, G. Coluccia, T. Bianchi & E. Magli
    Scale-robust Compressive Camera Fingerprint Matching with Random Projections
    Proc. IEEE Int Acoustics, Speech and Signal Processing (ICASSP) Conf
    2015, pp. 1697-1701
    DOI: 10.1109/ICASSP.2015.7178260
    BibTeX
    @inproceedings{Valsesia2015c,
     author = {Valsesia, D. and Coluccia, G. and Bianchi, T. and Magli, E.},
     title = {Scale-robust Compressive Camera Fingerprint Matching with Random Projections},
     booktitle = {Proc. IEEE Int Acoustics, Speech and Signal Processing (ICASSP) Conf},
     year = {2015},
     pages = {1697--1701}}
    
  297. D. Vázquez-Padín
    Detection of Image Resampling and Video Encoding Footprints for Forensic Applications
    University of Vigo, Universida de Vigo, 2015
    BibTeX
    @phdthesis{Vazquez-Padin2015a,
     author = {Vázquez-Padín, David},
     title = {Detection of Image Resampling and Video Encoding Footprints for Forensic Applications},
     school = {University of Vigo},
     year = {2015}}
    
  298. D. Vazquez-Padın, P. Comesana & F. Perez-Gonzalez
    An SVD Approach to Forensic Image Resampling Detection
    Proceedings of the 23th European Signal Processing Conference (EUSIPCO 2015)
    Proceedings of the 16th European Signal Processing Conference (EUSIPCO 2008), 2015
    DOI: 10.1109/eusipco.2015.7362748
    BibTeX
    @inproceedings{Vazquez-Padin2015,
     author = {Vazquez-Padın, David and Comesana, Pedro and Perez-Gonzalez, Fernando},
     title = {An SVD Approach to Forensic Image Resampling Detection},
     booktitle = {Proceedings of the 23th European Signal Processing Conference (EUSIPCO 2015)},
     journal = {Proceedings of the 16th European Signal Processing Conference (EUSIPCO 2008)},
     year = {2015}}
    
  299. D.S. Vidyadharan & S.M. Thampi
    Brightness Distribution Based Image Tampering Detection
    Signal Processing, Informatics, Communication and Energy Systems (SPICES), 2015 IEEE International Conference on
    2015, pp. 1-5
    DOI: 10.1109/SPICES.2015.7091555
    BibTeX
    @inproceedings{Vidyadharan2015,
     author = {Vidyadharan, D. S. and Thampi, S. M.},
     title = {Brightness Distribution Based Image Tampering Detection},
     booktitle = {Signal Processing, Informatics, Communication and Energy Systems (SPICES), 2015 IEEE International Conference on},
     year = {2015},
     pages = {1--5}}
    
  300. S. Vijayalakshmi V, B. Shwetha & S.V. Sathyanarayana
    Image classifier based digital image forensic detection-a review and simulations
    Proc. Computer Science and Technology (ICERECT) 2015 Int. Conf. Emerging Research in Electronics
    2015, pp. 23-28
    DOI: 10.1109/ERECT.2015.7498981
    BibTeX
    @inproceedings{VijayalakshmiV2015,
     author = {Vijayalakshmi V, S. and Shwetha, B. and Sathyanarayana, S. V.},
     title = {Image classifier based digital image forensic detection-a review and simulations},
     booktitle = {Proc. Computer Science and Technology (ICERECT) 2015 Int. Conf. Emerging Research in Electronics},
     year = {2015},
     pages = {23--28}}
    
  301. B. Wang, Y. Tan, M. Zhao, Y. Guo & X. Kong
    Classifier Combination Based Source Identification for Cell Phone Images
    KSII Transactions on Internet and Information Systems (TIIS), 2015, Vol. 9(12), pp. 5087-5102
    DOI: 10.1109/chinasip.2015.7230528
    BibTeX
    @article{Wang2015b,
     author = {Wang, Bo and Tan, Yue and Zhao, Meijuan and Guo, Yanqing and Kong, Xiangwei},
     title = {Classifier Combination Based Source Identification for Cell Phone Images},
     journal = {KSII Transactions on Internet and Information Systems (TIIS)},
     year = {2015},
     volume = {9},
     number = {12},
     pages = {5087--5102}}
    
  302. C. Wang & T. Zhu
    A Survey of Digital Image Blind Detection Based on Tampering Trace
    Electronic Science and Technology, 2015
    BibTeX
    @article{Wang2015,
     author = {Wang, Chenlu and Zhu, Tingge},
     title = {A Survey of Digital Image Blind Detection Based on Tampering Trace},
     journal = {Electronic Science and Technology},
     year = {2015}}
    
  303. Z.H. Wang
    Blind Detection of JPEG Composite Images Based on Quantization Noise Analysis
    Information, Computer and Application Engineering, 2015
    BibTeX
    @article{Wang2015a,
     author = {Wang, Zhi Hong},
     title = {Blind Detection of JPEG Composite Images Based on Quantization Noise Analysis},
     journal = {Information, Computer and Application Engineering},
     year = {2015}}
    
  304. N.B.A. Warif, M.Y.I. Idris, A.W.A. Wahab & R. Salleh
    An Evaluation of Error Level Analysis in Image Forensics
    Proc. 5th IEEE Int. Conf. System Engineering and Technology (ICSET)
    2015, pp. 23-28
    DOI: 10.1109/ICSEngT.2015.7412439
    BibTeX
    @inproceedings{Warif2015,
     author = {Warif, N. B. A. and Idris, M. Y. I. and Wahab, A. W. A. and Salleh, R.},
     title = {An Evaluation of Error Level Analysis in Image Forensics},
     booktitle = {Proc. 5th IEEE Int. Conf. System Engineering and Technology (ICSET)},
     year = {2015},
     pages = {23--28}}
    
  305. N.B.A. Warif, M.Y.I. Idris, A.W.A. Wahab & R. Salleh
    An evaluation of Error Level Analysis in image forensics
    Proc. 5th IEEE Int. Conf. System Engineering and Technology (ICSET)
    2015, pp. 23-28
    DOI: 10.1109/ICSEngT.2015.7412439
    BibTeX
    @inproceedings{Warif2015a,
     author = {Warif, N. B. A. and Idris, M. Y. I. and Wahab, A. W. A. and Salleh, R.},
     title = {An evaluation of Error Level Analysis in image forensics},
     booktitle = {Proc. 5th IEEE Int. Conf. System Engineering and Technology (ICSET)},
     year = {2015},
     pages = {23--28}}
    
  306. M. Worring
    Multimedia Analytics for Image Collection Forensics
    Ho/Handbook of Digital Forensics of Multimedia Data and Devices
    Wiley-Blackwell, 2015, pp. 305-327
    DOI: 10.1002/9781118705773.ch8
    BibTeX
    @incollection{Worring2015,
     author = {Worring, Marcel},
     title = {Multimedia Analytics for Image Collection Forensics},
     booktitle = {Ho/Handbook of Digital Forensics of Multimedia Data and Devices},
     publisher = {Wiley-Blackwell},
     year = {2015},
     pages = {305--327}}
    
  307. H. Wu, X. Kong & S. Shang
    A Printer Forensics Method Using Halftone Dot Arrangement Model
    Proc. IEEE China Summit and Int Signal and Information Processing (ChinaSIP) Conf
    2015, pp. 861-865
    DOI: 10.1109/ChinaSIP.2015.7230527
    BibTeX
    @inproceedings{Wu2015,
     author = {Wu, Han and Kong, Xiangwei and Shang, Shize},
     title = {A Printer Forensics Method Using Halftone Dot Arrangement Model},
     booktitle = {Proc. IEEE China Summit and Int Signal and Information Processing (ChinaSIP) Conf},
     year = {2015},
     pages = {861--865}}
    
  308. W.C. Wu, H.F. Hsu & P.Y. Lin
    Active tamper detection of digital images using VQ compression
    Proc. IEEE Int Consumer Electronics - Taiwan (ICCE-TW) Conf
    2015, pp. 508-509
    DOI: 10.1109/ICCE-TW.2015.7217025
    BibTeX
    @inproceedings{Wu2015b,
     author = {Wu, W. C. and Hsu, H. F. and Lin, P. Y.},
     title = {Active tamper detection of digital images using VQ compression},
     booktitle = {Proc. IEEE Int Consumer Electronics - Taiwan (ICCE-TW) Conf},
     year = {2015},
     pages = {508--509}}
    
  309. G. Xu, J. Ye & Y.-Q. Shi
    New Developments in Image Tampering Detection
    Digital-Forensics and Watermarking, Springer, 2015
    DOI: 10.1007/978-3-319-19321-2_1
    BibTeX
    @article{Xu2015,
     author = {Xu, Guanshuo and Ye, Jingyu and Shi, Yun-Qing},
     title = {New Developments in Image Tampering Detection},
     journal = {Digital-Forensics and Watermarking},
     publisher = {Springer},
     year = {2015}}
    
  310. J. Xu, Y. Ling & X. Zheng
    Forensic Detection of Gaussian Low-pass Filtering in Digital Images
    Proc. 8th Int. Congress Image and Signal Processing (CISP)
    2015, pp. 819-823
    DOI: 10.1109/CISP.2015.7407990
    BibTeX
    @inproceedings{Xu2015a,
     author = {Xu, J. and Ling, Y. and Zheng, X.},
     title = {Forensic Detection of Gaussian Low-pass Filtering in Digital Images},
     booktitle = {Proc. 8th Int. Congress Image and Signal Processing (CISP)},
     year = {2015},
     pages = {819--823}}
    
  311. N. Yadav & R. Kapdi
    Copy move forgery detection using SIFT and GMM
    Proc. 5th Nirma University Int. Conf. Engineering (NUiCONE)
    2015, pp. 1-4
    DOI: 10.1109/NUICONE.2015.7449647
    BibTeX
    @inproceedings{Yadav2015,
     author = {Yadav, N. and Kapdi, R.},
     title = {Copy move forgery detection using SIFT and GMM},
     booktitle = {Proc. 5th Nirma University Int. Conf. Engineering (NUiCONE)},
     year = {2015},
     pages = {1--4}}
    
  312. B. Yang, X. Sun, X. Chen, J. Zhang & X. Li
    Exposing Photographic Splicing by Detecting the Inconsistencies in Shadows
    The Computer Journal, 2015, Vol. 58(4), pp. 588-600
    DOI: 10.1093/comjnl/bxu146
    BibTeX
    @article{Yang2015e,
     author = {Yang, B. and Sun, X. and Chen, X. and Zhang, J. and Li, X.},
     title = {Exposing Photographic Splicing by Detecting the Inconsistencies in Shadows},
     journal = {The Computer Journal},
     year = {2015},
     volume = {58},
     number = {4},
     pages = {588--600}}
    
  313. B. Yang, X. Sun, X. Xin, W. Hu & Y. Wu
    Image Copy-move Forgery Detection Based on Sped-up Robust Features Descriptor and Adaptive Minimal-maximal Suppression
    Journal of Electronic Imaging, 2015, Vol. 24(6), pp. 063016
    DOI: 10.1117/1.JEI.24.6.063016
    BibTeX
    @article{Yang2015d,
     author = {Yang, Bin and Sun, Xingming and Xin, Xiangyang and Hu, Weifeng and Wu, Youxin},
     title = {Image Copy-move Forgery Detection Based on Sped-up Robust Features Descriptor and Adaptive Minimal-maximal Suppression},
     journal = {Journal of Electronic Imaging},
     year = {2015},
     volume = {24},
     number = {6},
     pages = {063016}}
    
  314. F. Yang & T. Gao
    Erratum to: A Novel Image Splicing Forensic Algorithm Based on Generalized Dct Coefficient-pair Histogram
    Advances in Image and Graphics Technologies
    Springer, 2015
    DOI: 10.1007/978-3-662-47791-5_51
    BibTeX
    @incollection{Yang2015c,
     author = {Yang, Fusheng and Gao, Tiegang},
     title = {Erratum to: A Novel Image Splicing Forensic Algorithm Based on Generalized Dct Coefficient-pair Histogram},
     booktitle = {Advances in Image and Graphics Technologies},
     publisher = {Springer},
     year = {2015}}
    
  315. J. Yang, G. Zhu, J. Huang & X. Zhao
    Estimating JPEG Compression History of Bitmaps Based on Factor Histogram
    Digital Signal Processing, 2015, Vol. 41, pp. 90-97
    DOI: 10.1016/j.dsp.2015.03.014
    BibTeX
    @article{Yang2015b,
     author = {Yang, Jianquan and Zhu, Guopu and Huang, Jiwu and Zhao, Xi},
     title = {Estimating JPEG Compression History of Bitmaps Based on Factor Histogram},
     journal = {Digital Signal Processing},
     year = {2015},
     volume = {41},
     pages = {90--97}}
    
  316. Q. Yang, F. Peng, J.-T. Li & M. Long
    Image Tamper Detection Based on Noise Estimation and Lacunarity Texture
    Multimedia Tools and Applications, Springer, 2015, pp. 1
    DOI: 10.1007/s11042-015-3079-2
    BibTeX
    @article{Yang2015a,
     author = {Yang, Qiuwei and Peng, Fei and Li, Jiao-Ting and Long, Min},
     title = {Image Tamper Detection Based on Noise Estimation and Lacunarity Texture},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2015},
     pages = {1}}
    
  317. R. Yang, Z. Bai, L. Yin & H. Gao
    Detecting of Copy-move Forgery in Digital Images Using Fractional Fourier Transform
    Falco, C. M. & Jiang, X. (ed.)
    Proc. of the Seventh International Conference on Digital Image Processing: ICDIP 2015
    Proc. SPIE, SPIE-Intl Soc Optical Eng, 2015, Vol. 9631, pp. 96310B-96310B-6
    DOI: 10.1117/12.2197146
    BibTeX
    @inproceedings{Yang2015,
     author = {Yang, Renqing and Bai, Zhengyao and Yin, Liguo and Gao, Hao},
     title = {Detecting of Copy-move Forgery in Digital Images Using Fractional Fourier Transform},
     booktitle = {Proc. of the Seventh International Conference on Digital Image Processing: ICDIP 2015},
     journal = {Proc. SPIE},
     publisher = {SPIE-Intl Soc Optical Eng},
     year = {2015},
     volume = {9631},
     pages = {96310B-96310B-6}}
    
  318. T. Yin, G. Yang, L. Li, D. Zhang & X. Sun
    Detecting Seam Carving Based Image Resizing Using Local Binary Patterns
    Computers & Security, Elsevier BV, 2015, Vol. 55, pp. 130-141
    DOI: 10.1016/j.cose.2015.09.003
    BibTeX
    @article{Yin2015,
     author = {Yin, Ting and Yang, Gaobo and Li, Leida and Zhang, Dengyong and Sun, Xingming},
     title = {Detecting Seam Carving Based Image Resizing Using Local Binary Patterns},
     journal = {Computers & Security},
     publisher = {Elsevier BV},
     year = {2015},
     volume = {55},
     pages = {130--141}}
    
  319. S.N. Youseph & R.R. Cherian
    Pixel and Edge Based Illuminant Color Estimation for Image Forgery Detection
    Procedia Computer Science, 2015, Vol. 46(0), pp. 1635-1642
    DOI: 10.1016/j.procs.2015.02.099
    BibTeX
    @article{Youseph2015,
     author = {Youseph, Shahana N. and Cherian, Rajesh Roy},
     title = {Pixel and Edge Based Illuminant Color Estimation for Image Forgery Detection},
     journal = {Procedia Computer Science},
     year = {2015},
     volume = {46},
     number = {0},
     pages = {1635--1642}}
    
  320. L. Yu, Q. Han, S.M. Yao & J. Fang
    An Improved Parameter Estimation Scheme for Image Modification Detection Based on DCT Coefficient Analysis
    Forensic Science International, 2015
    DOI: 10.1016/j.forsciint.2015.10.024
    BibTeX
    @article{Yu2015,
     author = {Yu, Liyang and Han, Qi and Yao, S. M. and Fang, Junbin},
     title = {An Improved Parameter Estimation Scheme for Image Modification Detection Based on DCT Coefficient Analysis},
     journal = {Forensic Science International},
     year = {2015}}
    
  321. M. Zampoglou, S. Papadopoulos & Y. Kompatsiaris
    Detecting Image Splicing in the Wild (web)
    Proc. IEEE Int Multimedia & Expo Workshops (ICMEW) Conf
    2015, pp. 1-6
    DOI: 10.1109/ICMEW.2015.7169839
    BibTeX
    @inproceedings{Zampoglou2015,
     author = {Zampoglou, M. and Papadopoulos, S. and Kompatsiaris, Y.},
     title = {Detecting Image Splicing in the Wild (web)},
     booktitle = {Proc. IEEE Int Multimedia & Expo Workshops (ICMEW) Conf},
     year = {2015},
     pages = {1--6}}
    
  322. F. Zeng, W. Wang, M. Tang & Z. Cao
    Exposing Blurred Image Forgeries through Blind Image Restoration
    Proc. Cloud and Internet Computing (3PGCIC) 2015 10th Int. Conf. P2P, Parallel, Grid
    2015, pp. 466-469
    DOI: 10.1109/3PGCIC.2015.50
    BibTeX
    @inproceedings{Zeng2015b,
     author = {Zeng, F. and Wang, W. and Tang, M. and Cao, Z.},
     title = {Exposing Blurred Image Forgeries through Blind Image Restoration},
     booktitle = {Proc. Cloud and Internet Computing (3PGCIC) 2015 10th Int. Conf. P2P, Parallel, Grid},
     year = {2015},
     pages = {466--469}}
    
  323. H. Zeng
    Rebuilding the Credibility of Sensor-based Camera Source Identification
    Multimedia Tools and Applications, Springer, 2015, pp. 1
    DOI: 10.1007/s11042-015-3072-9
    BibTeX
    @article{Zeng2015a,
     author = {Zeng, Hui},
     title = {Rebuilding the Credibility of Sensor-based Camera Source Identification},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2015},
     pages = {1}}
    
  324. H. Zeng, J. Chen, X. Kang & W. Zeng
    Removing Camera Fingerprint to Disguise Photograph Source
    Proc. IEEE Int Image Processing (ICIP) Conf
    2015, pp. 1687-1691
    DOI: 10.1109/ICIP.2015.7351088
    BibTeX
    @inproceedings{Zeng2015,
     author = {Zeng, Hui and Chen, Jiansheng and Kang, Xiangui and Zeng, Wenjun},
     title = {Removing Camera Fingerprint to Disguise Photograph Source},
     booktitle = {Proc. IEEE Int Image Processing (ICIP) Conf},
     year = {2015},
     pages = {1687--1691}}
    
  325. L. Zhan & Y. Zhu
    Passive Forensics for Image Splicing Based on PCA Noise Estimation
    Proc. 10th Int. Conf. for Internet Technology and Secured Transactions (ICITST)
    2015, pp. 78-83
    DOI: 10.1109/ICITST.2015.7412062
    BibTeX
    @inproceedings{Zhan2015,
     author = {Zhan, L. and Zhu, Y.},
     title = {Passive Forensics for Image Splicing Based on PCA Noise Estimation},
     booktitle = {Proc. 10th Int. Conf. for Internet Technology and Secured Transactions (ICITST)},
     year = {2015},
     pages = {78--83}}
    
  326. L. Zhan & Y. Zhu
    Passive forensics for image splicing based on PCA noise estimation
    Proc. 10th Int. Conf. for Internet Technology and Secured Transactions (ICITST)
    2015, pp. 78-83
    DOI: 10.1109/ICITST.2015.7412062
    BibTeX
    @inproceedings{Zhan2015a,
     author = {Zhan, L. and Zhu, Y.},
     title = {Passive forensics for image splicing based on PCA noise estimation},
     booktitle = {Proc. 10th Int. Conf. for Internet Technology and Secured Transactions (ICITST)},
     year = {2015},
     pages = {78--83}}
    
  327. Y. Zhang, S. Li, S. Wang & X. Zhao
    Identifying Image Splicing Based on Local Statistical Features in DCT and DWT Domain
    Mu, J., Liang, Q., Wang, W., Zhang, B. & Pi, Y. (ed.)
    The Proceedings of the Third International Conference on Communications, Signal Processing, and Systems
    Springer International Publishing, 2015, Vol. 322, pp. 723-731
    DOI: 10.1007/978-3-319-08991-1_75
    BibTeX
    @incollection{Zhang2015,
     author = {Zhang, Yujin and Li, Shenghong and Wang, Shilin and Zhao, Xudong},
     title = {Identifying Image Splicing Based on Local Statistical Features in DCT and DWT Domain},
     booktitle = {The Proceedings of the Third International Conference on Communications, Signal Processing, and Systems},
     publisher = {Springer International Publishing},
     year = {2015},
     volume = {322},
     pages = {723--731}}
    
  328. F. Zhao, R. Zhang, H. Guo & Y. Zhang
    Effective Digital Image Copy-move Location Algorithm Robust to Geometric Transformations
    Proc. IEEE Int Signal Processing, Communications and Computing (ICSPCC) Conf
    2015, pp. 1-5
    DOI: 10.1109/ICSPCC.2015.7338958
    BibTeX
    @inproceedings{Zhao2015c,
     author = {Zhao, Fuxing and Zhang, Rong and Guo, Haolong and Zhang, Yanhua},
     title = {Effective Digital Image Copy-move Location Algorithm Robust to Geometric Transformations},
     booktitle = {Proc. IEEE Int Signal Processing, Communications and Computing (ICSPCC) Conf},
     year = {2015},
     pages = {1--5}}
    
  329. J.-H. Zhao
    Research on Image Passive Forensics Based on ASIFT and Circle Projection Features
    JSCUT(Natural Science Edition), 2015, Vol. 42(3)
    BibTeX
    @article{Zhao2015,
     author = {Zhao, Jun-Hong},
     title = {Research on Image Passive Forensics Based on ASIFT and Circle Projection Features},
     journal = {JSCUT(Natural Science Edition)},
     year = {2015},
     volume = {42},
     number = {3}}
    
  330. X. Zhao, S. Wang, S. Li & J. Li
    Passive Image-splicing Detection by a 2-D Noncausal Markov Model
    Circuits and Systems for Video Technology, IEEE Transactions on, 2015, Vol. 25(2), pp. 185-199
    DOI: 10.1109/TCSVT.2014.2347513
    BibTeX
    @article{Zhao2015a,
     author = {Zhao, Xudong and Wang, Shilin and Li, Shenghong and Li, Jianhua},
     title = {Passive Image-splicing Detection by a 2-D Noncausal Markov Model},
     journal = {Circuits and Systems for Video Technology, IEEE Transactions on},
     year = {2015},
     volume = {25},
     number = {2},
     pages = {185--199}}
    
  331. H. Zhen & L. Jinjiang
    Exposing Image Sharpen Forgeries Based on Dyadic Contrast Contourlet
    nternational Journal of Multimedia and Ubiquitous Engineering, 2015, Vol. 10(7)
    DOI: 10.14257/ijmue.2015.10.7.25
    BibTeX
    @article{Zhen2015,
     author = {Zhen, Hua and Jinjiang, Li},
     title = {Exposing Image Sharpen Forgeries Based on Dyadic Contrast Contourlet},
     journal = {nternational Journal of Multimedia and Ubiquitous Engineering},
     year = {2015},
     volume = {10},
     number = {7}}
    
  332. J. Zheng, T. Zhu, Z. Li, W. Xing & J. Ren
    Exposing Image Forgery by Detecting Traces of Feather Operation
    Journal of Visual Languages & Computing, 2015, Vol. 27, pp. 9-18
    DOI: 10.1016/j.jvlc.2015.02.002
    BibTeX
    @article{Zheng2015,
     author = {Zheng, Jiangbin and Zhu, Tingge and Li, Zhe and Xing, Weiwei and Ren, JinChang},
     title = {Exposing Image Forgery by Detecting Traces of Feather Operation},
     journal = {Journal of Visual Languages & Computing},
     year = {2015},
     volume = {27},
     pages = {9--18}}
    
  333. J. Zhong & Y. Gan
    Detection of Copy--move Forgery Using Discrete Analytical Fourier--mellin Transform
    Nonlinear Dynamics, Springer Netherlands, 2015, pp. 1-14
    DOI: 10.1007/s11071-015-2374-9
    BibTeX
    @article{Zhong2015a,
     author = {Zhong, Junliu and Gan, Yanfen},
     title = {Detection of Copy--move Forgery Using Discrete Analytical Fourier--mellin Transform},
     journal = {Nonlinear Dynamics},
     publisher = {Springer Netherlands},
     year = {2015},
     pages = {1--14}}
    
  334. J. Zhong & Y. Gan
    Discrete Polar Complex Exponential Transform for Image Rotation Duplication Detection
    Advanced Science and Technology Letters, 2015
    DOI: 10.14257/astl.2015.81.05
    BibTeX
    @article{Zhong2015b,
     author = {Zhong, Junliu and Gan, Yanfen},
     title = {Discrete Polar Complex Exponential Transform for Image Rotation Duplication Detection},
     journal = {Advanced Science and Technology Letters},
     year = {2015}}
    
  335. J. Zhong, Y. Gan & S. Xie
    Radon Odd Radial Harmonic Fourier Moments in Detecting Cloned Forgery Image
    Chaos, Solitons & Fractals, 2015, pp. -
    DOI: 10.1016/j.chaos.2015.10.010
    BibTeX
    @article{Zhong2015,
     author = {Zhong, Junliu and Gan, Yanfen and Xie, Shuai},
     title = {Radon Odd Radial Harmonic Fourier Moments in Detecting Cloned Forgery Image},
     journal = {Chaos, Solitons & Fractals},
     year = {2015},
     pages = {-}}
    
  336. Z. ..P. .. Zhou, C. ..Y. .. Hu & C. ..J. .. Zhou
    Mobile Camera Source Identification Based on CFA Interpolation and Large Components of Sensor Pattern Noise
    Zheng, D. (ed.)
    Proceedings of the International Conference on Control, Mechatronics and Automation Technology (ICCMAT 2014)
    Control, Mechatronics and Automation Technology, 2015, pp. 239243
    BibTeX
    @inproceedings{Zhou2015,
     author = {Zhou, Z. . P. . and Hu, C. . Y. . and Zhou, C. . J. .},
     title = {Mobile Camera Source Identification Based on CFA Interpolation and Large Components of Sensor Pattern Noise},
     booktitle = {Proceedings of the International Conference on Control, Mechatronics and Automation Technology (ICCMAT 2014)},
     journal = {Control, Mechatronics and Automation Technology},
     year = {2015},
     pages = {239243}}
    
  337. Digital-Forensics and Watermarking
    Shi, Y.-Q., Kim, H. J., Pérez-González, F. & Yang, C.-N. (ed.)
    Springer International Publishing, 2015
    BibTeX
    @book{Shi2015a,,
     title = {Digital-Forensics and Watermarking},
     publisher = {Springer International Publishing},
     year = {2015}}
    


2014

  1. A. Al-Ahmadi, Amani
    Image Forgery Detection Exploiting Image Randomness
    King Saud University College of Computer & Information Sciences Department of Computer Science, King Saud University College of Computer & Information Sciences Department of Computer Science, 2014
    DOI: 10.1109/cisp.2014.7003901
    BibTeX
    @mastersthesis{AlAhmadi2014,
     author = {Al-Ahmadi, Amani, Ahmad},
     title = {Image Forgery Detection Exploiting Image Randomness},
     school = {King Saud University College of Computer & Information Sciences Department of Computer Science},
     year = {2014}}
    
  2. M. Ali Qureshi & M. Deriche
    A Review on Copy Move Image Forgery Detection Techniques
    Multi-Conference on Systems, Signals & Devices (SSD), 2014 11th International
    2014, pp. 1-5
    DOI: 10.1109/SSD.2014.6808907
    BibTeX
    @inproceedings{AliQureshi2014,
     author = {Ali Qureshi, M. and Deriche, M.},
     title = {A Review on Copy Move Image Forgery Detection Techniques},
     booktitle = {Multi-Conference on Systems, Signals & Devices (SSD), 2014 11th International},
     year = {2014},
     pages = {1--5}}
    
  3. I. Amerini, F. Battisti, R. Caldelli, M. Carli & A. Costanzo
    Exploiting Perceptual Quality Issues in Countering SIFT-based Forensic Methods
    Acoustics, Speech and Signal Processing (ICASSP), 2014 IEEE International Conference on
    2014, pp. 2664-2668
    DOI: 10.1109/ICASSP.2014.6854083
    BibTeX
    @inproceedings{Amerini2014b,
     author = {Amerini, Irene and Battisti, F. and Caldelli, R. and Carli, M. and Costanzo, A.},
     title = {Exploiting Perceptual Quality Issues in Countering SIFT-based Forensic Methods},
     booktitle = {Acoustics, Speech and Signal Processing (ICASSP), 2014 IEEE International Conference on},
     year = {2014},
     pages = {2664--2668}}
    
  4. I. Amerini, R. Becarelli, R. Caldelli & A.D. Mastio
    Splicing Forgeries Localization through the Use of First Digit Features
    2014 IEEE International Workshop on Information Forensics and Security (WIFS)
    Institute of Electrical & Electronics Engineers (IEEE), 2014, pp. 143-148
    DOI: 10.1109/WIFS.2014.7084318
    BibTeX
    @inproceedings{Amerini2014c,
     author = {Amerini, Irene and Becarelli, Rudy and Caldelli, Roberto and Mastio, Andrea Del},
     title = {Splicing Forgeries Localization through the Use of First Digit Features},
     booktitle = {2014 IEEE International Workshop on Information Forensics and Security (WIFS)},
     publisher = {Institute of Electrical & Electronics Engineers (IEEE)},
     year = {2014},
     pages = {143--148}}
    
  5. I. Amerini, R. Caldelli, P. Crescenzi, A.D. Mastio & A. Marino
    Blind Image Clustering Based on the Normalized Cuts Criterion for Camera Identification
    Signal Processing: Image Communication, 2014(0), pp. -
    DOI: 10.1016/j.image.2014.07.003
    BibTeX
    @article{Amerini2014a,
     author = {Amerini, Irene and Caldelli, R. and Crescenzi, P. and Mastio, A. Del and Marino, A.},
     title = {Blind Image Clustering Based on the Normalized Cuts Criterion for Camera Identification},
     journal = {Signal Processing: Image Communication},
     year = {2014},
     number = {0},
     pages = {-}}
    
  6. I. Amerini, R. Caldelli, A. Del Bimbo, A. Di Fuccia, L. Saravo & A.P. Rizzo
    Copy-move Forgery Detection from Printed Images
    Alattar, A. M., Memon, N. D. & Heitzenrater, C. D. (ed.)
    Proc. SPIE 9028, Media Watermarking, Security, and Forensics 2014
    Proc. SPIE, 2014, Vol. 9028, pp. 90280Y-90280Y-10
    DOI: 10.1117/12.2039509
    BibTeX
    @inproceedings{Amerini2014,
     author = {Amerini, Irene and Caldelli, Roberto and Del Bimbo, Alberto and Di Fuccia, Andrea and Saravo, Luigi and Rizzo, Anna Paola},
     title = {Copy-move Forgery Detection from Printed Images},
     booktitle = {Proc. SPIE 9028, Media Watermarking, Security, and Forensics 2014},
     journal = {Proc. SPIE},
     year = {2014},
     volume = {9028},
     pages = {90280Y-90280Y-10}}
    
  7. S. Amtullah & A. Koul
    Passive Image Forensic Method to Detect Copy Move Forgery in Digital Images
    IOSR Journal of Computer Engineering (IOSR-JCE), 2014, Vol. 16(2), pp. 96-104
    DOI: 10.9790/0661-1621296104
    BibTeX
    @article{Amtullah2014,
     author = {Amtullah, Salma and Koul, Ajay},
     title = {Passive Image Forensic Method to Detect Copy Move Forgery in Digital Images},
     journal = {IOSR Journal of Computer Engineering (IOSR-JCE)},
     year = {2014},
     volume = {16},
     number = {2},
     pages = {96--104}}
    
  8. V. Anand, M.F. Hashmi & A.G. Keskar
    A Copy Move Forgery Detection to Overcome Sustained Attacks Using Dyadic Wavelet Transform and SIFT Methods
    Nguyen, N., Attachoo, B., Trawiński, B. & Somboonviwat, K. (ed.)
    Intelligent Information and Database Systems
    Springer International Publishing, 2014, Vol. 8397, pp. 530-542
    DOI: 10.1007/978-3-319-05476-6_54
    BibTeX
    @incollection{Anand2014,
     author = {Anand, Vijay and Hashmi, Mohammad Farukh and Keskar, Avinash G.},
     title = {A Copy Move Forgery Detection to Overcome Sustained Attacks Using Dyadic Wavelet Transform and SIFT Methods},
     booktitle = {Intelligent Information and Database Systems},
     publisher = {Springer International Publishing},
     year = {2014},
     volume = {8397},
     pages = {530--542}}
    
  9. M.S.R. Asati & M.P.R.Pardhi
    Exposing Digital Image Forgeries by Illumination Color Classification
    International Journal of Engineering Trends and Technology, 2014, Vol. 18(6), pp. 269-271
    DOI: 10.14445/22315381/IJETT-V18P255
    BibTeX
    @article{Asati2014,
     author = {Asati, Ms. Shraddha R. and P.R.Pardhi, Mr.},
     title = {Exposing Digital Image Forgeries by Illumination Color Classification},
     journal = {International Journal of Engineering Trends and Technology},
     year = {2014},
     volume = {18},
     number = {6},
     pages = {269--271}}
    
  10. D.A. Ayalneh, H.J. Kim & Y.S. Choi
    JPEG Copy Paste Forgery Detection Using Bag Optimized for Complex Images
    Advanced Communication Technology (ICACT), 2014 16th International Conference on
    2014, pp. 181-185
    DOI: 10.1109/ICACT.2014.6778945
    BibTeX
    @inproceedings{Ayalneh2014,
     author = {Ayalneh, Dessalegn Atnafu and Kim, Hyoung Joong and Choi, Yong Soo},
     title = {JPEG Copy Paste Forgery Detection Using Bag Optimized for Complex Images},
     booktitle = {Advanced Communication Technology (ICACT), 2014 16th International Conference on},
     year = {2014},
     pages = {181--185}}
    
  11. K. Bahrami & A.C. Kot
    Image Tampering Detection by Exposing Blur Type Inconsistency
    Acoustics, Speech and Signal Processing (ICASSP), 2014 IEEE International Conference on
    Institute of Electrical & Electronics Engineers (IEEE), 2014, pp. 2654-2658
    DOI: 10.1109/ICASSP.2014.6854081
    BibTeX
    @inproceedings{Bahrami2014,
     author = {Bahrami, K. and Kot, A. C.},
     title = {Image Tampering Detection by Exposing Blur Type Inconsistency},
     booktitle = {Acoustics, Speech and Signal Processing (ICASSP), 2014 IEEE International Conference on},
     publisher = {Institute of Electrical & Electronics Engineers (IEEE)},
     year = {2014},
     pages = {2654--2658}}
    
  12. G. Bhartiya & A.S. Jalal
    Image Forgery Detection Using Feature Based Clustering in JPEG Images
    Industrial and Information Systems (ICIIS), 2014 9th International Conference on
    2014, pp. 1-5
    DOI: 10.1109/ICIINFS.2014.7036583
    BibTeX
    @inproceedings{Bhartiya2014,
     author = {Bhartiya, Gunjan and Jalal, Anand Singh},
     title = {Image Forgery Detection Using Feature Based Clustering in JPEG Images},
     booktitle = {Industrial and Information Systems (ICIIS), 2014 9th International Conference on},
     year = {2014},
     pages = {1--5}}
    
  13. G.K. Birajdar & V.H. Mankar
    Blind Method for Rescaling Detection and Rescale Factor Estimation in Digital Images Using Periodic Properties of Interpolation
    AEU - International Journal of Electronics and Communications, 2014(0), pp. -
    DOI: 10.1016/j.aeue.2014.01.013
    BibTeX
    @article{Birajdar2014,
     author = {Birajdar, Gajanan K. and Mankar, Vijay H.},
     title = {Blind Method for Rescaling Detection and Rescale Factor Estimation in Digital Images Using Periodic Properties of Interpolation},
     journal = {AEU - International Journal of Electronics and Communications},
     year = {2014},
     number = {0},
     pages = {-}}
    
  14. S. Bo, Y. Quan-qiao, W. Shi-lin, Z. Cheng-lin & L. Shen-ghong
    Image Splicing Detection Based on Improved Markov Model
    Zhang, B., Mu, J., Wang, W., Liang, Q. & Pi, Y. (ed.)
    The Proceedings of the Second International Conference on Communications, Signal Processing, and Systems
    Springer International Publishing, 2014, Vol. 246, pp. 127-135
    DOI: 10.1007/978-3-319-00536-2_15
    BibTeX
    @incollection{Bo2014,
     author = {Bo, Su and Quan-qiao, Yuan and Shi-lin, Wang and Cheng-lin, Zhao and Shen-ghong, Li},
     title = {Image Splicing Detection Based on Improved Markov Model},
     booktitle = {The Proceedings of the Second International Conference on Communications, Signal Processing, and Systems},
     publisher = {Springer International Publishing},
     year = {2014},
     volume = {246},
     pages = {127--135}}
    
  15. H. Bojinov, D. Boneh, Y. Michakevsky & G. Nakibly
    Mobile Device Identification Via Sensor Fingerprinting
    2014
    BibTeX
    @electronic{Bojinov2014,
     author = {Bojinov, Hristo and Boneh, Dan and Michakevsky, Yan and Nakibly, Gabi},
     title = {Mobile Device Identification Via Sensor Fingerprinting},
     year = {2014}}
    
  16. G. Cao, Y. Zhao, R. Ni & X. Li
    Contrast Enhancement Based Forensics in Digital Images
    Information Forensics and Security, IEEE Transactions on, Institute of Electrical & Electronics Engineers (IEEE), 2014, Vol. 9(99), pp. 515-525
    DOI: 10.1109/TIFS.2014.2300937
    BibTeX
    @article{Cao2014a,
     author = {Cao, G. and Zhao, Y. and Ni, R. and Li, X.},
     title = {Contrast Enhancement Based Forensics in Digital Images},
     journal = {Information Forensics and Security, IEEE Transactions on},
     publisher = {Institute of Electrical & Electronics Engineers (IEEE)},
     year = {2014},
     volume = {9},
     number = {99},
     pages = {515--525}}
    
  17. G. Cao, Y. Zhao, R. Ni & X. Li
    Contrast Enhancement-Based Forensics in Digital Images
    #IEEE_J_IFS#, 2014, Vol. 9(3), pp. 515-525
    DOI: 10.1109/TIFS.2014.2300937
    BibTeX
    @article{Cao2014c,
     author = {Cao, G. and Zhao, Y. and Ni, R. and Li, X.},
     title = {Contrast Enhancement-Based Forensics in Digital Images},
     journal = {#IEEE_J_IFS#},
     year = {2014},
     volume = {9},
     number = {3},
     pages = {515--525}}
    
  18. G. Cao, Y. Zhao, R. Ni, B. Ou & Y. Wang
    Forensic Detection of Noise Addition in Digital Images
    Journal of Electronic Imaging, SPIE-Intl Soc Optical Eng, 2014, Vol. 23(2), pp. 023004
    DOI: 10.1117/1.JEI.23.2.023004
    BibTeX
    @article{Cao2014b,
     author = {Cao, Gang and Zhao, Yao and Ni, Rongrong and Ou, Bo and Wang, Yongbin},
     title = {Forensic Detection of Noise Addition in Digital Images},
     journal = {Journal of Electronic Imaging},
     publisher = {SPIE-Intl Soc Optical Eng},
     year = {2014},
     volume = {23},
     number = {2},
     pages = {023004}}
    
  19. G. Cao, Y. Zhao, R. Ni, H. Tian & L. Yu
    Attacking Contrast Enhancement Forensics in Digital Images
    Science China Information Sciences, Springer Berlin Heidelberg, 2014, Vol. 57(5), pp. 1-13
    DOI: 10.1007/s11432-013-4928-0
    BibTeX
    @article{Cao2014,
     author = {Cao, Gang and Zhao, Yao and Ni, RongRong and Tian, HuaWei and Yu, LiFang},
     title = {Attacking Contrast Enhancement Forensics in Digital Images},
     journal = {Science China Information Sciences},
     publisher = {Springer Berlin Heidelberg},
     year = {2014},
     volume = {57},
     number = {5},
     pages = {1--13}}
    
  20. G. Cattaneo & G. Roscigno
    A Possible Pitfall in the Experimental Analysis of Tampering Detection Algorithms
    Network-Based Information Systems (NBiS), 2014 17th International Conference on
    2014, pp. 279-286
    DOI: 10.1109/NBiS.2014.82
    BibTeX
    @inproceedings{Cattaneo2014a,
     author = {Cattaneo, G. and Roscigno, G.},
     title = {A Possible Pitfall in the Experimental Analysis of Tampering Detection Algorithms},
     booktitle = {Network-Based Information Systems (NBiS), 2014 17th International Conference on},
     year = {2014},
     pages = {279--286}}
    
  21. G. Cattaneo, G. Roscigno & U.F. Petrillo
    A Scalable Approach to Source Camera Identification Over Hadoop
    Advanced Information Networking and Applications (AINA), 2014 IEEE 28th International Conference on
    2014, pp. 366-373
    DOI: 10.1109/AINA.2014.47
    BibTeX
    @inproceedings{Cattaneo2014,
     author = {Cattaneo, G. and Roscigno, G. and Petrillo, U. F.},
     title = {A Scalable Approach to Source Camera Identification Over Hadoop},
     booktitle = {Advanced Information Networking and Applications (AINA), 2014 IEEE 28th International Conference on},
     year = {2014},
     pages = {366--373}}
    
  22. T.-Y. Chang, S.-C. Tai & G.-S. Lin
    A Passive Multi-purpose Scheme Based on Periodicity Analysis of CFA Artifacts for Image Forensics
    Journal of Visual Communication and Image Representation, 2014(0), pp. -
    DOI: 10.1016/j.jvcir.2014.04.010
    BibTeX
    @article{Chang2014,
     author = {Chang, Tang-You and Tai, Shen-Chuan and Lin, Guo-Shiang},
     title = {A Passive Multi-purpose Scheme Based on Periodicity Analysis of CFA Artifacts for Image Forensics},
     journal = {Journal of Visual Communication and Image Representation},
     year = {2014},
     number = {0},
     pages = {-}}
    
  23. A. Cheddad
    Digital Forgery
    The Encyclopedia of Criminology and Criminal Justice
    Blackwell Publishing Ltd, 2014
    DOI: 10.1002/9781118517383.wbeccj132
    BibTeX
    @inbook{Cheddad2014,
     author = {Cheddad, Abbas},
     title = {Digital Forgery},
     booktitle = {The Encyclopedia of Criminology and Criminal Justice},
     publisher = {Blackwell Publishing Ltd},
     year = {2014}}
    
  24. C. Chen, H. Li, W. Luo, R. Yang & J. Huang
    Anti-forensics of JPEG Detectors Via Adaptive Quantization Table Replacement
    Proc. 22nd Int Pattern Recognition (ICPR) Conf
    2014, pp. 672-677
    DOI: 10.1109/ICPR.2014.126
    BibTeX
    @inproceedings{Chen2014a,
     author = {Chen, C. and Li, H. and Luo, W. and Yang, R. and Huang, J.},
     title = {Anti-forensics of JPEG Detectors Via Adaptive Quantization Table Replacement},
     booktitle = {Proc. 22nd Int Pattern Recognition (ICPR) Conf},
     year = {2014},
     pages = {672--677}}
    
  25. C. Chen, J. Ni & Z. Shen
    Effective Estimation of Image Rotation Angle Using Spectral Method
    IEEE Signal Processing Letters, 2014, Vol. 21(7), pp. 890-894
    DOI: 10.1109/LSP.2014.2320503
    BibTeX
    @article{Chen2014b,
     author = {Chen, C. and Ni, J. and Shen, Z.},
     title = {Effective Estimation of Image Rotation Angle Using Spectral Method},
     journal = {IEEE Signal Processing Letters},
     year = {2014},
     volume = {21},
     number = {7},
     pages = {890--894}}
    
  26. Z. Chen, Y. Zhao & R. Ni
    Detecting the operation chain in digital images by type and order fingerprint
    Proc. 12th Int. Conf. Signal Processing (ICSP)
    2014, pp. 1837-1842
    DOI: 10.1109/ICOSP.2014.7015310
    BibTeX
    @inproceedings{Chen2014,
     author = {Chen, Z. and Zhao, Y. and Ni, R.},
     title = {Detecting the operation chain in digital images by type and order fingerprint},
     booktitle = {Proc. 12th Int. Conf. Signal Processing (ICSP)},
     year = {2014},
     pages = {1837--1842}}
    
  27. G. Chierchia, D. Cozzolino, G. Poggi, C. Sansone & L. Verdoliva
    Guided Filtering for PRNU-based Localization of Small-size Image Forgeries
    2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
    International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Institute of Electrical & Electronics Engineers (IEEE), 2014
    DOI: 10.1109/icassp.2014.6854802
    BibTeX
    @article{Chierchia2014a,
     author = {Chierchia, G. and Cozzolino, D. and Poggi, G. and Sansone, C. and Verdoliva, L.},
     title = {Guided Filtering for PRNU-based Localization of Small-size Image Forgeries},
     booktitle = {2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)},
     journal = {International Conference on Acoustics, Speech, and Signal Processing (ICASSP)},
     publisher = {Institute of Electrical & Electronics Engineers (IEEE)},
     year = {2014}}
    
  28. G. Chierchia, D. Cozzolino, G. Poggi, C. Sansone & L. Verdoliva
    Guided Filtering for PRNU-based Localization of Small-size Image Forgeries
    Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics
    2014, pp. 6231-6235
    DOI: 10.1109/ICASSP.2014.6854802
    BibTeX
    @inproceedings{Chierchia2014b,
     author = {Chierchia, G. and Cozzolino, D. and Poggi, G. and Sansone, C. and Verdoliva, L.},
     title = {Guided Filtering for PRNU-based Localization of Small-size Image Forgeries},
     booktitle = {Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics},
     year = {2014},
     pages = {6231--6235}}
    
  29. G. Chierchia, G. Poggi, C. Sansone & L. Verdoliva
    A Bayesian-mrf Approach for PRNU-based Image Forgery Detection
    IEEE Trans.Inform.Forensic Secur., Institute of Electrical & Electronics Engineers (IEEE), 2014, Vol. 9(4), pp. 554-567
    DOI: 10.1109/TIFS.2014.2302078
    BibTeX
    @article{Chierchia2014,
     author = {Chierchia, Giovanni and Poggi, Giovanni and Sansone, Carlo and Verdoliva, Luisa},
     title = {A Bayesian-mrf Approach for PRNU-based Image Forgery Detection},
     journal = {IEEE Trans.Inform.Forensic Secur.},
     publisher = {Institute of Electrical & Electronics Engineers (IEEE)},
     year = {2014},
     volume = {9},
     number = {4},
     pages = {554--567}}
    
  30. T. Chihaoui, S. Bourouis & K. Hamrouni
    Copy-move Image Forgery Detection Based on SIFT Descriptors and SVD-matching
    Advanced Technologies for Signal and Image Processing (ATSIP), 2014 1st International Conference on
    2014, pp. 125-129
    DOI: 10.1109/ATSIP.2014.6834590
    BibTeX
    @inproceedings{Chihaoui2014,
     author = {Chihaoui, T. and Bourouis, S. and Hamrouni, K.},
     title = {Copy-move Image Forgery Detection Based on SIFT Descriptors and SVD-matching},
     booktitle = {Advanced Technologies for Signal and Image Processing (ATSIP), 2014 1st International Conference on},
     year = {2014},
     pages = {125--129}}
    
  31. G.B. Chittapur, S. Murali, H.S. Prabhakara & B.S. Anami
    Exposing Digital Forgery in Video by Mean Frame Comparison Techniques
    Emerging Research in Electronics, Computer Science and Technology
    Springer, 2014
    DOI: 10.1007/978-81-322-1157-0_57
    BibTeX
    @incollection{Chittapur2014,
     author = {Chittapur, Govindraj B. and Murali, S. and Prabhakara, H. S. and Anami, Basavaraj S.},
     title = {Exposing Digital Forgery in Video by Mean Frame Comparison Techniques},
     booktitle = {Emerging Research in Electronics, Computer Science and Technology},
     publisher = {Springer},
     year = {2014}}
    
  32. X. Chu, Y. Chen, M.C. Stamm & K.J.R. Liu
    Information theoretical limit of compression forensics
    Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics
    2014, pp. 2689-2693
    DOI: 10.1109/ICASSP.2014.6854088
    BibTeX
    @inproceedings{Chu2014,
     author = {Chu, X. and Chen, Y. and Stamm, M. C. and Liu, K. J. R.},
     title = {Information theoretical limit of compression forensics},
     booktitle = {Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics},
     year = {2014},
     pages = {2689--2693}}
    
  33. V. Conotter, E. Bodnari, G. Boato & H. Farid
    Physiologically-based Detection of Computer Generated Faces in Video
    Proc. IEEE Int Image Processing (ICIP) Conf
    2014, pp. 248-252
    DOI: 10.1109/ICIP.2014.7025049
    BibTeX
    @inproceedings{Conotter2014,
     author = {Conotter, V. and Bodnari, E. and Boato, G. and Farid, H.},
     title = {Physiologically-based Detection of Computer Generated Faces in Video},
     booktitle = {Proc. IEEE Int Image Processing (ICIP) Conf},
     year = {2014},
     pages = {248--252}}
    
  34. A. Costanzo Piccinnano
    Techniques for Digital Image Forensics and Counter-forensics
    Università degli studi di siena, Università degli studi di siena, 2014
    BibTeX
    @phdthesis{Costanzo2014a,
     author = {Costanzo Piccinnano, Andrea},
     title = {Techniques for Digital Image Forensics and Counter-forensics},
     school = {Università degli studi di siena},
     year = {2014}}
    
  35. A. Costanzo, I. Amerini, R. Caldelli & M. Barni
    Forensic Analysis of SIFT Keypoint Removal and Injection
    Information Forensics and Security, IEEE Transactions on, 2014, Vol. 9(9), pp. 1450-1464
    DOI: 10.1109/TIFS.2014.2337654
    BibTeX
    @article{Costanzo2014,
     author = {Costanzo, A. and Amerini, Irene and Caldelli, R. and Barni, Mauro},
     title = {Forensic Analysis of SIFT Keypoint Removal and Injection},
     journal = {Information Forensics and Security, IEEE Transactions on},
     year = {2014},
     volume = {9},
     number = {9},
     pages = {1450--1464}}
    
  36. D. Cozzolino, D. Gragnaniello & L. Verdoliva
    Image Forgery Detection through Residual-based Local Descriptors and Block-matching
    Image Processing (ICIP), 2014 IEEE International Conference on
    2014, pp. 5297-5301
    DOI: 10.1109/ICIP.2014.7026072
    BibTeX
    @inproceedings{Cozzolino2014a,
     author = {Cozzolino, D. and Gragnaniello, D. and Verdoliva, L.},
     title = {Image Forgery Detection through Residual-based Local Descriptors and Block-matching},
     booktitle = {Image Processing (ICIP), 2014 IEEE International Conference on},
     year = {2014},
     pages = {5297--5301}}
    
  37. D. Cozzolino, D. Gragnaniello & L. Verdoliva
    Image Forgery Localization through the Fusion of Camera-based, Feature-based and Pixel-based Techniques
    Image Processing (ICIP), 2014 IEEE International Conference on
    2014, pp. 5302-5306
    DOI: 10.1109/ICIP.2014.7026073
    BibTeX
    @inproceedings{Cozzolino2014b,
     author = {Cozzolino, D. and Gragnaniello, D. and Verdoliva, L.},
     title = {Image Forgery Localization through the Fusion of Camera-based, Feature-based and Pixel-based Techniques},
     booktitle = {Image Processing (ICIP), 2014 IEEE International Conference on},
     year = {2014},
     pages = {5302--5306}}
    
  38. D. Cozzolino, G. Poggi & L. Verdoliva
    Copy-move Forgery Detection Based on Patchmatch
    Image Processing (ICIP), 2014 IEEE International Conference on
    2014, pp. 5312-5316
    DOI: 10.1109/ICIP.2014.7026075
    BibTeX
    @inproceedings{Cozzolino2014,
     author = {Cozzolino, D. and Poggi, G. and Verdoliva, L.},
     title = {Copy-move Forgery Detection Based on Patchmatch},
     booktitle = {Image Processing (ICIP), 2014 IEEE International Conference on},
     year = {2014},
     pages = {5312--5316}}
    
  39. S. Dadkhah, A.A. Manaf & S. Sadeghi
    Efficient Image Authentication and Tamper Localization Algorithm Using Active Watermarking
    Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations
    Springer, 2014
    DOI: 10.1007/978-3-662-43616-5_5
    BibTeX
    @incollection{Dadkhah2014,
     author = {Dadkhah, Sajjad and Manaf, Azizah Abd and Sadeghi, Somayeh},
     title = {Efficient Image Authentication and Tamper Localization Algorithm Using Active Watermarking},
     booktitle = {Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations},
     publisher = {Springer},
     year = {2014}}
    
  40. D.T. Dang-Nguyen, V. Conotter, G. Boato & F.G.B.D. Natale
    Video forensics based on expression dynamics
    Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)
    2014, pp. 161-166
    DOI: 10.1109/WIFS.2014.7084321
    BibTeX
    @inproceedings{Dang-Nguyen2014a,
     author = {Dang-Nguyen, D. T. and Conotter, V. and Boato, G. and Natale, F. G. B. De},
     title = {Video forensics based on expression dynamics},
     booktitle = {Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)},
     year = {2014},
     pages = {161--166}}
    
  41. D.-T. Dang-Nguyen
    Discrimination of Computer Generated Versus Natural Human Faces
    University of Trento, UNITN, University of Trento, UNITN, 2014
    BibTeX
    @phdthesis{Dang-Nguyen2014,
     author = {Dang-Nguyen, Duc-Tien},
     title = {Discrimination of Computer Generated Versus Natural Human Faces},
     school = {University of Trento, UNITN},
     year = {2014}}
    
  42. A. De Rosa, A. Piva, M. Fontani & M. Iuliani
    Investigating Multimedia Contents
    Security Technology (ICCST), 2014 International Carnahan Conference on
    2014, pp. 1-6
    DOI: 10.1109/CCST.2014.6986976
    BibTeX
    @inproceedings{DeRosa2014,
     author = {De Rosa, A. and Piva, A. and Fontani, M. and Iuliani, M.},
     title = {Investigating Multimedia Contents},
     booktitle = {Security Technology (ICCST), 2014 International Carnahan Conference on},
     year = {2014},
     pages = {1--6}}
    
  43. S. Debbarma, A.B. Singh & K.M. Singh
    Keypoints Based Copy-move Forgery Detection of Digital Images
    Proc. Int Informatics, Electronics Vision (ICIEV) Conf
    2014, pp. 1-5
    DOI: 10.1109/ICIEV.2014.7135994
    BibTeX
    @inproceedings{Debbarma2014,
     author = {Debbarma, S. and Singh, A. B. and Singh, K. M.},
     title = {Keypoints Based Copy-move Forgery Detection of Digital Images},
     booktitle = {Proc. Int Informatics, Electronics Vision (ICIEV) Conf},
     year = {2014},
     pages = {1--5}}
    
  44. L. Debiasi, A. Uhl & Z. Sun
    Generation of Iris Sensor PRNU Fingerprints from Uncorrelated Data
    Biometrics and Forensics (IWBF), 2014 International Workshop on
    2014, pp. 1-6
    DOI: 10.1109/IWBF.2014.6914262
    BibTeX
    @inproceedings{Debiasi2014,
     author = {Debiasi, Luca and Uhl, Andreas and Sun, Zhenan},
     title = {Generation of Iris Sensor PRNU Fingerprints from Uncorrelated Data},
     booktitle = {Biometrics and Forensics (IWBF), 2014 International Workshop on},
     year = {2014},
     pages = {1--6}}
    
  45. W.N.N. Diane, S. Xingming & F. KueMoise
    A Survey of Partition-based Techniques for Copy-move Forgery Detection
    The Scientific World Journal, 2014
    DOI: 10.1155/2014/975456
    BibTeX
    @article{Diane2014,
     author = {Diane, Wandji Nanda Nathalie and Xingming, Sun and KueMoise, Fah},
     title = {A Survey of Partition-based Techniques for Copy-move Forgery Detection},
     journal = {The Scientific World Journal},
     year = {2014}}
    
  46. H.G. Dietz
    Out-of-focus Point Spread Functions
    Proc. SPIE 9023, Digital Photography X, 90230J (March 7, 2014)
    Proc. SPIE, 2014, Vol. 9023, pp. 90230J-90230J-11
    DOI: 10.1117/12.2040490
    BibTeX
    @inproceedings{Dietz2014,
     author = {Dietz, Henry Gordon},
     title = {Out-of-focus Point Spread Functions},
     booktitle = {Proc. SPIE 9023, Digital Photography X, 90230J (March 7, 2014)},
     journal = {Proc. SPIE},
     year = {2014},
     volume = {9023},
     pages = {90230J-90230J-11}}
    
  47. F. Ding, G. Zhu & Y.Q. Shi
    A Novel Method for Detecting Image Sharpening Based on Local Binary Pattern
    Digital-Forensics and Watermarking, Springer, 2014
    DOI: 10.1007/978-3-662-43886-2_13
    BibTeX
    @article{Ding2014,
     author = {Ding, Feng and Zhu, Guopu and Shi, Yun Qing},
     title = {A Novel Method for Detecting Image Sharpening Based on Local Binary Pattern},
     journal = {Digital-Forensics and Watermarking},
     publisher = {Springer},
     year = {2014}}
    
  48. A.E. Dirik & A. Karakücük
    Forensic Use of Photo Response Non-uniformity of Imaging Sensors and a Counter Method
    Optics Express, 2014, Vol. 22(1), pp. -
    DOI: 10.1364/oe.22.000470
    BibTeX
    @article{Dirik2014,
     author = {Dirik, Ahmet Emir and Karakücük, Ahmet},
     title = {Forensic Use of Photo Response Non-uniformity of Imaging Sensors and a Counter Method},
     journal = {Optics Express},
     year = {2014},
     volume = {22},
     number = {1},
     pages = {-}}
    
  49. A.E. Dirik, H.T. Sencar & N. Memon
    Analysis of Seam-carving-based Anonymization of Images against PRNU Noise Pattern-based Source Attribution
    Information Forensics and Security, IEEE Transactions on, 2014, Vol. 9(12), pp. 2277-2290
    DOI: 10.1109/TIFS.2014.2361200
    BibTeX
    @article{Dirik2014a,
     author = {Dirik, A. E. and Sencar, H. T. and Memon, N.},
     title = {Analysis of Seam-carving-based Anonymization of Images against PRNU Noise Pattern-based Source Attribution},
     journal = {Information Forensics and Security, IEEE Transactions on},
     year = {2014},
     volume = {9},
     number = {12},
     pages = {2277--2290}}
    
  50. M. Doyoddorj & K.-H. Rhee
    Robust Copy-move Forgery Detection Based on Dual-transform
    Digital Forensics and Cyber Crime
    Digital Forensics and Cyber Crime, Springer, 2014
    DOI: 10.1007/978-3-319-14289-0_1
    BibTeX
    @incollection{Doyoddorj2014,
     author = {Doyoddorj, Munkhbaatar and Rhee, Kyung-Hyune},
     title = {Robust Copy-move Forgery Detection Based on Dual-transform},
     booktitle = {Digital Forensics and Cyber Crime},
     journal = {Digital Forensics and Cyber Crime},
     publisher = {Springer},
     year = {2014}}
    
  51. D. Dupplaw, M. Matthews, R. Johansson, G. Boato, A. Costanzo, M. Fontani, E. Minack, E. Demidova, R. Blanco, T. Griffiths, P. Lewis, J. Hare & A. Moschitti
    Information Extraction from Multimedia Web Documents: An Open-source Platform and Testbed
    International Journal of Multimedia Information Retrieval, Springer London, 2014, pp. 1-15
    DOI: 10.1007/s13735-014-0051-2
    BibTeX
    @article{Dupplaw2014,
     author = {Dupplaw, DavidPaul and Matthews, Michael and Johansson, Richard and Boato, Giulia and Costanzo, Andrea and Fontani, Marco and Minack, Enrico and Demidova, Elena and Blanco, Roi and Griffiths, Thomas and Lewis, Paul and Hare, Jonathon and Moschitti, Alessandro},
     title = {Information Extraction from Multimedia Web Documents: An Open-source Platform and Testbed},
     journal = {International Journal of Multimedia Information Retrieval},
     publisher = {Springer London},
     year = {2014},
     pages = {1--15}}
    
  52. E.-S.M. El-Alfy & M.A. Qureshi
    Combining Spatial and DCT Based Markov Features for Enhanced Blind Detection of Image Splicing
    Pattern Analysis and Applications, Springer London, 2014, pp. 1-11
    DOI: 10.1007/s10044-014-0396-4
    BibTeX
    @article{El-Alfy2014,
     author = {El-Alfy, E.-Sayed M. and Qureshi, Muhammad Ali},
     title = {Combining Spatial and DCT Based Markov Features for Enhanced Blind Detection of Image Splicing},
     journal = {Pattern Analysis and Applications},
     publisher = {Springer London},
     year = {2014},
     pages = {1--11}}
    
  53. S. Elkasrawi & F. Shafait
    Printer Identification Using Supervised Learning for Document Forgery Detection
    2014
    DOI: 10.1109/das.2014.48
    BibTeX
    @misc{Elkasrawi2014,
     author = {Elkasrawi, Sara and Shafait, Faisal},
     title = {Printer Identification Using Supervised Learning for Document Forgery Detection},
     year = {2014}}
    
  54. S.M. Fadl & N.A. Semary
    A Proposed Accelerated Image Copy-move Forgery Detection
    Visual Communications and Image Processing Conference, 2014 IEEE
    2014, pp. 253-257
    DOI: 10.1109/VCIP.2014.7051552
    BibTeX
    @inproceedings{Fadl2014a,
     author = {Fadl, S. M. and Semary, N. A.},
     title = {A Proposed Accelerated Image Copy-move Forgery Detection},
     booktitle = {Visual Communications and Image Processing Conference, 2014 IEEE},
     year = {2014},
     pages = {253--257}}
    
  55. S.M. Fadl, N.A. Semary & M.M. Hadhoud
    Copy-rotate-move Forgery Detection Based on Spatial Domain
    Computer Engineering & Systems (ICCES), 2014 9th International Conference on
    2014, pp. 136-141
    DOI: 10.1109/ICCES.2014.7030944
    BibTeX
    @inproceedings{Fadl2014,
     author = {Fadl, S. M. and Semary, N. A. and Hadhoud, M. M.},
     title = {Copy-rotate-move Forgery Detection Based on Spatial Domain},
     booktitle = {Computer Engineering & Systems (ICCES), 2014 9th International Conference on},
     year = {2014},
     pages = {136--141}}
    
  56. S.M. Fadl, N.A. Semary & M.M. Hadhoud
    Fan Search for Image Copy-move Forgery Detection
    Advanced Machine Learning Technologies and Applications
    Springer, 2014
    DOI: 10.1007/978-3-319-13461-1_18
    BibTeX
    @incollection{Fadl2014b,
     author = {Fadl, Sondos M. and Semary, Noura A. and Hadhoud, Mohiy M.},
     title = {Fan Search for Image Copy-move Forgery Detection},
     booktitle = {Advanced Machine Learning Technologies and Applications},
     publisher = {Springer},
     year = {2014}}
    
  57. G. Fahmy
    Nonorthogonal DCT Implementation for JPEG Forensics
    Hybrid Intelligent Systems (HIS), 2014 14th International Conference on
    2014, pp. 7-11
    DOI: 10.1109/HIS.2014.7086195
    BibTeX
    @inproceedings{Fahmy2014,
     author = {Fahmy, G.},
     title = {Nonorthogonal DCT Implementation for JPEG Forensics},
     booktitle = {Hybrid Intelligent Systems (HIS), 2014 14th International Conference on},
     year = {2014},
     pages = {7--11}}
    
  58. G. Fahmy
    Nonorthogonal DCT Block Convergence for JPEG-75 Forensics
    Proc. IEEE Int. Symp. Signal Processing and Information Technology (ISSPIT)
    2014, pp. 000349-000353
    DOI: 10.1109/ISSPIT.2014.7300613
    BibTeX
    @inproceedings{Fahmy2014a,
     author = {Fahmy, G.},
     title = {Nonorthogonal DCT Block Convergence for JPEG-75 Forensics},
     booktitle = {Proc. IEEE Int. Symp. Signal Processing and Information Technology (ISSPIT)},
     year = {2014},
     pages = {000349--000353}}
    
  59. W. Fan, K. Wang, F. Cayre & Z. Xiong
    JPEG Anti-forensics with Improved Tradeoff between Forensic Undetectability and Image Quality
    Information Forensics and Security, IEEE Transactions on, 2014, Vol. 9(8), pp. 1211-1226
    DOI: 10.1109/TIFS.2014.2317949
    BibTeX
    @article{Fan2014,
     author = {Fan, Wei and Wang, Kai and Cayre, F. and Xiong, Zhang},
     title = {JPEG Anti-forensics with Improved Tradeoff between Forensic Undetectability and Image Quality},
     journal = {Information Forensics and Security, IEEE Transactions on},
     year = {2014},
     volume = {9},
     number = {8},
     pages = {1211--1226}}
    
  60. W. Fan, K. Wang, F. Cayre & Z. Xiong
    JPEG Anti-Forensics With Improved Tradeoff Between Forensic Undetectability and Image Quality
    #IEEE_J_IFS#, 2014, Vol. 9(8), pp. 1211-1226
    DOI: 10.1109/TIFS.2014.2317949
    BibTeX
    @article{Fan2014a,
     author = {Fan, W. and Wang, K. and Cayre, F. and Xiong, Z.},
     title = {JPEG Anti-Forensics With Improved Tradeoff Between Forensic Undetectability and Image Quality},
     journal = {#IEEE_J_IFS#},
     year = {2014},
     volume = {9},
     number = {8},
     pages = {1211--1226}}
    
  61. S.A. Fattah, M.M.I. Ullah, M. Ahmed, I. Ahmmed & C. Shahnaz
    A Scheme for Copy-move Forgery Detection in Digital Images Based on 2D-DWT
    Circuits and Systems (MWSCAS), 2014 IEEE 57th International Midwest Symposium on
    2014, pp. 801-804
    DOI: 10.1109/MWSCAS.2014.6908536
    BibTeX
    @inproceedings{Fattah2014,
     author = {Fattah, S. A. and Ullah, M. M. I. and Ahmed, M. and Ahmmed, I. and Shahnaz, C.},
     title = {A Scheme for Copy-move Forgery Detection in Digital Images Based on 2D-DWT},
     booktitle = {Circuits and Systems (MWSCAS), 2014 IEEE 57th International Midwest Symposium on},
     year = {2014},
     pages = {801--804}}
    
  62. A. Ferreira & A. Rocha
    A Multiscale and Multi-perturbation Blind Forensic Technique for Median Detecting
    Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications
    Springer Science mathplus Business Media, 2014, pp. 302-310
    DOI: 10.1007/978-3-319-12568-8_37
    BibTeX
    @incollection{Ferreira2014,
     author = {Ferreira, Anselmo and Rocha, Anderson},
     title = {A Multiscale and Multi-perturbation Blind Forensic Technique for Median Detecting},
     booktitle = {Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications},
     publisher = {Springer Science mathplus Business Media},
     year = {2014},
     pages = {302--310}}
    
  63. M. Fontani
    Digital Forensic Techniques for Splicing Detection in Multimedia Contents
    UNIVERSITÀ DEGLI STUDI DI SIENA Dipartimento di Ingegneria dell'Informazione e Scienze Matematiche, UNIVERSITÀ DEGLI STUDI DI SIENA Dipartimento di Ingegneria dell'Informazione e Scienze Matematiche, 2014
    BibTeX
    @phdthesis{Fontani2014a,
     author = {Fontani, Marco},
     title = {Digital Forensic Techniques for Splicing Detection in Multimedia Contents},
     school = {UNIVERSITÀ DEGLI STUDI DI SIENA Dipartimento di Ingegneria dell'Informazione e Scienze Matematiche},
     year = {2014}}
    
  64. M. Fontani, A. Bonchi, A. Piva & M. Barni
    Countering Anti-forensics by Means of Data Fusion
    Alattar, A. M., Memon, N. D. & Heitzenrater, C. D. (ed.)
    Proc. SPIE 9028, Media Watermarking, Security, and Forensics 2014
    Proc. SPIE, 2014, Vol. 9028, pp. 90280Z-90280Z-15
    DOI: 10.1117/12.2039569
    BibTeX
    @inproceedings{Fontani2014,
     author = {Fontani, Marco and Bonchi, Alessandro and Piva, Alessandro and Barni, Mauro},
     title = {Countering Anti-forensics by Means of Data Fusion},
     booktitle = {Proc. SPIE 9028, Media Watermarking, Security, and Forensics 2014},
     journal = {Proc. SPIE},
     year = {2014},
     volume = {9028},
     pages = {90280Z-90280Z-15}}
    
  65. K. Francis, S. Gholap & P.K. Bora
    Illuminant Colour Based Image Forensics Using Mismatch in Human Skin Highlights
    Communications (NCC), 2014 Twentieth National Conference on
    2014, pp. 1-6
    DOI: 10.1109/NCC.2014.6811349
    BibTeX
    @inproceedings{Francis2014,
     author = {Francis, Kiran and Gholap, Sandeep and Bora, P. K.},
     title = {Illuminant Colour Based Image Forensics Using Mismatch in Human Skin Highlights},
     booktitle = {Communications (NCC), 2014 Twentieth National Conference on},
     year = {2014},
     pages = {1--6}}
    
  66. K. Francis, S. Gholap & P.K. Bora
    Illuminant colour based image forensics using mismatch in human skin highlights
    Proc. Twentieth National Conf. Communications (NCC)
    2014, pp. 1-6
    DOI: 10.1109/NCC.2014.6811349
    BibTeX
    @inproceedings{Francis2014a,
     author = {Francis, K. and Gholap, S. and Bora, P. K.},
     title = {Illuminant colour based image forensics using mismatch in human skin highlights},
     booktitle = {Proc. Twentieth National Conf. Communications (NCC)},
     year = {2014},
     pages = {1--6}}
    
  67. L. Gaborini
    Image Tampering Detection and Localization
    Politecnico di Milano, Politecnico di Milano, 2014
    BibTeX
    @mastersthesis{Gaborini2014,
     author = {Gaborini, Lorenzo},
     title = {Image Tampering Detection and Localization},
     school = {Politecnico di Milano},
     year = {2014}}
    
  68. L. Gaborini, P. Bestagini, S. Milani, M. Tagliasacchi & S. Tubaro
    Multi-clue Image Tampering Localization
    Information Forensics and Security (WIFS), 2014 IEEE International Workshop on
    2014, pp. 125-130
    DOI: 10.1109/WIFS.2014.7084315
    BibTeX
    @inproceedings{Gaborini2014a,
     author = {Gaborini, L. and Bestagini, P. and Milani, S. and Tagliasacchi, M. and Tubaro, S.},
     title = {Multi-clue Image Tampering Localization},
     booktitle = {Information Forensics and Security (WIFS), 2014 IEEE International Workshop on},
     year = {2014},
     pages = {125--130}}
    
  69. F. Galvan, G. Puglisi, A.R. Bruna & S. Battiato
    First Quantization Matrix Estimation from Double Compressed JPEG Images
    Information Forensics and Security, IEEE Transactions on, 2014, Vol. 9(8), pp. 1299-1310
    DOI: 10.1109/TIFS.2014.2330312
    BibTeX
    @article{Galvan2014,
     author = {Galvan, F. and Puglisi, Giovanni and Bruna, A. R. and Battiato, Sebastiano},
     title = {First Quantization Matrix Estimation from Double Compressed JPEG Images},
     journal = {Information Forensics and Security, IEEE Transactions on},
     year = {2014},
     volume = {9},
     number = {8},
     pages = {1299--1310}}
    
  70. Y. Gan & J. Zhong
    Image Copy-move Tamper Blind Detection Algorithm Based on Integrated Feature Vectors
    Journal of Chemical and Pharmaceutical Research, 2014, Vol. 6(6), pp. 1584-1590
    BibTeX
    @article{Gan2014,
     author = {Gan, Yanfen and Zhong, Junli},
     title = {Image Copy-move Tamper Blind Detection Algorithm Based on Integrated Feature Vectors},
     journal = {Journal of Chemical and Pharmaceutical Research},
     year = {2014},
     volume = {6},
     number = {6},
     pages = {1584--1590}}
    
  71. S. Gao, C. Zhang, C.-L. Wu, G. Ye & L. Huang
    A Hybrid Feature Based Method for Distinguishing Computer Graphics and Photographic Image
    Digital-Forensics and Watermarking, Springer, 2014
    DOI: 10.1007/978-3-662-43886-2_22
    BibTeX
    @article{Gao2014,
     author = {Gao, Shang and Zhang, Cong and Wu, Chan-Le and Ye, Gang and Huang, Lei},
     title = {A Hybrid Feature Based Method for Distinguishing Computer Graphics and Photographic Image},
     journal = {Digital-Forensics and Watermarking},
     publisher = {Springer},
     year = {2014}}
    
  72. H. Ge & H. Malik
    Exposing image forgery using inconsistent reflection vanishing point
    Proc. Int Audio, Language and Image Processing (ICALIP) Conf
    2014, pp. 282-286
    DOI: 10.1109/ICALIP.2014.7009801
    BibTeX
    @inproceedings{Ge2014a,
     author = {Ge, H. and Malik, H.},
     title = {Exposing image forgery using inconsistent reflection vanishing point},
     booktitle = {Proc. Int Audio, Language and Image Processing (ICALIP) Conf},
     year = {2014},
     pages = {282--286}}
    
  73. L. Ge
    Image Perspective Invariant Features Algorithm Based on Particle Swarm Optimization
    Journal of Multimedia, 2014, Vol. 9(3)
    BibTeX
    @article{Ge2014,
     author = {Ge, Lu},
     title = {Image Perspective Invariant Features Algorithm Based on Particle Swarm Optimization},
     journal = {Journal of Multimedia},
     year = {2014},
     volume = {9},
     number = {3}}
    
  74. B. Gencturk, V. Nabiyev, G. Ulutas & M. Ulutas
    A Hybrid Image Authentication Method Robust to JPEG Attacks
    Proc. 22nd Signal Processing and Communications Applications Conf. (SIU)
    Institute of Electrical & Electronics Engineers (IEEE), 2014, pp. 1596-1599
    DOI: 10.1109/SIU.2014.6830549
    BibTeX
    @inproceedings{Gencturk2014,
     author = {Gencturk, Beste and Nabiyev, Vasif and Ulutas, Guzin and Ulutas, Mustafa},
     title = {A Hybrid Image Authentication Method Robust to JPEG Attacks},
     booktitle = {Proc. 22nd Signal Processing and Communications Applications Conf. (SIU)},
     publisher = {Institute of Electrical & Electronics Engineers (IEEE)},
     year = {2014},
     pages = {1596--1599}}
    
  75. S.A. Gieske
    Search Optimization through JPEG Quantization Tables
    University of Amsterdam Faculty of Science, University of Amsterdam Faculty of Science, 2014
    BibTeX
    @mastersthesis{Gieske2014,
     author = {Gieske, Shanron A.},
     title = {Search Optimization through JPEG Quantization Tables},
     school = {University of Amsterdam Faculty of Science},
     year = {2014}}
    
  76. A. Gironi, M. Fontani, T. Bianchi, A. Piva & M. Barni
    A Video Forensic Technique for Detecting Frame Deletion and Insertion
    Acoustics, Speech and Signal Processing (ICASSP), 2014 IEEE International Conference on
    2014, pp. 6226-6230
    DOI: 10.1109/ICASSP.2014.6854801
    BibTeX
    @inproceedings{Gironi2014,
     author = {Gironi, A. and Fontani, M. and Bianchi, T. and Piva, A. and Barni, Mauro},
     title = {A Video Forensic Technique for Detecting Frame Deletion and Insertion},
     booktitle = {Acoustics, Speech and Signal Processing (ICASSP), 2014 IEEE International Conference on},
     year = {2014},
     pages = {6226--6230}}
    
  77. F. Gisolf, P. Barens, E. Snel, A. Malgoezar, M. Vos, A. Mieremet & Z. Geradts
    Common Source Identification of Images in Large Databases
    Forensic Science International, Elsevier BV, 2014, Vol. 244, pp. 222-230
    DOI: 10.1016/j.forsciint.2014.08.034
    BibTeX
    @article{Gisolf2014,
     author = {Gisolf, Floris and Barens, Pelle and Snel, Ewald and Malgoezar, Anwar and Vos, Mark and Mieremet, Arjan and Geradts, Zeno},
     title = {Common Source Identification of Images in Large Databases},
     journal = {Forensic Science International},
     publisher = {Elsevier BV},
     year = {2014},
     volume = {244},
     pages = {222--230}}
    
  78. T. Gloe, A. Fischer & M. Kirchner
    Forensic Analysis of Video File Formats
    Digital Investigation, 2014, Vol. 11, Supplement 1(0), pp. 68-76
    DOI: 10.1016/j.diin.2014.03.009
    BibTeX
    @article{Gloe2014,
     author = {Gloe, Thomas and Fischer, André and Kirchner, Matthias},
     title = {Forensic Analysis of Video File Formats},
     journal = {Digital Investigation},
     year = {2014},
     volume = {11, Supplement 1},
     number = {0},
     pages = {68--76}}
    
  79. M. Goljan & J. Fridrich
    Estimation of Lens Distortion Correction from Single Images
    Department of ECE, SUNY Binghamton, NY, USA, Department of ECE, SUNY Binghamton, NY, USA, 2014
    DOI: 10.1117/12.2036804
    BibTeX
    @techreport{Goljan2014,
     author = {Goljan, Miroslav and Fridrich, Jessica},
     title = {Estimation of Lens Distortion Correction from Single Images},
     school = {Department of ECE, SUNY Binghamton, NY, USA},
     year = {2014}}
    
  80. X. Gui, X. Li, W. Qi & B. Yang
    Blind Median Filtering Detection Based on Histogram Features
    Proc. Asia-Pacific Signal and Information Processing Association Annual Summit and Conf. (APSIPA)
    2014, pp. 1-4
    DOI: 10.1109/APSIPA.2014.7041536
    BibTeX
    @inproceedings{Gui2014,
     author = {Gui, X. and Li, X. and Qi, W. and Yang, B.},
     title = {Blind Median Filtering Detection Based on Histogram Features},
     booktitle = {Proc. Asia-Pacific Signal and Information Processing Association Annual Summit and Conf. (APSIPA)},
     year = {2014},
     pages = {1--4}}
    
  81. W. Guicquero, M. Benetti, A. Peizerat, A. Dupret & P. Vandergheynst
    On Compensating Unknown Pixel Behaviors for Image Sensors with Embedded Processing
    Signals, Systems and Computers, 2014 48th Asilomar Conference on
    2014, pp. 933-937
    DOI: 10.1109/ACSSC.2014.7094590
    BibTeX
    @inproceedings{Guicquero2014,
     author = {Guicquero, W. and Benetti, M. and Peizerat, A. and Dupret, A. and Vandergheynst, P.},
     title = {On Compensating Unknown Pixel Behaviors for Image Sensors with Embedded Processing},
     booktitle = {Signals, Systems and Computers, 2014 48th Asilomar Conference on},
     year = {2014},
     pages = {933--937}}
    
  82. M.F. Hashmi, V. Anand & A.G. Keskar
    A Copy-move Image Forgery Detection Based on Speeded up Robust Feature Transform and Wavelet Transforms
    Computer and Communication Technology (ICCCT), 2014 International Conference on
    2014, pp. 147-152
    DOI: 10.1109/ICCCT.2014.7001483
    BibTeX
    @inproceedings{Hashmi2014,
     author = {Hashmi, M. F. and Anand, V. and Keskar, A. G.},
     title = {A Copy-move Image Forgery Detection Based on Speeded up Robust Feature Transform and Wavelet Transforms},
     booktitle = {Computer and Communication Technology (ICCCT), 2014 International Conference on},
     year = {2014},
     pages = {147--152}}
    
  83. M.F. Hashmi, V. Anand & A.G. Keskar
    Copy-move Image Forgery Detection Using an Efficient and Robust Method Combining Un-decimated Wavelet Transform and Scale Invariant Feature Transform
    AASRI Procedia, Elsevier BV, 2014, Vol. 9, pp. 84-91
    DOI: 10.1016/j.aasri.2014.09.015
    BibTeX
    @article{Hashmi2014a,
     author = {Hashmi, Mohammad Farukh and Anand, Vijay and Keskar, Avinas G.},
     title = {Copy-move Image Forgery Detection Using an Efficient and Robust Method Combining Un-decimated Wavelet Transform and Scale Invariant Feature Transform},
     journal = {AASRI Procedia},
     publisher = {Elsevier BV},
     year = {2014},
     volume = {9},
     pages = {84--91}}
    
  84. J.-U. Hou, H.-U. Jang & H.-K. Lee
    Hue Modification Estimation Using Sensor Pattern Noise
    Image Processing (ICIP), 2014 IEEE International Conference on
    2014, pp. 5287-5291
    DOI: 10.1109/ICIP.2014.7026070
    BibTeX
    @inproceedings{Hou2014,
     author = {Hou, Jong-Uk and Jang, Han-Ul and Lee, Heung-Kyu},
     title = {Hue Modification Estimation Using Sensor Pattern Noise},
     booktitle = {Image Processing (ICIP), 2014 IEEE International Conference on},
     year = {2014},
     pages = {5287--5291}}
    
  85. Y. Hu, C.-T. Li & Z. Lai
    Fast Source Camera Identification Using Matching Signs between Query and Reference Fingerprints
    Multimedia Tools and Applications, Springer US, 2014, pp. 1-24
    DOI: 10.1007/s11042-014-1985-3
    BibTeX
    @article{Hu2014,
     author = {Hu, Yongjian and Li, Chang-Tsun and Lai, Zhimao},
     title = {Fast Source Camera Identification Using Matching Signs between Query and Reference Fingerprints},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer US},
     year = {2014},
     pages = {1--24}}
    
  86. D.-Y. Huang, T.-W. Lin, W.-C. Hu & C.-H. Chou
    Boosting Scheme for Detecting Region Duplication Forgery in Digital Images
    Pan, J.-S., Krömer, P. & Snášel, V. (ed.)
    Genetic and Evolutionary Computing
    Springer International Publishing, 2014, Vol. 238, pp. 125-133
    DOI: 10.1007/978-3-319-01796-9_13
    BibTeX
    @incollection{Huang2014,
     author = {Huang, Deng-Yuan and Lin, Ta-Wei and Hu, Wu-Chih and Chou, Chih-Hung},
     title = {Boosting Scheme for Detecting Region Duplication Forgery in Digital Images},
     booktitle = {Genetic and Evolutionary Computing},
     publisher = {Springer International Publishing},
     year = {2014},
     volume = {238},
     pages = {125--133}}
    
  87. M. Hussain, S. Qasem, G. Bebis, G. Muhammad, H. Aboalsamh & H. Mathkour
    Evaluation of Image Forgery Detect Ion Using Multi - Scale Weber Local Descript Ors
    International Journal on Artificial Intelligence Tools, 2014, Vol. XX(X), pp. 1-27
    BibTeX
    @article{Hussain2014a,
     author = {Hussain, Muhammad and Qasem, Sahar and Bebis, George and Muhammad, Ghulam and Aboalsamh, Hatim and Mathkour, Hassan},
     title = {Evaluation of Image Forgery Detect Ion Using Multi - Scale Weber Local Descript Ors},
     journal = {International Journal on Artificial Intelligence Tools},
     year = {2014},
     volume = {XX},
     number = {X},
     pages = {1--27}}
    
  88. M. Hussain, S.Q. Saleh, H. Aboalsamh, G. Muhammad & G. Bebis
    Comparison between Wld and LBP Descriptors for Non-intrusive Image Forgery Detection
    Innovations in Intelligent Systems and Applications (INISTA) Proceedings, 2014 IEEE International Symposium on
    2014, pp. 197-204
    DOI: 10.1109/INISTA.2014.6873618
    BibTeX
    @inproceedings{Hussain2014,
     author = {Hussain, Muhammad and Saleh, Sahar Q. and Aboalsamh, Hatim and Muhammad, Ghulam and Bebis, George},
     title = {Comparison between Wld and LBP Descriptors for Non-intrusive Image Forgery Detection},
     booktitle = {Innovations in Intelligent Systems and Applications (INISTA) Proceedings, 2014 IEEE International Symposium on},
     year = {2014},
     pages = {197--204}}
    
  89. J. Indumathi & S.P. Amala
    State-of-the-art in Block Based Copy Move Forgery Detection
    Proc of the itl. Conf. on Cryptography and Security 2014 (ICCS)
    2014
    BibTeX
    @inproceedings{Indumathi2014,
     author = {Indumathi, J. and Amala, S. P.},
     title = {State-of-the-art in Block Based Copy Move Forgery Detection},
     booktitle = {Proc of the itl. Conf. on Cryptography and Security 2014 (ICCS)},
     year = {2014}}
    
  90. M. Iuliani, S. Rossetto, T. Bianchi, A. De Rosa, A. Piva & M. Barni
    Image Counter-forensics Based on Feature Injection
    Alattar, A. M., Memon, N. D. & Heitzenrater, C. D. (ed.)
    Proc. SPIE 9028, Media Watermarking, Security, and Forensics 2014
    Proc. SPIE, 2014, Vol. 9028, pp. 902810-902810-15
    DOI: 10.1117/12.2042234
    BibTeX
    @inproceedings{Iuliani2014,
     author = {Iuliani, M. and Rossetto, S. and Bianchi, T. and De Rosa, Alessia and Piva, A. and Barni, Mauro},
     title = {Image Counter-forensics Based on Feature Injection},
     booktitle = {Proc. SPIE 9028, Media Watermarking, Security, and Forensics 2014},
     journal = {Proc. SPIE},
     year = {2014},
     volume = {9028},
     pages = {902810-902810-15}}
    
  91. B.G. Jeong & I.K. Eom
    Image manipulation detection using Edge-based segmentation and statistical property of wavelet coefficients
    Proc. Int Electronics, Information and Communications (ICEIC) Conf
    2014, pp. 1-2
    DOI: 10.1109/ELINFOCOM.2014.6914358
    BibTeX
    @inproceedings{Jeong2014,
     author = {Jeong, B. G. and Eom, I. K.},
     title = {Image manipulation detection using Edge-based segmentation and statistical property of wavelet coefficients},
     booktitle = {Proc. Int Electronics, Information and Communications (ICEIC) Conf},
     year = {2014},
     pages = {1--2}}
    
  92. L. Jiao & Z. Du
    Copy-paste Image Forgery Blind Detection Based on Mean Shift
    Journal of Computer Applications, 2014, Vol. 34(3), pp. 806-809
    BibTeX
    @article{Jiao2014,
     author = {Jiao, Lixin and Du, Zhenglong},
     title = {Copy-paste Image Forgery Blind Detection Based on Mean Shift},
     journal = {Journal of Computer Applications},
     year = {2014},
     volume = {34},
     number = {3},
     pages = {806--809}}
    
  93. X. Kang, J. Chen, K. Lin & P. Anjie
    A Context-adaptive Spn Predictor for Trustworthy Source Camera Identification
    EURASIP Journal on Image and Video Processing, 2014, Vol. 2014(1), pp. 19
    DOI: 10.1186/1687-5281-2014-19
    BibTeX
    @article{Kang2014,
     author = {Kang, Xiangui and Chen, Jiansheng and Lin, Kerui and Anjie, Peng},
     title = {A Context-adaptive Spn Predictor for Trustworthy Source Camera Identification},
     journal = {EURASIP Journal on Image and Video Processing},
     year = {2014},
     volume = {2014},
     number = {1},
     pages = {19}}
    
  94. H. Kato, T. Nagao, H. Fujiwara & K. Kondo
    Boundary Detection of Altered Region by Differential Features on Camera Response Function
    International Journal of Signal Processing Systems, 2014, Vol. 2(1), pp. 31-36
    BibTeX
    @article{Kato2014,
     author = {Kato, Hirokazu and Nagao, Toshiyuki and Fujiwara, Hideaki and Kondo, Katsuya},
     title = {Boundary Detection of Altered Region by Differential Features on Camera Response Function},
     journal = {International Journal of Signal Processing Systems},
     year = {2014},
     volume = {2},
     number = {1},
     pages = {31--36}}
    
  95. Y. Ke, W. Min, F. Qin & J. Shang
    Image Forgery Detection Based on Semantics
    International Journal of Hybrid Information Technology, 2014, Vol. 1(7), pp. 109-124
    DOI: 10.14257/ijhit.2014.7.1.09
    BibTeX
    @article{Ke2014,
     author = {Ke, Yongzhen and Min, Weidong and Qin, Fan and Shang, Junjun},
     title = {Image Forgery Detection Based on Semantics},
     journal = {International Journal of Hybrid Information Technology},
     year = {2014},
     volume = {1},
     number = {7},
     pages = {109--124}}
    
  96. Y. Ke, F. Qin, W. Min & G. Zhangws
    Exposing Image Forgery by Detecting Consistency of Shadow
    The Scientific World Journal, 2014, Vol. 2014
    DOI: 10.1155/2014/364501
    BibTeX
    @article{Ke2014a,
     author = {Ke, Yongzhen and Qin, Fan and Min, Weidong and Zhangws, Guiling},
     title = {Exposing Image Forgery by Detecting Consistency of Shadow},
     journal = {The Scientific World Journal},
     year = {2014},
     volume = {2014}}
    
  97. E. Kee, J.F. O'brien & H. Farid
    Exposing Photo Manipulation from Shading and Shadows
    ACM Transactions on Graphics, Association for Computing Machinery (ACM), 2014, Vol. 33(5), pp. 1-21
    DOI: 10.1145/2629646
    BibTeX
    @article{Kee2014,
     author = {Kee, Eric and O'brien, James F. and Farid, Hany},
     title = {Exposing Photo Manipulation from Shading and Shadows},
     journal = {ACM Transactions on Graphics},
     publisher = {Association for Computing Machinery (ACM)},
     year = {2014},
     volume = {33},
     number = {5},
     pages = {1--21}}
    
  98. S. Ketenci & G. Uluta&x015F
    Replication Regions Detection in Images Based on Frequency Analysis of Blocks
    Proc. 22nd Signal Processing and Communications Applications Conf. (SIU)
    2014, pp. 461-464
    DOI: 10.1109/SIU.2014.6830265
    BibTeX
    @inproceedings{Ketenci2014a,
     author = {Ketenci, S. and Uluta&x015F, G.},
     title = {Replication Regions Detection in Images Based on Frequency Analysis of Blocks},
     booktitle = {Proc. 22nd Signal Processing and Communications Applications Conf. (SIU)},
     year = {2014},
     pages = {461--464}}
    
  99. S. Ketenci & G. Ulutas
    Replication Regions Detection in Images Based on Frequency Analysis of Blocks
    Signal Processing and Communications Applications Conference (SIU), 2014 22nd
    2014, pp. 461-464
    DOI: 10.1109/SIU.2014.6830265
    BibTeX
    @inproceedings{Ketenci2014b,
     author = {Ketenci, S. and Ulutas, G.},
     title = {Replication Regions Detection in Images Based on Frequency Analysis of Blocks},
     booktitle = {Signal Processing and Communications Applications Conference (SIU), 2014 22nd},
     year = {2014},
     pages = {461--464}}
    
  100. S. Ketenci & G. Ulutaş
    Replication Regions Detection in Images Based on Frequency Analysis of Blocks
    Proc. 22nd Signal Processing and Communications Applications Conf. (SIU)
    2014, pp. 461-464
    DOI: 10.1109/SIU.2014.6830265
    BibTeX
    @inproceedings{Ketenci2014d,
     author = {Ketenci, S. and Ulutaş, G.},
     title = {Replication Regions Detection in Images Based on Frequency Analysis of Blocks},
     booktitle = {Proc. 22nd Signal Processing and Communications Applications Conf. (SIU)},
     year = {2014},
     pages = {461--464}}
    
  101. S. Ketenci, G. Ulutas & M. Ulutas
    Detection of Duplicated Regions in Images Using 1D-Fourier Transform
    Systems, Signals and Image Processing (IWSSIP), 2014 International Conference on
    2014, pp. 171-174
    BibTeX
    @inproceedings{Ketenci2014,
     author = {Ketenci, S. and Ulutas, G. and Ulutas, M.},
     title = {Detection of Duplicated Regions in Images Using 1D-Fourier Transform},
     booktitle = {Systems, Signals and Image Processing (IWSSIP), 2014 International Conference on},
     year = {2014},
     pages = {171--174}}
    
  102. S.M. Khamankar & M.S. Madankar
    Exposing Digital Image Forgeries from near Duplicate Images
    Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on
    2014, pp. 924-928
    DOI: 10.1109/CSNT.2014.190
    BibTeX
    @inproceedings{Khamankar2014,
     author = {Khamankar, S. M. and Madankar, M. S.},
     title = {Exposing Digital Image Forgeries from near Duplicate Images},
     booktitle = {Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on},
     year = {2014},
     pages = {924--928}}
    
  103. A. Kharboutly, W. Puech, G. Subsol & D. Hoa
    CT-scanner Identification Based on Sensor Noise Analysis
    Visual Information Processing (EUVIP), 2014 5th European Workshop on
    2014, pp. 1-5
    DOI: 10.1109/EUVIP.2014.7018385
    BibTeX
    @inproceedings{Kharboutly2014,
     author = {Kharboutly, A. and Puech, W. and Subsol, G. and Hoa, D.},
     title = {CT-scanner Identification Based on Sensor Noise Analysis},
     booktitle = {Visual Information Processing (EUVIP), 2014 5th European Workshop on},
     year = {2014},
     pages = {1--5}}
    
  104. D.-G. Kim & H.-K. Lee
    Color Laser Printer Identification Using Photographed Halftone Images
    Proceedings of the 17th European Signal Processing Conference (EUSIPCO 2014)
    2014
    BibTeX
    @inproceedings{Kim2014,
     author = {Kim, Do-Guk and Lee, Heung-Kyu},
     title = {Color Laser Printer Identification Using Photographed Halftone Images},
     booktitle = {Proceedings of the 17th European Signal Processing Conference (EUSIPCO 2014)},
     year = {2014}}
    
  105. G.-B. Lee, Y.-c. Shin, J.-h. Park & M.-j. Lee
    Low-complexity Camera Tamper Detection Based on Edge Information
    Consumer Electronics - Taiwan (ICCE-TW), 2014 IEEE International Conference on
    2014, pp. 155-156
    DOI: 10.1109/ICCE-TW.2014.6904034
    BibTeX
    @inproceedings{Lee2014,
     author = {Lee, Gil-Beom and Shin, Youn-chul and Park, Joo-heon and Lee, Myeong-jin},
     title = {Low-complexity Camera Tamper Detection Based on Edge Information},
     booktitle = {Consumer Electronics - Taiwan (ICCE-TW), 2014 IEEE International Conference on},
     year = {2014},
     pages = {155--156}}
    
  106. H. Lee & C. Kim
    Blurred image region detection and segmentation
    Proc. IEEE Int. Conf. Image Processing (ICIP)
    2014, pp. 4427-4431
    DOI: 10.1109/ICIP.2014.7025898
    BibTeX
    @inproceedings{Lee2014a,
     author = {Lee, H. and Kim, C.},
     title = {Blurred image region detection and segmentation},
     booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)},
     year = {2014},
     pages = {4427--4431}}
    
  107. B. Li, T.-T. Ng, X. Li, S. Tan & J. Huang
    JPEG Noises beyond the First Compression Cycle
    arXiv:1405.7571, 2014
    BibTeX
    @article{Li2014f,
     author = {Li, Bin and Ng, Tian-Tsong and Li, Xiaolong and Tan, Shunquan and Huang, Jiwu},
     title = {JPEG Noises beyond the First Compression Cycle},
     journal = {arXiv:1405.7571},
     year = {2014}}
    
  108. F. Li & T. Huang
    Video Copy-move Forgery Detection and Localization Based on Structural Similarity
    Farag, A. A., Yang, J. & Jiao, F. (ed.)
    Proceedings of the 3rd International Conference on Multimedia Technology (ICMT 2013)
    Springer Berlin Heidelberg, 2014, Vol. 278, pp. 63-76
    DOI: 10.1007/978-3-642-41407-7_7
    BibTeX
    @incollection{Li2014,
     author = {Li, Fugui and Huang, Tianqiang},
     title = {Video Copy-move Forgery Detection and Localization Based on Structural Similarity},
     booktitle = {Proceedings of the 3rd International Conference on Multimedia Technology (ICMT 2013)},
     publisher = {Springer Berlin Heidelberg},
     year = {2014},
     volume = {278},
     pages = {63--76}}
    
  109. H. Li, W. Luo & J. Huang
    Anti-forensics of Double JPEG Compression with the Same Quantization Matrix
    Multimedia Tools and Applications, Springer US, 2014, pp. 1-16
    DOI: 10.1007/s11042-014-1927-0
    BibTeX
    @article{Li2014c,
     author = {Li, Haodong and Luo, Weiqi and Huang, Jiwu},
     title = {Anti-forensics of Double JPEG Compression with the Same Quantization Matrix},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer US},
     year = {2014},
     pages = {1--16}}
    
  110. K. Li, H. Li, B. Yang, Q. Meng & S. Luo
    Detection of Image Forgery Based on Improved PCA-SIFT
    Wong, W. E. & Zhu, T. (ed.)
    Computer Engineering and Networking
    Springer International Publishing, 2014, Vol. 277, pp. 679-686
    DOI: 10.1007/978-3-319-01766-2_78
    BibTeX
    @incollection{Li2014a,
     author = {Li, Kunlun and Li, Hexin and Yang, Bo and Meng, Qi and Luo, Shangzong},
     title = {Detection of Image Forgery Based on Improved PCA-SIFT},
     booktitle = {Computer Engineering and Networking},
     publisher = {Springer International Publishing},
     year = {2014},
     volume = {277},
     pages = {679--686}}
    
  111. L. Li, S. Li, H. Zhu & X. Wu
    Detecting Copy-move Forgery under Affine Transforms for Image Forensics
    Computers & Electrical Engineering, Elsevier BV, 2014, Vol. 40(6), pp. 1951-1962
    DOI: 10.1016/j.compeleceng.2013.11.034
    BibTeX
    @article{Li2014h,
     author = {Li, Leida and Li, Shushang and Zhu, Hancheng and Wu, Xiaoyue},
     title = {Detecting Copy-move Forgery under Affine Transforms for Image Forensics},
     journal = {Computers & Electrical Engineering},
     publisher = {Elsevier BV},
     year = {2014},
     volume = {40},
     number = {6},
     pages = {1951--1962}}
    
  112. R. Li, Y. Guan & C.-T. Li
    PCA-based Denoising of Sensor Pattern Noise for Source Camera Identification
    Signal and Information Processing (ChinaSIP), 2014 IEEE China Summit & International Conference on
    2014, pp. 436-440
    DOI: 10.1109/ChinaSIP.2014.6889280
    BibTeX
    @inproceedings{Li2014d,
     author = {Li, Ruizhe and Guan, Yu and Li, Chang-Tsun},
     title = {PCA-based Denoising of Sensor Pattern Noise for Source Camera Identification},
     booktitle = {Signal and Information Processing (ChinaSIP), 2014 IEEE China Summit & International Conference on},
     year = {2014},
     pages = {436--440}}
    
  113. R. Li, C.-T. Li & Y. Guan
    A Reference Estimator Based on Composite Sensor Pattern Noise for Source Device Identification
    Alattar, A. M., Memon, N. D. & Heitzenrater, C. D. (ed.)
    Proc. SPIE 9028, Media Watermarking, Security, and Forensics 2014
    Proc. SPIE, 2014, Vol. 9028, pp. 90280O-90280O-7
    DOI: 10.1117/12.2038651
    BibTeX
    @inproceedings{Li2014b,
     author = {Li, Ruizhe and Li, Chang-Tsun and Guan, Yu},
     title = {A Reference Estimator Based on Composite Sensor Pattern Noise for Source Device Identification},
     booktitle = {Proc. SPIE 9028, Media Watermarking, Security, and Forensics 2014},
     journal = {Proc. SPIE},
     year = {2014},
     volume = {9028},
     pages = {90280O-90280O-7}}
    
  114. Y. Li, Y.-j. Zhou, K.-g. Yuan, Y.-c. Guo & X.-x. Niu
    Exposing Photo Manipulation with Inconsistent Perspective Geometry
    The Journal of China Universities of Posts and Telecommunications, 2014, Vol. 21(4), pp. 83-104
    DOI: 10.1016/S1005-8885(14)60320-4
    BibTeX
    @article{Li2014e,
     author = {Li, Yan and Zhou, Ya-jian and Yuan, Kai-guo and Guo, Yu-cui and Niu, Xin-xin},
     title = {Exposing Photo Manipulation with Inconsistent Perspective Geometry},
     journal = {The Journal of China Universities of Posts and Telecommunications},
     year = {2014},
     volume = {21},
     number = {4},
     pages = {83--104}}
    
  115. Z. Li, Z. Zhang & Y. Shi
    Distinguishing Computer Graphics from Photographic Images Using a Multiresolution Approach Based on Local Binary Patterns
    Security and Communication Networks, 2014
    DOI: 10.1002/sec.929
    BibTeX
    @article{Li2014g,
     author = {Li, Zhaohong and Zhang, Zhenzhen and Shi, Yunqing},
     title = {Distinguishing Computer Graphics from Photographic Images Using a Multiresolution Approach Based on Local Binary Patterns},
     journal = {Security and Communication Networks},
     year = {2014}}
    
  116. B. Liu & C.M. Pun
    HSV Based Image Forgery Detection for Copy-move Attack
    Material Science and Engeneering, 2014, Vol. 556-562, pp. 2825-2828
    DOI: 10.4028/www.scientific.net/AMM.556-562.2825
    BibTeX
    @article{Liu2014a,
     author = {Liu, Bo and Pun, Chi Man},
     title = {HSV Based Image Forgery Detection for Copy-move Attack},
     journal = {Material Science and Engeneering},
     year = {2014},
     volume = {556-562},
     pages = {2825--2828}}
    
  117. B. Liu, C.-M. Pun & X.-C. Yuan
    Digital Image Forgery Detection Using JPEG Features and Local Noise Discrepancies
    The Scientific World Journal, 2014
    BibTeX
    @article{Liu2014,
     author = {Liu, Bo and Pun, C.-M. and Yuan, Xiao-Chen},
     title = {Digital Image Forgery Detection Using JPEG Features and Local Noise Discrepancies},
     journal = {The Scientific World Journal},
     year = {2014}}
    
  118. F. Liu, H. Wang, L.-M. Cheng, A.T.S. Ho & S. Li
    Enhanced Perceptual Image Authentication with Tamper Localization and Self-restoration
    Multimedia and Expo (ICME), 2014 IEEE International Conference on
    2014, pp. 1-6
    DOI: 10.1109/ICME.2014.6890128
    BibTeX
    @inproceedings{Liu2014c,
     author = {Liu, Fang and Wang, Hui and Cheng, Lee-Ming and Ho, Anthony T. S. and Li, Shujun},
     title = {Enhanced Perceptual Image Authentication with Tamper Localization and Self-restoration},
     booktitle = {Multimedia and Expo (ICME), 2014 IEEE International Conference on},
     year = {2014},
     pages = {1--6}}
    
  119. J. Liu & X. Kang
    Anti-forensics of Video Frame Deletion
    paper.edu.cn, 2014
    BibTeX
    @electronic{Liu2014b,
     author = {Liu, Jingxian and Kang, Xiangui},
     title = {Anti-forensics of Video Frame Deletion},
     journal = {paper.edu.cn},
     year = {2014}}
    
  120. L. Liu, R. Ni, Y. Zhao & S. Li
    Improved SIFT-based Copy-move Detection Using Bfsn Clustering and CFA Features
    Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2014 Tenth International Conference on
    2014, pp. 626-629
    DOI: 10.1109/IIH-MSP.2014.162
    BibTeX
    @inproceedings{Liu2014d,
     author = {Liu, Lu and Ni, Rongrong and Zhao, Yao and Li, Siran},
     title = {Improved SIFT-based Copy-move Detection Using Bfsn Clustering and CFA Features},
     booktitle = {Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2014 Tenth International Conference on},
     year = {2014},
     pages = {626--629}}
    
  121. Y. Liu, Y. Zhao & R. Ni
    Forensics of Image Blurring and Sharpening History Based on NSCT Domain
    Proc. Asia-Pacific Signal and Information Processing Association Annual Summit and Conf. (APSIPA)
    2014, pp. 1-4
    DOI: 10.1109/APSIPA.2014.7041728
    BibTeX
    @inproceedings{Liu2014e,
     author = {Liu, Y. and Zhao, Y. and Ni, R.},
     title = {Forensics of Image Blurring and Sharpening History Based on NSCT Domain},
     booktitle = {Proc. Asia-Pacific Signal and Information Processing Association Annual Summit and Conf. (APSIPA)},
     year = {2014},
     pages = {1--4}}
    
  122. Y. Liu, Y. Zhao & R. Ni
    Forensics of image blurring and sharpening history based on NSCT domain
    Proc. Asia-Pacific Signal and Information Processing Association Annual Summit and Conf. (APSIPA)
    2014, pp. 1-4
    DOI: 10.1109/APSIPA.2014.7041728
    BibTeX
    @inproceedings{Liu2014f,
     author = {Liu, Y. and Zhao, Y. and Ni, R.},
     title = {Forensics of image blurring and sharpening history based on NSCT domain},
     booktitle = {Proc. Asia-Pacific Signal and Information Processing Association Annual Summit and Conf. (APSIPA)},
     year = {2014},
     pages = {1--4}}
    
  123. D. Luo, R. Yang & J. Huang
    Detecting double compressed AMR audio using deep learning
    Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics
    2014, pp. 2669-2673
    DOI: 10.1109/ICASSP.2014.6854084
    BibTeX
    @inproceedings{Luo2014,
     author = {Luo, D. and Yang, R. and Huang, J.},
     title = {Detecting double compressed AMR audio using deep learning},
     booktitle = {Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics},
     year = {2014},
     pages = {2669--2673}}
    
  124. P. Makkena, A. Rajagopalan & G. Seetharaman
    Harnessing Motion Blur to Unveil Splicing
    Information Forensics and Security, IEEE Transactions on, 2014, Vol. PP(99), pp. 1-1
    DOI: 10.1109/TIFS.2014.2302895
    BibTeX
    @article{Makkena2014,
     author = {Makkena, P. and Rajagopalan, A. and Seetharaman, G.},
     title = {Harnessing Motion Blur to Unveil Splicing},
     journal = {Information Forensics and Security, IEEE Transactions on},
     year = {2014},
     volume = {PP},
     number = {99},
     pages = {1--1}}
    
  125. P. Malviya & R. Naskar
    Digital Forensic Technique for Double Compression Based JPEG Image Forgery Detection
    Information Systems Security
    Springer, 2014
    DOI: 10.1007/978-3-319-13841-1_25
    BibTeX
    @incollection{Malviya2014,
     author = {Malviya, Pankaj and Naskar, Ruchira},
     title = {Digital Forensic Technique for Double Compression Based JPEG Image Forgery Detection},
     booktitle = {Information Systems Security},
     publisher = {Springer},
     year = {2014}}
    
  126. F. Marra, F. Roli, D. Cozzolino, C. Sansone & L. Verdoliva
    Attacking the Triangle Test in Sensor-based Camera Identification
    Image Processing (ICIP), 2014 IEEE International Conference on
    2014, pp. 5307-5311
    DOI: 10.1109/ICIP.2014.7026074
    BibTeX
    @inproceedings{Marra2014,
     author = {Marra, F. and Roli, F. and Cozzolino, D. and Sansone, C. and Verdoliva, L.},
     title = {Attacking the Triangle Test in Sensor-based Camera Identification},
     booktitle = {Image Processing (ICIP), 2014 IEEE International Conference on},
     year = {2014},
     pages = {5307--5311}}
    
  127. F. Marturana
    Device Classification in Digital Forensics Triage
    Universita Degli Studi Di Roma Tor Vergata Dipartimento Di Ingegneria Civile E Ingegneria Informatica, Universita Degli Studi Di Roma Tor Vergata Dipartimento Di Ingegneria Civile E Ingegneria Informatica, 2014
    BibTeX
    @phdthesis{Marturana2014,
     author = {Marturana, Fabio},
     title = {Device Classification in Digital Forensics Triage},
     school = {Universita Degli Studi Di Roma Tor Vergata Dipartimento Di Ingegneria Civile E Ingegneria Informatica},
     year = {2014}}
    
  128. A. Melloni, P. Bestagini, S. Milani, M. Tagliasacchi, A. Rocha & S. Tubaro
    Image Phylogeny through Dissimilarity Metrics Fusion
    Proc. 5th European Workshop Visual Information Processing (EUVIP)
    2014, pp. 1-6
    DOI: 10.1109/EUVIP.2014.7018370
    BibTeX
    @inproceedings{Melloni2014,
     author = {Melloni, A. and Bestagini, P. and Milani, S. and Tagliasacchi, M. and Rocha, A. and Tubaro, S.},
     title = {Image Phylogeny through Dissimilarity Metrics Fusion},
     booktitle = {Proc. 5th European Workshop Visual Information Processing (EUVIP)},
     year = {2014},
     pages = {1--6}}
    
  129. S. Milani, P. Bestagini, M. Tagliasacchi & S. Tubaro
    Demosaicing Strategy Identification Via Eigenalgorithms
    2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
    2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Institute of Electrical and Electronics Engineers (IEEE), 2014
    DOI: 10.1109/icassp.2014.6854082
    BibTeX
    @inproceedings{Milani2014,
     author = {Milani, Simone and Bestagini, Paolo and Tagliasacchi, Marco and Tubaro, Stefano},
     title = {Demosaicing Strategy Identification Via Eigenalgorithms},
     booktitle = {2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)},
     journal = {2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)},
     publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
     year = {2014}}
    
  130. S. Milani, P. Bestagini, M. Tagliasacchi & S. Tubaro
    Antiforensic synthesis of motion vectors using template algorithms
    Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics
    2014, pp. 2709-2713
    DOI: 10.1109/ICASSP.2014.6854092
    BibTeX
    @inproceedings{Milani2014c,
     author = {Milani, S. and Bestagini, P. and Tagliasacchi, M. and Tubaro, S.},
     title = {Antiforensic synthesis of motion vectors using template algorithms},
     booktitle = {Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics},
     year = {2014},
     pages = {2709--2713}}
    
  131. S. Milani, P. Bestagini, M. Tagliasacchi & S. Tubaro
    Demosaicing strategy identification via eigenalgorithms
    Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics
    2014, pp. 2659-2663
    DOI: 10.1109/ICASSP.2014.6854082
    BibTeX
    @inproceedings{Milani2014d,
     author = {Milani, S. and Bestagini, P. and Tagliasacchi, M. and Tubaro, S.},
     title = {Demosaicing strategy identification via eigenalgorithms},
     booktitle = {Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics},
     year = {2014},
     pages = {2659--2663}}
    
  132. S. Milani, L. Cuccovillo, M. Tagliasacchi, S. Tubaro & P. Aichroth
    Video Camera Identification Using Audio-visual Features
    Visual Information Processing (EUVIP), 2014 5th European Workshop on
    2014, pp. 1-6
    DOI: 10.1109/EUVIP.2014.7018382
    BibTeX
    @inproceedings{Milani2014a,
     author = {Milani, S. and Cuccovillo, L. and Tagliasacchi, M. and Tubaro, S. and Aichroth, P.},
     title = {Video Camera Identification Using Audio-visual Features},
     booktitle = {Visual Information Processing (EUVIP), 2014 5th European Workshop on},
     year = {2014},
     pages = {1--6}}
    
  133. S. Milani, M. Tagliasacchi & S. Tubaro
    Discriminating Multiple JPEG Compressions Using First Digit Features
    APSIPA Transactions on Signal and Information Processing, 2014, Vol. 3
    DOI: 10.1017/atsip.2014.19
    BibTeX
    @article{Milani2014b,
     author = {Milani, S. and Tagliasacchi, M. and Tubaro, S.},
     title = {Discriminating Multiple JPEG Compressions Using First Digit Features},
     journal = {APSIPA Transactions on Signal and Information Processing},
     year = {2014},
     volume = {3}}
    
  134. A.V. Mire, S.B. Dhok, P.D. Porey & N.J. Mistry
    Digital Forensic of JPEG Images
    Signal and Image Processing (ICSIP), 2014 Fifth International Conference on
    2014, pp. 131-136
    DOI: 10.1109/ICSIP.2014.26
    BibTeX
    @inproceedings{Mire2014,
     author = {Mire, A. V. and Dhok, S. B. and Porey, P. D. and Mistry, N. J.},
     title = {Digital Forensic of JPEG Images},
     booktitle = {Signal and Image Processing (ICSIP), 2014 Fifth International Conference on},
     year = {2014},
     pages = {131--136}}
    
  135. M. Mishra & M.C. Adhikary
    Detection of Clones in Digital Images
    International Journal of Computer Science and Business Informatics, 2014, Vol. 9(1)
    BibTeX
    @article{Mishra2014,
     author = {Mishra, Minati and Adhikary, M. C.},
     title = {Detection of Clones in Digital Images},
     journal = {International Journal of Computer Science and Business Informatics},
     year = {2014},
     volume = {9},
     number = {1}}
    
  136. Z. Moghaddasi, H.A. Jalab & R.M. Noor
    SVD-based Image Splicing Detection
    Information Technology and Multimedia (ICIMU), 2014 International Conference on
    2014, pp. 27-30
    DOI: 10.1109/ICIMU.2014.7066598
    BibTeX
    @inproceedings{Moghaddasi2014,
     author = {Moghaddasi, Zahra and Jalab, Hamid A. and Noor, Rafidah Md},
     title = {SVD-based Image Splicing Detection},
     booktitle = {Information Technology and Multimedia (ICIMU), 2014 International Conference on},
     year = {2014},
     pages = {27--30}}
    
  137. C. Moun & C. Netramai
    Localization and Building Identification in Outdoor Environment for Smartphone Using Integrated GPS and Camera
    Proc. Fourth Int Digital Information and Communication Technology and it's Applications (DICTAP) Conf
    2014, pp. 327-332
    DOI: 10.1109/DICTAP.2014.6821705
    BibTeX
    @inproceedings{Moun2014,
     author = {Moun, C. and Netramai, C.},
     title = {Localization and Building Identification in Outdoor Environment for Smartphone Using Integrated GPS and Camera},
     booktitle = {Proc. Fourth Int Digital Information and Communication Technology and it's Applications (DICTAP) Conf},
     year = {2014},
     pages = {327--332}}
    
  138. S. Mushtaq & A.H. Mir
    Forgery Detection Using Statistical Features
    Computational Intelligence on Power, Energy and Controls with their impact on Humanity (CIPECH), 2014 Innovative Applications of
    2014, pp. 92-97
    DOI: 10.1109/CIPECH.2014.7019062
    BibTeX
    @inproceedings{Mushtaq2014,
     author = {Mushtaq, S. and Mir, A. H.},
     title = {Forgery Detection Using Statistical Features},
     booktitle = {Computational Intelligence on Power, Energy and Controls with their impact on Humanity (CIPECH), 2014 Innovative Applications of},
     year = {2014},
     pages = {92--97}}
    
  139. S. Mushtaq & A.H. Mir
    Novel Method for Image Splicing Detection
    Advances in Computing, Communications and Informatics (ICACCI, 2014 International Conference on
    2014, pp. 2398-2403
    DOI: 10.1109/ICACCI.2014.6968386
    BibTeX
    @inproceedings{Mushtaq2014a,
     author = {Mushtaq, S. and Mir, A. H.},
     title = {Novel Method for Image Splicing Detection},
     booktitle = {Advances in Computing, Communications and Informatics (ICACCI, 2014 International Conference on},
     year = {2014},
     pages = {2398--2403}}
    
  140. H.U. Neenu & J. Cheriyan
    Image Forgery Detection Based on Illumination Inconsistencies & Intrinsic Resampling Properties
    Emerging Research Areas: Magnetics, Machines and Drives (AICERA/iCMMD), 2014 Annual International Conference on
    2014, pp. 1-6
    DOI: 10.1109/AICERA.2014.6908192
    BibTeX
    @inproceedings{Neenu2014,
     author = {Neenu, H. U. and Cheriyan, J.},
     title = {Image Forgery Detection Based on Illumination Inconsistencies & Intrinsic Resampling Properties},
     booktitle = {Emerging Research Areas: Magnetics, Machines and Drives (AICERA/iCMMD), 2014 Annual International Conference on},
     year = {2014},
     pages = {1--6}}
    
  141. A. Ng, L. Pan & Y. Xiang
    A Novel Method for Detecting Double Compressed Facebook JPEG Images
    Batten, L., Li, G., Niu, W. & Warren, M. (ed.)
    Applications and Techniques in Information Security
    Springer Science mathplus Business Media, 2014, Vol. 490, pp. 191-198
    DOI: 10.1007/978-3-662-45670-5_18
    BibTeX
    @incollection{Ng2014,
     author = {Ng, Allan and Pan, Lei and Xiang, Yang},
     title = {A Novel Method for Detecting Double Compressed Facebook JPEG Images},
     booktitle = {Applications and Techniques in Information Security},
     publisher = {Springer Science mathplus Business Media},
     year = {2014},
     volume = {490},
     pages = {191--198}}
    
  142. C. Nothelle
    Vorsicht Falle! Scripted Reality, Retouchierte Fotos, Pseudonyme -- Täuschung Als Medienethische Herausforderung
    Communicatio Socialis, 2014, Vol. 46(3-4)
    BibTeX
    @article{Nothelle2014,
     author = {Nothelle, Claudia},
     title = {Vorsicht Falle! Scripted Reality, Retouchierte Fotos, Pseudonyme -- Täuschung Als Medienethische Herausforderung},
     journal = {Communicatio Socialis},
     year = {2014},
     volume = {46},
     number = {3--4}}
    
  143. F. de O. Costa, M.A. Oikawa, Z. Dias, S. Goldenstein & A.R. de Rocha
    Image Phylogeny Forests Reconstruction
    IEEE Transactions on Information Forensics and Security, 2014, Vol. 9(10), pp. 1533-1546
    DOI: 10.1109/TIFS.2014.2340017
    BibTeX
    @article{O.Costa2014,
     author = {de O. Costa, F. and Oikawa, M. A. and Dias, Z. and Goldenstein, S. and de Rocha, A. R.},
     title = {Image Phylogeny Forests Reconstruction},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2014},
     volume = {9},
     number = {10},
     pages = {1533--1546}}
    
  144. S. Orozco, AnaLucila, A. González, DavidManuel, G. Villalba, L. Javier & J. Hernández-Castro
    Analysis of Errors in EXIF Metadata on Mobile Devices
    Multimedia Tools and Applications, Springer US, 2014, pp. 1-29
    DOI: 10.1007/s11042-013-1837-6
    BibTeX
    @article{Orozco2014,
     author = {Orozco, Sandoval and AnaLucila and González, Arenas and DavidManuel and Villalba, García and Javier, Luis and Hernández-Castro, Julio},
     title = {Analysis of Errors in EXIF Metadata on Mobile Devices},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer US},
     year = {2014},
     pages = {1--29}}
    
  145. D. Pande
    Towards Detection of Image Tampering Over Diverse Information Security Schemata: A State of the art
    International Journal of Information and Network Security (IJINS), 2014, Vol. 3(1)
    BibTeX
    @article{Pande2014,
     author = {Pande, Deepali},
     title = {Towards Detection of Image Tampering Over Diverse Information Security Schemata: A State of the art},
     journal = {International Journal of Information and Network Security (IJINS)},
     year = {2014},
     volume = {3},
     number = {1}}
    
  146. R.C. Pandey, S.K. Singh & K.K. Shukla
    Passive Copy-move Forgery Detection in Videos
    Computer and Communication Technology (ICCCT), 2014 International Conference on
    2014, pp. 301-306
    DOI: 10.1109/ICCCT.2014.7001509
    BibTeX
    @inproceedings{Pandey2014a,
     author = {Pandey, R. C. and Singh, S. K. and Shukla, K. K.},
     title = {Passive Copy-move Forgery Detection in Videos},
     booktitle = {Computer and Communication Technology (ICCCT), 2014 International Conference on},
     year = {2014},
     pages = {301--306}}
    
  147. R.C. Pandey, S.K. Singh, K.K. Shukla & R. Agrawal
    Fast and Robust Passive Copy-move Forgery Detection Using SURF and SIFT Image Features
    Industrial and Information Systems (ICIIS), 2014 9th International Conference on
    2014, pp. 1-6
    DOI: 10.1109/ICIINFS.2014.7036519
    BibTeX
    @inproceedings{Pandey2014,
     author = {Pandey, Ramesh Chand and Singh, Sanjay Kumar and Shukla, K. K. and Agrawal, Rishabh},
     title = {Fast and Robust Passive Copy-move Forgery Detection Using SURF and SIFT Image Features},
     booktitle = {Industrial and Information Systems (ICIIS), 2014 9th International Conference on},
     year = {2014},
     pages = {1--6}}
    
  148. C. Pasquini, G. Boato & F. Perez-Gonzalez
    Multiple JPEG compression detection by means of Benford-Fourier coefficients
    Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)
    2014, pp. 113-118
    DOI: 10.1109/WIFS.2014.7084313
    BibTeX
    @inproceedings{Pasquini2014b,
     author = {Pasquini, C. and Boato, G. and Perez-Gonzalez, F.},
     title = {Multiple JPEG compression detection by means of Benford-Fourier coefficients},
     booktitle = {Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)},
     year = {2014},
     pages = {113--118}}
    
  149. C. Pasquini, P. Comesaña-Alfaro, F. Pérez-González & G. Boato
    Transportation-theoretic image counterforensics to First Significant Digit histogram forensics
    Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics
    2014, pp. 2699-2703
    DOI: 10.1109/ICASSP.2014.6854090
    BibTeX
    @inproceedings{Pasquini2014a,
     author = {Pasquini, C. and Comesaña-Alfaro, P. and Pérez-González, F. and Boato, G.},
     title = {Transportation-theoretic image counterforensics to First Significant Digit histogram forensics},
     booktitle = {Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics},
     year = {2014},
     pages = {2699--2703}}
    
  150. C. Pasquini, P. Comesaña-Alfaro, F. Pérez-González & G. Boato
    Transportation-theoretic image counterforensics to First Significant Digit histogram forensics
    Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics
    2014, pp. 2699-2703
    DOI: 10.1109/ICASSP.2014.6854090
    BibTeX
    @inproceedings{Pasquini2014c,
     author = {Pasquini, C. and Comesaña-Alfaro, P. and Pérez-González, F. and Boato, G.},
     title = {Transportation-theoretic image counterforensics to First Significant Digit histogram forensics},
     booktitle = {Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics},
     year = {2014},
     pages = {2699--2703}}
    
  151. C. Pasquini, F. Pérez-González & G. Boato
    A Benford-Fourier JPEG compression detector
    Proc. IEEE Int. Conf. Image Processing (ICIP)
    2014, pp. 5322-5326
    DOI: 10.1109/ICIP.2014.7026077
    BibTeX
    @inproceedings{Pasquini2014,
     author = {Pasquini, C. and Pérez-González, F. and Boato, G.},
     title = {A Benford-Fourier JPEG compression detector},
     booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)},
     year = {2014},
     pages = {5322--5326}}
    
  152. A. Peng & X. Kang
    A Robust Median Filtering Detector Based on Filter Residual
    paper.edu.cn, 2014
    BibTeX
    @electronic{Peng2014a,
     author = {Peng, Anjie and Kang, Xiangui},
     title = {A Robust Median Filtering Detector Based on Filter Residual},
     journal = {paper.edu.cn},
     year = {2014}}
    
  153. F. Peng, J. Shi & M. Long
    Identifying Photographic Images and Photorealistic Computer Graphics Using Multifractal Spectrum Features of PRNU
    Multimedia and Expo (ICME), 2014 IEEE International Conference on
    2014, pp. 1-6
    DOI: 10.1109/ICME.2014.6890296
    BibTeX
    @inproceedings{Peng2014b,
     author = {Peng, Fei and Shi, Jiaoling and Long, Min},
     title = {Identifying Photographic Images and Photorealistic Computer Graphics Using Multifractal Spectrum Features of PRNU},
     booktitle = {Multimedia and Expo (ICME), 2014 IEEE International Conference on},
     year = {2014},
     pages = {1--6}}
    
  154. F. Peng & D.-l. Zhou
    Discriminating Natural Images and Computer Generated Graphics Based on the Impact of CFA Interpolation on the Correlation of PRNU
    Digital Investigation, 2014(0), pp. -
    DOI: 10.1016/j.diin.2014.04.002
    BibTeX
    @article{Peng2014,
     author = {Peng, Fei and Zhou, Die-lan},
     title = {Discriminating Natural Images and Computer Generated Graphics Based on the Impact of CFA Interpolation on the Correlation of PRNU},
     journal = {Digital Investigation},
     year = {2014},
     number = {0},
     pages = {-}}
    
  155. H.S.D. Perera
    Video Analysis Tool Box for Digital Video Forensics
    University of Moratuwa, University of Moratuwa, 2014
    BibTeX
    @phdthesis{Perer2014,
     author = {Perera, Halloluwage Susinda Deemantha},
     title = {Video Analysis Tool Box for Digital Video Forensics},
     school = {University of Moratuwa},
     year = {2014}}
    
  156. Z. Qian & X. Zhang
    Improved Anti-forensics of JPEG\ Compression
    Journal of Systems and Software, 2014(0), pp. -
    DOI: 10.1016/j.jss.2013.12.043
    BibTeX
    @article{Qian2014,
     author = {Qian, Zhenxing and Zhang, Xinpeng},
     title = {Improved Anti-forensics of JPEG\ Compression},
     journal = {Journal of Systems and Software},
     year = {2014},
     number = {0},
     pages = {-}}
    
  157. X. Qiu, H. Li, W. Luo & J. Huang
    A Universal Image Forensic Strategy Based on Steganalytic Model
    Proceedings of the 2Nd ACM Workshop on Information Hiding and Multimedia Security
    ACM, 2014, pp. 165-170
    DOI: 10.1145/2600918.2600941
    BibTeX
    @inproceedings{Qiu2014,
     author = {Qiu, Xiaoqing and Li, Haodong and Luo, Weiqi and Huang, Jiwu},
     title = {A Universal Image Forensic Strategy Based on Steganalytic Model},
     booktitle = {Proceedings of the 2Nd ACM Workshop on Information Hiding and Multimedia Security},
     publisher = {ACM},
     year = {2014},
     pages = {165--170}}
    
  158. Z. Qu, W. Luo & J. Huang
    A Framework for Identifying Shifted Double JPEG Compression Artifacts with Application to Non-intrusive Digital Image Forensics
    Science China Information Sciences, Science China Press, 2014, Vol. 57(2), pp. 1-18
    DOI: 10.1007/s11432-013-5046-8
    BibTeX
    @article{Qu2014,
     author = {Qu, ZhenHua and Luo, WeiQi and Huang, JiWu},
     title = {A Framework for Identifying Shifted Double JPEG Compression Artifacts with Application to Non-intrusive Digital Image Forensics},
     journal = {Science China Information Sciences},
     publisher = {Science China Press},
     year = {2014},
     volume = {57},
     number = {2},
     pages = {1--18}}
    
  159. M.A. Qureshi & M. Deriche
    A Review on Copy Move Image Forgery Detection Techniques
    Proc. 11th Int Systems, Signals Devices (SSD) Multi-Conf
    2014, pp. 1-5
    DOI: 10.1109/SSD.2014.6808907
    BibTeX
    @inproceedings{Qureshi2014,
     author = {Qureshi, M. Ali and Deriche, M.},
     title = {A Review on Copy Move Image Forgery Detection Techniques},
     booktitle = {Proc. 11th Int Systems, Signals Devices (SSD) Multi-Conf},
     year = {2014},
     pages = {1--5}}
    
  160. M.P. Rao, A.N. Rajagopalan & G. Seetharaman
    Harnessing Motion Blur to Unveil Splicing
    Information Forensics and Security, IEEE Transactions on, 2014, Vol. 9(4), pp. 583-595
    DOI: 10.1109/TIFS.2014.2302895
    BibTeX
    @article{Rao2014,
     author = {Rao, M. P. and Rajagopalan, A. N. and Seetharaman, G.},
     title = {Harnessing Motion Blur to Unveil Splicing},
     journal = {Information Forensics and Security, IEEE Transactions on},
     year = {2014},
     volume = {9},
     number = {4},
     pages = {583--595}}
    
  161. C. Richao, Y. Gaobo & Z. Ningbo
    Detection of Object-based Manipulation by the Statistical Features of Object Contour
    Forensic Science International, 2014
    BibTeX
    @article{Richao2014,
     author = {Richao, Chen and Gaobo, Yang and Ningbo, Zhu},
     title = {Detection of Object-based Manipulation by the Statistical Features of Object Contour},
     journal = {Forensic Science International},
     year = {2014}}
    
  162. S.-J. Ryu & H.-K. Lee
    Estimation of Linear Transformation by Analyzing the Periodicity of Interpolation
    Pattern Recognition Letters, 2014, Vol. 36(0), pp. 89-99
    DOI: 10.1016/j.patrec.2013.09.028
    BibTeX
    @article{Ryu2014,
     author = {Ryu, Seung-Jin and Lee, Heung-Kyu},
     title = {Estimation of Linear Transformation by Analyzing the Periodicity of Interpolation},
     journal = {Pattern Recognition Letters},
     year = {2014},
     volume = {36},
     number = {0},
     pages = {89--99}}
    
  163. S.-J. Ryu, H.-Y. Lee & H.-k. Lee
    Detecting Trace of Seam Carving for Forensic Analysis
    IEICE TRANSACTIONS on Information and Systems, 2014, Vol. E97-D(5), pp. 1304-1311
    BibTeX
    @article{Ryu2014a,
     author = {Ryu, Seung-Jin and Lee, Hae-Yeoun and Lee, Heung-kyu},
     title = {Detecting Trace of Seam Carving for Forensic Analysis},
     journal = {IEICE TRANSACTIONS on Information and Systems},
     year = {2014},
     volume = {E97-D},
     number = {5},
     pages = {1304--1311}}
    
  164. M. Saleem
    A Key-point Based Robust Algorithm for Detecting Cloning Forgery
    International Journal of Current Engineering and Technology, 2014
    BibTeX
    @article{Saleem2014,
     author = {Saleem, Mariam},
     title = {A Key-point Based Robust Algorithm for Detecting Cloning Forgery},
     journal = {International Journal of Current Engineering and Technology},
     year = {2014}}
    
  165. M. Saleem, M.Q. Altaf & Q. Chaudry
    A Comparative Analysis on Pixel-based Blind Cloning Techniques
    Control System, Computing and Engineering (ICCSCE), 2014 IEEE International Conference on
    2014, pp. 130-135
    DOI: 10.1109/ICCSCE.2014.7072702
    BibTeX
    @inproceedings{Saleem2014a,
     author = {Saleem, M. and Altaf, M. Q. and Chaudry, Q.},
     title = {A Comparative Analysis on Pixel-based Blind Cloning Techniques},
     booktitle = {Control System, Computing and Engineering (ICCSCE), 2014 IEEE International Conference on},
     year = {2014},
     pages = {130--135}}
    
  166. A.L. Sandoval Orozco, D.M. Arenas González, J. Rosales Corripio, L.J. García Villalba & J.C. Hernandez-Castro
    Source Identification for Mobile Devices, Based on Wavelet Transforms Combined with Sensor Imperfections
    Computing, Springer, 2014, Vol. 96(9), pp. 829
    DOI: 10.1007/s00607-013-0313-5
    BibTeX
    @article{SandovalOrozco2014,
     author = {Sandoval Orozco, A. L. and Arenas González, D. M. and Rosales Corripio, J. and García Villalba, L. J. and Hernandez-Castro, J. C.},
     title = {Source Identification for Mobile Devices, Based on Wavelet Transforms Combined with Sensor Imperfections},
     journal = {Computing},
     publisher = {Springer},
     year = {2014},
     volume = {96},
     number = {9},
     pages = {829}}
    
  167. T.K. Sarode & N. Vaswani
    Copy-move Forgery Detection Using Orthogonal Wavelet Transforms.
    International Journal of Computer Applications, 2014, Vol. 88, pp. 41-45
    BibTeX
    @article{Sarode2014,
     author = {Sarode, Tanuja K. and Vaswani, Naveen},
     title = {Copy-move Forgery Detection Using Orthogonal Wavelet Transforms.},
     journal = {International Journal of Computer Applications},
     year = {2014},
     volume = {88},
     pages = {41--45}}
    
  168. R. Satta & P. Stirparo
    On the Usage of Sensor Pattern Noise for Picture-to-identity Linking through Social Network Accounts
    Proceeding of the International Conference on Computer Vision Theory and Applications Lisbon, Portugal
    2014
    BibTeX
    @inproceedings{Satta2014,
     author = {Satta, Riccardo and Stirparo, Pasquale},
     title = {On the Usage of Sensor Pattern Noise for Picture-to-identity Linking through Social Network Accounts},
     booktitle = {Proceeding of the International Conference on Computer Vision Theory and Applications Lisbon, Portugal},
     year = {2014}}
    
  169. S. Shang, N. Memon & X. Kong
    Detecting Documents Forged by Printing and Copying
    EURASIP Journal on Advances in Signal Processing, Springer, 2014, Vol. 2014(1), pp. 140
    BibTeX
    @article{Shang2014,
     author = {Shang, Shize and Memon, Nasir and Kong, Xiangwei},
     title = {Detecting Documents Forged by Printing and Copying},
     journal = {EURASIP Journal on Advances in Signal Processing},
     publisher = {Springer},
     year = {2014},
     volume = {2014},
     number = {1},
     pages = {140}}
    
  170. N. Shaozhang, M. Xianzhe & C. Haoliang
    Digital Image Forensics Using Orthogonal 1-D Objects
    Chinese Journal of Electronics, 2014, Vol. 23(3)
    BibTeX
    @article{Shaozhang201,
     author = {Shaozhang, Niu and Xianzhe, Meng and Haoliang, Cui},
     title = {Digital Image Forensics Using Orthogonal 1-D Objects},
     journal = {Chinese Journal of Electronics},
     year = {2014},
     volume = {23},
     number = {3}}
    
  171. K. Sharma
    Computationally Efficient Copy-move Image Forgery Detection Based on DCT and SVD
    Advanced Research in Electrical and Electronic Engineering, 2014, Vol. 1(3), pp. 79-81
    BibTeX
    @article{Sharma2014,
     author = {Sharma, Kavya},
     title = {Computationally Efficient Copy-move Image Forgery Detection Based on DCT and SVD},
     journal = {Advanced Research in Electrical and Electronic Engineering},
     year = {2014},
     volume = {1},
     number = {3},
     pages = {79--81}}
    
  172. Shehnaz & M. Kaur
    Forgery Detection Based on Blur Inconsistencies: A Review
    International Journal of Engineering and Technical Research (IJETR), 2014, Vol. 2(12), pp. 198-201
    BibTeX
    @article{Shehnaz2014,
     author = {Shehnaz and Kaur, Mandeep},
     title = {Forgery Detection Based on Blur Inconsistencies: A Review},
     journal = {International Journal of Engineering and Technical Research (IJETR)},
     year = {2014},
     volume = {2},
     number = {12},
     pages = {198--201}}
    
  173. Z. Shen, J. Ni & C. Chen
    Blind Detection of Median Filtering Using Linear and Nonlinear Descriptors
    Multimedia Tools and Applications, Springer, 2014, pp. 1
    DOI: 10.1007/s11042-014-2407-2
    BibTeX
    @article{Shen2014,
     author = {Shen, Zhaoyi and Ni, Jiangqun and Chen, Chenglong},
     title = {Blind Detection of Median Filtering Using Linear and Nonlinear Descriptors},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer},
     year = {2014},
     pages = {1}}
    
  174. C. Shi, N.-F. Law, H.-F. Leung & W.-C. Siu
    Weighting Optimization with Neural Network for Photo-response-non-uniformity-based Source Camera Identification
    Asia-Pacific Signal and Information Processing Association, 2014 Annual Summit and Conference (APSIPA)
    2014, pp. 1-7
    DOI: 10.1109/APSIPA.2014.7041642
    BibTeX
    @inproceedings{Shi2014,
     author = {Shi, Chao and Law, Ngai-Fong and Leung, Hung-Fat and Siu, Wan-Chi},
     title = {Weighting Optimization with Neural Network for Photo-response-non-uniformity-based Source Camera Identification},
     booktitle = {Asia-Pacific Signal and Information Processing Association, 2014 Annual Summit and Conference (APSIPA)},
     year = {2014},
     pages = {1--7}}
    
  175. Y.-D. Shin
    Forgery Image Detection of Scale up and down Image Using Discrete Cosine Transform
    Journal of Next Generation Information Technology (JNIT), 2014, Vol. 5(2)
    BibTeX
    @article{Shin2014,
     author = {Shin, Yong-Dal},
     title = {Forgery Image Detection of Scale up and down Image Using Discrete Cosine Transform},
     journal = {Journal of Next Generation Information Technology (JNIT)},
     year = {2014},
     volume = {5},
     number = {2}}
    
  176. C. Song & X. Lin
    Natural Image Splicing Detection Based on Defocus Blur at Edges
    Communications in China (ICCC), 2014 IEEE/CIC International Conference on
    2014, pp. 225-230
    DOI: 10.1109/ICCChina.2014.7008276
    BibTeX
    @inproceedings{Song2014,
     author = {Song, Chunhe and Lin, Xiaodong},
     title = {Natural Image Splicing Detection Based on Defocus Blur at Edges},
     booktitle = {Communications in China (ICCC), 2014 IEEE/CIC International Conference on},
     year = {2014},
     pages = {225--230}}
    
  177. B. Su, Q. Yuan, S. Wang, C. Zhao & S. Li
    Enhanced State Selection Markov Model for Image Splicing Detection
    EURASIP Journal on Wireless Communications and Networking, 2014, Vol. 2014(1), pp. 7
    DOI: 10.1186/1687-1499-2014-7
    BibTeX
    @article{Su2014,
     author = {Su, Bo and Yuan, Quanqiao and Wang, Shilin and Zhao, Chenglin and Li, Shenghong},
     title = {Enhanced State Selection Markov Model for Image Splicing Detection},
     journal = {EURASIP Journal on Wireless Communications and Networking},
     year = {2014},
     volume = {2014},
     number = {1},
     pages = {7}}
    
  178. L. Su, T. Huang & J. Yang
    A Video Forgery Detection Algorithm Based on Compressive Sensing
    Multimedia Tools and Applications, Springer US, 2014, pp. 1-16
    DOI: 10.1007/s11042-014-1915-4
    BibTeX
    @article{Su2014a,
     author = {Su, Lichao and Huang, Tianqiang and Yang, Jianmei},
     title = {A Video Forgery Detection Algorithm Based on Compressive Sensing},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer US},
     year = {2014},
     pages = {1--16}}
    
  179. K. Sudhakar, V.M. Sandeep & S. Kulkarni
    Speeding-up SIFT Based Copy Move Forgery Detection Using Level Set Approach
    Advances in Electronics, Computers and Communications (ICAECC), 2014 International Conference on
    2014, pp. 1-6
    DOI: 10.1109/ICAECC.2014.7002407
    BibTeX
    @inproceedings{Sudhakar2014,
     author = {Sudhakar, K. and Sandeep, V. M. and Kulkarni, S.},
     title = {Speeding-up SIFT Based Copy Move Forgery Detection Using Level Set Approach},
     booktitle = {Advances in Electronics, Computers and Communications (ICAECC), 2014 International Conference on},
     year = {2014},
     pages = {1--6}}
    
  180. K. Sudhakar, V.M. Sandeep & S. Kulkarni
    Shape Based Copy Move Forgery Detection Using Level Set Approach
    Signal and Image Processing (ICSIP), 2014 Fifth International Conference on
    2014, pp. 213-217
    DOI: 10.1109/ICSIP.2014.40
    BibTeX
    @inproceedings{Sudhakar2014a,
     author = {Sudhakar, K. and Sandeep, V. M. and Kulkarni, S.},
     title = {Shape Based Copy Move Forgery Detection Using Level Set Approach},
     booktitle = {Signal and Image Processing (ICSIP), 2014 Fifth International Conference on},
     year = {2014},
     pages = {213--217}}
    
  181. R. Sumner
    Processing Raw Images in Matlab
    Department of Electrical Engineering, UC Santa Cruz, Department of Electrical Engineering, UC Santa Cruz, 2014
    BibTeX
    @other{Sumner2014,
     author = {Sumner, Rob},
     title = {Processing Raw Images in Matlab},
     school = {Department of Electrical Engineering, UC Santa Cruz},
     year = {2014}}
    
  182. K. Sunil, D. Jagan & M. Shaktidev
    DCT-PCA Based Method for Copy-move Forgery Detection
    Satapathy, S. C., Avadhani, P. S., Udgata, S. K. & Lakshminarayana, S. (ed.)
    ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol II
    Springer International Publishing, 2014, Vol. 249, pp. 577-583
    DOI: 10.1007/978-3-319-03095-1_62
    BibTeX
    @incollection{Sunil2014,
     author = {Sunil, Kumar and Jagan, Desai and Shaktidev, Mukherjee},
     title = {DCT-PCA Based Method for Copy-move Forgery Detection},
     booktitle = {ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol II},
     publisher = {Springer International Publishing},
     year = {2014},
     volume = {249},
     pages = {577--583}}
    
  183. T.H. Tai
    Statistical Modeling and Detection for Digital Image Forensics
    University of Technology of Troyes, University of Technology of Troyes, 2014
    BibTeX
    @phdthesis{Tai2014,
     author = {Tai, Than Hai},
     title = {Statistical Modeling and Detection for Digital Image Forensics},
     school = {University of Technology of Troyes},
     year = {2014}}
    
  184. T.H. Thai, R. Cogranne & F. Retraint
    Optimal Detector for Camera Model Identification Based on an Accurate Model of DCT Coefficients
    Proc. IEEE 16th Int Multimedia Signal Processing (MMSP) Workshop
    2014, pp. 1-6
    DOI: 10.1109/MMSP.2014.6958810
    BibTeX
    @inproceedings{Thai2014,
     author = {Thai, Thanh Hai and Cogranne, R. and Retraint, F.},
     title = {Optimal Detector for Camera Model Identification Based on an Accurate Model of DCT Coefficients},
     booktitle = {Proc. IEEE 16th Int Multimedia Signal Processing (MMSP) Workshop},
     year = {2014},
     pages = {1--6}}
    
  185. T.H. Thai, R. Cogranne & F. Retraint
    Camera Model Identification Based on the Heteroscedastic Noise Model
    IEEE Transactions on Image Processing, 2014, Vol. 23(1), pp. 250-263
    DOI: 10.1109/TIP.2013.2290596
    BibTeX
    @article{Thai2014b,
     author = {Thai, T. H. and Cogranne, R. and Retraint, F.},
     title = {Camera Model Identification Based on the Heteroscedastic Noise Model},
     journal = {IEEE Transactions on Image Processing},
     year = {2014},
     volume = {23},
     number = {1},
     pages = {250--263}}
    
  186. T. Thongkamwitoon, H. Muammar & P.L. Dragotti
    Robust Image Recapture Detection Using a K-SVD Learning Approach to Train Dictionaries of Edge Profiles
    Proc. IEEE Int. Conf. Image Processing (ICIP)
    2014, pp. 5317-5321
    DOI: 10.1109/ICIP.2014.7026076
    BibTeX
    @inproceedings{Thongkamwitoon2014,
     author = {Thongkamwitoon, T. and Muammar, H. and Dragotti, P. L.},
     title = {Robust Image Recapture Detection Using a K-SVD Learning Approach to Train Dictionaries of Edge Profiles},
     booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)},
     year = {2014},
     pages = {5317--5321}}
    
  187. D. Tralic, S. Grgic & B. Zovko-Cihlar
    Video Frame Copy-move Forgery Detection Based on Cellular Automata and Local Binary Patterns
    Telecommunications (BIHTEL), 2014 X International Symposium on
    2014, pp. 1-4
    DOI: 10.1109/BIHTEL.2014.6987651
    BibTeX
    @inproceedings{Tralic2014a,
     author = {Tralic, D. and Grgic, S. and Zovko-Cihlar, B.},
     title = {Video Frame Copy-move Forgery Detection Based on Cellular Automata and Local Binary Patterns},
     booktitle = {Telecommunications (BIHTEL), 2014 X International Symposium on},
     year = {2014},
     pages = {1--4}}
    
  188. D. Tralic, P. Rosin, X. Sun & S. Grgic
    Copy-move Forgery Detection Using Cellular Automata
    Rosin, P., Adamatzky, A. & Sun, X. (ed.)
    Cellular Automata in Image Processing and Geometry
    Chapter Copy-Move Forgery Detection Using Cellular Automata
    Springer, 2014, pp. 105-125
    DOI: 10.1007/978-3-319-06431-4_6
    BibTeX
    @inbook{Tralic2014,
     author = {Tralic, Dijana and Rosin, Paul and Sun, Xianfang and Grgic, Sonja},
     title = {Copy-move Forgery Detection Using Cellular Automata},
     booktitle = {Cellular Automata in Image Processing and Geometry},
     publisher = {Springer},
     year = {2014},
     pages = {105--125}}
    
  189. D. Tralic, P.L. Rosin, X. Sun & S. Grgic
    Detection of Duplicated Image Regions Using Cellular Automata
    Systems, Signals and Image Processing (IWSSIP), 2014 International Conference on
    2014, pp. 167-170
    BibTeX
    @inproceedings{Tralic2014b,
     author = {Tralic, D. and Rosin, P. L. and Sun, Xianfang and Grgic, S.},
     title = {Detection of Duplicated Image Regions Using Cellular Automata},
     booktitle = {Systems, Signals and Image Processing (IWSSIP), 2014 International Conference on},
     year = {2014},
     pages = {167--170}}
    
  190. D.T. Trung, A. Beghdadi & M.-C. Larabi
    Blind Inpainting Forgery Detection
    Signal and Information Processing (GlobalSIP), 2014 IEEE Global Conference on
    2014, pp. 1019-1023
    DOI: 10.1109/GlobalSIP.2014.7032275
    BibTeX
    @inproceedings{Trung2014,
     author = {Trung, Dang Thanh and Beghdadi, A. and Larabi, M.-C.},
     title = {Blind Inpainting Forgery Detection},
     booktitle = {Signal and Information Processing (GlobalSIP), 2014 IEEE Global Conference on},
     year = {2014},
     pages = {1019--1023}}
    
  191. G. Valenzise, M. Tagliasacchi & S. Tubaro
    Detectability-quality Trade-off in JPEG Counter-forensics
    Proc. IEEE Int. Conf. Image Processing (ICIP)
    2014, pp. 5337-5341
    DOI: 10.1109/ICIP.2014.7026080
    BibTeX
    @inproceedings{Valenzise2014,
     author = {Valenzise, G. and Tagliasacchi, M. and Tubaro, S.},
     title = {Detectability-quality Trade-off in JPEG Counter-forensics},
     booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)},
     year = {2014},
     pages = {5337--5341}}
    
  192. G. Valenzise, M. Tagliasacchi & S. Tubaro
    Detectability-quality trade-off in JPEG counter-forensics
    Proc. IEEE Int. Conf. Image Processing (ICIP)
    2014, pp. 5337-5341
    DOI: 10.1109/ICIP.2014.7026080
    BibTeX
    @inproceedings{Valenzise2014a,
     author = {Valenzise, G. and Tagliasacchi, M. and Tubaro, S.},
     title = {Detectability-quality trade-off in JPEG counter-forensics},
     booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)},
     year = {2014},
     pages = {5337--5341}}
    
  193. L. Verdoliva, D. Cozzolino & G. Poggi
    A Feature-based Approach for Image Tampering Detection and Localization
    Information Forensics and Security (WIFS), 2014 IEEE International Workshop on
    2014, pp. 149-154
    DOI: 10.1109/WIFS.2014.7084319
    BibTeX
    @inproceedings{Verdoliva2014,
     author = {Verdoliva, L. and Cozzolino, D. and Poggi, G.},
     title = {A Feature-based Approach for Image Tampering Detection and Localization},
     booktitle = {Information Forensics and Security (WIFS), 2014 IEEE International Workshop on},
     year = {2014},
     pages = {149--154}}
    
  194. K.A. Vladimirovich & M.V. Valerievich
    A Fast Plain Copy-move Detection Algorithm Based on Structural Pattern and 2d Rabin-karp Rolling Hash
    Image Analysis and Recognition, Springer, 2014
    DOI: 10.1007/978-3-319-11758-4_50
    BibTeX
    @article{Vladimirovich2014,
     author = {Vladimirovich, Kuznetsov Andrey and Valerievich, Myasnikov Vladislav},
     title = {A Fast Plain Copy-move Detection Algorithm Based on Structural Pattern and 2d Rabin-karp Rolling Hash},
     journal = {Image Analysis and Recognition},
     publisher = {Springer},
     year = {2014}}
    
  195. A.W.A. Wahab, M.A. Bagiwa, M.Y.I. Idris, S. Khan, Z. Razak & M.R.K. Ariffin
    Passive Video Forgery Detection Techniques: A Survey
    Information Assurance and Security (IAS), 2014 10th International Conference on
    2014, pp. 29-34
    DOI: 10.1109/ISIAS.2014.7064616
    BibTeX
    @inproceedings{Wahab2014,
     author = {Wahab, Ainuddin Wahid Abdul and Bagiwa, Mustapha Aminu and Idris, Mohd Yamani Idna and Khan, Suleman and Razak, Zaidi and Ariffin, Muhammad Rezal Kamel},
     title = {Passive Video Forgery Detection Techniques: A Survey},
     booktitle = {Information Assurance and Security (IAS), 2014 10th International Conference on},
     year = {2014},
     pages = {29--34}}
    
  196. M. Wang, Z. Chen, W. Fan & Z. Xiong
    Countering anti-forensics to wavelet-based compression
    Proc. IEEE Int. Conf. Image Processing (ICIP)
    2014, pp. 5382-5386
    DOI: 10.1109/ICIP.2014.7026089
    BibTeX
    @inproceedings{Wang2014c,
     author = {Wang, M. and Chen, Z. and Fan, W. and Xiong, Z.},
     title = {Countering anti-forensics to wavelet-based compression},
     booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)},
     year = {2014},
     pages = {5382--5386}}
    
  197. S.-L. Wang, A.W.-C. Liew, S.-H. Li, Y.-J. Zhang & J.-H. Li
    Detection of Shifted Double JPEG Compression by an Adaptive DCT Coefficient Model
    EURASIP Journal on Advances in Signal Processing, 2014, Vol. 2014(1), pp. 101
    DOI: 10.1186/1687-6180-2014-101
    BibTeX
    @article{Wang2014,
     author = {Wang, Shi-Lin and Liew, Alan Wee-Chung and Li, Sheng-Hong and Zhang, Yu-Jin and Li, Jian-Hua},
     title = {Detection of Shifted Double JPEG Compression by an Adaptive DCT Coefficient Model},
     journal = {EURASIP Journal on Advances in Signal Processing},
     year = {2014},
     volume = {2014},
     number = {1},
     pages = {101}}
    
  198. W. Wang, J. Dong & T. Tan
    Exploring DCT Coefficient Quantization Effects for Local Tampering Detection
    Information Forensics and Security, IEEE Transactions on, 2014, Vol. 9(10), pp. 1653-1666
    DOI: 10.1109/TIFS.2014.2345479
    BibTeX
    @article{Wang2014a,
     author = {Wang, Wei and Dong, Jing and Tan, Tieniu},
     title = {Exploring DCT Coefficient Quantization Effects for Local Tampering Detection},
     journal = {Information Forensics and Security, IEEE Transactions on},
     year = {2014},
     volume = {9},
     number = {10},
     pages = {1653--1666}}
    
  199. W. Wang, X. Jiang, S. Wang, M. Wan & T. Sun
    Identifying Video Forgery Process Using Optical Flow
    Digital-Forensics and Watermarking, Springer, 2014
    DOI: 10.1007/978-3-662-43886-2_18
    BibTeX
    @article{Wang2014b,
     author = {Wang, Wan and Jiang, Xinghao and Wang, Shilin and Wan, Meng and Sun, Tanfeng},
     title = {Identifying Video Forgery Process Using Optical Flow},
     journal = {Digital-Forensics and Watermarking},
     publisher = {Springer},
     year = {2014}}
    
  200. J.-D. Wei, Y.-J. Lin & Y.-J. Wu
    A Patch Analysis Method to Detect Seam Carved Images
    Pattern Recognition Letters, 2014, Vol. 36(0), pp. 100-106
    DOI: 10.1016/j.patrec.2013.09.026
    BibTeX
    @article{Wei2014,
     author = {Wei, Jyh-Da and Lin, Yu-Ju and Wu, Yi-Jing},
     title = {A Patch Analysis Method to Detect Seam Carved Images},
     journal = {Pattern Recognition Letters},
     year = {2014},
     volume = {36},
     number = {0},
     pages = {100--106}}
    
  201. Y. Wu, Y. Deng, H. Duan & L. Zhou
    Dual Tree Complex Wavelet Transform Approach to Copy-rotate-move Forgery Detection
    Science China Information Sciences, Springer Berlin Heidelberg, 2014, Vol. 57(1), pp. 1-12
    DOI: 10.1007/s11432-013-4823-8
    BibTeX
    @article{Wu2014,
     author = {Wu, YunJie and Deng, Yu and Duan, HaiBin and Zhou, LinNa},
     title = {Dual Tree Complex Wavelet Transform Approach to Copy-rotate-move Forgery Detection},
     journal = {Science China Information Sciences},
     publisher = {Springer Berlin Heidelberg},
     year = {2014},
     volume = {57},
     number = {1},
     pages = {1--12}}
    
  202. Y. Wu, X. Jiang, T. Sun & W. Wang
    Exposing video inter-frame forgery based on velocity field consistency
    Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics
    2014, pp. 2674-2678
    DOI: 10.1109/ICASSP.2014.6854085
    BibTeX
    @inproceedings{Wu2014a,
     author = {Wu, Y. and Jiang, X. and Sun, T. and Wang, W.},
     title = {Exposing video inter-frame forgery based on velocity field consistency},
     booktitle = {Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics},
     year = {2014},
     pages = {2674--2678}}
    
  203. Y. Xiao
    Image Splicing Detection Based on Machine Learning Algorithm
    Wong, W. E. & Zhu, T. (ed.)
    Computer Engineering and Networking
    Springer International Publishing, 2014, Vol. 277, pp. 601-608
    DOI: 10.1007/978-3-319-01766-2_69
    BibTeX
    @incollection{Xiao2014,
     author = {Xiao, Yan},
     title = {Image Splicing Detection Based on Machine Learning Algorithm},
     booktitle = {Computer Engineering and Networking},
     publisher = {Springer International Publishing},
     year = {2014},
     volume = {277},
     pages = {601--608}}
    
  204. N. Xing, J. Wang, X. Zhang & J. Zhang
    Digital Image Identification Based on Generalized Gaussian Model
    Proc. SPIE 9233, International Symposium on Photonics and Optoelectronics 2014
    Proc. SPIE, 2014, Vol. 9233, pp. 923303-923303-6
    DOI: 10.1117/12.2069695
    BibTeX
    @inproceedings{Xing2014,
     author = {Xing, Nan and Wang, Jing and Zhang, Xiaolei and Zhang, Jingbo},
     title = {Digital Image Identification Based on Generalized Gaussian Model},
     booktitle = {Proc. SPIE 9233, International Symposium on Photonics and Optoelectronics 2014},
     journal = {Proc. SPIE},
     year = {2014},
     volume = {9233},
     pages = {923303-923303-6}}
    
  205. B. Xu, G. Liu & Y. Dai
    Detecting Image Splicing Using Merged Features in Chroma Space
    The Scientific World Journal, 2014, Vol. 2014
    DOI: 10.1155/2014/262356
    BibTeX
    @article{Xu2014,
     author = {Xu, Bo and Liu, Guangjie and Dai, Yuewei},
     title = {Detecting Image Splicing Using Merged Features in Chroma Space},
     journal = {The Scientific World Journal},
     year = {2014},
     volume = {2014}}
    
  206. B. Yang & B. Liu
    Feature Fusion for Blurring Detection in Image Forensics
    IEICE TRANSACTIONS on Information and Systems, 2014, Vol. E97-D(6), pp. 1690-1693
    BibTeX
    @article{Yang2014a,
     author = {Yang, Benjuan and Liu, Benyong},
     title = {Feature Fusion for Blurring Detection in Image Forensics},
     journal = {IEICE TRANSACTIONS on Information and Systems},
     year = {2014},
     volume = {E97-D},
     number = {6},
     pages = {1690--1693}}
    
  207. H. Yang & Z. Zhou
    Hiding the Trace of JPEG Compression History
    Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on
    2014, pp. 909-913
    DOI: 10.1109/CSNT.2014.187
    BibTeX
    @inproceedings{Yang2014,
     author = {Yang, Hong and Zhou, Zhiping},
     title = {Hiding the Trace of JPEG Compression History},
     booktitle = {Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on},
     year = {2014},
     pages = {909--913}}
    
  208. J. Yang, J. Xie, G. Zhu, S. Kwong & Y.-Q. Shi
    An Effective Method for Detecting Double JPEG Compression with the Same Quantization Matrix
    Information Forensics and Security, IEEE Transactions on, 2014, Vol. 9(11), pp. 1933-1942
    DOI: 10.1109/TIFS.2014.2359368
    BibTeX
    @article{Yang2014b,
     author = {Yang, Jianquan and Xie, Jin and Zhu, Guopu and Kwong, Sam and Shi, Yun-Qing},
     title = {An Effective Method for Detecting Double JPEG Compression with the Same Quantization Matrix},
     journal = {Information Forensics and Security, IEEE Transactions on},
     year = {2014},
     volume = {9},
     number = {11},
     pages = {1933--1942}}
    
  209. R. Yang
    Additive Noise Detection and Its Application to Audio Forensics
    Asia-Pacific Signal and Information Processing Association, 2014 Annual Summit and Conference (APSIPA)
    2014, pp. 1-5
    DOI: 10.1109/APSIPA.2014.7041688
    BibTeX
    @inproceedings{Yang2014c,
     author = {Yang, Rui},
     title = {Additive Noise Detection and Its Application to Audio Forensics},
     booktitle = {Asia-Pacific Signal and Information Processing Association, 2014 Annual Summit and Conference (APSIPA)},
     year = {2014},
     pages = {1--5}}
    
  210. S. Yang, C. Qin, Z. Qian & B. Xu
    Tampering Detection and Content Recovery for Digital Images Using Halftone Mechanism
    Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2014 Tenth International Conference on
    2014, pp. 130-133
    DOI: 10.1109/IIH-MSP.2014.39
    BibTeX
    @inproceedings{Yang2014d,
     author = {Yang, Shanshan and Qin, Chuan and Qian, Zhenxing and Xu, Boqing},
     title = {Tampering Detection and Content Recovery for Digital Images Using Halftone Mechanism},
     booktitle = {Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2014 Tenth International Conference on},
     year = {2014},
     pages = {130--133}}
    
  211. H. Yan-Li, N. Shao-Zhang, Z. Jian-Cheng & Z. Lin-Na
    Forensics of Image Tampering Based on the Consistency of Illuminant Chromaticity
    Asia-Pacific Signal and Information Processing Association, 2014 Annual Summit and Conference (APSIPA)
    2014, pp. 1-4
    DOI: 10.1109/APSIPA.2014.7041551
    BibTeX
    @inproceedings{Yan-Li2014,
     author = {Yan-Li, Huang and Shao-Zhang, Niu and Jian-Cheng, Zou and Lin-Na, Zhou},
     title = {Forensics of Image Tampering Based on the Consistency of Illuminant Chromaticity},
     booktitle = {Asia-Pacific Signal and Information Processing Association, 2014 Annual Summit and Conference (APSIPA)},
     year = {2014},
     pages = {1--4}}
    
  212. H. Yan-li, N. Shao-Zhang, Z. Jian-Cheng & Z. Lin-Na
    Forensics of image tampering based on the consistency of illuminant chromaticity
    Proc. Asia-Pacific Signal and Information Processing Association Annual Summit and Conf. (APSIPA)
    2014, pp. 1-4
    DOI: 10.1109/APSIPA.2014.7041551
    BibTeX
    @inproceedings{Yan-li2014,
     author = {Yan-li, H. and Shao-Zhang, N. and Jian-Cheng, Z. and Lin-Na, Z.},
     title = {Forensics of image tampering based on the consistency of illuminant chromaticity},
     booktitle = {Proc. Asia-Pacific Signal and Information Processing Association Annual Summit and Conf. (APSIPA)},
     year = {2014},
     pages = {1--4}}
    
  213. H. Yong-Jian, G. Hua, Z. Jing & L. Bei-Bei
    Simplification and Analysis of Counter-attack Algorithm for Image Source Identification
    JSCUT(Natural Science Edition), 2014
    BibTeX
    @article{Yongjian2014,
     author = {Yong-Jian, Hu and Hua, Guan and Jing, Zhao and Bei-Bei, Liu},
     title = {Simplification and Analysis of Counter-attack Algorithm for Image Source Identification},
     journal = {JSCUT(Natural Science Edition)},
     year = {2014}}
    
  214. L. Yu, Q. Han & X. Niu
    Copy-rotation-move Forgery Detection Using the MROGH Descriptor
    Cloud Engineering (IC2E), 2014 IEEE International Conference on
    2014, pp. 510-513
    DOI: 10.1109/IC2E.2014.54
    BibTeX
    @inproceedings{Yu2014b,
     author = {Yu, Liyang and Han, Qi and Niu, Xiamu},
     title = {Copy-rotation-move Forgery Detection Using the MROGH Descriptor},
     booktitle = {Cloud Engineering (IC2E), 2014 IEEE International Conference on},
     year = {2014},
     pages = {510--513}}
    
  215. Z. Yu, L. Lin, B.W.-K. Ling, C.Y.-F. Ho, C. Qing, H. Xu, W. Dai, Y. Liang, J. Chen & Q. Dai
    Camera Identification for Very Low Bit Rate Time Varying Quantization Noise Videos
    Communication Systems, Networks & Digital Signal Processing (CSNDSP), 2014 9th International Symposium on
    2014, pp. 208-212
    DOI: 10.1109/CSNDSP.2014.6923826
    BibTeX
    @inproceedings{Yu2014a,
     author = {Yu, Zitong and Lin, Lianshi and Ling, B. W.-K. and Ho, C. Y.-F. and Qing, Chunmei and Xu, Hailiang and Dai, Weihang and Liang, Yuming and Chen, Jiameng and Dai, Qingyun},
     title = {Camera Identification for Very Low Bit Rate Time Varying Quantization Noise Videos},
     booktitle = {Communication Systems, Networks & Digital Signal Processing (CSNDSP), 2014 9th International Symposium on},
     year = {2014},
     pages = {208--212}}
    
  216. Z. Yu, R. Wang, S. Xin, W. Li & J. Wang
    Single-view Recaptured Photo Detection Based on Hsv Color Space
    Journal of Computational Information Systems, 2014, Vol. 10(8), pp. 3229-3236
    BibTeX
    @article{Yu2014,
     author = {Yu, Zan and Wang, Rangding and Xin, Shiqing and Li, Wei and Wang, Jiaji},
     title = {Single-view Recaptured Photo Detection Based on Hsv Color Space},
     journal = {Journal of Computational Information Systems},
     year = {2014},
     volume = {10},
     number = {8},
     pages = {3229--3236}}
    
  217. M. Zandi, A. Mahmoudi-Aznaveh & A. Mansouri
    Adaptive Matching for Copy-move Forgery Detection
    Information Forensics and Security (WIFS), 2014 IEEE International Workshop on
    2014, pp. 119-124
    DOI: 10.1109/WIFS.2014.7084314
    BibTeX
    @inproceedings{Zandi2014,
     author = {Zandi, M. and Mahmoudi-Aznaveh, A. and Mansouri, A.},
     title = {Adaptive Matching for Copy-move Forgery Detection},
     booktitle = {Information Forensics and Security (WIFS), 2014 IEEE International Workshop on},
     year = {2014},
     pages = {119--124}}
    
  218. H. Zeng & X. Kang
    Camera Source Identification Game with Incomplete Information
    Digital-Forensics and Watermarking, Springer, 2014
    DOI: 10.1007/978-3-662-43886-2_14
    BibTeX
    @article{Zeng2014a,
     author = {Zeng, Hui and Kang, Xiangui},
     title = {Camera Source Identification Game with Incomplete Information},
     journal = {Digital-Forensics and Watermarking},
     publisher = {Springer},
     year = {2014}}
    
  219. H. Zeng, T. Qin, X. Kang & L. Liu
    Countering Anti-forensics of Median Filtering
    Acoustics, Speech and Signal Processing (ICASSP), 2014 IEEE International Conference on
    2014, pp. 2704-2708
    DOI: 10.1109/ICASSP.2014.6854091
    BibTeX
    @inproceedings{Zeng2014,
     author = {Zeng, Hui and Qin, Tengfei and Kang, Xiangui and Liu, Li},
     title = {Countering Anti-forensics of Median Filtering},
     booktitle = {Acoustics, Speech and Signal Processing (ICASSP), 2014 IEEE International Conference on},
     year = {2014},
     pages = {2704--2708}}
    
  220. J. Zhang, Q. Ruan & Y. Jin
    Combined SIFT and Bi-coherence Features to Detect Image Forgery
    Signal Processing (ICSP), 2014 12th International Conference on
    2014, pp. 1859-1863
    DOI: 10.1109/ICOSP.2014.7015314
    BibTeX
    @inproceedings{Zhang2014d,
     author = {Zhang, Ju and Ruan, Qiuqi and Jin, Yi},
     title = {Combined SIFT and Bi-coherence Features to Detect Image Forgery},
     booktitle = {Signal Processing (ICSP), 2014 12th International Conference on},
     year = {2014},
     pages = {1859--1863}}
    
  221. R. Zhang & R.-D. Wang
    In-camera JPEG Compression Detection for Doubly Compressed Images
    Multimedia Tools and Applications, Springer US, 2014, pp. 1-19
    DOI: 10.1007/s11042-014-1868-7
    BibTeX
    @article{Zhang2014a,
     author = {Zhang, Rong and Wang, Rang-Ding},
     title = {In-camera JPEG Compression Detection for Doubly Compressed Images},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer US},
     year = {2014},
     pages = {1--19}}
    
  222. R.F. Zhang, H.M. Ye, Z.H. Song & M. Wang
    Blind Detection of Copy-move Forgery in Digital Images Based on Dyadic Wavelet Transform
    Cai, S. Z., Zhang, Q. F., Xu, X. P., Hu, D. H. & Qu, Y. M. (ed.)
    Chapter Chapter 7: Communication, Signal and Image Processing, Data Acquisition and Recognation Technologies
    Advanced Materials Research, Trans Tech Publications, 2014, Vol. 989-994, pp. 4127-4131
    DOI: 10.4028/www.scientific.net/AMR.989-994.4127
    BibTeX
    @article{Zhang2014c,
     author = {Zhang, Rui Fang and Ye, Han Min and Song, Zi Hang and Wang, Min},
     title = {Blind Detection of Copy-move Forgery in Digital Images Based on Dyadic Wavelet Transform},
     journal = {Advanced Materials Research},
     publisher = {Trans Tech Publications},
     year = {2014},
     volume = {989-994},
     pages = {4127--4131}}
    
  223. Y. Zhang, S. Li, S. Wang & Y.Q. Shi
    Revealing the Traces of Median Filtering Using High-order Local Ternary Patterns
    IEEE Signal Processing Letters, 2014, Vol. 21(3), pp. 275-279
    DOI: 10.1109/LSP.2013.2295858
    BibTeX
    @article{Zhang2014e,
     author = {Zhang, Y. and Li, S. and Wang, S. and Shi, Y. Q.},
     title = {Revealing the Traces of Median Filtering Using High-order Local Ternary Patterns},
     journal = {IEEE Signal Processing Letters},
     year = {2014},
     volume = {21},
     number = {3},
     pages = {275--279}}
    
  224. Y. Zhang, C. Zhao, F. Zhao & S. Li
    Blind Forensics of Median Filtering Based on Markov Statistics in Median-filtered Residual Domain
    Zhang, B., Mu, J., Wang, W., Liang, Q. & Pi, Y. (ed.)
    The Proceedings of the Second International Conference on Communications, Signal Processing, and Systems
    Springer International Publishing, 2014, Vol. 246, pp. 179-186
    DOI: 10.1007/978-3-319-00536-2_21
    BibTeX
    @incollection{Zhang2014,
     author = {Zhang, Yujin and Zhao, Chenglin and Zhao, Feng and Li, Shenghong},
     title = {Blind Forensics of Median Filtering Based on Markov Statistics in Median-filtered Residual Domain},
     booktitle = {The Proceedings of the Second International Conference on Communications, Signal Processing, and Systems},
     publisher = {Springer International Publishing},
     year = {2014},
     volume = {246},
     pages = {179--186}}
    
  225. Z. Zhang, J. Hou, Q. Ma & Z. Li
    Efficient Video Frame Insertion and Deletion Detection Based on Inconsistency of Correlations between Local Binary Pattern Coded Frames
    Security and Communication Networks, 2014, pp. n/a-n/a
    DOI: 10.1002/sec.981
    BibTeX
    @article{Zhang2014b,
     author = {Zhang, Zhenzhen and Hou, Jianjun and Ma, Qinglong and Li, Zhaohong},
     title = {Efficient Video Frame Insertion and Deletion Detection Based on Inconsistency of Correlations between Local Binary Pattern Coded Frames},
     journal = {Security and Communication Networks},
     year = {2014},
     pages = {n/a--n/a}}
    
  226. X. Zhao, J. Li, S. Wang & S. Li
    A Distributed Local Margin Learning Based Scheme for High-dimensional Feature Processing in Image Tampering Detection
    Multimedia and Expo (ICME), 2014 IEEE International Conference on
    2014, pp. 1-6
    DOI: 10.1109/ICME.2014.6890238
    BibTeX
    @inproceedings{Zhao2014a,
     author = {Zhao, Xudong and Li, Jianhua and Wang, Shilin and Li, Shenghong},
     title = {A Distributed Local Margin Learning Based Scheme for High-dimensional Feature Processing in Image Tampering Detection},
     booktitle = {Multimedia and Expo (ICME), 2014 IEEE International Conference on},
     year = {2014},
     pages = {1--6}}
    
  227. X. Zhao, S. Wang, S. Li & J. Li
    Passive Image Splicing Detection by 2-D Noncausal Markov Model
    Circuits and Systems for Video Technology, IEEE Transactions on, 2014(99)
    DOI: 10.1109/TCSVT.2014.2347513
    BibTeX
    @article{Zhao2014,
     author = {Zhao, X. and Wang, S. and Li, S. and Li, J.},
     title = {Passive Image Splicing Detection by 2-D Noncausal Markov Model},
     journal = {Circuits and Systems for Video Technology, IEEE Transactions on},
     year = {2014},
     number = {99}}
    
  228. X. Zhao, S. Wang, S. Li, J. Li & X. Lin
    A Distributed Scheme for Image Splicing Detection
    Digital-Forensics and Watermarking, Springer, 2014
    DOI: 10.1007/978-3-662-43886-2_23
    BibTeX
    @article{Zhao2014b,
     author = {Zhao, Xudong and Wang, Shilin and Li, Shenghong and Li, Jianhua and Lin, Xiang},
     title = {A Distributed Scheme for Image Splicing Detection},
     journal = {Digital-Forensics and Watermarking},
     publisher = {Springer},
     year = {2014}}
    
  229. J. Zheng & L. Chang
    Detection Technology of Tampering Image Based on Harris Corner Points
    Journal of Computational Information Systems, 2014, Vol. 10(4), pp. 1481-1488
    BibTeX
    @article{Zheng2014,
     author = {Zheng, Jiming and Chang, Liping},
     title = {Detection Technology of Tampering Image Based on Harris Corner Points},
     journal = {Journal of Computational Information Systems},
     year = {2014},
     volume = {10},
     number = {4},
     pages = {1481--1488}}
    
  230. J. Zheng & L. Chang
    Detection of Region-duplication Forgery in Image Based on Key Points' Binary Descriptors
    Journal of Information & Computational Scien, 2014, Vol. 11, pp. 3959-3966
    BibTeX
    @article{Zheng2014c,
     author = {Zheng, Jiming and Chang, Liping},
     title = {Detection of Region-duplication Forgery in Image Based on Key Points' Binary Descriptors},
     journal = {Journal of Information & Computational Scien},
     year = {2014},
     volume = {11},
     pages = {3959--3966}}
    
  231. J. Zheng, X. Song, J. Ren & T. Zhu
    Exposing Photo Manipulation Using Geometry and Shadows
    Proc. SPIE 9159, Sixth International Conference on Digital Image Processing (ICDIP 2014)
    Proc. SPIE, 2014, Vol. 9159, pp. 91591W-91591W-6
    DOI: 10.1117/12.2064531
    BibTeX
    @inproceedings{Zheng2014a,
     author = {Zheng, Jiangbin and Song, Xuemei and Ren, Jinchang and Zhu, Tingge},
     title = {Exposing Photo Manipulation Using Geometry and Shadows},
     booktitle = {Proc. SPIE 9159, Sixth International Conference on Digital Image Processing (ICDIP 2014)},
     journal = {Proc. SPIE},
     year = {2014},
     volume = {9159},
     pages = {91591W-91591W-6}}
    
  232. J. Zheng, T. Zhu, Z. Li, W. Xing & J. Ren
    Exposing Image Forgery by Detecting Traces of Feather Operation
    2014
    BibTeX
    @misc{Zheng2014b,
     author = {Zheng, Jiangbin and Zhu, Tingge and Li, Zhe and Xing, Weiwei and Ren, JinChang},
     title = {Exposing Image Forgery by Detecting Traces of Feather Operation},
     year = {2014}}
    
  233. D. Zhu & Z. Zhou
    Resampling Tamper Detection Based on JPEG Double Compression
    Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on
    2014, pp. 914-918
    DOI: 10.1109/CSNT.2014.188
    BibTeX
    @inproceedings{Zhu2014,
     author = {Zhu, Dan and Zhou, Zhiping},
     title = {Resampling Tamper Detection Based on JPEG Double Compression},
     booktitle = {Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on},
     year = {2014},
     pages = {914--918}}
    
  234. N. Zhu, X. Gao & C. Deng
    Image scaling factor estimation based on normalized energy density and learning to rank
    Proc. Int Security, Pattern Analysis, and Cybernetics (SPAC) Conf
    2014, pp. 197-202
    DOI: 10.1109/SPAC.2014.6982684
    BibTeX
    @inproceedings{Zhu2014a,
     author = {Zhu, N. and Gao, X. and Deng, C.},
     title = {Image scaling factor estimation based on normalized energy density and learning to rank},
     booktitle = {Proc. Int Security, Pattern Analysis, and Cybernetics (SPAC) Conf},
     year = {2014},
     pages = {197--202}}
    
  235. M. Zimba
    DWT-SATs Based Detection of Image Region Cloning
    International Journal of Physical, Natural Science and Engineering, 2014, Vol. 8(2)
    BibTeX
    @article{Zimba2014,
     author = {Zimba, Michael},
     title = {DWT-SATs Based Detection of Image Region Cloning},
     journal = {International Journal of Physical, Natural Science and Engineering},
     year = {2014},
     volume = {8},
     number = {2}}
    
  236. Digital-Forensics and Watermarking
    Shi, Y. Q., Kim, H. J. & Pérez-González, F. (ed.)
    Springer Berlin Heidelberg, 2014
    BibTeX
    @book{Shi2014a,,
     title = {Digital-Forensics and Watermarking},
     publisher = {Springer Berlin Heidelberg},
     year = {2014}}
    


2013

  1. J. Ackermann & M. Goesele
    How Bright Is the Moon? Recovering and Using Absolute Luminance Values from Internet Images
    Tominaga, S., Schettini, R. & Trémeau, A. (ed.)
    Computational Color Imaging
    Springer Berlin Heidelberg, 2013, Vol. 7786, pp. 90-104
    DOI: 10.1007/978-3-642-36700-7_8
    BibTeX
    @incollection{Ackermann2013,
     author = {Ackermann, Jens and Goesele, Michael},
     title = {How Bright Is the Moon? Recovering and Using Absolute Luminance Values from Internet Images},
     booktitle = {Computational Color Imaging},
     publisher = {Springer Berlin Heidelberg},
     year = {2013},
     volume = {7786},
     pages = {90--104}}
    
  2. I. Amerini, M. Barni, R. Caldelli & A. Costanzo
    Counter-forensics of SIFT-based copy-move detection by means of keypoint classification
    EURASIP Journal on Image and Video Processing, 2013, Vol. 2013(1), pp. 18
    DOI: 10.1186/1687-5281-2013-18
    BibTeX
    @article{Amerini2013b,
     author = {Amerini, Irene and Barni, Mauro and Caldelli, Roberto and Costanzo, Andrea},
     title = {Counter-forensics of SIFT-based copy-move detection by means of keypoint classification},
     journal = {EURASIP Journal on Image and Video Processing},
     year = {2013},
     volume = {2013},
     number = {1},
     pages = {18}}
    
  3. Abbadi
    Blind Fake Image detection
    IJCSI International Journal of Computer Science Issues, 2013, Vol. 10(4-1), pp. 180-186
    DOI: 10.1093/ietcom/e89-b.5.1726
    BibTeX
    @article{Abbadi2013,
     author = {Abbadi},
     title = {Blind Fake Image detection},
     journal = {IJCSI International Journal of Computer Science Issues},
     year = {2013},
     volume = {10},
     number = {4-1},
     pages = {180--186}}
    
  4. K. Abcyrathne, W. Wijesinghe, G. Godaliyadda, M. Ekanayake & J. Wijayakulasooriya
    Temporal ICA based source extraction from dynamic image sequences with visual interference under noise
    Industrial and Information Systems (ICIIS), 2013 8th IEEE International Conference on
    2013, pp. 671-675
    DOI: 10.1109/ICIInfS.2013.6732065
    BibTeX
    @inproceedings{Abcyrathne2013,
     author = {Abcyrathne, K.A.B.S. and Wijesinghe, W.V.D. and Godaliyadda, G.M.R.I. and Ekanayake, M.P.B. and Wijayakulasooriya, J.V.},
     title = {Temporal ICA based source extraction from dynamic image sequences with visual interference under noise},
     booktitle = {Industrial and Information Systems (ICIIS), 2013 8th IEEE International Conference on},
     year = {2013},
     pages = {671--675}}
    
  5. J.E. Adams Jr & B. Pillman
    Digital Camera Image Formation: Introduction and Hardware
    Sencar, H. T. & Memon, N. (ed.)
    Digital Image Forensics
    Springer New York, 2013, pp. 3-44
    DOI: 10.1007/978-1-4614-0757-7_1
    BibTeX
    @incollection{AdamsJr2013,
     author = {Adams Jr, James E. and Pillman, Bruce},
     title = {Digital Camera Image Formation: Introduction and Hardware},
     booktitle = {Digital Image Forensics},
     publisher = {Springer New York},
     year = {2013},
     pages = {3--44}}
    
  6. E. Agnes, S.D. Mahalakshmi & K. Vijayalakshmi
    A Forensic Method for Detecting Image Forgery Using Codebook
    International Journal of Advanced Research in Computer Science and Software Engineering, 2013
    DOI: 10.1109/ice-ccn.2013.6528568
    BibTeX
    @article{Agnes2013,
     author = {E. Agnes and S. Devi Mahalakshmi and K. Vijayalakshmi},
     title = {A Forensic Method for Detecting Image Forgery Using Codebook},
     journal = {International Journal of Advanced Research in Computer Science and Software Engineering},
     year = {2013}}
    
  7. A. Al Ahmadi, M. Hussain, H. Aboalsamh, G. Muhammad & G. Bebis
    Splicing image forgery detection based on DCT and Local Binary Pattern
    Global Conference on Signal and Information Processing (GlobalSIP), 2013 IEEE
    2013, pp. 253-256
    DOI: 10.1109/GlobalSIP.2013.6736863
    BibTeX
    @inproceedings{AlAhmadi2013,
     author = {Al Ahmadi, A.A. and Hussain, M. and Aboalsamh, H. and Muhammad, G. and Bebis, G.},
     title = {Splicing image forgery detection based on DCT and Local Binary Pattern},
     booktitle = {Global Conference on Signal and Information Processing (GlobalSIP), 2013 IEEE},
     year = {2013},
     pages = {253--256}}
    
  8. M. Al Sawadi, G. Muhammad & M. Hussain
    Copy-Move Image Forgery Detection Using Local Binary Pattern and Neighborhood Clustering
    Proceedings of the European Modeling Symposium (EMS), Manchester, UK, November 2013.
    2013
    DOI: 10.1109/ems.2013.43
    BibTeX
    @inproceedings{AlSawadi2013,
     author = {Al Sawadi, Motasem and Ghulam Muhammad and Muhammad Hussain},
     title = {Copy-Move Image Forgery Detection Using Local Binary Pattern and Neighborhood Clustering},
     booktitle = {Proceedings of the European Modeling Symposium (EMS), Manchester, UK, November 2013.},
     year = {2013}}
    
  9. A.A. Alahmadi, M. Hussain, H. Aboalsamh, G. Muhammad & G. Bebis
    Splicing image forgery detection based on DCT and Local Binary Pattern
    Proc. IEEE Global Conf. Signal and Information Processing (GlobalSIP)
    2013, pp. 253-256
    DOI: 10.1109/GlobalSIP.2013.6736863
    BibTeX
    @inproceedings{Alahmadi2013,
     author = {A. A. Alahmadi and M. Hussain and H. Aboalsamh and G. Muhammad and G. Bebis},
     title = {Splicing image forgery detection based on DCT and Local Binary Pattern},
     booktitle = {Proc. IEEE Global Conf. Signal and Information Processing (GlobalSIP)},
     year = {2013},
     pages = {253--256}}
    
  10. M.H. Al-Hammadi, G. Muhammad, M. Hussain & G. Bebis
    Curvelet Transform and Local Texture Based Image Forgery Detection
    Advances in Visual Computing, Springer, 2013
    DOI: 10.1007/978-3-642-41939-3_49
    BibTeX
    @article{Al-Hammadi2013,
     author = {Al-Hammadi, Muneer H. and Muhammad, Ghulam and Hussain, Muhammad and Bebis, George},
     title = {Curvelet Transform and Local Texture Based Image Forgery Detection},
     journal = {Advances in Visual Computing},
     publisher = {Springer},
     year = {2013}}
    
  11. O.M. Al-Qershi & B.E. Khoo
    Passive detection of copy-move forgery in digital images: State-of-the-art
    Forensic Science International, 2013, Vol. 231(1-3), pp. 284-295
    DOI: 10.1016/j.forsciint.2013.05.027
    BibTeX
    @article{Al-Qershi2013,
     author = {Osamah M. Al-Qershi and Bee Ee Khoo},
     title = {Passive detection of copy-move forgery in digital images: State-of-the-art},
     journal = {Forensic Science International},
     year = {2013},
     volume = {231},
     number = {1--3},
     pages = {284--295}}
    
  12. I. Amerini, L. Ballan, R. Caldelli, A. Del Bimbo, L. Del Tongo & G. Serra
    Copy-move forgery detection and localization by means of robust clustering with J-linkage
    Signal Processing: Image Communication, Elsevier, 2013
    DOI: 10.1016/j.image.2013.03.006
    BibTeX
    @article{Amerini2013,
     author = {Amerini, Irene and Ballan, Lamberto and Caldelli, Roberto and Del Bimbo, Alberto and Del Tongo, Luca and Serra, Giuseppe},
     title = {Copy-move forgery detection and localization by means of robust clustering with J-linkage},
     journal = {Signal Processing: Image Communication},
     publisher = {Elsevier},
     year = {2013}}
    
  13. I. Amerini, M. Barni, R. Caldelli & A. Costanzo
    SIFT keypoint removal and injection for countering matching-based image forensics
    Proceedings of the first ACM workshop on Information hiding and multimedia security
    ACM, 2013, pp. 123-130
    DOI: 10.1145/2482513.2482524
    BibTeX
    @inproceedings{Amerini2013a,
     author = {Amerini, Irene and Barni, Mauro and Caldelli, Roberto and Costanzo, Andrea},
     title = {SIFT keypoint removal and injection for countering matching-based image forensics},
     booktitle = {Proceedings of the first ACM workshop on Information hiding and multimedia security},
     publisher = {ACM},
     year = {2013},
     pages = {123--130}}
    
  14. I. Amerini, M. Barni, R. Caldelli & A. Costanzo
    Removal and Injection of Keypoints for Sift-based Copy-move Counter-forensics
    EURASIP Journal on Information Security, 2013
    DOI: 10.1186/1687-417x-2013-8
    BibTeX
    @article{Amerini2013c,
     author = {Irene Amerini and Mauro Barni and Roberto Caldelli and Andrea Costanzo},
     title = {Removal and Injection of Keypoints for Sift-based Copy-move Counter-forensics},
     journal = {EURASIP Journal on Information Security},
     year = {2013}}
    
  15. S.H. Anamandra & V. Chandrasekaran
    CHILD: A robust Computationally-Efficient Histogram-based Image Local Descriptor
    Proc. Fourth National Conf. Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG)
    2013, pp. 1-5
    DOI: 10.1109/NCVPRIPG.2013.6776154
    BibTeX
    @inproceedings{Anamandra2013,
     author = {S. H. Anamandra and V. Chandrasekaran},
     title = {CHILD: A robust Computationally-Efficient Histogram-based Image Local Descriptor},
     booktitle = {Proc. Fourth National Conf. Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG)},
     year = {2013},
     pages = {1--5}}
    
  16. S. Arathy, D.S. Vidyadharan, C Balan & T Sobha
    Auto White Balancing and comparison of Support Vector Machine and neural network classifiers in prediction of source camera
    Control Communication and Computing (ICCC), 2013 International Conference on
    2013, pp. 96-101
    DOI: 10.1109/ICCC.2013.6731631
    BibTeX
    @inproceedings{Arathy2013,
     author = {S Arathy and Vidyadharan, Divya S and Balan C and Sobha T},
     title = {Auto White Balancing and comparison of Support Vector Machine and neural network classifiers in prediction of source camera},
     booktitle = {Control Communication and Computing (ICCC), 2013 International Conference on},
     year = {2013},
     pages = {96--101}}
    
  17. D. Asatryan, N. Asatryan, N. Lanina & A. Petrosyan
    Method for detection of image tampering and partial recovery
    Computer Science and Information Technologies (CSIT), 2013
    2013, pp. 1-6
    DOI: 10.1109/CSITechnol.2013.6710350
    BibTeX
    @inproceedings{Asatryan2013,
     author = {Asatryan, D. and Asatryan, N. and Lanina, N. and Petrosyan, A.},
     title = {Method for detection of image tampering and partial recovery},
     booktitle = {Computer Science and Information Technologies (CSIT), 2013},
     year = {2013},
     pages = {1--6}}
    
  18. Associated-Press
    AP News Values & Principles
    2013
    BibTeX
    @electronic{AssociatedPress2013,
     author = {Associated-Press, },
     title = {AP News Values & Principles},
     year = {2013}}
    
  19. N.A.N. Azhan, I.R. Adeyemi & S.A. Razak
    Analysis of DQT and DHT in JPEG Files
    International Journal of Information Technology and Computer Science ( IJITCS ), 2013
    BibTeX
    @article{Azhan2013,
     author = {Nor Amira Nor Azhan and Ikuesan R. Adeyemi and Shukor Abd Razak},
     title = {Analysis of DQT and DHT in JPEG Files},
     journal = {International Journal of Information Technology and Computer Science ( IJITCS )},
     year = {2013}}
    
  20. R. Böhme & M. Kirchner
    Counter-Forensics: Attacking Image Forensics
    Sencar, H. T. & Memon, N. (ed.)
    Digital Image Forensics
    Springer Science mathplus Business Media, 2013, pp. 327-366
    DOI: 10.1007/978-1-4614-0757-7_12
    BibTeX
    @incollection{Boehme2013,
     author = {Rainer Böhme and Matthias Kirchner},
     title = {Counter-Forensics: Attacking Image Forensics},
     booktitle = {Digital Image Forensics},
     publisher = {Springer Science mathplus Business Media},
     year = {2013},
     pages = {327--366}}
    
  21. K.S. Bacchuwar & K. Ramakrishnan
    A jump patch-block match algorithm for multiple forgery detection
    Automation, Computing, Communication, Control and Compressed Sensing (iMac4s), 2013 International Multi-Conference on
    2013, pp. 723-728
    DOI: 10.1109/iMac4s.2013.6526502
    BibTeX
    @inproceedings{Department2013,
     author = {Bacchuwar, Ketan S and Ramakrishnan, K.R},
     title = {A jump patch-block match algorithm for multiple forgery detection},
     booktitle = {Automation, Computing, Communication, Control and Compressed Sensing (iMac4s), 2013 International Multi-Conference on},
     year = {2013},
     pages = {723--728}}
    
  22. K. Bahrami, A.C. Kot & J. Fan
    Splicing detection in out-of-focus blurred images
    Information Forensics and Security (WIFS), 2013 IEEE International Workshop on
    2013, pp. 144-149
    DOI: 10.1109/WIFS.2013.6707809
    BibTeX
    @inproceedings{Bahrami2013,
     author = {Bahrami, Khosro and Kot, Alex C. and Fan, Jiayuan},
     title = {Splicing detection in out-of-focus blurred images},
     booktitle = {Information Forensics and Security (WIFS), 2013 IEEE International Workshop on},
     year = {2013},
     pages = {144--149}}
    
  23. M. Barni, M. Fontani & B. Tondi
    A Universal Attack Against Histogram-Based Image Forensics
    International Journal of Digital Crime and Forensics (IJDCF), 2013
    DOI: 10.4018/jdcf.2013070103
    BibTeX
    @article{Barni2013a,
     author = {Mauro Barni and Marco Fontani and Benedetta Tondi},
     title = {A Universal Attack Against Histogram-Based Image Forensics},
     journal = {International Journal of Digital Crime and Forensics (IJDCF)},
     year = {2013}}
    
  24. M. Barni & B. Tondi
    The Source Identification Game:an Information-Theoretic Perspective
    IEEE Transactions on Information Forensics and Security, 2013
    DOI: 10.1109/TIFS.2012.2237397
    BibTeX
    @article{Barni2013,
     author = {Barni, Mauro and Tondi, Benedetta},
     title = {The Source Identification Game:an Information-Theoretic Perspective},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2013}}
    
  25. P. Bestagini, S. Battaglia, S. Milani, M. Tagliasacchi & S. Tubaro
    Detection of Temporal Interpolation In Video Sequences
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013, 2013
    BibTeX
    @inproceedings{Bestagini2013,
     author = {Paolo Bestagini and Simone Battaglia and Simone Milani and Marco Tagliasacchi and Stefano Tubaro},
     title = {Detection of Temporal Interpolation In Video Sequences},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013},
     journal = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013},
     year = {2013}}
    
  26. S. Bian, W. Luo & J. Huang
    Detecting video frame-rate up-conversion based on periodic properties of inter-frame similarity
    Multimedia Tools and Applications, Springer US, 2013, Vol. -, pp. 1-15
    DOI: 10.1007/s11042-013-1364-5
    BibTeX
    @article{Bian2013,
     author = {Bian, Shan and Luo, Weiqi and Huang, Jiwu},
     title = {Detecting video frame-rate up-conversion based on periodic properties of inter-frame similarity},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer US},
     year = {2013},
     volume = {-},
     pages = {1--15}}
    
  27. T. Bianchi, A. Piva & F. Perez-Gonzalez
    Near optimal detection of quantized signals and application to JPEG forensics
    Information Forensics and Security (WIFS), 2013 IEEE International Workshop on
    2013, pp. 168-173
    DOI: 10.1109/WIFS.2013.6707813
    BibTeX
    @inproceedings{Bianchi2013,
     author = {Bianchi, Tiziano and Piva, Alessandro and Perez-Gonzalez, Fernando},
     title = {Near optimal detection of quantized signals and application to JPEG forensics},
     booktitle = {Information Forensics and Security (WIFS), 2013 IEEE International Workshop on},
     year = {2013},
     pages = {168--173}}
    
  28. A. Biney & H. Sellahewa
    Analysis of Smartphone Model Identification using Digital Images
    Proc. IEEE International Conference on Image Processing ICIP 2013
    2013, pp. 4487-4491
    BibTeX
    @inproceedings{Biney2013,
     author = {Akua Biney and Harin Sellahewa},
     title = {Analysis of Smartphone Model Identification using Digital Images},
     booktitle = {Proc. IEEE International Conference on Image Processing ICIP 2013},
     year = {2013},
     pages = {4487--4491}}
    
  29. G.K. Birajdar & V.H. Mankar
    Digital image forgery detection using passive techniques: A survey
    Digital Investigation, 2013, Vol. 10(3), pp. 226-245
    DOI: 10.1016/j.diin.2013.04.007
    BibTeX
    @article{Birajdar2013,
     author = {Gajanan K. Birajdar and Vijay H. Mankar},
     title = {Digital image forgery detection using passive techniques: A survey},
     journal = {Digital Investigation},
     year = {2013},
     volume = {10},
     number = {3},
     pages = {226--245}}
    
  30. G.K. Birajdar & V.H. Mankar
    Blind Authentication of Resampled Images and Rescaling Factor Estimation
    Cloud Ubiquitous Computing Emerging Technologies (CUBE), 2013 International Conference on
    2013, pp. 112-116
    DOI: 10.1109/CUBE.2013.28
    BibTeX
    @inproceedings{Birajdar2013a,
     author = {Birajdar, Gajanan K. and Mankar, Vijay H.},
     title = {Blind Authentication of Resampled Images and Rescaling Factor Estimation},
     booktitle = {Cloud Ubiquitous Computing Emerging Technologies (CUBE), 2013 International Conference on},
     year = {2013},
     pages = {112--116}}
    
  31. K. Bolouri, M. Javanmard & M. Firouzmand
    Camera Identification Algorithm Based on Sensor Pattern Noise Using Wavelet Transform, SVD / PCA and SVM Classifier
    Journal of Information Systems and Telecommunication, 2013
    BibTeX
    @article{Bolouri2013,
     author = {Kimia Bolouri and Mehdi Javanmard and Mohammad Firouzmand},
     title = {Camera Identification Algorithm Based on Sensor Pattern Noise Using Wavelet Transform, SVD / PCA and SVM Classifier},
     journal = {Journal of Information Systems and Telecommunication},
     year = {2013}}
    
  32. S. Bourouis, M.A. Mashrgy & N. Bouguila
    Bayesian learning of finite generalized inverted Dirichlet mixtures: Application to object classification and forgery detection
    Expert Systems with Applications, 2013(0), pp. -
    DOI: 10.1016/j.eswa.2013.09.030
    BibTeX
    @article{Bourouis2013,
     author = {Sami Bourouis and Mohamed Al Mashrgy and Nizar Bouguila},
     title = {Bayesian learning of finite generalized inverted Dirichlet mixtures: Application to object classification and forgery detection},
     journal = {Expert Systems with Applications},
     year = {2013},
     number = {0},
     pages = {-}}
    
  33. A. Bruna
    Applied Image Processing Algorithms for Forensic Applications
    Universita’ Degli Studi Di Catania, Universita’ Degli Studi Di Catania, 2013
    BibTeX
    @phdthesis{Bruna2013,
     author = {Bruna, A.R.},
     title = {Applied Image Processing Algorithms for Forensic Applications},
     school = {Universita’ Degli Studi Di Catania},
     year = {2013}}
    
  34. H. Cao & A. Kot
    Estimating EXIF Parameters Based on Noise Features for Image Manipulation Detection
    IEEE Transactions on Information Forensics and Security, 2013, Vol. 8, pp. 608-618
    DOI: 10.1109/TIFS.2013.2249064
    BibTeX
    @article{Cao2013,
     author = {Cao, H. and Kot, A.C.},
     title = {Estimating EXIF Parameters Based on Noise Features for Image Manipulation Detection},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2013},
     volume = {8},
     pages = {608--618}}
    
  35. T. de Carvalho, C. Riess, E. Angelopoulou, H. Pedrini & A.R. Rocha
    Exposing Digital Image Forgeries by Illumination Color Classification
    IEEE Transactions on Information Forensics and Security, 2013, Vol. 8(7), pp. 1182-1194
    DOI: 10.1109/TIFS.2013.2265677
    BibTeX
    @article{Carvalho2013,
     author = {de Carvalho, T. and Riess, C. and Angelopoulou, E. and Pedrini, H. and Rocha, A. R.},
     title = {Exposing Digital Image Forgeries by Illumination Color Classification},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2013},
     volume = {8},
     number = {7},
     pages = {1182--1194}}
    
  36. S. Chakraborty
    Copy move image forgery detection using mutual information
    Computing, Communications and Networking Technologies (ICCCNT),2013 Fourth International Conference on
    2013, pp. 1-4
    DOI: 10.1109/ICCCNT.2013.6726743
    BibTeX
    @inproceedings{Chakraborty2013,
     author = {Chakraborty, Somnath},
     title = {Copy move image forgery detection using mutual information},
     booktitle = {Computing, Communications and Networking Technologies (ICCCNT),2013 Fourth International Conference on},
     year = {2013},
     pages = {1--4}}
    
  37. L.-H. Chan, N.-F. Law & W.-C. Siu
    A confidence map and pixel-based weighted correlation for PRNU-based camera identification
    Digital Investigation, Elsevier, 2013
    BibTeX
    @article{Chan2013,
     author = {Chan, Lit-Hung and Law, Ngai-Fong and Siu, Wan-Chi},
     title = {A confidence map and pixel-based weighted correlation for PRNU-based camera identification},
     journal = {Digital Investigation},
     publisher = {Elsevier},
     year = {2013}}
    
  38. T.-Y. Chang, G.-S. Lin & S.-C. Tai
    Identifying Device Brand by Using Characteristics of Color Filter Array
    Pan, J.-S., Yang, C.-N. & Lin, C.-C. (ed.)
    Advances in Intelligent Systems and Applications - Volume 2
    Springer Berlin Heidelberg, 2013, Vol. 21, pp. 349-358
    DOI: 10.1007/978-3-642-35473-1_35
    BibTeX
    @incollection{Chang2013,
     author = {Chang, Tang-You and Lin, Guo-Shiang and Tai, Shen-Chuan},
     title = {Identifying Device Brand by Using Characteristics of Color Filter Array},
     booktitle = {Advances in Intelligent Systems and Applications - Volume 2},
     publisher = {Springer Berlin Heidelberg},
     year = {2013},
     volume = {21},
     pages = {349--358}}
    
  39. C. Chen, J. Ni & J. Huang
    Blind Detection of Median Filtering in Digital Images: A Difference Domain Based Approach
    Image Processing, IEEE Transactions on, 2013, Vol. PP(99), pp. 1-1
    DOI: 10.1109/TIP.2013.2277814
    BibTeX
    @article{Chen2013c,
     author = {Chen, C. and Ni, J. and Huang, J.},
     title = {Blind Detection of Median Filtering in Digital Images: A Difference Domain Based Approach},
     journal = {Image Processing, IEEE Transactions on},
     year = {2013},
     volume = {PP},
     number = {99},
     pages = {1--1}}
    
  40. C. Chen, J. Ni & J. Huang
    Blind Detection of Median Filtering in Digital Images: A Difference Domain Based Approach
    IEEE_J_IP, 2013, Vol. 22(12), pp. 4699-4710
    DOI: 10.1109/TIP.2013.2277814
    BibTeX
    @article{Chen2013g,
     author = {C. Chen and J. Ni and J. Huang},
     title = {Blind Detection of Median Filtering in Digital Images: A Difference Domain Based Approach},
     journal = {IEEE_J_IP},
     year = {2013},
     volume = {22},
     number = {12},
     pages = {4699--4710}}
    
  41. L. Chen, W. Lu & J. Ni
    3 An Image region Description Method Based on Stap Sector Statistics and its Application in Image Copy-Rotate/Flip-Move Forgery Detection
    Li, C.-T. (ed.)
    Emerging Digital Forensics Application for Crime Detection, Prevention and Security
    Chapter 3 An Image region Description Method Based on Stap Sector Statistics and its Application in Image Copy-Rotate/Flip-Move Forgery Detection
    IGI Global, 2013, pp. 35-49
    DOI: 10.4018/978-1-4666-4006-1.ch003
    BibTeX
    @inbook{Chen2013d,
     author = {Likai Chen and Wei Lu and Jianqun Ni},
     title = {3 An Image region Description Method Based on Stap Sector Statistics and its Application in Image Copy-Rotate/Flip-Move Forgery Detection},
     booktitle = {Emerging Digital Forensics Application for Crime Detection, Prevention and Security},
     publisher = {IGI Global},
     year = {2013},
     pages = {35--49}}
    
  42. L. Chen, W. Lu, J. Ni, W. Sun & J. Huang
    Region duplication detection based on Harris corner points and step sector statistics
    Journal of Visual Communication and Image Representation, Elsevier, 2013, Vol. 24(3), pp. 244-254
    DOI: 10.1016/j.jvcir.2013.01.008
    BibTeX
    @article{Chen2013a,
     author = {Chen, Likai and Lu, Wei and Ni, Jiangqun and Sun, Wei and Huang, Jiwu},
     title = {Region duplication detection based on Harris corner points and step sector statistics},
     journal = {Journal of Visual Communication and Image Representation},
     publisher = {Elsevier},
     year = {2013},
     volume = {24},
     number = {3},
     pages = {244--254}}
    
  43. L. Chen, S. Wang, S. Li & J. Li
    Countering Universal Image Tampering Detection with Histogram Restoration
    Shi, Y., Kim, H.-J. & Pérez-González, F. (ed.)
    Digital Forensics and Watermaking
    Springer Berlin Heidelberg, 2013, Vol. 7809, pp. 282-289
    DOI: 10.1007/978-3-642-40099-5_23
    BibTeX
    @incollection{Chen2013b,
     author = {Chen, Luyi and Wang, Shilin and Li, Shenghong and Li, Jianhua},
     title = {Countering Universal Image Tampering Detection with Histogram Restoration},
     booktitle = {Digital Forensics and Watermaking},
     publisher = {Springer Berlin Heidelberg},
     year = {2013},
     volume = {7809},
     pages = {282--289}}
    
  44. S. Chen, A. Pande, K. Zeng & P. Mohapatra
    Video Source Identification in Lossy Wireless Networks
    Department of Computer Science, University of California, Davis, CA 95616, Department of Computer Science, University of California, Davis, CA 95616, 2013
    BibTeX
    @techreport{Chen2013,
     author = {Chen, S. and Pande, A. and Zeng, K. and Mohapatra, P.},
     title = {Video Source Identification in Lossy Wireless Networks},
     school = {Department of Computer Science, University of California, Davis, CA 95616},
     year = {2013}}
    
  45. Y.-L. Chen & C.-T. Hsu
    What has been tampered? From a sparse manipulation perspective
    Multimedia Signal Processing (MMSP), 2013 IEEE 15th International Workshop on
    2013, pp. 123-128
    DOI: 10.1109/MMSP.2013.6659275
    BibTeX
    @inproceedings{Chen2013e,
     author = {Chen, Yi-Lei and Hsu, Chiou-Ting},
     title = {What has been tampered? From a sparse manipulation perspective},
     booktitle = {Multimedia Signal Processing (MMSP), 2013 IEEE 15th International Workshop on},
     year = {2013},
     pages = {123--128}}
    
  46. Z. Chen, Y. Zhao & R. Ni
    Forensics of blurred images based on no-reference image quality assessment
    Signal and Information Processing (ChinaSIP), 2013 IEEE China Summit & International Conference on
    2013, pp. 437-441
    DOI: 10.1109/ChinaSIP.2013.6625377
    BibTeX
    @inproceedings{Chen2013f,
     author = {Zhipeng Chen and Yao Zhao and Rongrong Ni},
     title = {Forensics of blurred images based on no-reference image quality assessment},
     booktitle = {Signal and Information Processing (ChinaSIP), 2013 IEEE China Summit & International Conference on},
     year = {2013},
     pages = {437--441}}
    
  47. G. Chierchia, G. Poggi, C. Sansone & L. Verdoliva
    PRNU-based forgery detection with regularity constraints and global optimization
    Multimedia Signal Processing (MMSP), 2013 IEEE 15th International Workshop on
    2013, pp. 236-241
    DOI: 10.1109/MMSP.2013.6659294
    BibTeX
    @inproceedings{Chierchia2013,
     author = {Giovann Chierchia and Poggi, Giovanni and Sansone, Carlo and Verdoliva, Luisa},
     title = {PRNU-based forgery detection with regularity constraints and global optimization},
     booktitle = {Multimedia Signal Processing (MMSP), 2013 IEEE 15th International Workshop on},
     year = {2013},
     pages = {236--241}}
    
  48. Chippendale
    Geo-positional Image Forensics through Scene-terrain Registration
    Proceedings of the International Conference on Computer Vision Theory and Applications (VISIGRAPP 2013)
    Scitepress, 2013
    DOI: 10.5220/0004282300410047
    BibTeX
    @conference{Chippendale2013,
     author = {Chippendale},
     title = {Geo-positional Image Forensics through Scene-terrain Registration},
     booktitle = {Proceedings of the International Conference on Computer Vision Theory and Applications (VISIGRAPP 2013)},
     publisher = {Scitepress},
     year = {2013}}
    
  49. C.-H. Choi, H.-Y. Lee & H.-K. Lee
    Estimation of color modification in digital images by CFA pattern change
    Forensic Science International, 2013, Vol. -(0), pp. -
    DOI: 10.1016/j.forsciint.2012.12.014
    BibTeX
    @article{Choi2013,
     author = {Chang-Hee Choi and Hae-Yeoun Lee and Heung-Kyu Lee},
     title = {Estimation of color modification in digital images by CFA pattern change},
     journal = {Forensic Science International},
     year = {2013},
     volume = {-},
     number = {0},
     pages = {-}}
    
  50. X. Chu, M.C. Stamm & K.J.R.L. Yan Chen
    Concealability-rate-distortion Tradeoff In Image Compression Anti-forensics
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013
    Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013, 2013, pp. 3063-3067
    DOI: 10.1109/ICASSP.2013.6638221
    BibTeX
    @inproceedings{Chu2013a,
     author = {Xiaoyu Chu and Matthew C. Stamm and Yan Chen, K. J. Ray Liu},
     title = {Concealability-rate-distortion Tradeoff In Image Compression Anti-forensics},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013},
     journal = {Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013},
     year = {2013},
     pages = {3063--3067}}
    
  51. Ciptasari
    Exploiting reference images in exposing geometrical distortions
    International Journal of Multimedia & Its Applications (IJMA), 2013, Vol. 5(3)
    BibTeX
    @article{Ciptasari2013,
     author = {Ciptasari},
     title = {Exploiting reference images in exposing geometrical distortions},
     journal = {International Journal of Multimedia & Its Applications (IJMA)},
     year = {2013},
     volume = {5},
     number = {3}}
    
  52. R. Ciptasari, K.-H. Rhee & K. Sakurai
    Image Splicing Verification Based on Pixel-Based Alignment Method
    Shi, Y., Kim, H.-J. & Pérez-González, F. (ed.)
    Digital Forensics and Watermaking
    Springer Berlin Heidelberg, 2013, Vol. 7809, pp. 198-212
    DOI: 10.1007/978-3-642-40099-5_17
    BibTeX
    @incollection{Ciptasari2013a,
     author = {Ciptasari, RimbaWhidiana and Rhee, Kyung-Hyune and Sakurai, Kouichi},
     title = {Image Splicing Verification Based on Pixel-Based Alignment Method},
     booktitle = {Digital Forensics and Watermaking},
     publisher = {Springer Berlin Heidelberg},
     year = {2013},
     volume = {7809},
     pages = {198--212}}
    
  53. P. Comesana, F. Perez-Gonzalez & N. Liste
    Quantization Lattice Estimation for Multimedia Forensics
    Proc. IEEE International Conference on Image Processing ICIP 2013
    2013, pp. 4462 - 4466
    BibTeX
    @inproceedings{Comesana2013,
     author = {Pedro Comesana and Fernando Perez-Gonzalez and and Noelia Liste},
     title = {Quantization Lattice Estimation for Multimedia Forensics},
     booktitle = {Proc. IEEE International Conference on Image Processing ICIP 2013},
     year = {2013},
     pages = {4462 -- 4466}}
    
  54. P. Comesaña-Alfaro & F. Pérez-González
    Optimal Counterforensics For Histogram-based Forensics
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013
    Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013, 2013
    DOI: 10.1109/icassp.2013.6638218
    BibTeX
    @inproceedings{Comesana-Alfaro2013,
     author = {Pedro Comesaña-Alfaro and Fernando Pérez-González},
     title = {Optimal Counterforensics For Histogram-based Forensics},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013},
     journal = {Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013},
     year = {2013}}
    
  55. V. Conotter, P. Comesana & F. Pérez-González
    Joint detection of full-frame linear filtering and JPEG compression in digital images
    2013
    BibTeX
    @electronic{Conotter2013a,
     author = {Conotter, V and Comesana, P and Pérez-González, F},
     title = {Joint detection of full-frame linear filtering and JPEG compression in digital images},
     year = {2013}}
    
  56. V. Conotter, P. Comesaña-Alfaro & F. Pérez-González
    Forensic Analysis Of Full-frame Linearly Filtered Jpeg Images
    Proc. IEEE International Conference on Image Processing ICIP 2013
    2013, pp. 4517 - 4521
    BibTeX
    @inproceedings{Conotter2013,
     author = {Valentina Conotter and Pedro Comesaña-Alfaro and Fernando Pérez-González},
     title = {Forensic Analysis Of Full-frame Linearly Filtered Jpeg Images},
     booktitle = {Proc. IEEE International Conference on Image Processing ICIP 2013},
     year = {2013},
     pages = {4517 -- 4521}}
    
  57. A.J. Cooper
    Improved photo response non-uniformity (PRNU) based source camera identification
    Forensic Science International, 2013, Vol. -(0), pp. -
    DOI: 10.1016/j.forsciint.2012.12.018
    BibTeX
    @article{Cooper2013,
     author = {Alan J. Cooper},
     title = {Improved photo response non-uniformity (PRNU) based source camera identification},
     journal = {Forensic Science International},
     year = {2013},
     volume = {-},
     number = {0},
     pages = {-}}
    
  58. J.R. Corripio, A.L.S. Orozco, L.J.G. Villalba, J. Hernandez-Castro & S.J. Gibson
    Source Smartphone Identification Using Sensor Pattern Noise and Wavelet Transform
    The 5th International Conference on Imaging for Crime Detection and Prevention, 16th-17th December 2013, London, UK., 2013
    BibTeX
    @article{Corripio2013,
     author = {Jocelin Rosales Corripio and Ana Lucila Sandoval Orozco and Luis Javier Garc’ıa Villalba and Julio Hernandez-Castro and Stuart James Gibson},
     title = {Source Smartphone Identification Using Sensor Pattern Noise and Wavelet Transform},
     journal = {The 5th International Conference on Imaging for Crime Detection and Prevention, 16th-17th December 2013, London, UK.},
     year = {2013}}
    
  59. F.O. de Costa, E. Silva, M. Eckmann, W.J. Scheirer & A. Rocha
    Open Set Source Camera Attribution and Device Linking
    Pattern Recognition Letters, 2013(0), pp. -
    DOI: 10.1016/j.patrec.2013.09.006
    BibTeX
    @article{deCosta2013,
     author = {Filipe O. de Costa and Ewerton Silva and Michael Eckmann and Walter J. Scheirer and Anderson Rocha},
     title = {Open Set Source Camera Attribution and Device Linking},
     journal = {Pattern Recognition Letters},
     year = {2013},
     number = {0},
     pages = {-}}
    
  60. D. Cozzolino, F. Gargiulo, C. Sansone & L. Verdoliva
    Multiple Classifier Systems for Image Forgery Detection
    Proc. of the International Conference on Image Analysis and Processing (ICIAP)
    International Conference on Image Analysis and Processing (ICIAP), 2013
    DOI: 10.1007/978-3-642-41184-7_27
    BibTeX
    @inproceedings{Cozzolino2013,
     author = {D. Cozzolino and F. Gargiulo and C. Sansone and L. Verdoliva},
     title = {Multiple Classifier Systems for Image Forgery Detection},
     booktitle = {Proc. of the International Conference on Image Analysis and Processing (ICIAP)},
     journal = {International Conference on Image Analysis and Processing (ICIAP)},
     year = {2013}}
    
  61. D. Cozzolino, D. Gragnaniello & L. Verdoliva
    A novel framework for image forgery localization
    arXiv.org, 2013
    BibTeX
    @article{Cozzolino2013a,
     author = {Davide Cozzolino and Diego Gragnaniello and Luisa Verdoliva},
     title = {A novel framework for image forgery localization},
     journal = {arXiv.org},
     year = {2013}}
    
  62. D. Cozzolino, D. Gragnaniello & L. Verdoliva
    Image forgery detection based on the fusion of machine learning and block-matching methods
    arXiv.org, 2013
    BibTeX
    @article{Cozzolino2013b,
     author = {Davide Cozzolino and Diego Gragnaniello and Luisa Verdoliva},
     title = {Image forgery detection based on the fusion of machine learning and block-matching methods},
     journal = {arXiv.org},
     year = {2013}}
    
  63. HYUN Dai-Kyung, JUNG Dae-Jin, LEE Hae-Yeoun & LEE Heung-Kyu
    Rotation-Tolerant Camera Identification Using Optimal Tradeoff Circular Harmonic Function Correlation Filter
    IEICE TRANSACTIONS on Information and Systems, 2013, Vol. E96-D(6), pp. 1394-1397
    DOI: 10.1587/transinf.e96.d.1394
    BibTeX
    @article{HYUN2013,
     author = {Dai-Kyung HYUN and Dae-Jin JUNG and Hae-Yeoun LEE and Heung-Kyu LEE},
     title = {Rotation-Tolerant Camera Identification Using Optimal Tradeoff Circular Harmonic Function Correlation Filter},
     journal = {IEICE TRANSACTIONS on Information and Systems},
     year = {2013},
     volume = {E96-D},
     number = {6},
     pages = {1394--1397}}
    
  64. D.T. Dang-Nguyen, I.D. Gebru, V. Conotter, G. Boato & F.G.B.D. Natale
    Counter-forensics of median filtering
    Proc. IEEE 15th Int Multimedia Signal Processing (MMSP) Workshop
    2013, pp. 260-265
    DOI: 10.1109/MMSP.2013.6659298
    BibTeX
    @inproceedings{Dang-Nguyen2013,
     author = {D. T. Dang-Nguyen and I. D. Gebru and V. Conotter and G. Boato and F. G. B. De Natale},
     title = {Counter-forensics of median filtering},
     booktitle = {Proc. IEEE 15th Int Multimedia Signal Processing (MMSP) Workshop},
     year = {2013},
     pages = {260--265}}
    
  65. U. Datta & C. Sharma
    Analysis of Copy-Move Image Forgery Detection
    IInternational Journal of Advanced Research in Computer Science and Electroic Engineering(IJARCSEE), 2013, Vol. 2(2)
    BibTeX
    @article{Datta2013,
     author = {Unmukh Datta and Chetna Sharma},
     title = {Analysis of Copy-Move Image Forgery Detection},
     journal = {IInternational Journal of Advanced Research in Computer Science and Electroic Engineering(IJARCSEE)},
     year = {2013},
     volume = {2},
     number = {2}}
    
  66. R. Davarzani, K. Yaghmaie, S. Mozaffari & M. Tapak
    Copy-move forgery detection using multiresolution local binary patterns
    Forensic Science International, 2013, Vol. 231(1-3), pp. 61-72
    DOI: 10.1016/j.forsciint.2013.04.023
    BibTeX
    @article{Davarzani2013,
     author = {Reza Davarzani and Khashayar Yaghmaie and Saeed Mozaffari and Meysam Tapak},
     title = {Copy-move forgery detection using multiresolution local binary patterns},
     journal = {Forensic Science International},
     year = {2013},
     volume = {231},
     number = {1--3},
     pages = {61--72}}
    
  67. A. Deever, M. Kumar & B. Pillman
    Digital Camera Image Formation: Processing and Storage
    Sencar, H. T. & Memon, N. (ed.)
    Digital Image Forensics
    Springer New York, 2013, pp. 45-78
    BibTeX
    @incollection{Deever2013,
     author = {Aaron Deever and Mrityunjay Kumar and Bruce Pillman},
     title = {Digital Camera Image Formation: Processing and Storage},
     booktitle = {Digital Image Forensics},
     publisher = {Springer New York},
     year = {2013},
     pages = {45--78}}
    
  68. Z. Deng, J. Zhang & Y. Zeng
    Image Splicing Detection via Demosaicking Inconsistency
    2013
    BibTeX
    @electronic{Deng2013,
     author = {Zhonghai Deng and Jingyuan Zhang and Yuguang Zeng},
     title = {Image Splicing Detection via Demosaicking Inconsistency},
     year = {2013}}
    
  69. F.N. Dezfoli, A. Dehghantanha, R. Mahmoud, N.F.B.M. Sani & F. Daryaba
    Digital Forensic Trends and Future
    International Journal of Cyber-Security and Digital Forensics (IJCSDF), 2013, Vol. 2(2), pp. 48-76
    BibTeX
    @article{Dezfoli2013,
     author = {Farhood Norouzizadeh Dezfoli and Ali Dehghantanha and Ramlan Mahmoud and Nor Fazlida Binti Mohd Sani and Farid Daryaba},
     title = {Digital Forensic Trends and Future},
     journal = {International Journal of Cyber-Security and Digital Forensics (IJCSDF)},
     year = {2013},
     volume = {2},
     number = {2},
     pages = {48--76}}
    
  70. J. Dong & W. Wang
    CASIA Image Tampering Detection Evaluation Database
    2013 IEEE China Summit and International Conference on Signal and Information Processing
    Institute of Electrical and Electronics Engineers (IEEE), 2013, pp. 422-426
    DOI: 10.1109/chinasip.2013.6625374
    BibTeX
    @inproceedings{Dong2013,
     author = {Jing Dong and Wei Wang},
     title = {CASIA Image Tampering Detection Evaluation Database},
     booktitle = {2013 IEEE China Summit and International Conference on Signal and Information Processing},
     publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
     year = {2013},
     pages = {422--426}}
    
  71. M. Doyoddorj & K.-H. Rhee
    A blind forgery detection scheme using image compatibility metrics
    Industrial Electronics (ISIE), 2013 IEEE International Symposium on
    2013, pp. 1-6
    DOI: 10.1109/ISIE.2013.6563873
    BibTeX
    @inproceedings{Doyoddorj2013,
     author = {M. Doyoddorj and Rhee, Kyung-Hyune},
     title = {A blind forgery detection scheme using image compatibility metrics},
     booktitle = {Industrial Electronics (ISIE), 2013 IEEE International Symposium on},
     year = {2013},
     pages = {1--6}}
    
  72. Z.F. Elsharkawy, S.A. Abdelwahab, S.M. Elaraby, M.I. Dessouky & F.E. Abd El-Samie
    Accurate and Robust Identifying Forged Region Method in Scanned Images
    International Journal of Computer Applications, 2013, Vol. 83, pp. 40-47
    BibTeX
    @article{Elsharkawy2013,
     author = {Elsharkawy, Zeinab F., Abdelwahab, Safey A., Elaraby, Sayed M., Dessouky, Moawad I., Abd El-Samie, Fathi E.},
     title = {Accurate and Robust Identifying Forged Region Method in Scanned Images},
     journal = {International Journal of Computer Applications},
     year = {2013},
     volume = {83},
     pages = {40--47}}
    
  73. J. Fan, H. Cao & A. Kot
    Estimating EXIF Parameters Based on Noise Features for Image Manipulation Detection
    Information Forensics and Security, IEEE Transactions on, IEEE, 2013, Vol. 8(4), pp. 608-618
    DOI: 10.1109/TIFS.2013.2249064
    BibTeX
    @article{Fan2013a,
     author = {Fan, Jiayuan and Cao, Hong and Kot, A},
     title = {Estimating EXIF Parameters Based on Noise Features for Image Manipulation Detection},
     journal = {Information Forensics and Security, IEEE Transactions on},
     publisher = {IEEE},
     year = {2013},
     volume = {8},
     number = {4},
     pages = {608--618}}
    
  74. W. Fan, K. Wang, F. Cayre & Z. Xiong
    A variational approach to JPEG anti-forensics
    2013 IEEE International Conference on Acoustics, Speech and Signal Processing
    Institute of Electrical & Electronics Engineers (IEEE), 2013
    DOI: 10.1109/ICASSP.2013.6638220
    BibTeX
    @inproceedings{Fan2013,
     author = {Fan, Wei and Wang, Kai and Cayre, François and Xiong, Zhang},
     title = {A variational approach to JPEG anti-forensics},
     booktitle = {2013 IEEE International Conference on Acoustics, Speech and Signal Processing},
     publisher = {Institute of Electrical & Electronics Engineers (IEEE)},
     year = {2013}}
    
  75. F. Farhadzadeh, S. Voloshynovskiy, T. Holotyak & F. Beekhof
    Active Content Fingerprinting: Shrinkage And Lattice Based Modulations
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013
    Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013, 2013
    DOI: 10.1109/icassp.2013.6638223
    BibTeX
    @inproceedings{Farhadzadeh2013,
     author = {Farzad Farhadzadeh and Sviatoslav Voloshynovskiy and Taras Holotyak and Fokko Beekhof},
     title = {Active Content Fingerprinting: Shrinkage And Lattice Based Modulations},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013},
     journal = {Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013},
     year = {2013}}
    
  76. P. Ferrara, T. Bianchi, A. De Rosa & A. Piva
    Detection and estimation of contrast enhancement in double compressed images
    Proceedings of the 2013 IEEE International Workshop on Multimedia Signal Processing (MMSP 2013)
    2013
    BibTeX
    @inproceedings{Ferrara2013,
     author = {Ferrara, Pasquale and Bianchi, Tiziano and De Rosa, Alessia and Piva, Alessandro},
     title = {Detection and estimation of contrast enhancement in double compressed images},
     booktitle = {Proceedings of the 2013 IEEE International Workshop on Multimedia Signal Processing (MMSP 2013)},
     year = {2013}}
    
  77. P. Ferrara, T. Bianchi, A. De Rosa & A. Piva
    Reverse engineering of double compressed images in the presence of contrast enhancement
    Multimedia Signal Processing (MMSP), 2013 IEEE 15th International Workshop on
    2013, pp. 141-146
    DOI: 10.1109/MMSP.2013.6659278
    BibTeX
    @inproceedings{Ferrara2013a,
     author = {Ferrara, Pasquale and Bianchi, Tiziano and De Rosa, Alessia and Piva, Alessandro},
     title = {Reverse engineering of double compressed images in the presence of contrast enhancement},
     booktitle = {Multimedia Signal Processing (MMSP), 2013 IEEE 15th International Workshop on},
     year = {2013},
     pages = {141--146}}
    
  78. A. Fischer & T. Gloe
    Forensic analysis of interdependencies between vignetting and radial lens distortion
    IS&T/SPIE Electronic Imaging
    2013, pp. 86650D-86650D
    BibTeX
    @inproceedings{Fischer2013,
     author = {Fischer, André and Gloe, Thomas},
     title = {Forensic analysis of interdependencies between vignetting and radial lens distortion},
     booktitle = {IS&T/SPIE Electronic Imaging},
     year = {2013},
     pages = {86650D--86650D}}
    
  79. M. Fontani
    A Forensic Tool for Investigating Image Forgeries
    International Journal of Digital Crime and Forensics (IJDCF), IGI Global, 2013, Vol. 5(4), pp. 15-33
    DOI: 10.4018/ijdcf.2013100102
    BibTeX
    @article{Fontani2013a,
     author = {Marco Fontani},
     title = {A Forensic Tool for Investigating Image Forgeries},
     journal = {International Journal of Digital Crime and Forensics (IJDCF)},
     publisher = {IGI Global},
     year = {2013},
     volume = {5},
     number = {4},
     pages = {15--33}}
    
  80. M. Fontani, E. Argones-Rua, C. Troncoso & M. Barni
    The watchful forensic analyst: Multi-clue information fusion with background knowledge
    Information Forensics and Security (WIFS), 2013 IEEE International Workshop on
    2013, pp. 120-125
    DOI: 10.1109/WIFS.2013.6707805
    BibTeX
    @inproceedings{Fontani2013b,
     author = {Fontani, M. and Argones-Rua, E. and Troncoso, C. and Barni, M.},
     title = {The watchful forensic analyst: Multi-clue information fusion with background knowledge},
     booktitle = {Information Forensics and Security (WIFS), 2013 IEEE International Workshop on},
     year = {2013},
     pages = {120--125}}
    
  81. M. Fontani, T. Bianchi, A. De Rosa, A. Piva & M. Barni
    A Framework for Decision Fusion in Image Forensics based on Dempster-Shafer Theory of Evidence
    IEEE Transactions on Information Forensics and Security, 2013, Vol. -, pp. -
    DOI: 10.1109/TIFS.2013.2248727
    BibTeX
    @article{Fontani2013,
     author = {Fontani, M and Bianchi, Tiziano and De Rosa, Alessia and Piva, Alessandro and Barni, M.},
     title = {A Framework for Decision Fusion in Image Forensics based on Dempster-Shafer Theory of Evidence},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2013},
     volume = {-},
     pages = {-}}
    
  82. J. Fridrich
    Sensor Defects in Digital Image Forensic
    Sencar, H. T. & Memon, N. (ed.)
    Digital Image Forensics
    Springer Science mathplus Business Media, 2013, pp. 179-218
    DOI: 10.1007/978-1-4614-0757-7_6
    BibTeX
    @incollection{Fridrich2013,
     author = {Jessica Fridrich},
     title = {Sensor Defects in Digital Image Forensic},
     booktitle = {Digital Image Forensics},
     publisher = {Springer Science mathplus Business Media},
     year = {2013},
     pages = {179--218}}
    
  83. F. Galvan, G. Puglisi, A. Bruna & S. Battiato
    First Quantization Coefficient Extraction from Double Compressed JPEG Images
    Petrosino, A. (ed.)
    Image Analysis and Processing -- ICIAP 2013
    Springer Berlin Heidelberg, 2013, Vol. 8156, pp. 783-792
    DOI: 10.1007/978-3-642-41181-6_79
    BibTeX
    @incollection{Galvan2013,
     author = {Galvan, Fausto and Puglisi, Giovanni and Bruna, ArcangeloR. and Battiato, Sebastiano},
     title = {First Quantization Coefficient Extraction from Double Compressed JPEG Images},
     booktitle = {Image Analysis and Processing -- ICIAP 2013},
     publisher = {Springer Berlin Heidelberg},
     year = {2013},
     volume = {8156},
     pages = {783--792}}
    
  84. Y. Gan & J. Cang
    A Detection Algorithm for Image Copy-move Forgery Based on Improved Circular Projection Matching and PCA
    Sensors & Transducers, 2013, Vol. 159(11), pp. 19-25
    BibTeX
    @article{Gan2013,
     author = {Yanfen Gan and Jing Cang},
     title = {A Detection Algorithm for Image Copy-move Forgery Based on Improved Circular Projection Matching and PCA},
     journal = {Sensors & Transducers},
     year = {2013},
     volume = {159},
     number = {11},
     pages = {19--25}}
    
  85. D. Garc\ia-Ordás, L. Fernández-Robles, E. Alegre, M.T. Garc\ia-Ordás & O. Garc\ia-Olalla
    Automatic Tampering Detection in Spliced Images with Different Compression Levels
    Sanches, J., Micó, L. & Cardoso, J. (ed.)
    Pattern Recognition and Image Analysis
    Springer Science mathplus Business Media, 2013, Vol. 7887, pp. 416-423
    DOI: 10.1007/978-3-642-38628-2_49
    BibTeX
    @incollection{Garcia-Ordas2013,
     author = {Diego Garc\ia-Ordás and Laura Fernández-Robles and Enrique Alegre and Mar\ia Teresa Garc\ia-Ordás and Oscar Garc\ia-Olalla},
     title = {Automatic Tampering Detection in Spliced Images with Different Compression Levels},
     booktitle = {Pattern Recognition and Image Analysis},
     publisher = {Springer Science mathplus Business Media},
     year = {2013},
     volume = {7887},
     pages = {416--423}}
    
  86. D. Garc\ia-Ordás, L. Fernández-Robles, E. Alegre, M.T. Garc\ia-Ordás & O. Garc\ia-Olalla
    Automatic Tampering Detection in Spliced Images with Different Compression Levels
    Pattern Recognition and Image Analysis
    Springer, 2013, pp. 416-423
    DOI: 10.1007/978-3-642-38628-2_49
    BibTeX
    @incollection{Garcia-Ordas2013a,
     author = {Diego Garc\ia-Ordás and Laura Fernández-Robles and Enrique Alegre and Mar\ia Teresa Garc\ia-Ordás and Oscar Garc\ia-Olalla},
     title = {Automatic Tampering Detection in Spliced Images with Different Compression Levels},
     booktitle = {Pattern Recognition and Image Analysis},
     publisher = {Springer},
     year = {2013},
     pages = {416--423}}
    
  87. D. Garc\ia-Ordás, L. Fernández-Robles, E. Alegre, M.T. Garc\ia-Ordás & O. Garc\ia-Olalla
    Automatic Tampering Detection in Spliced Images with Different Compression Levels
    Pattern Recognition and Image Analysis
    Pattern Recognition and Image Analysis, Springer, 2013, pp. 416-423
    DOI: 10.1007/978-3-642-38628-2_49
    BibTeX
    @article{Garcia-Ordas2013b,
     author = {Diego Garc\ia-Ordás and Laura Fernández-Robles and Enrique Alegre and Mar\ia Teresa Garc\ia-Ordás and Oscar Garc\ia-Olalla},
     title = {Automatic Tampering Detection in Spliced Images with Different Compression Levels},
     booktitle = {Pattern Recognition and Image Analysis},
     journal = {Pattern Recognition and Image Analysis},
     publisher = {Springer},
     year = {2013},
     pages = {416--423}}
    
  88. F. Gisolf, Z. Geradts, D. Verhoeven & C. Klaver
    The effects of switching the camera module from BlackBerry Curve 9360 devices
    Digital Investigation, 2013, Vol. -(0), pp. -
    DOI: 10.1016/j.diin.2013.01.007
    BibTeX
    @article{Gisolf2013a,
     author = {Floris Gisolf and Zeno Geradts and Dennie Verhoeven and Coert Klaver},
     title = {The effects of switching the camera module from BlackBerry Curve 9360 devices},
     journal = {Digital Investigation},
     year = {2013},
     volume = {-},
     number = {0},
     pages = {-}}
    
  89. F. Gisolf, A. Malgoezar, T. Baar & Z. Geradts
    Improving source camera identification using a simplified total variation based noise removal algorithm
    Digital Investigation, 2013(0), pp. -
    DOI: 10.1016/j.diin.2013.08.002
    BibTeX
    @article{Gisolf2013,
     author = {Floris Gisolf and Anwar Malgoezar and Teun Baar and Zeno Geradts},
     title = {Improving source camera identification using a simplified total variation based noise removal algorithm},
     journal = {Digital Investigation},
     year = {2013},
     number = {0},
     pages = {-}}
    
  90. U.M. Gokhale & Y.V.Joshi
    Noise Estimation Using Filtering and SVD for Image Tampering Detection
    International Journal of Engineering Science and Innovative Technology (IJESIT), 2013
    BibTeX
    @article{Gokhale2013,
     author = {U. M. Gokhale and Y.V.Joshi},
     title = {Noise Estimation Using Filtering and SVD for Image Tampering Detection},
     journal = {International Journal of Engineering Science and Innovative Technology (IJESIT)},
     year = {2013}}
    
  91. M. Goljan & J. Fridrich
    Sensor Fingerprint Digests for Fast Camera Identification from Geometrically Distorted Images
    Department of ECE, SUNY Binghamton, NY, USA, Department of ECE, SUNY Binghamton, NY, USA, 2013
    BibTeX
    @techreport{Goljan2013,
     author = {Goljan, Miroslav and Fridrich, Jessica},
     title = {Sensor Fingerprint Digests for Fast Camera Identification from Geometrically Distorted Images},
     school = {Department of ECE, SUNY Binghamton, NY, USA},
     year = {2013}}
    
  92. M.E. Graves
    Forensic Video Analysis
    Proceedings of the17th Interpol International Forensic Science Managers Symposium, Lyon
    2013, pp. 638-651
    BibTeX
    @inproceedings{Graves2013,
     author = {Matthew E. Graves},
     title = {Forensic Video Analysis},
     booktitle = {Proceedings of the17th Interpol International Forensic Science Managers Symposium, Lyon},
     year = {2013},
     pages = {638--651}}
    
  93. A. Gupta, N. Saxena & S. Vasistha
    Detecting Copy Move Forgery In Digital Images
    International Journal of Engineering Research and Applications (IJERA), 2013, Vol. 3(4), pp. 94-97
    BibTeX
    @article{Gupta2013,
     author = {Ashima Gupta and Nisheeth Saxena and S.K. Vasistha},
     title = {Detecting Copy Move Forgery In Digital Images},
     journal = {International Journal of Engineering Research and Applications (IJERA)},
     year = {2013},
     volume = {3},
     number = {4},
     pages = {94--97}}
    
  94. A. Gupta, N. Saxena & S. Vasistha
    Detecting Copy move Forgery using DCT
    International Journal of Scientific and Research Publications, 2013
    BibTeX
    @article{Gupta2013a,
     author = {Ashima Gupta and Nisheeth Saxena and S.K Vasistha},
     title = {Detecting Copy move Forgery using DCT},
     journal = {International Journal of Scientific and Research Publications},
     year = {2013}}
    
  95. S. Gupta & P.S. Sandhu
    Document Forgery: The State of Art
    International Journal of Research in Engineering and Technology (IJRET), 2013
    BibTeX
    @article{Gupta2013b,
     author = {Surbhi Gupta and Parvinder S. Sandhu},
     title = {Document Forgery: The State of Art},
     journal = {International Journal of Research in Engineering and Technology (IJRET)},
     year = {2013}}
    
  96. K. Hara, K. Inoue & K. Urahama
    Generalized Mixture Ratio Based Blind Image Separation
    Signal Processing Letters, IEEE, 2013, Vol. 20(8), pp. 743-746
    DOI: 10.1109/LSP.2013.2265274
    BibTeX
    @article{Hara2013,
     author = {Hara, K. and Inoue, K. and Urahama, K.},
     title = {Generalized Mixture Ratio Based Blind Image Separation},
     journal = {Signal Processing Letters, IEEE},
     year = {2013},
     volume = {20},
     number = {8},
     pages = {743--746}}
    
  97. M. Hashmi, A. Hambarde & A. Keskar
    Copy move forgery detection using DWT and SIFT features
    Intelligent Systems Design and Applications (ISDA), 2013 13th International Conference on
    2013, pp. 188-193
    DOI: 10.1109/ISDA.2013.6920733
    BibTeX
    @inproceedings{Hashmi2013,
     author = {Hashmi, M.F. and Hambarde, A.R. and Keskar, A.G.},
     title = {Copy move forgery detection using DWT and SIFT features},
     booktitle = {Intelligent Systems Design and Applications (ISDA), 2013 13th International Conference on},
     year = {2013},
     pages = {188--193}}
    
  98. He
    Exposing Copy-move Forgeries Based on a Dimension-reduced Sift Method
    Information Technology Journal, 2013, Vol. 12(14), pp. 2975-2979
    BibTeX
    @article{He2013,
     author = {He},
     title = {Exposing Copy-move Forgeries Based on a Dimension-reduced Sift Method},
     journal = {Information Technology Journal},
     year = {2013},
     volume = {12},
     number = {14},
     pages = {2975--2979}}
    
  99. P.D. Hiscocks
    Measuring Luminance with a Digital Camera: Case History
    Syscomp Electronic Design Limited, Syscomp Electronic Design Limited, 2013
    BibTeX
    @techreport{Hiscocks2013,
     author = {Peter D. Hiscocks},
     title = {Measuring Luminance with a Digital Camera: Case History},
     school = {Syscomp Electronic Design Limited},
     year = {2013}}
    
  100. J. Hou, H. Shi, Y. Cheng & R. Li
    Fogery image splicing detection by abnormal prediction features
    Mechatronics and Automation (ICMA), 2013 IEEE International Conference on
    2013, pp. 1394-1398
    DOI: 10.1109/ICMA.2013.6618117
    BibTeX
    @inproceedings{Hou2013a,
     author = {Jun Hou and Shi, Haojie and Cheng, Yan and Li, Ran},
     title = {Fogery image splicing detection by abnormal prediction features},
     booktitle = {Mechatronics and Automation (ICMA), 2013 IEEE International Conference on},
     year = {2013},
     pages = {1394--1398}}
    
  101. X. Hou, T. Zhang, G. Xiong, Y. Zhang & X. Ping
    Image resampling detection based on texture classification
    Multimedia Tools and Applications, Springer US, 2013, pp. 1-28
    DOI: 10.1007/s11042-013-1466-0
    BibTeX
    @article{Hou2013,
     author = {Hou, Xiaodan and Zhang, Tao and Xiong, Gang and Zhang, Yan and Ping, Xin},
     title = {Image resampling detection based on texture classification},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer US},
     year = {2013},
     pages = {1--28}}
    
  102. P. Hrudya, L. Nair, S. Adithya, R. Unni, V. Priya & P. Poornachandran
    Digital image forgery detection on artificially blurred images
    Emerging Trends in Communication, Control, Signal Processing & Computing Applications (C2SPCA), 2013 International Conference on
    2013, pp. 1-5
    DOI: 10.1109/C2SPCA.2013.6749392
    BibTeX
    @inproceedings{Hrudya2013,
     author = {Hrudya, P. and Nair, L.S. and Adithya, S.M. and Unni, R. and Priya, V.H. and Poornachandran, P.},
     title = {Digital image forgery detection on artificially blurred images},
     booktitle = {Emerging Trends in Communication, Control, Signal Processing & Computing Applications (C2SPCA), 2013 International Conference on},
     year = {2013},
     pages = {1--5}}
    
  103. C.-J. Hsieh, C.-T. Weng & J.-S. Li
    JPEG forensics scheme for signature embedding and packet-level detection
    International Journal of Communication Systems, 2013, pp. n/a-n/a
    DOI: 10.1002/dac.2547
    BibTeX
    @article{Hsieh2013,
     author = {Hsieh, Che-Jen and Weng, Chi-Tien and Li, Jung-Shian},
     title = {JPEG forensics scheme for signature embedding and packet-level detection},
     journal = {International Journal of Communication Systems},
     year = {2013},
     pages = {n/a--n/a}}
    
  104. W. Huang & X. Han
    An Improved RANSAC Algorithm of Color Image Stitching
    Proceedings of 2013 Chinese Intelligent Automation Conference
    Springer, 2013
    DOI: 10.1007/978-3-642-38466-0_3
    BibTeX
    @incollection{Huang2013,
     author = {Huang, Weijie and Han, Xiaowei},
     title = {An Improved RANSAC Algorithm of Color Image Stitching},
     booktitle = {Proceedings of 2013 Chinese Intelligent Automation Conference},
     publisher = {Springer},
     year = {2013}}
    
  105. M. Hussain, G. Muhammad, S.Q. Saleh, A.M. Mirza & G. Bebis
    Image forgery detection using multi-resolution Weber local descriptors
    EUROCON, 2013 IEEE
    2013, pp. 1570-1577
    DOI: 10.1109/EUROCON.2013.6625186
    BibTeX
    @inproceedings{Hussain2013,
     author = {Hussain, M. and Muhammad, G. and Saleh, S. Q. and Mirza, A. M. and Bebis, G.},
     title = {Image forgery detection using multi-resolution Weber local descriptors},
     booktitle = {EUROCON, 2013 IEEE},
     year = {2013},
     pages = {1570--1577}}
    
  106. M.G. Hwang, H.J. Park & D.H. Har
    Source camera identification based on interpolation via lens distortion correction
    Australian Journal of Forensic Sciences, 2013, Vol. 0(0), pp. 1-13
    DOI: 10.1080/00450618.2013.804946
    BibTeX
    @article{Hwang2013,
     author = {Hwang, Min Gu and Park, Hyung Ju and Har, Dong Hwan},
     title = {Source camera identification based on interpolation via lens distortion correction},
     journal = {Australian Journal of Forensic Sciences},
     year = {2013},
     volume = {0},
     number = {0},
     pages = {1--13}}
    
  107. D.-K. Hyun, M.-J. Lee, S.-J. Ryu, H.-Y. Lee & H.-K. Lee
    Forgery Detection for Surveillance Video
    The Era of Interactive Media
    Springer New York, 2013, pp. 25-36
    DOI: 10.1007/978-1-4614-3501-3_3
    BibTeX
    @incollection{Hyun2013,
     author = {Hyun, Dai-Kyung and Lee, Min-Jeong and Ryu, Seung-Jin and Lee, Hae-Yeoun and Lee, Heung-Kyu},
     title = {Forgery Detection for Surveillance Video},
     booktitle = {The Era of Interactive Media},
     publisher = {Springer New York},
     year = {2013},
     pages = {25--36}}
    
  108. D.-K. Hyun, S.-J. Ryu, H.-Y. Lee & H.-K. Lee
    Detection of Upscale-Crop and Partial Manipulation in Surveillance Video Based on Sensor Pattern Noise
    Sensors, 2013, pp. 12605-12631
    DOI: 10.3390/s130912605
    BibTeX
    @article{Hyun2013a,
     author = {Dai-Kyung Hyun and Seung-Jin Ryu and Hae-Yeoun Lee and Heung-Kyu Lee},
     title = {Detection of Upscale-Crop and Partial Manipulation in Surveillance Video Based on Sensor Pattern Noise},
     journal = {Sensors},
     year = {2013},
     pages = {12605--12631}}
    
  109. M.B. Imamoglu, G. Ulutas & M. Ulutas
    Detection of copy-move forgery using Krawtchouk moment
    Electrical and Electronics Engineering (ELECO), 2013 8th International Conference on
    2013, pp. 311-314
    DOI: 10.1109/ELECO.2013.6713851
    BibTeX
    @inproceedings{Imamoglu2013,
     author = {Imamoglu, Mustafa Bilgehan and Ulutas, Guzin and Ulutas, Mustafa},
     title = {Detection of copy-move forgery using Krawtchouk moment},
     booktitle = {Electrical and Electronics Engineering (ELECO), 2013 8th International Conference on},
     year = {2013},
     pages = {311--314}}
    
  110. M. Jaberi, G. Bebis, M. Hussain & G. Muhammad
    Accurate and Robust Localization of Duplicated Region In Copy-move Image Forgery
    Machine Vision and Applications, 2013, Vol. 25(2), pp. 451-457
    DOI: 10.1007/s00138-013-0522-0
    BibTeX
    @article{Jaberi2013,
     author = {Maryam Jaberi and George Bebis and Muhammad Hussain and Ghulam Muhammad},
     title = {Accurate and Robust Localization of Duplicated Region In Copy-move Image Forgery},
     journal = {Machine Vision and Applications},
     year = {2013},
     volume = {25},
     number = {2},
     pages = {451--457}}
    
  111. M. Jaberi, G. Bebis, M. Hussain & G. Muhammad
    Improving the detection and localization of duplicated regions in copy-move image forgery
    Digital Signal Processing (DSP), 2013 18th International Conference on
    2013, pp. 1-6
    DOI: 10.1109/ICDSP.2013.6622700
    BibTeX
    @inproceedings{Jaberi2013a,
     author = {Jaberi, M. and Bebis, G. and Hussain, M. and Muhammad, G.},
     title = {Improving the detection and localization of duplicated regions in copy-move image forgery},
     booktitle = {Digital Signal Processing (DSP), 2013 18th International Conference on},
     year = {2013},
     pages = {1--6}}
    
  112. Y. Jiang, H. Zeng, X. Kang & L. Liu
    The Game of Countering JPEG Anti-forensics Based on the Noise Level Estimation
    Proceedings of the APSIPA
    2013
    BibTeX
    @inproceedings{Jiang2013,
     author = {Yunwen Jiang and Hui Zeng and Xiangui Kang and Li Liu},
     title = {The Game of Countering JPEG Anti-forensics Based on the Noise Level Estimation},
     booktitle = {Proceedings of the APSIPA},
     year = {2013}}
    
  113. M.K. Johnson
    Detecting Doctored Images
    Sencar, H. T. & Memon, N. (ed.)
    Digital Image Forensics
    Springer New York, 2013, pp. 257-274
    BibTeX
    @incollection{Johnson2013,
     author = {Johnson, Micah K},
     title = {Detecting Doctored Images},
     booktitle = {Digital Image Forensics},
     publisher = {Springer New York},
     year = {2013},
     pages = {257--274}}
    
  114. K.Karthikeyan & R. Lakshmi
    Fuzzy based Image Forgery Localization Using Blocking Artifacts
    International Journal of New Trends in Electronics and Communication (IJNTEC), 2013, Vol. 1(1), pp. 18 - 20
    BibTeX
    @article{Karthikeyan2013,
     author = {K.Karthikeyan and R.Sowmya Lakshmi},
     title = {Fuzzy based Image Forgery Localization Using Blocking Artifacts},
     journal = {International Journal of New Trends in Electronics and Communication (IJNTEC)},
     year = {2013},
     volume = {1},
     number = {1},
     pages = {18 -- 20}}
    
  115. A.B. Kaimal, S. Manimurugan & J. Anitha
    A modified anti-forensic technique for removing detectable traces from digital images
    Proc. Int Computer Communication and Informatics (ICCCI) Conf
    2013, pp. 1-4
    DOI: 10.1109/ICCCI.2013.6466109
    BibTeX
    @inproceedings{Kaimal2013,
     author = {Kaimal, Athira B. and Manimurugan, S. and Anitha, J.},
     title = {A modified anti-forensic technique for removing detectable traces from digital images},
     booktitle = {Proc. Int Computer Communication and Informatics (ICCCI) Conf},
     year = {2013},
     pages = {1--4}}
    
  116. A.B. Kaimal, S. Manimurugan, J. Rajivkumar & Anitha
    A new technique for removing forensically detectable traces from digital images
    Proc. 7th Int Intelligent Systems and Control (ISCO) Conf
    2013, pp. 321-324
    DOI: 10.1109/ISCO.2013.6481171
    BibTeX
    @inproceedings{Kaimal2013a,
     author = {Kaimal, Athira B. and Manimurugan, S. and Rajivkumar, J. and Anitha},
     title = {A new technique for removing forensically detectable traces from digital images},
     booktitle = {Proc. 7th Int Intelligent Systems and Control (ISCO) Conf},
     year = {2013},
     pages = {321--324}}
    
  117. X. Kang, M. Stamm, A. Peng & K. Liu
    Robust Median Filtering Forensics Using an Autoregressive Model
    Information Forensics and Security, IEEE Transactions on, 2013, Vol. 8(9), pp. 1456-1468
    DOI: 10.1109/TIFS.2013.2273394
    BibTeX
    @article{Kang2013,
     author = {Kang, X. and Stamm, M.C. and Peng, A. and Liu, K.J.R.},
     title = {Robust Median Filtering Forensics Using an Autoregressive Model},
     journal = {Information Forensics and Security, IEEE Transactions on},
     year = {2013},
     volume = {8},
     number = {9},
     pages = {1456--1468}}
    
  118. A. Kashyap & S.D. Joshi
    Detection of copy-move forgery using wavelet decomposition
    Signal Processing and Communication (ICSC), 2013 International Conference on
    2013, pp. 396-400
    DOI: 10.1109/ICSPCom.2013.6719820
    BibTeX
    @inproceedings{Kashyap2013,
     author = {Kashyap, Abhishek and Joshi, Shiv Dutt},
     title = {Detection of copy-move forgery using wavelet decomposition},
     booktitle = {Signal Processing and Communication (ICSC), 2013 International Conference on},
     year = {2013},
     pages = {396--400}}
    
  119. Y. Ke, Q. Shan, F. Qin & W. Min
    Image Recapture Detection Using Multiple Features
    International Journal of Multimedia and Ubiquitous Engineering, 2013
    BibTeX
    @article{Ke2013,
     author = {Yongzhen Ke and Qingqing Shan and Fan Qin and Weidong Min},
     title = {Image Recapture Detection Using Multiple Features},
     journal = {International Journal of Multimedia and Ubiquitous Engineering},
     year = {2013}}
    
  120. E. Kee, J. O'brien & H. Farid
    Exposing photo manipulation with inconsistent shadows
    ACM Trans. Graph., ACM, 2013, Vol. 32(3), pp. 28:1-28:12
    DOI: 10.1145/2487228.2487236
    BibTeX
    @article{Kee2013,
     author = {Kee, Eric and O'brien, James and Farid, Hany},
     title = {Exposing photo manipulation with inconsistent shadows},
     journal = {ACM Trans. Graph.},
     publisher = {ACM},
     year = {2013},
     volume = {32},
     number = {3},
     pages = {28:1--28:12}}
    
  121. S. Ketenci & G. Ulutas
    Copy-move forgery detection in images via 2D-Fourier Transform
    Telecommunications and Signal Processing (TSP), 2013 36th International Conference on
    2013, pp. 813-816
    DOI: 10.1109/TSP.2013.6614051
    BibTeX
    @inproceedings{Ketenci2013,
     author = {Ketenci, S. and Ulutas, G.},
     title = {Copy-move forgery detection in images via 2D-Fourier Transform},
     booktitle = {Telecommunications and Signal Processing (TSP), 2013 36th International Conference on},
     year = {2013},
     pages = {813--816}}
    
  122. M. Kirchner, P. Winkler & H. Farid
    Impeding forgers at photo inception
    IS&T/SPIE Electronic Imaging
    2013, pp. 866504-866504
    BibTeX
    @inproceedings{Kirchner2013,
     author = {Kirchner, Matthias and Winkler, Peter and Farid, Hany},
     title = {Impeding forgers at photo inception},
     booktitle = {IS&T/SPIE Electronic Imaging},
     year = {2013},
     pages = {866504--866504}}
    
  123. A.C. Kot & H. Cao
    Image and Video Source Class Identi�?cation
    Sencar, H. T. & Memon, N. (ed.)
    Digital Image Forensics
    Springer New York, 2013, pp. 157-179
    BibTeX
    @incollection{Kot2013,
     author = {Alex C. Kot and Hong Cao},
     title = {Image and Video Source Class Identi�?cation},
     booktitle = {Digital Image Forensics},
     publisher = {Springer New York},
     year = {2013},
     pages = {157--179}}
    
  124. S. Kumar, J. Desai & S. Mukherjee
    A fast DCT based method for copy move forgery detection
    Image Information Processing (ICIIP), 2013 IEEE Second International Conference on
    2013, pp. 649-654
    DOI: 10.1109/ICIIP.2013.6707675
    BibTeX
    @inproceedings{Kumar2013a,
     author = {Kumar, Sunil and Desai, Jagannath and Mukherjee, Shaktidev},
     title = {A fast DCT based method for copy move forgery detection},
     booktitle = {Image Information Processing (ICIIP), 2013 IEEE Second International Conference on},
     year = {2013},
     pages = {649--654}}
    
  125. S. Kumar, J. Desai, S. Mukherjee & P. Das
    Suitability of Independent Component Analysis in Digital Image Forgery Detection
    International Journal of Engineering and Technology, 2013, Vol. 5, pp. -
    BibTeX
    @article{Kumar2013,
     author = {Kumar, Sunil and Desai, JV and Mukherjee, S and Das, PK},
     title = {Suitability of Independent Component Analysis in Digital Image Forgery Detection},
     journal = {International Journal of Engineering and Technology},
     year = {2013},
     volume = {5},
     pages = {-}}
    
  126. T.-Y. Kuo, Y.-C. Lo & S.-N. Huang
    Image forgery detection for region duplication tampering
    Multimedia and Expo (ICME), 2013 IEEE International Conference on
    2013, pp. 1-6
    DOI: 10.1109/ICME.2013.6607452
    BibTeX
    @inproceedings{Kuo2013,
     author = {Tien-Ying Kuo and Yi-Chung Lo and Ssu-Neng Huang},
     title = {Image forgery detection for region duplication tampering},
     booktitle = {Multimedia and Expo (ICME), 2013 IEEE International Conference on},
     year = {2013},
     pages = {1--6}}
    
  127. K. Kurosawa, K. Kuroki, K. Tsuchiya, N. Igarashi & N. Akiba
    Case studies and further improvements on source camera identification
    IS&T/SPIE Electronic Imaging
    2013, pp. 86650C-86650C
    BibTeX
    @inproceedings{Kurosawa2013,
     author = {Kurosawa, Kenji and Kuroki, Kenro and Tsuchiya, Ken�ichi and Igarashi, Naoaki and Akiba, Norimitsu},
     title = {Case studies and further improvements on source camera identification},
     booktitle = {IS&T/SPIE Electronic Imaging},
     year = {2013},
     pages = {86650C--86650C}}
    
  128. D. Labartino, T. Bianchi, A.D. Rosa, M. Fontani, D. Vazquez-Padın, A. Piva & M. Barni
    Localization of Forgeries in MPEG-2 Video through GOP Size and DQ Analysis
    Proceedings of the 2013 IEEE International Workshop on Multimedia Signal Processing (MMSP 2013)
    2013
    DOI: 10.1109/mmsp.2013.6659338
    BibTeX
    @inproceedings{Labartino2013,
     author = {D. Labartino and T. Bianchi and A. De Rosa and M. Fontani and D. Vazquez-Padın and A. Piva and M. Barni},
     title = {Localization of Forgeries in MPEG-2 Video through GOP Size and DQ Analysis},
     booktitle = {Proceedings of the 2013 IEEE International Workshop on Multimedia Signal Processing (MMSP 2013)},
     year = {2013}}
    
  129. S. Lai & R. Böhme
    Block convergence in repeated transform coding: jpeg-100 forensics, carbon dating, and tamper detection
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013
    Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013, 2013, pp. 3028-3032
    DOI: 10.1109/icassp.2013.6638214
    BibTeX
    @inproceedings{Lai2013,
     author = {Lai, ShiYue and Böhme, Rainer},
     title = {Block convergence in repeated transform coding: jpeg-100 forensics, carbon dating, and tamper detection},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013},
     journal = {Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013},
     year = {2013},
     pages = {3028--3032}}
    
  130. L. Laijie, Y. Gaobo & X. Ming
    Anti-Forensics for Unsharp Masking Sharpening in Digital Images
    International Journal of Digital Crime and Forensics (IJDCF), 2013, Vol. 5(3)
    DOI: 10.4018/jdcf.2013070104
    BibTeX
    @article{Laijie2013,
     author = {Lu Laijie and Yang Gaobo and Xia Ming},
     title = {Anti-Forensics for Unsharp Masking Sharpening in Digital Images},
     journal = {International Journal of Digital Crime and Forensics (IJDCF)},
     year = {2013},
     volume = {5},
     number = {3}}
    
  131. M Lalitha, H. Holalad, S. Rajput, D Muktanidhi S & U. Mudenagudi
    A classifier framework for the detection of doctored images
    Proc. Fourth National Conf. Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG)
    2013, pp. 1-4
    DOI: 10.1109/NCVPRIPG.2013.6776155
    BibTeX
    @inproceedings{Lalitha2013a,
     author = {Lalitha M and H. Holalad and S. Rajput and Muktanidhi S D and U. Mudenagudi},
     title = {A classifier framework for the detection of doctored images},
     booktitle = {Proc. Fourth National Conf. Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG)},
     year = {2013},
     pages = {1--4}}
    
  132. M. Lalitha, H. Holalad, S. Rajput, S. Muktanidhi & U. Mudenagudi
    A classifier framework for the detection of doctored images
    Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG), 2013 Fourth National Conference on
    2013, pp. 1-4
    DOI: 10.1109/NCVPRIPG.2013.6776155
    BibTeX
    @inproceedings{Lalitha2013,
     author = {Lalitha, M. and Holalad, H. and Rajput, S. and Muktanidhi, S.D. and Mudenagudi, U.},
     title = {A classifier framework for the detection of doctored images},
     booktitle = {Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG), 2013 Fourth National Conference on},
     year = {2013},
     pages = {1--4}}
    
  133. A. Lawgaly, F. Khelifi & A. Bouridane
    Image Sharpening for Efficient Source Camera Identification Based on Sensor Pattern Noise Estimation
    Emerging Security Technologies (EST), 2013 Fourth International Conference on
    2013, pp. 113-116
    DOI: 10.1109/EST.2013.25
    BibTeX
    @inproceedings{Lawgaly2013,
     author = {Lawgaly, A. and Khelifi, F. and Bouridane, A.},
     title = {Image Sharpening for Efficient Source Camera Identification Based on Sensor Pattern Noise Estimation},
     booktitle = {Emerging Security Technologies (EST), 2013 Fourth International Conference on},
     year = {2013},
     pages = {113--116}}
    
  134. L. Li, S. Li, H. Zhu, S.-C. Chu, J.F. Roddick & J.-S. Pan
    An Efficient Scheme for Detecting Copy-move Forged Images by Local Binary Patterns
    Journal of Information Hiding and Multimedia Signal Processing, 2013, Vol. 4(1)
    BibTeX
    @article{Li2013e,
     author = {Leida Li and Shushang Li and Hancheng Zhu and Shu-Chuan Chu and John F. Roddick and Jeng-Shyang Pan},
     title = {An Efficient Scheme for Detecting Copy-move Forged Images by Local Binary Patterns},
     journal = {Journal of Information Hiding and Multimedia Signal Processing},
     year = {2013},
     volume = {4},
     number = {1}}
    
  135. L. Li, J. Xue, X. Wang & L. Tian
    A robust approach to detect digital forgeries by exploring correlation patterns
    Pattern Analysis and Applications, Springer-Verlag, 2013, Vol. -, pp. 1-15
    DOI: 10.1007/s10044-013-0319-9
    BibTeX
    @article{Li2013,
     author = {Li, Lu and Xue, Jianru and Wang, Xiaofeng and Tian, Lihua},
     title = {A robust approach to detect digital forgeries by exploring correlation patterns},
     journal = {Pattern Analysis and Applications},
     publisher = {Springer-Verlag},
     year = {2013},
     volume = {-},
     pages = {1--15}}
    
  136. L. Li, W. Zhang, S. Li & J.S. Pan
    Detection of Region Duplication Forgery in Images under Affine Transforms
    Proc. Ninth Int Intelligent Information Hiding and Multimedia Signal Processing Conf
    2013, pp. 543-546
    DOI: 10.1109/IIH-MSP.2013.140
    BibTeX
    @inproceedings{Li2013f,
     author = {L. Li and W. Zhang and S. Li and J. S. Pan},
     title = {Detection of Region Duplication Forgery in Images under Affine Transforms},
     booktitle = {Proc. Ninth Int Intelligent Information Hiding and Multimedia Signal Processing Conf},
     year = {2013},
     pages = {543--546}}
    
  137. Q. Li
    Searching and Extracting Digital Image Evidence
    Sencar, H. T. & Memon, N. (ed.)
    Digital Image Forensics
    Springer New York, 2013, pp. 123-156
    BibTeX
    @incollection{Li2013a,
     author = {Qiming Li},
     title = {Searching and Extracting Digital Image Evidence},
     booktitle = {Digital Image Forensics},
     publisher = {Springer New York},
     year = {2013},
     pages = {123--156}}
    
  138. X. Li, X.J. Shen, Y.D. Lv & H.P. Chen
    Visual Saliency and Extended Hidden Markov Model Based Approach for Image Splicing Detection
    Applied Mechanics and Materials, 2013, Vol. 385 - 386, pp. 1466-1469
    BibTeX
    @article{Li2013c,
     author = {Xiang Li and Xuan Jing Shen and Ying Da Lv and Hai Peng Chen},
     title = {Visual Saliency and Extended Hidden Markov Model Based Approach for Image Splicing Detection},
     journal = {Applied Mechanics and Materials},
     year = {2013},
     volume = {385 - 386},
     pages = {1466--1469}}
    
  139. Y. Li
    Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching
    Forensic Science International, Elsevier BV, 2013, Vol. 224(1-3), pp. 59-67
    DOI: 10.1016/j.forsciint.2012.10.031
    BibTeX
    @article{Li2013d,
     author = {Yuenan Li},
     title = {Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching},
     journal = {Forensic Science International},
     publisher = {Elsevier BV},
     year = {2013},
     volume = {224},
     number = {1-3},
     pages = {59--67}}
    
  140. Z. Li, J. Ye & Y. Shi
    Distinguishing Computer Graphics from Photographic Images Using Local Binary Patterns
    Shi, Y., Kim, H.-J. & Pérez-González, F. (ed.)
    Digital Forensics and Watermaking
    Springer Berlin Heidelberg, 2013, Vol. 7809, pp. 228-241
    DOI: 10.1007/978-3-642-40099-5_19
    BibTeX
    @incollection{Li2013b,
     author = {Li, Zhaohong and Ye, Jingyu and Shi, YunQing},
     title = {Distinguishing Computer Graphics from Photographic Images Using Local Binary Patterns},
     booktitle = {Digital Forensics and Watermaking},
     publisher = {Springer Berlin Heidelberg},
     year = {2013},
     volume = {7809},
     pages = {228--241}}
    
  141. Y.Y. Liang & Y. Wang
    A splicing image detecting metheod based on original image estimation
    Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013)
    2013
    DOI: 10.2991/iccsee.2013.143
    BibTeX
    @inproceedings{Liang2013,
     author = {Yun Yi Liang and Ying Wang},
     title = {A splicing image detecting metheod based on original image estimation},
     booktitle = {Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013)},
     year = {2013}}
    
  142. S.-Y. Liao & T.-Q. Huang
    Video copy-move forgery detection and localization based on Tamura texture features
    Image and Signal Processing (CISP), 2013 6th International Congress on
    2013, Vol. 2, pp. 864-868
    DOI: 10.1109/CISP.2013.6745286
    BibTeX
    @inproceedings{Liao2013,
     author = {Sheng-Yang Liao and Tian-Qiang Huang},
     title = {Video copy-move forgery detection and localization based on Tamura texture features},
     booktitle = {Image and Signal Processing (CISP), 2013 6th International Congress on},
     year = {2013},
     volume = {2},
     pages = {864--868}}
    
  143. C.-S. Lin & J.-J. Tsay
    Passive Approach for Video Forgery Detection and Localization
    Proc of the second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec2013) - Xianggang/Hong Kong
    2013, pp. 107-112
    BibTeX
    @inproceedings{Lin2013,
     author = {Cheng-Shain Lin and Jyh-Jong Tsay},
     title = {Passive Approach for Video Forgery Detection and Localization},
     booktitle = {Proc of the second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec2013) - Xianggang/Hong Kong},
     year = {2013},
     pages = {107--112}}
    
  144. X. Lin, C. Li & Y. Hu
    Exposing Image Forgery Through the Detection of Contrast Enhancement
    ICIP
    2013
    BibTeX
    @inproceedings{Lin2013a,
     author = {X Lin and CT Li and Y Hu},
     title = {Exposing Image Forgery Through the Detection of Contrast Enhancement},
     booktitle = {ICIP},
     year = {2013}}
    
  145. B. Liu & C.-M. Pun
    A SIFT and local features based integrated method for copy-move attack detection in digital image
    Information and Automation (ICIA), 2013 IEEE International Conference on
    2013, pp. 865-869
    DOI: 10.1109/ICInfA.2013.6720415
    BibTeX
    @inproceedings{Liu2013b,
     author = {Bo Liu and Chi-Man Pun},
     title = {A SIFT and local features based integrated method for copy-move attack detection in digital image},
     booktitle = {Information and Automation (ICIA), 2013 IEEE International Conference on},
     year = {2013},
     pages = {865--869}}
    
  146. Q. Liu, P. Cooper, L. Chen, H. Cho, Z. Chen, M. Qiao, Y. Su, M. Wei & A. Sung
    Detection of JPEG double compression and identification of smartphone image source and post-capture manipulation
    Applied Intelligence, Springer US, 2013, pp. 1-22
    DOI: 10.1007/s10489-013-0430-z
    BibTeX
    @article{Liu2013a,
     author = {Liu, Qingzhong and Cooper, PeterA. and Chen, Lei and Cho, Hyuk and Chen, Zhongxue and Qiao, Mengyu and Su, Yuting and Wei, Mingzhen and Sung, AndrewH.},
     title = {Detection of JPEG double compression and identification of smartphone image source and post-capture manipulation},
     journal = {Applied Intelligence},
     publisher = {Springer US},
     year = {2013},
     pages = {1--22}}
    
  147. X. Liu, F. Li & L. Xiang
    Copy-Move Forgery Detection Using the MROGH
    Journal of Computational Information Systems, 2013, Vol. 9(3), pp. 1071-1078
    BibTeX
    @article{Liu2013,
     author = {Liu, Xiaoxia and Li, Feng and Xiang, Lingyun},
     title = {Copy-Move Forgery Detection Using the MROGH},
     journal = {Journal of Computational Information Systems},
     year = {2013},
     volume = {9},
     number = {3},
     pages = {1071--1078}}
    
  148. J. Lopez-Moreno, E. Garces, S. Hadap, E. Reinhard & D. Gutierrez
    Multiple Light Source Estimation in a Single Image
    Computer Graphics Forum, 2013, pp. n/a-n/a
    DOI: 10.1111/cgf.12195
    BibTeX
    @article{Lopez-Moreno2013,
     author = {Lopez-Moreno, Jorge and Garces, Elena and Hadap, Sunil and Reinhard, Erik and Gutierrez, Diego},
     title = {Multiple Light Source Estimation in a Single Image},
     journal = {Computer Graphics Forum},
     year = {2013},
     pages = {n/a--n/a}}
    
  149. G. Lynch, F.Y. Shih & H.-Y.M. Liao
    An Efficient Expanding Block Algorithm for Image Copy-Move Forgery Detection
    Information Sciences, 2013(0), pp. -
    DOI: 10.1016/j.ins.2013.03.028
    BibTeX
    @article{Lynch2013,
     author = {Gavin Lynch and Frank Y. Shih and Hong-Yuan Mark Liao},
     title = {An Efficient Expanding Block Algorithm for Image Copy-Move Forgery Detection},
     journal = {Information Sciences},
     year = {2013},
     number = {0},
     pages = {-}}
    
  150. S. Lyu
    Natural Image Statistics in Digital Image Forensics
    Sencar, H. T. & Memon, N. (ed.)
    Digital Image Forensics
    Springer New York, 2013, pp. 239-256
    BibTeX
    @incollection{Lyu2013,
     author = {Siwei Lyu},
     title = {Natural Image Statistics in Digital Image Forensics},
     booktitle = {Digital Image Forensics},
     publisher = {Springer New York},
     year = {2013},
     pages = {239--256}}
    
  151. S. Lyu, X. Pan & X. Zhang
    Exposing Region Splicing Forgeries with Blind Local Noise Estimation
    International Journal of Computer Vision, Springer US, 2013, pp. 1-20
    DOI: 10.1007/s11263-013-0688-y
    BibTeX
    @article{Lyu2013a,
     author = {Lyu, Siwei and Pan, Xunyu and Zhang, Xing},
     title = {Exposing Region Splicing Forgeries with Blind Local Noise Estimation},
     journal = {International Journal of Computer Vision},
     publisher = {Springer US},
     year = {2013},
     pages = {1--20}}
    
  152. D. Mahalakshmi, K. Vijayalakshmi & E. Agnes
    A forensic method for detecting image forgery
    Emerging Trends in Computing, Communication and Nanotechnology (ICE-CCN), 2013 International Conference on
    2013, pp. 590-594
    DOI: 10.1109/ICE-CCN.2013.6528568
    BibTeX
    @inproceedings{Mahalakshmi2013,
     author = {Devi Mahalakshmi and Vijayalakshmi, K. and Agnes, E.},
     title = {A forensic method for detecting image forgery},
     booktitle = {Emerging Trends in Computing, Communication and Nanotechnology (ICE-CCN), 2013 International Conference on},
     year = {2013},
     pages = {590--594}}
    
  153. B. Mahdian, R. Nedbal & S. Saic
    Blind Verification of Digital Image Originality: A Statistical Approach
    Information Forensics and Security, IEEE Transactions on, 2013, Vol. 8(9), pp. 1531-1540
    DOI: 10.1109/TIFS.2013.2276000
    BibTeX
    @article{Mahdian2013,
     author = {Mahdian, B. and Nedbal, R. and Saic, S.},
     title = {Blind Verification of Digital Image Originality: A Statistical Approach},
     journal = {Information Forensics and Security, IEEE Transactions on},
     year = {2013},
     volume = {8},
     number = {9},
     pages = {1531--1540}}
    
  154. B. Mahdian & S. Saic
    A Novel Method for Identifying Exact Sensor Using Multiplicative Noise Component
    Multimedia (ISM), 2013 IEEE International Symposium on
    2013, pp. 241-247
    DOI: 10.1109/ISM.2013.46
    BibTeX
    @inproceedings{Mahdian2013a,
     author = {Mahdian, B. and Saic, S.},
     title = {A Novel Method for Identifying Exact Sensor Using Multiplicative Noise Component},
     booktitle = {Multimedia (ISM), 2013 IEEE International Symposium on},
     year = {2013},
     pages = {241--247}}
    
  155. R.R. Maind, A. Khade & D. Chitre
    Robust Image Copy Move Forgery Detection
    IJAIR, 2013
    BibTeX
    @article{Maind2013,
     author = {Rohini R. Maind and Alka Khade and D.K. Chitre},
     title = {Robust Image Copy Move Forgery Detection},
     journal = {IJAIR},
     year = {2013}}
    
  156. K. Manudhane & M. Bartere
    Methodology for Evidence Reconstruction in Digital Image Forensics
    International Journal of Engineering Research & Technology (IJERT), 2013, Vol. 2(11), pp. 1311-1318
    BibTeX
    @article{Manudhane2013,
     author = {Kalpana Manudhane and M.M. Bartere},
     title = {Methodology for Evidence Reconstruction in Digital Image Forensics},
     journal = {International Journal of Engineering Research & Technology (IJERT)},
     year = {2013},
     volume = {2},
     number = {11},
     pages = {1311--1318}}
    
  157. X. Meng, S. Niu, R. Yan & Y. Li
    Detecting Photographic Cropping Based on Vanishing Points
    Chinese Journal of Electronics, 2013
    BibTeX
    @article{Meng2013,
     author = {Meng, X.. and Niu, S. and Yan, R. and Li, Y.},
     title = {Detecting Photographic Cropping Based on Vanishing Points},
     journal = {Chinese Journal of Electronics},
     year = {2013}}
    
  158. L. Meng-Jiao, N. Shao-Zhang & Z. Jian-Cheng
    Research on Image Detection Algorithm with Markov Process
    Intelligent Information Hiding and Multimedia Signal Processing, 2013 Ninth International Conference on
    2013, pp. 238-241
    DOI: 10.1109/IIH-MSP.2013.68
    BibTeX
    @inproceedings{Meng-Jiao2013,
     author = {Li Meng-Jiao and Niu Shao-Zhang and Zou Jian-Cheng},
     title = {Research on Image Detection Algorithm with Markov Process},
     booktitle = {Intelligent Information Hiding and Multimedia Signal Processing, 2013 Ninth International Conference on},
     year = {2013},
     pages = {238--241}}
    
  159. R. Mercuri
    Courtroom Considerations in Digital Image Forensics
    Sencar, H. T. & Memon, N. (ed.)
    Digital Image Forensics
    Springer New York, 2013, pp. 313-326
    BibTeX
    @incollection{Mercuri2013,
     author = {Rebecca Mercuri},
     title = {Courtroom Considerations in Digital Image Forensics},
     booktitle = {Digital Image Forensics},
     publisher = {Springer New York},
     year = {2013},
     pages = {313--326}}
    
  160. N. Mettripun, N. Khanna, T. Amornraksa & E.J. Delp
    Partial sharpness index for classifying digital camera and scanned images
    Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON), 2013 10th International Conference on
    2013, pp. 1-5
    DOI: 10.1109/ECTICon.2013.6559643
    BibTeX
    @inproceedings{Mettripun2013,
     author = {Mettripun, Narong and Khanna, Nitin and Amornraksa, Thumrongrat and Delp, Edward J.},
     title = {Partial sharpness index for classifying digital camera and scanned images},
     booktitle = {Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON), 2013 10th International Conference on},
     year = {2013},
     pages = {1--5}}
    
  161. S. Milani, M. Tagliasacchi & S. Tubaro
    Antiforensics attacks to benford´s law for the detection of double compressed images
    2013 IEEE International Conference on Acoustics, Speech and Signal Processing
    Institute of Electrical & Electronics Engineers (IEEE), 2013
    DOI: 10.1109/ICASSP.2013.6638219
    BibTeX
    @inproceedings{Milani2013,
     author = {Milani, Simone and Tagliasacchi, Marco and Tubaro, Stefano},
     title = {Antiforensics attacks to benford´s law for the detection of double compressed images},
     booktitle = {2013 IEEE International Conference on Acoustics, Speech and Signal Processing},
     publisher = {Institute of Electrical & Electronics Engineers (IEEE)},
     year = {2013}}
    
  162. A. Mire, S. Dhok, P. Porey & N. Mistry
    Automation of JPEG Ghost Detection using Graph Based Segmentation
    International Journal Of Computational Engineering Research, 2013, Vol. 3(12)
    BibTeX
    @article{Mire2013,
     author = {AV Mire and SB Dhok and PD Porey and NJ Mistry},
     title = {Automation of JPEG Ghost Detection using Graph Based Segmentation},
     journal = {International Journal Of Computational Engineering Research},
     year = {2013},
     volume = {3},
     number = {12}}
    
  163. M. Mishra & F.L.D.M.C. Adhikary
    Digital Image Tamper Detection Techniques - A Comprehensive Study
    International Journal of Computer Science and Business Informatics, 2013
    BibTeX
    @article{Mishra2013a,
     author = {Minati Mishra and Flt. Lt. Dr. M. C. Adhikary},
     title = {Digital Image Tamper Detection Techniques - A Comprehensive Study},
     journal = {International Journal of Computer Science and Business Informatics},
     year = {2013}}
    
  164. M. Mishra & M.C. Adhikary
    Region Duplication Forgery Detection Technique based on SURF and HAC
    International Journal of Computer Science and Business Informatics, 2013, Vol. 2(1), pp. 1 - 12
    BibTeX
    @article{Mishra2013,
     author = {Minati Mishra and M. C. Adhikary},
     title = {Region Duplication Forgery Detection Technique based on SURF and HAC},
     journal = {International Journal of Computer Science and Business Informatics},
     year = {2013},
     volume = {2},
     number = {1},
     pages = {1 -- 12}}
    
  165. Z. Mohamadian & A.A. Pouyan
    Detection of Duplication Forgery in Digital Images in Uniform and Non-uniform Regions
    Computer Modelling and Simulation (UKSim), 2013 UKSim 15th International Conference on
    2013, pp. 455-460
    DOI: 10.1109/UKSim.2013.94
    BibTeX
    @inproceedings{Mohamadian2013,
     author = {Mohamadian, Z. and Pouyan, A. A.},
     title = {Detection of Duplication Forgery in Digital Images in Uniform and Non-uniform Regions},
     booktitle = {Computer Modelling and Simulation (UKSim), 2013 UKSim 15th International Conference on},
     year = {2013},
     pages = {455--460}}
    
  166. H. Muammar & P.L. Dragotti
    An investigation into aliasing in images recaptured from an LCD monitor using a digital camera
    Proc. Speech and Signal Processing 2013 IEEE Int. Conf. Acoustics
    2013, pp. 2242-2246
    DOI: 10.1109/ICASSP.2013.6638053
    BibTeX
    @inproceedings{Muammar2013,
     author = {H. Muammar and P. L. Dragotti},
     title = {An investigation into aliasing in images recaptured from an LCD monitor using a digital camera},
     booktitle = {Proc. Speech and Signal Processing 2013 IEEE Int. Conf. Acoustics},
     year = {2013},
     pages = {2242--2246}}
    
  167. G. Muhammad
    Multi-scale local texture descriptor for image forgery detection
    Industrial Technology (ICIT), 2013 IEEE International Conference on
    2013, pp. 1146-1151
    DOI: 10.1109/ICIT.2013.6505834
    BibTeX
    @inproceedings{Muhammad2013,
     author = {Muhammad, Ghulam},
     title = {Multi-scale local texture descriptor for image forgery detection},
     booktitle = {Industrial Technology (ICIT), 2013 IEEE International Conference on},
     year = {2013},
     pages = {1146--1151}}
    
  168. G. Muhammad, M. Al-Hammadi, M. Hussain & G. Bebis
    Image forgery detection using steerable pyramid transform and local binary pattern
    Machine Vision and Applications, Springer Berlin Heidelberg, 2013, pp. 1-11
    DOI: 10.1007/s00138-013-0547-4
    BibTeX
    @article{Muhammad2013a,
     author = {Muhammad, Ghulam and Al-Hammadi, MunnerH. and Hussain, Muhammad and Bebis, George},
     title = {Image forgery detection using steerable pyramid transform and local binary pattern},
     journal = {Machine Vision and Applications},
     publisher = {Springer Berlin Heidelberg},
     year = {2013},
     pages = {1--11}}
    
  169. G. Muhammad, M.H. Al-Hammadi, M. Hussain, A.M. Mirza & G. Bebis
    Copy move image forgery detection method using steerable pyramid transform and texture descriptor
    EUROCON, 2013 IEEE
    2013, pp. 1586-1592
    DOI: 10.1109/EUROCON.2013.6625188
    BibTeX
    @inproceedings{Muhammad2013b,
     author = {Muhammad, G and Al-Hammadi, M. H. and Hussain, M. and Mirza, A. M. and Bebis, G.},
     title = {Copy move image forgery detection method using steerable pyramid transform and texture descriptor},
     booktitle = {EUROCON, 2013 IEEE},
     year = {2013},
     pages = {1586--1592}}
    
  170. G. Muhammad & M. Hussain
    Passive Detection of Copy - Move Image Forgery using Undecimated Wavelets and Zernike Moments
    INFORMATION, 2013, Vol. 16(5), pp. 2957-2964
    BibTeX
    @article{Muhammad2013c,
     author = {Ghulam Muhammad and Muhammad Hussain},
     title = {Passive Detection of Copy - Move Image Forgery using Undecimated Wavelets and Zernike Moments},
     journal = {INFORMATION},
     year = {2013},
     volume = {16},
     number = {5},
     pages = {2957--2964}}
    
  171. S. Murali, G. Chittapur & H. Prabhakara
    Detection of Digital Photo Image Forgery Using Copy-Create Techniques
    Mohan, S. & Kumar, S. S. (ed.)
    Proceedings of the Fourth International Conference on Signal and Image Processing 2012 (ICSIP 2012)
    Springer India, 2013, Vol. 221, pp. 281-290
    DOI: 10.1007/978-81-322-0997-3_26
    BibTeX
    @incollection{Murali2013,
     author = {Murali, S. and Chittapur, GovndrajB. and Prabhakara, H.S.},
     title = {Detection of Digital Photo Image Forgery Using Copy-Create Techniques},
     booktitle = {Proceedings of the Fourth International Conference on Signal and Image Processing 2012 (ICSIP 2012)},
     publisher = {Springer India},
     year = {2013},
     volume = {221},
     pages = {281--290}}
    
  172. S. Murali, G.B. Chittapur, B.S. Anami & others
    Comparision and analysis of photo image forgery detection techniques
    International Journal on Computational Sciences & Applications (IJCSA), 2013, Vol. 2(6), pp. 45-56
    BibTeX
    @article{Murali2013a,
     author = {Murali, S and Chittapur, Govindraj B and Anami, Basavaraj S and others},
     title = {Comparision and analysis of photo image forgery detection techniques},
     journal = {International Journal on Computational Sciences & Applications (IJCSA)},
     year = {2013},
     volume = {2},
     number = {6},
     pages = {45--56}}
    
  173. C. Neamtu, C. Barca, E. Achimescu & B. Gavriloaia
    Exposing copy-move image tampering using forensic method based on SURF
    Electronics, Computers and Artificial Intelligence (ECAI), 2013 International Conference on
    2013, pp. 1-4
    DOI: 10.1109/ECAI.2013.6636173
    BibTeX
    @inproceedings{Neamtu2013,
     author = {Neamtu, C. and Barca, C. and Achimescu, E. and Gavriloaia, B.},
     title = {Exposing copy-move image tampering using forensic method based on SURF},
     booktitle = {Electronics, Computers and Artificial Intelligence (ECAI), 2013 International Conference on},
     year = {2013},
     pages = {1--4}}
    
  174. A. Newson, A. Almansa, M. Fradet, Y. Gousseau & P. Pérez
    Towards Fast, Generic Video Inpainting
    Proceedings of the 10th European Conference on Visual Media Production
    ACM, 2013, pp. 7:1-7:8
    DOI: 10.1145/2534008.2534019
    BibTeX
    @inproceedings{Newson2013,
     author = {Newson, Alasdair and Almansa, Andrés and Fradet, Matthieu and Gousseau, Yann and Pérez, Patrick},
     title = {Towards Fast, Generic Video Inpainting},
     booktitle = {Proceedings of the 10th European Conference on Visual Media Production},
     publisher = {ACM},
     year = {2013},
     pages = {7:1--7:8}}
    
  175. T.-T. Ng & S.-F. Chang
    Discrimination of Computer Synthesized or Recaptured Images from Real Images
    Sencar, H. T. & Memon, N. (ed.)
    Digital Image Forensics
    Springer New York, 2013, pp. 275-312
    BibTeX
    @incollection{Ng2013,
     author = {Tian-Tsong Ng and Shih-Fu Chang},
     title = {Discrimination of Computer Synthesized or Recaptured Images from Real Images},
     booktitle = {Digital Image Forensics},
     publisher = {Springer New York},
     year = {2013},
     pages = {275--312}}
    
  176. H.C. Nguyen
    Security of Forensic Techniques for Digital Images
    Technische Universität Darmstadt, Technische Universität Darmstadt, 2013
    BibTeX
    @phdthesis{Nguyen2013,
     author = {Hieu Cuong Nguyen},
     title = {Security of Forensic Techniques for Digital Images},
     school = {Technische Universität Darmstadt},
     year = {2013}}
    
  177. H.C. Nguyen & S. Katzenbeisser
    Detecting Resized Double JPEG Compressed Images – Using Support Vector Machine
    Communications and Multimedia Security
    Springer, 2013
    DOI: 10.1007/978-3-642-40779-6_9
    BibTeX
    @incollection{Nguyen2013a,
     author = {Nguyen, Hieu Cuong and Katzenbeisser, Stefan},
     title = {Detecting Resized Double JPEG Compressed Images – Using Support Vector Machine},
     booktitle = {Communications and Multimedia Security},
     publisher = {Springer},
     year = {2013}}
    
  178. NPPA
    NPPA Code of Ethics
    2013
    BibTeX
    @electronic{NPPA2013,
     author = {NPPA},
     title = {NPPA Code of Ethics},
     year = {2013}}
    
  179. A.L.S. Orozco, J.R. Corripio, D.M.A. González, L.J.G. Villalba & J.C.H. Castro
    Techniques for Source Camera Identification
    Proceedings of the ICIT 2013 -- The 6th International Conference on Information Technology
    ICIT, 2013
    BibTeX
    @inproceedings{Orozco2013,
     author = {Ana Lucila Sandoval Orozco and Jocelin Rosales Corripio and David Manuel Arenas González and Luis Javier García Villalba and Julio César Hernández Castro},
     title = {Techniques for Source Camera Identification},
     booktitle = {Proceedings of the ICIT 2013 -- The 6th International Conference on Information Technology},
     journal = {ICIT},
     year = {2013}}
    
  180. L. Pancheri, E. Panina, G.F.D. Betta, L. Gasparini & D. Stoppa
    Compact analog counting SPAD pixel with 1.9% PRNU and 530ps time gating
    Proc. ESSCIRC (ESSCIRC)
    2013, pp. 295-298
    DOI: 10.1109/ESSCIRC.2013.6649131
    BibTeX
    @inproceedings{Pancheri2013,
     author = {L. Pancheri and E. Panina and G. F. Dalla Betta and L. Gasparini and D. Stoppa},
     title = {Compact analog counting SPAD pixel with 1.9% PRNU and 530ps time gating},
     booktitle = {Proc. ESSCIRC (ESSCIRC)},
     year = {2013},
     pages = {295--298}}
    
  181. A. Pande, S. Chen, P. Mohapatra & J. Zambreno
    Hardware Architecture for Video Authentication using Sensor Pattern Noise
    Circuits and Systems for Video Technology, IEEE Transactions on, 2013, Vol. PP(99), pp. 1-1
    DOI: 10.1109/TCSVT.2013.2276869
    BibTeX
    @article{Pande2013,
     author = {Pande, A. and Chen, S. and Mohapatra, P. and Zambreno, J.},
     title = {Hardware Architecture for Video Authentication using Sensor Pattern Noise},
     journal = {Circuits and Systems for Video Technology, IEEE Transactions on},
     year = {2013},
     volume = {PP},
     number = {99},
     pages = {1--1}}
    
  182. C. Pasquini & G. Boato
    JPEG compression anti-forensics based on first significant digit distribution
    Multimedia Signal Processing (MMSP), 2013 IEEE 15th International Workshop on
    2013, pp. 500-505
    DOI: 10.1109/MMSP.2013.6659339
    BibTeX
    @inproceedings{Pasquini2013,
     author = {Pasquini, Cecilia and Boato, Giulia},
     title = {JPEG compression anti-forensics based on first significant digit distribution},
     booktitle = {Multimedia Signal Processing (MMSP), 2013 IEEE 15th International Workshop on},
     year = {2013},
     pages = {500--505}}
    
  183. A. Peng & X. Kang
    Robust Median Filtering Detection Based on Filtered Residual
    Shi, Y., Kim, H.-J. & Pérez-González, F. (ed.)
    Digital Forensics and Watermaking
    Springer Berlin Heidelberg, 2013, Vol. 7809, pp. 344-357
    DOI: 10.1007/978-3-642-40099-5_29
    BibTeX
    @incollection{Peng2013b,
     author = {Peng, Anjie and Kang, Xiangui},
     title = {Robust Median Filtering Detection Based on Filtered Residual},
     booktitle = {Digital Forensics and Watermaking},
     publisher = {Springer Berlin Heidelberg},
     year = {2013},
     volume = {7809},
     pages = {344--357}}
    
  184. F. Peng, J. Li & M. Long
    Discriminating Natural Images and Computer Generated Graphics Based on Compound Fractal Features
    Journal of Computational Information Systems, 2013, Vol. 9(13), pp. 101-5108
    BibTeX
    @article{Peng2013a,
     author = {Fei Peng and Jiaoting Li and Min Long},
     title = {Discriminating Natural Images and Computer Generated Graphics Based on Compound Fractal Features},
     journal = {Journal of Computational Information Systems},
     year = {2013},
     volume = {9},
     number = {13},
     pages = {101--5108}}
    
  185. F. Peng, J. Shi & M. Long
    Comparison and Analysis of the Performance of PRNU Extraction Methods in Source Camera Identification
    Journal of Computational Information Systems, 2013, Vol. 9(14), pp. 585-5592
    BibTeX
    @article{Peng2013,
     author = {Fei Peng and Jiaoling Shi and Min Long},
     title = {Comparison and Analysis of the Performance of PRNU Extraction Methods in Source Camera Identification},
     journal = {Journal of Computational Information Systems},
     year = {2013},
     volume = {9},
     number = {14},
     pages = {585--5592}}
    
  186. Y. Peng & B. Liu
    Accurate estimation of primary quantisation table with applications to tampering detection
    Institution of Engineering and Technology, Electronics Letters, 2013
    DOI: 10.1049/el.2013.2218
    BibTeX
    @article{Peng2013c,
     author = {Yuanyuan Peng and Benyong Liu},
     title = {Accurate estimation of primary quantisation table with applications to tampering detection},
     journal = {Institution of Engineering and Technology, Electronics Letters},
     year = {2013}}
    
  187. A. Piva
    An Overview on Image Forensics
    ISRN Signal Processing, 2013, Vol. 2013, pp. 1-22
    DOI: 10.1155/2013/496701
    BibTeX
    @article{Piva2013,
     author = {Piva, Alessandro},
     title = {An Overview on Image Forensics},
     journal = {ISRN Signal Processing},
     year = {2013},
     volume = {2013},
     pages = {1--22}}
    
  188. Presserat
    Publizistische Grundsätze (Pressekodex) -- Richtlinien für die publizistische Arbeit nach den Empfehlungen des Deutschen Presserats
    2013
    BibTeX
    @electronic{Presserat2013,
     author = {Presserat},
     title = {Publizistische Grundsätze (Pressekodex) -- Richtlinien für die publizistische Arbeit nach den Empfehlungen des Deutschen Presserats},
     year = {2013}}
    
  189. G. Puglisi, A. Bruna, F. Galvan & S. Battiato
    First JPEG Quantization Matrix Estimation Based On Histogram Analysis
    Proc. IEEE International Conference on Image Processing ICIP 2013
    2013, pp. 4502 - 4506
    BibTeX
    @inproceedings{Puglisi2013,
     author = {Giovanni Puglisi and Arcangelo Bruna and Fausto Galvan and Sebastiano Battiato},
     title = {First JPEG Quantization Matrix Estimation Based On Histogram Analysis},
     booktitle = {Proc. IEEE International Conference on Image Processing ICIP 2013},
     year = {2013},
     pages = {4502 -- 4506}}
    
  190. T. Qazi, K. Hayat, S.U. Khan, S.A. Madani, I.A. Khan, J. Kołodziej, H. Li, W. Lin, K.C. Yow & C.-Z. Xu
    Survey on blind image forgery detection
    IET Image Processing, 2013
    DOI: 10.1049/iet-ipr.2012.0388
    BibTeX
    @article{Qazi2013,
     author = {Tanzeela Qazi and Khizar Hayat and Samee U. Khan and Sajjad A. Madani and Imran A. Khan and Joanna Kołodziej and Hongxiang Li and Weiyao Lin and Kin Choong Yow and Cheng-Zhong Xu},
     title = {Survey on blind image forgery detection},
     journal = {IET Image Processing},
     year = {2013}}
    
  191. R. Qian, W. Li & N. Yu
    High precision rotation angle estimation for rotated images
    Multimedia and Expo Workshops (ICMEW), 2013 IEEE International Conference on
    2013, pp. 1-4
    DOI: 10.1109/ICMEW.2013.6618298
    BibTeX
    @inproceedings{Qian2013a,
     author = {Ruohan Qian and Weihai Li and Nenghai Yu},
     title = {High precision rotation angle estimation for rotated images},
     booktitle = {Multimedia and Expo Workshops (ICMEW), 2013 IEEE International Conference on},
     year = {2013},
     pages = {1--4}}
    
  192. R. Qian, W. Li, N. Yu & B. Liu
    High Precision Image Rotation Angle Estimation with Periodicity of Pixel Variance
    Image and Graphics (ICIG), 2013 Seventh International Conference on
    2013, pp. 106-111
    DOI: 10.1109/ICIG.2013.27
    BibTeX
    @inproceedings{Qian2013,
     author = {Ruohan Qian and Weihai Li and Nenghai Yu and Bin Liu},
     title = {High Precision Image Rotation Angle Estimation with Periodicity of Pixel Variance},
     booktitle = {Image and Graphics (ICIG), 2013 Seventh International Conference on},
     year = {2013},
     pages = {106--111}}
    
  193. Z. Qian & T. Qiao
    Simplified Anti-Forensics of JPEG Compression
    Journal of Computers, ACADEMY PUBLISHER, 2013, Vol. 8(10), pp. 2483-2488
    DOI: 10.4304/jcp.8.10.2483-2488
    BibTeX
    @article{Qian2013b,
     author = {Zhenxing Qian and Tong Qiao},
     title = {Simplified Anti-Forensics of JPEG Compression},
     journal = {Journal of Computers},
     publisher = {ACADEMY PUBLISHER},
     year = {2013},
     volume = {8},
     number = {10},
     pages = {2483--2488}}
    
  194. Z. Qu, X. Kang, J. Huang & Y. Li
    Forensic sensor pattern noise extraction from large image data set
    Proc. Speech and Signal Processing 2013 IEEE Int. Conf. Acoustics
    2013, pp. 3023-3027
    DOI: 10.1109/ICASSP.2013.6638213
    BibTeX
    @inproceedings{Qu2013a,
     author = {Z. Qu and X. Kang and J. Huang and Y. Li},
     title = {Forensic sensor pattern noise extraction from large image data set},
     booktitle = {Proc. Speech and Signal Processing 2013 IEEE Int. Conf. Acoustics},
     year = {2013},
     pages = {3023--3027}}
    
  195. Z. Qu, X. Kang, J. Huang & S.Y.-S. Yinxiang Li
    Forensic Sensor Pattern Noise Extraction From Large Image Data Set
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013
    Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013, 2013
    DOI: 10.1109/icassp.2013.6638213
    BibTeX
    @inproceedings{Qu2013,
     author = {Zhenhua Qu and Xiangui Kang and Jiwu Huang and Yinxiang Li, Sun Yat-Sen},
     title = {Forensic Sensor Pattern Noise Extraction From Large Image Data Set},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013},
     journal = {Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013},
     year = {2013}}
    
  196. D. Quick & K.-K.R. Choo
    Forensic collection of cloud storage data: Does the act of collection result in changes to the data or its metadata?
    Digital Investigation, 2013(0), pp. -
    DOI: 10.1016/j.diin.2013.07.001
    BibTeX
    @article{Quick2013,
     author = {Darren Quick and Kim-Kwang Raymond Choo},
     title = {Forensic collection of cloud storage data: Does the act of collection result in changes to the data or its metadata?},
     journal = {Digital Investigation},
     year = {2013},
     number = {0},
     pages = {-}}
    
  197. S. Rahman & A. Robles-Kelly
    A Method For Estimating Light Direction, Shape, And Reflection Parameters From A Single Image
    Proc. IEEE International Conference on Image Processing ICIP 2013
    2013, pp. 2034-2038
    BibTeX
    @inproceedings{Rahman2013,
     author = {Sejuti Rahman and Antonio Robles-Kelly},
     title = {A Method For Estimating Light Direction, Shape, And Reflection Parameters From A Single Image},
     booktitle = {Proc. IEEE International Conference on Image Processing ICIP 2013},
     year = {2013},
     pages = {2034--2038}}
    
  198. V. Raj & L. Thomas
    A Novel Approach for Forgery Detection of Images
    International Journal of Application or Innovation in Engineering & Management (IJAIEM), 2013
    BibTeX
    @article{Raj2013,
     author = {Vimal Raj and Lija Thomas},
     title = {A Novel Approach for Forgery Detection of Images},
     journal = {International Journal of Application or Innovation in Engineering & Management (IJAIEM)},
     year = {2013}}
    
  199. M. Purnachandra Rao & A. Rajagopalan
    Harnessing Motion Blur To Uncover Splicing
    Proc. IEEE International Conference on Image Processing ICIP 2013
    2013, pp. 4507 - 4511
    BibTeX
    @inproceedings{PurnachandraRao2013,
     author = {M. Purnachandra Rao and A.N. Rajagopalan},
     title = {Harnessing Motion Blur To Uncover Splicing},
     booktitle = {Proc. IEEE International Conference on Image Processing ICIP 2013},
     year = {2013},
     pages = {4507 -- 4511}}
    
  200. Q. Rao, H. Li, W. Luo & J. Huang
    Anti-Forensics of the Triangle Test by Random Fingerprint-Copy Attack
    Computational Visual Media Conference, 2013
    BibTeX
    @article{Rao2013,
     author = {Quanquan Rao and Haodong Li and Weiqi Luo and Jiwu Huang},
     title = {Anti-Forensics of the Triangle Test by Random Fingerprint-Copy Attack},
     journal = {Computational Visual Media Conference},
     year = {2013}}
    
  201. C. Riess
    Physics-based and Statistical Features for Image Forensics -- Physikalische und statistische Merkmale in der Bildforensik
    Der Technischen Fakultät der Universität Erlangen--Nürnberg, Der Technischen Fakultät der Universität Erlangen--Nürnberg, 2013
    BibTeX
    @phdthesis{Riess2013,
     author = {Christian Riess},
     title = {Physics-based and Statistical Features for Image Forensics -- Physikalische und statistische Merkmale in der Bildforensik},
     school = {Der Technischen Fakultät der Universität Erlangen--Nürnberg},
     year = {2013}}
    
  202. A. Ruifrok, Z. Geradts & J. Bijhold
    Imaging
    Proceedings of the17th Interpol International Forensic Science Managers Symposium, Lyon
    2013, pp. 638-651
    BibTeX
    @inproceedings{Ruifrok2013,
     author = {Arnout Ruifrok and Zeno Geradts and Jurrien Bijhold},
     title = {Imaging},
     booktitle = {Proceedings of the17th Interpol International Forensic Science Managers Symposium, Lyon},
     year = {2013},
     pages = {638--651}}
    
  203. S.-J. Ryu, M. Kirchner, M.-J. Lee & H.-K. Lee
    Rotation Invariant Localization of Duplicated Image Regions Based on Zernike Moments
    IEEE Transactions on Information Forensics and Security, 2013, Vol. 8(8), pp. 1355-1370
    DOI: 10.1109/TIFS.2013.2272377
    BibTeX
    @article{Ryu2013,
     author = {S.-J. Ryu and Kirchner, M. and Lee, M.-J. and Lee, H.-K.},
     title = {Rotation Invariant Localization of Duplicated Image Regions Based on Zernike Moments},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2013},
     volume = {8},
     number = {8},
     pages = {1355--1370}}
    
  204. A. Saini
    A Survey on Passive-Blind Image Forensics
    Proceedings of the second International Conference on Role of Technology in Nation Building (ICRTNB - 2013), 2013
    BibTeX
    @article{Saini2013,
     author = {Anupama Saini},
     title = {A Survey on Passive-Blind Image Forensics},
     journal = {Proceedings of the second International Conference on Role of Technology in Nation Building (ICRTNB - 2013)},
     year = {2013}}
    
  205. A. Sandoval Orozco, D. Arenas González, J. Rosales Corripio, L. García Villalba & J. Hernandez-Castro
    Source identification for mobile devices, based on wavelet transforms combined with sensor imperfections
    Computing, Springer Vienna, 2013, Vol. -, pp. 1-13
    DOI: 10.1007/s00607-013-0313-5
    BibTeX
    @article{SandovalOrozco2013,
     author = {Sandoval Orozco, A.L. and Arenas González, D.M. and Rosales Corripio, J. and García Villalba, L.J. and Hernandez-Castro, J.C.},
     title = {Source identification for mobile devices, based on wavelet transforms combined with sensor imperfections},
     journal = {Computing},
     publisher = {Springer Vienna},
     year = {2013},
     volume = {-},
     pages = {1--13}}
    
  206. R. Satta & P. Stirparo
    Picture-to-Identity linking of social network accounts based on Sensor Pattern Noise
    Proceedings International Conference on Imaging for Crime Detection and Prevention (ICDP 2013), Kingston University London, UK
    2013
    DOI: 10.1049/ic.2013.0266
    BibTeX
    @inproceedings{Satta2013,
     author = {Riccardo Satta and Pasquale Stirparo},
     title = {Picture-to-Identity linking of social network accounts based on Sensor Pattern Noise},
     booktitle = {Proceedings International Conference on Imaging for Crime Detection and Prevention (ICDP 2013), Kingston University London, UK},
     year = {2013}}
    
  207. H.T. Sencar & N.D. Memon
    Digital Image Forensics: There is More to a Picture than Meets the Eye
    Springer, 2013
    BibTeX
    @book{Sencar2013,
     author = {Husrev T. Sencar and Nasir D. Memon},
     title = {Digital Image Forensics: There is More to a Picture than Meets the Eye},
     publisher = {Springer},
     year = {2013}}
    
  208. M. Shabanifard, M.G. Shayesteh & M.A. Akhaee
    Forensic detection of image manipulation using the Zernike moments and pixel-pair histogram
    Institution of Engineering and Technology, Institution of Engineering and Technology, 2013, pp. -(0)
    BibTeX
    @article{Shabanifard2013,
     author = {Mahmood Shabanifard and Mahrokh G. Shayesteh and Mohammad Ali Akhaee},
     title = {Forensic detection of image manipulation using the Zernike moments and pixel-pair histogram},
     journal = {Institution of Engineering and Technology},
     publisher = {Institution of Engineering and Technology},
     year = {2013},
     pages = {-(0)}}
    
  209. T. Shanableh
    Detection of frame deletion for digital video forensics
    Digital Investigation, 2013(0), pp. -
    DOI: 10.1016/j.diin.2013.10.004
    BibTeX
    @article{Shanableh2013,
     author = {Tamer Shanableh},
     title = {Detection of frame deletion for digital video forensics},
     journal = {Digital Investigation},
     year = {2013},
     number = {0},
     pages = {-}}
    
  210. A. Sharang & P. Jindal
    Digital Image forensics using noise features
    Department of Computer Science & Engineering, Indian Institute of Technology (IIT), Kanpur, Department of Computer Science & Engineering, Indian Institute of Technology (IIT), Kanpur, 2013
    BibTeX
    @techreport{Sharang2013,
     author = {Abhijit Sharang and Pankaj Jindal},
     title = {Digital Image forensics using noise features},
     school = {Department of Computer Science & Engineering, Indian Institute of Technology (IIT), Kanpur},
     year = {2013}}
    
  211. C. Sharma & U. Datta
    Copy-Move Image Forgery Detection by DyWT and DCT using Euclidean distances
    International Journal of Computer Technology and Electronics Communication, 2013
    BibTeX
    @article{Sharma2013a,
     author = {Chetna Sharma and Unmukh Datta},
     title = {Copy-Move Image Forgery Detection by DyWT and DCT using Euclidean distances},
     journal = {International Journal of Computer Technology and Electronics Communication},
     year = {2013}}
    
  212. D. Sharma & P. Abrol
    Digital Image Tampering -- A Threat to Security Management
    International Journal of Advanced Research in Computer and Communication Engineering, 2013, Vol. 2(10), pp. 4120 - 4123
    BibTeX
    @article{Sharma2013,
     author = {Deepika Sharma and Pawanesh Abrol},
     title = {Digital Image Tampering -- A Threat to Security Management},
     journal = {International Journal of Advanced Research in Computer and Communication Engineering},
     year = {2013},
     volume = {2},
     number = {10},
     pages = {4120 -- 4123}}
    
  213. X. Shen, Y. Zhu, Y. Lv & H. Chen
    Image Copy-Move Forgery Detection Based on SIFT and Gray Level
    Applied Mechanics and Materials, Trans Tech Publ, 2013, Vol. 263, pp. 3021-3024
    BibTeX
    @article{Shen2013,
     author = {Shen, X.J. and Zhu, Y. and Lv, Y.D. and Chen, H.P.},
     title = {Image Copy-Move Forgery Detection Based on SIFT and Gray Level},
     journal = {Applied Mechanics and Materials},
     publisher = {Trans Tech Publ},
     year = {2013},
     volume = {263},
     pages = {3021--3024}}
    
  214. Y. Sheng, H. Wang & G. Zhang
    Comparison and Analysis of Copy-Move Forgery Detection Algorithms for Electronic Image Processing
    Jin, D. & Lin, S. (ed.)
    Advances in Mechanical and Electronic Engineering
    Springer Berlin Heidelberg, 2013, Vol. 178, pp. 343-348
    BibTeX
    @incollection{Sheng2013,
     author = {Sheng, YunZhong and Wang, HangJun and Zhang, GuangQun},
     title = {Comparison and Analysis of Copy-Move Forgery Detection Algorithms for Electronic Image Processing},
     booktitle = {Advances in Mechanical and Electronic Engineering},
     publisher = {Springer Berlin Heidelberg},
     year = {2013},
     volume = {178},
     pages = {343--348}}
    
  215. A.R. Soobhany, K.P. Lam, P. Fletcher & D. Collins
    Source Identification Of Camera Phones Using Svd
    Proc. IEEE International Conference on Image Processing ICIP 2013
    2013, pp. 4487-4491
    BibTeX
    @inproceedings{Soobhany2013,
     author = {Ahmad Ryad Soobhany and K. P. Lam and Peter Fletcher and David Collins},
     title = {Source Identification Of Camera Phones Using Svd},
     booktitle = {Proc. IEEE International Conference on Image Processing ICIP 2013},
     year = {2013},
     pages = {4487--4491}}
    
  216. M.S. Sreelakshmi & D. Venkataraman
    Image compression using anti-forensics method
    CoRR, 2013, Vol. abs/1303.2330
    BibTeX
    @article{Sreelakshmi2013,
     author = {M. S. Sreelakshmi and D. Venkataraman},
     title = {Image compression using anti-forensics method},
     journal = {CoRR},
     year = {2013},
     volume = {abs/1303.2330}}
    
  217. M.S. Sreelakshmi & D. Venkataraman
    Image compression using anti-forensics method
    arxiv, 2013
    BibTeX
    @article{Sreelakshmi2013a,
     author = {M. S. Sreelakshmi and D. Venkataraman},
     title = {Image compression using anti-forensics method},
     journal = {arxiv},
     year = {2013}}
    
  218. M. Stamm, M. Wu & K.J.R. Liu
    Information Forensics: An Overview of the First Decade
    IEEE Access, 2013, Vol. 1, pp. 167-200
    DOI: 10.1109/ACCESS.2013.2260814
    BibTeX
    @article{Stamm2013,
     author = {Stamm, M and Wu, M. and Liu, K. J. R.},
     title = {Information Forensics: An Overview of the First Decade},
     journal = {IEEE Access},
     year = {2013},
     volume = {1},
     pages = {167--200}}
    
  219. B. Su, Q. Yuan, Y. Zhang, M. Zhai & S. Wang
    Rapid Image Splicing Detection Based on Relevance Vector Machine
    Shi, Y., Kim, H.-J. & Pérez-González, F. (ed.)
    Digital Forensics and Watermaking
    Springer Berlin Heidelberg, 2013, Vol. 7809, pp. 300-310
    DOI: 10.1007/978-3-642-40099-5_25
    BibTeX
    @incollection{Su2013,
     author = {Su, Bo and Yuan, Quanqiao and Zhang, Yujin and Zhai, Mengying and Wang, Shilin},
     title = {Rapid Image Splicing Detection Based on Relevance Vector Machine},
     booktitle = {Digital Forensics and Watermaking},
     publisher = {Springer Berlin Heidelberg},
     year = {2013},
     volume = {7809},
     pages = {300--310}}
    
  220. M. Tagliasacchi, M. Visentini-Scarzanella, P.L. Dragotti & S. Tubaro
    Transform Coder Identification
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013
    2013
    BibTeX
    @inproceedings{Tagliasacchi2013,
     author = {Marco Tagliasacchi and Marco Visentini-Scarzanella and Pier Luigi Dragotti and Stefano Tubaro},
     title = {Transform Coder Identification},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013},
     year = {2013}}
    
  221. W. Taktak & J.-L. Dugelay
    Digital Image Forensics: A Two-Step Approach for Identifying Source and Detecting Forgeries
    The Era of Interactive Media
    Springer New York, 2013, pp. 37-51
    DOI: 10.1007/978-1-4614-3501-3_4
    BibTeX
    @incollection{Taktak2013,
     author = {Taktak, Wiem and Dugelay, Jean-Luc},
     title = {Digital Image Forensics: A Two-Step Approach for Identifying Source and Detecting Forgeries},
     booktitle = {The Era of Interactive Media},
     publisher = {Springer New York},
     year = {2013},
     pages = {37--51}}
    
  222. G.R. Talmale & Y. Malode
    Study Of Different Techniques Of Image Forgery Detection
    International Journal of Advanced Research in Computer Science, 2013, Vol. 4(1), pp. 8-13
    BibTeX
    @article{Talmale2013,
     author = {Girish. R. Talmale and Yogesh Malode},
     title = {Study Of Different Techniques Of Image Forgery Detection},
     journal = {International Journal of Advanced Research in Computer Science},
     year = {2013},
     volume = {4},
     number = {1},
     pages = {8--13}}
    
  223. S.A. Thajeel & G.B. Sulong
    State of The Art of Copy-move Forgery Detection Techniques: A Review
    IJCSI International Journal of Computer Science, 2013, Vol. 10(6), pp. 174-183
    BibTeX
    @article{Thajeel2013,
     author = {Thajeel, Salam A. and Ghazali Bin Sulong},
     title = {State of The Art of Copy-move Forgery Detection Techniques: A Review},
     journal = {IJCSI International Journal of Computer Science},
     year = {2013},
     volume = {10},
     number = {6},
     pages = {174--183}}
    
  224. E. Tokuda, H. Pedrini & A. Rocha
    Computer Generated Images vs. Digital Photographs: A Synergetic Feature and Classifier Combination Approach
    Journal of Visual Communication and Image Representation, 2013(0), pp. -
    DOI: 10.1016/j.jvcir.2013.08.009
    BibTeX
    @article{Tokuda2013,
     author = {Eric Tokuda and Helio Pedrini and Anderson Rocha},
     title = {Computer Generated Images vs. Digital Photographs: A Synergetic Feature and Classifier Combination Approach},
     journal = {Journal of Visual Communication and Image Representation},
     year = {2013},
     number = {0},
     pages = {-}}
    
  225. Y. Tomioka, Y. Ito & H. Kitazawa
    Robust Digital Camera Identification Based on Pairwise Magnitude Relations of Clustered Sensor Pattern Noise
    IEEE Transactions on Information Forensics and Security, 2013, Vol. 8(12), pp. 1986-1995
    DOI: 10.1109/TIFS.2013.2284761
    BibTeX
    @article{Tomioka2013,
     author = {Y. Tomioka and Ito, Y. and Kitazawa, H.},
     title = {Robust Digital Camera Identification Based on Pairwise Magnitude Relations of Clustered Sensor Pattern Noise},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2013},
     volume = {8},
     number = {12},
     pages = {1986--1995}}
    
  226. S. Tong, Z. Zhang, Y. Xie & X. Wu
    Image Splicing Detection Based on Statistical Properties of Benford Model
    Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013)
    2013
    DOI: 10.2991/iccsee.2013.200
    BibTeX
    @inproceedings{Tong2013,
     author = {Tong, Senfeng And Zhang, Zhen And Xie, Yongjie And Wu, Xiaodi},
     title = {Image Splicing Detection Based on Statistical Properties of Benford Model},
     booktitle = {Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013)},
     year = {2013}}
    
  227. S.F. Tong, Y.H. Yang & Y.J. Xie
    Distinguishing Computer Graphics from Natural Images Based on Statistical Characteristics
    Vehicle, Mechatronics and Information Technologies, 2013, Vol. 380 - 384, pp. 1306-1309
    DOI: 10.4028/www.scientific.net/AMM.380-384.1306
    BibTeX
    @article{Tong2013a,
     author = {Sen Feng Tong and Yu Hao Yang and Yong Jie Xie},
     title = {Distinguishing Computer Graphics from Natural Images Based on Statistical Characteristics},
     journal = {Vehicle, Mechatronics and Information Technologies},
     year = {2013},
     volume = {380 - 384},
     pages = {1306--1309}}
    
  228. D. Tralic, I. Zupancic, S. Grgic & M. Grgic
    CoMoFoD --- New database for copy-move forgery detection
    ELMAR, 2013 55th International Symposium
    2013, pp. 49-54
    BibTeX
    @inproceedings{Tralic2013,
     author = {Tralic, Dijana and Zupancic, Ivan and Grgic, Sonja and Grgic, Mislay},
     title = {CoMoFoD --- New database for copy-move forgery detection},
     booktitle = {ELMAR, 2013 55th International Symposium},
     year = {2013},
     pages = {49--54}}
    
  229. G. Ulutas & M. Ulutas
    Image forgery detection using Color Coherence Vector
    Electronics, Computer and Computation (ICECCO), 2013 International Conference on
    2013, pp. 107-110
    DOI: 10.1109/ICECCO.2013.6718240
    BibTeX
    @inproceedings{Ulutas2013b,
     author = {Ulutas, G. and Ulutas, M.},
     title = {Image forgery detection using Color Coherence Vector},
     booktitle = {Electronics, Computer and Computation (ICECCO), 2013 International Conference on},
     year = {2013},
     pages = {107--110}}
    
  230. G. Ulutas, M. Ulutas & V.V. Nabiyev
    Copy move forgery detection based on LBP
    Signal Processing and Communications Applications Conference (SIU), 2013 21st
    2013, pp. 1-4
    DOI: 10.1109/SIU.2013.6531569
    BibTeX
    @inproceedings{Ulutas2013,
     author = {Ulutas, G. and Ulutas, M. and Nabiyev, V. V.},
     title = {Copy move forgery detection based on LBP},
     booktitle = {Signal Processing and Communications Applications Conference (SIU), 2013 21st},
     year = {2013},
     pages = {1--4}}
    
  231. G. Valenzise, M. Tagliasacchi & S. Tubaro
    Revealing the Traces of JPEG Compression Anti-Forensics
    IEEE Transactions on Information Forensics and Security, 2013, Vol. 8(2), pp. 335-349
    DOI: 10.1109/TIFS.2012.2234117
    BibTeX
    @article{Valenzise2013,
     author = {Valenzise, Giuseppe and Tagliasacchi, Marco and Tubaro, Stefano},
     title = {Revealing the Traces of JPEG Compression Anti-Forensics},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2013},
     volume = {8},
     number = {2},
     pages = {335--349}}
    
  232. J. Valera & N. Garcia
    Unambiguous interpolation rate estimation in uncompressed resized color digital images
    Biometrics and Forensics (IWBF), 2013 International Workshop on
    2013, pp. 1-4
    DOI: 10.1109/IWBF.2013.6547314
    BibTeX
    @inproceedings{Valera2013,
     author = {Jesus Valera and Narciso Garcia},
     title = {Unambiguous interpolation rate estimation in uncompressed resized color digital images},
     booktitle = {Biometrics and Forensics (IWBF), 2013 International Workshop on},
     year = {2013},
     pages = {1--4}}
    
  233. D. Vázquez-Padın, P. Comesana & F. Pérez-González
    Set-Membership Identification of Resampled Signals
    2013 IEEE International Workshop on Information Forensics and Security (WIFS)
    Institute of Electrical & Electronics Engineers (IEEE), 2013
    DOI: 10.1109/WIFS.2013.6707810
    BibTeX
    @inproceedings{Vazquez-Padin2013,
     author = {D. Vázquez-Padın and P. Comesana and F Pérez-González},
     title = {Set-Membership Identification of Resampled Signals},
     booktitle = {2013 IEEE International Workshop on Information Forensics and Security (WIFS)},
     publisher = {Institute of Electrical & Electronics Engineers (IEEE)},
     year = {2013}}
    
  234. S. Venkata
    Pixel Estimation Based Video Forgery Detection
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013
    Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013, 2013
    DOI: 10.1109/icassp.2013.6638216
    BibTeX
    @inproceedings{Venkata2013,
     author = {Subramanyam Venkata},
     title = {Pixel Estimation Based Video Forgery Detection},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013},
     journal = {Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013},
     year = {2013}}
    
  235. N.D. Wandji & S. Xingming
    Robust Detection of Copy-Move Forgery in Color Images
    2013
    BibTeX
    @electronic{Wandji2013a,
     author = {Nathalie Diane Wandji and Sun Xingming},
     title = {Robust Detection of Copy-Move Forgery in Color Images},
     year = {2013}}
    
  236. N.D. Wandji, S. Xingming & M.F. Kue
    Detection of copy-move forgery in digital images based on DCT
    Arxiv, 2013
    BibTeX
    @article{Wandji2013,
     author = {Nathalie Diane Wandji and Sun Xingming and Moise Fah Kue},
     title = {Detection of copy-move forgery in digital images based on DCT},
     journal = {Arxiv},
     year = {2013}}
    
  237. T. Wang, J. Tang & B. Luo
    Blind Detection of Region Duplication Forgery by Merging Blur and Affine Moment Invariants
    Proc. Seventh Int Image and Graphics (ICIG) Conf
    2013, pp. 258-264
    DOI: 10.1109/ICIG.2013.61
    BibTeX
    @inproceedings{Wang2013b,
     author = {T. Wang and J. Tang and B. Luo},
     title = {Blind Detection of Region Duplication Forgery by Merging Blur and Affine Moment Invariants},
     booktitle = {Proc. Seventh Int Image and Graphics (ICIG) Conf},
     year = {2013},
     pages = {258--264}}
    
  238. W. Wang, X. Jiang, S. Wang & T. Sun
    Estimation of the primary quantization parameter in MPEG videos
    Visual Communications and Image Processing (VCIP), 2013
    2013, pp. 1-6
    DOI: 10.1109/VCIP.2013.6706413
    BibTeX
    @inproceedings{Wang2013,
     author = {Wang, Wan and Jiang, Xinghao and Wang, Shilin and Sun, Tanfeng},
     title = {Estimation of the primary quantization parameter in MPEG videos},
     booktitle = {Visual Communications and Image Processing (VCIP), 2013},
     year = {2013},
     pages = {1--6}}
    
  239. W. Wang, F. Zeng, H. Yuan & X. Duan
    Identifying Image Composites by Detecting Discrepancies in Defocus and Motion Blur
    Journal of Computers, 2013, Vol. 8(11)
    DOI: 10.4304/jcp.8.11.2789-2794
    BibTeX
    @article{Wang2013a,
     author = {Wei Wang and Feng Zeng and Honglin Yuan and Xintao Duan},
     title = {Identifying Image Composites by Detecting Discrepancies in Defocus and Motion Blur},
     journal = {Journal of Computers},
     year = {2013},
     volume = {8},
     number = {11}}
    
  240. J. Watanabe, T. Hosaka & T. Hamamoto
    Sensor-Pattern-Noise Map Reconstruction in Source Camera Identification for Size-Reduced Images
    IEICE TRANSACTIONS on Information and Systems, 2013, Vol. E96-D(8), pp. 1882-1885
    BibTeX
    @article{Watanabe2013,
     author = {Joji Watanabe And Tadaaki Hosaka And Takayuki Hamamoto},
     title = {Sensor-Pattern-Noise Map Reconstruction in Source Camera Identification for Size-Reduced Images},
     journal = {IEICE TRANSACTIONS on Information and Systems},
     year = {2013},
     volume = {E96-D},
     number = {8},
     pages = {1882--1885}}
    
  241. J. Wen
    Duplicated Region Detection Using Robust Features
    International Journal of Applied Mathematics and Statistics, 2013, Vol. 49(19)
    BibTeX
    @article{Wen2013,
     author = {Jiang Wen},
     title = {Duplicated Region Detection Using Robust Features},
     journal = {International Journal of Applied Mathematics and Statistics},
     year = {2013},
     volume = {49},
     number = {19}}
    
  242. L. Wu, X. Kong, B. Wang & S. Shang
    Image tampering localization via estimating the non-aligned double JPEG compression
    Proc. SPIE 8665, Media Watermarking, Security, and Forensics, 2013, pp. 86650R-86650R-7
    DOI: 10.1117/12.2003695
    BibTeX
    @article{Wu2013b,
     author = {Wu, Lanying and Kong, Xiangwei and Wang, Bo and Shang, Shize},
     title = {Image tampering localization via estimating the non-aligned double JPEG compression},
     journal = {Proc. SPIE 8665, Media Watermarking, Security, and Forensics},
     year = {2013},
     pages = {86650R-86650R-7}}
    
  243. S. Wu & D. Shen
    Blind Detection of Tampered JPEG Image Based on Blocking Artifacts of Double Quantization
    Applied Mechanics and Materials, Trans Tech Publ, 2013, Vol. 263, pp. 3104-3107
    BibTeX
    @article{Wu2013,
     author = {Wu, S.B. and Shen, D.S.},
     title = {Blind Detection of Tampered JPEG Image Based on Blocking Artifacts of Double Quantization},
     journal = {Applied Mechanics and Materials},
     publisher = {Trans Tech Publ},
     year = {2013},
     volume = {263},
     pages = {3104--3107}}
    
  244. Z.-H. Wu, M.C. Stamm & K.J.R. Liu
    Anti-forensics Of Median Filtering
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013
    Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013, 2013
    DOI: 10.1109/icassp.2013.6638217
    BibTeX
    @inproceedings{Wu2013a,
     author = {Zhung-Han Wu and Matthew C. Stamm and K. J. Ray Liu},
     title = {Anti-forensics Of Median Filtering},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013},
     journal = {Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013},
     year = {2013}}
    
  245. Y.J. Xie, Y. Bao, S.F. Tong & Y.H. Yang
    Source Camera Identification Based on In-and-Inter Channel Traces
    Applied Mechanics and Materials, 2013, Vol. 380-384, pp. 3754-3757
    DOI: 10.4028/www.scientific.net/AMM.380-384.3754
    BibTeX
    @article{Xie2013a,
     author = {Yong Jie Xie and Yi Bao and Sen Feng Tong and Yu Hao Yang},
     title = {Source Camera Identification Based on In-and-Inter Channel Traces},
     journal = {Applied Mechanics and Materials},
     year = {2013},
     volume = {380-384},
     pages = {3754--3757}}
    
  246. Y.-j. Xie, BAO Yi, TONG Sen-feng & YANG Yu-hao
    Source Digital Image Identification based on Cross-correlation
    Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013)
    2013, pp. 201
    DOI: 10.2991/iccsee.2013.199
    BibTeX
    @inproceedings{Xie2013,
     author = {Xie, Yong-jie and BAO, Yi and TONG, Sen-feng and YANG, Yu-hao},
     title = {Source Digital Image Identification based on Cross-correlation},
     booktitle = {Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013)},
     year = {2013},
     pages = {201}}
    
  247. W. Xiuping, B. Ruilin & G. Xinnian
    Camera calibration method based on a flexible spliced pattern of equilateral triangles
    Chinese Automation Congress (CAC), 2013
    2013, pp. 250-254
    DOI: 10.1109/CAC.2013.6775737
    BibTeX
    @inproceedings{Xiuping2013,
     author = {Wang Xiuping and Bai Ruilin and Guo Xinnian},
     title = {Camera calibration method based on a flexible spliced pattern of equilateral triangles},
     booktitle = {Chinese Automation Congress (CAC), 2013},
     year = {2013},
     pages = {250--254}}
    
  248. B. Xu, G. Liu & Y. Dai
    Detect Image splicing using merged features in chroma space
    The Scientific World Journal, 2013
    BibTeX
    @article{Xu2013,
     author = {Bo Xu and Guangjie Liu and Yuewei Dai},
     title = {Detect Image splicing using merged features in chroma space},
     journal = {The Scientific World Journal},
     year = {2013}}
    
  249. C. Yan
    Research on forensic identification of forged images
    Proc. Int Mechatronic Sciences, Electric Engineering and Computer (MEC) Conf
    2013, pp. 1152-1155
    DOI: 10.1109/MEC.2013.6885238
    BibTeX
    @inproceedings{Yan2013,
     author = {Cheng Yan},
     title = {Research on forensic identification of forged images},
     booktitle = {Proc. Int Mechatronic Sciences, Electric Engineering and Computer (MEC) Conf},
     year = {2013},
     pages = {1152--1155}}
    
  250. B. Yang & B. Liu
    Image Forgery Detection via Multifeature Classification
    Journal of Pattern Recognition & Image Processing, 2013
    BibTeX
    @article{Yang2013a,
     author = {Benjuan Yang and Benyong Liu},
     title = {Image Forgery Detection via Multifeature Classification},
     journal = {Journal of Pattern Recognition & Image Processing},
     year = {2013}}
    
  251. B. Yang, X. Sun, X. Chen, J. Zhang & X. Li
    An Efficient Forensic Method for Copy-move Forgery Detection Based on DWT-FWHT.
    Radioengineering, 2013, Vol. 22(4), pp. 1098-1105
    BibTeX
    @article{Yang2013b,
     author = {Bin Yang And Xingming Sun And Xianyi Chen And Jianjun Zhang And Xu Li},
     title = {An Efficient Forensic Method for Copy-move Forgery Detection Based on DWT-FWHT.},
     journal = {Radioengineering},
     year = {2013},
     volume = {22},
     number = {4},
     pages = {1098--1105}}
    
  252. J. Yang, E. Ran, D. Xiao & I. Tan
    Digital Image Forgery Forensics by Using Undecimated Dyadic Wavelet Transform and Zernike Moments
    Journal of Computational Information Systems, 2013, Vol. 9(16), pp. 6399-6408
    BibTeX
    @article{Yang2013,
     author = {Jiyun Yang And Ei Ran And Di Xiao And Inyong Tan},
     title = {Digital Image Forgery Forensics by Using Undecimated Dyadic Wavelet Transform and Zernike Moments},
     journal = {Journal of Computational Information Systems},
     year = {2013},
     volume = {9},
     number = {16},
     pages = {6399--6408}}
    
  253. H. Zeng, Y. Jiang, X. Kang & L. Liu
    Game Theoretic Analysis of Camera Source Identification
    Proceedings of the APSIPA
    2013
    DOI: 10.1109/apsipa.2013.6694150
    BibTeX
    @inproceedings{Zeng2013a,
     author = {Hui Zeng and Yunwen Jiang and Xiangui Kang and Li Liu},
     title = {Game Theoretic Analysis of Camera Source Identification},
     booktitle = {Proceedings of the APSIPA},
     year = {2013}}
    
  254. H. Zeng, X. Kang & J. Huang
    Mixed-strategy Nash Equilibrium In The Camera Source Identification Game
    Proc. IEEE International Conference on Image Processing ICIP 2013
    2013, pp. 4472-4476
    DOI: 10.1109/icip.2013.6738921
    BibTeX
    @inproceedings{Zeng2013,
     author = {Hui Zeng and Xiangui Kang and Jiwu Huang},
     title = {Mixed-strategy Nash Equilibrium In The Camera Source Identification Game},
     booktitle = {Proc. IEEE International Conference on Image Processing ICIP 2013},
     year = {2013},
     pages = {4472--4476}}
    
  255. Y. Zhang, C. Zhao, Y. Pi, S. Li & S. Wang
    Image-splicing forgery detection based on local binary patterns of DCT coefficients
    Security and Communication Networks, 2013, Vol. -, pp. n/a-n/a
    DOI: 10.1002/sec.721
    BibTeX
    @article{Zhang2013,
     author = {Zhang, Yujin and Zhao, Chenglin and Pi, Yiming and Li, Shenghong and Wang, Shilin},
     title = {Image-splicing forgery detection based on local binary patterns of DCT coefficients},
     journal = {Security and Communication Networks},
     year = {2013},
     volume = {-},
     pages = {n/a--n/a}}
    
  256. Y.-j. Zhang, S.-h. Li & S.-l. Wang
    Detecting shifted double JPEG compression tampering utilizing both intra-block and inter-block correlations
    Journal of Shanghai Jiaotong University (Science), Shanghai Jiaotong University Press, 2013, Vol. 18, pp. 7-16
    DOI: 10.1007/s12204-013-1362-9
    BibTeX
    @article{Zhang2013a,
     author = {Zhang, Yu-jin and Li, Sheng-hong and Wang, Shi-lin},
     title = {Detecting shifted double JPEG compression tampering utilizing both intra-block and inter-block correlations},
     journal = {Journal of Shanghai Jiaotong University (Science)},
     publisher = {Shanghai Jiaotong University Press},
     year = {2013},
     volume = {18},
     pages = {7--16}}
    
  257. J. Zhao & W. Zhao
    Passive Forensics for Region Duplication Image Forgery Based on Harris Feature Points and Local Binary Patterns
    Mathematical Problems in Engineering, 2013, Vol. 2013
    BibTeX
    @article{Zhao2013a,
     author = {Jie Zhao and Weifeng Zhao},
     title = {Passive Forensics for Region Duplication Image Forgery Based on Harris Feature Points and Local Binary Patterns},
     journal = {Mathematical Problems in Engineering},
     year = {2013},
     volume = {2013}}
    
  258. X. Zhao, S. Wang, S. Li, J. Li & Q. Yuan
    Image Splicing Detection Based on Noncausal Markov Model
    Proc. IEEE International Conference on Image Processing ICIP 2013
    2013, pp. 4462 - 4466
    BibTeX
    @inproceedings{Zhao2013,
     author = {Xudong Zhao and Shilin Wang and Shenghong Li and Jianhua Li and Quanqiao Yuan},
     title = {Image Splicing Detection Based on Noncausal Markov Model},
     booktitle = {Proc. IEEE International Conference on Image Processing ICIP 2013},
     year = {2013},
     pages = {4462 -- 4466}}
    
  259. N. Zheng, Y. Wang & M. Xu
    A LBP-Based Method for Detecting Copy-Move Forgery with Rotation
    Park, J. J. (J. H., Ng, J. K.-Y., Jeong, H. Y. & Waluyo, B. (ed.)
    Multimedia and Ubiquitous Engineering
    Springer Netherlands, 2013, Vol. 240, pp. 261-267
    DOI: 10.1007/978-94-007-6738-6_33
    BibTeX
    @incollection{Zheng2013,
     author = {Zheng, Ning and Wang, Yixing and Xu, Ming},
     title = {A LBP-Based Method for Detecting Copy-Move Forgery with Rotation},
     booktitle = {Multimedia and Ubiquitous Engineering},
     publisher = {Springer Netherlands},
     year = {2013},
     volume = {240},
     pages = {261--267}}
    
  260. L. Zhong & W. Xu
    A robust image copy-move forgery detection based on mixed moments
    Software Engineering and Service Science (ICSESS), 2013 4th IEEE International Conference on
    2013, pp. 381-384
    DOI: 10.1109/ICSESS.2013.6615329
    BibTeX
    @inproceedings{Zhong2013,
     author = {Le Zhong and Weihong Xu},
     title = {A robust image copy-move forgery detection based on mixed moments},
     booktitle = {Software Engineering and Service Science (ICSESS), 2013 4th IEEE International Conference on},
     year = {2013},
     pages = {381--384}}
    
  261. Proceedings of the 17th Interpol International Forensic Science Managers Symposium, Lyon
    Daéid, N. N. (ed.)
    2013, Vol. Centre for Forensic Science, University of Strathclyde, Glasgow, UK
    DOI: 10.1109/isplc.2013.6525804
    BibTeX
    @proceedings{Interpol2013,,
     title = {Proceedings of the 17th Interpol International Forensic Science Managers Symposium, Lyon},
     year = {2013},
     volume = {Centre for Forensic Science, University of Strathclyde, Glasgow, UK}}
    


2012

  1. B. Aiazzi, L. Alparone, S. Baronti, M. Selva & L. Stefani
    Unsupervised Estimation of Signal-Dependent CCD Camera Noise
    EURASIP Journal on Advances in Signal Processing, Springer, 2012, Vol. 2012(1), pp. 231
    BibTeX
    @article{Aiazzi2012,
     author = {Aiazzi, B. and Alparone, L. and Baronti, S. and Selva, M. and Stefani, L.},
     title = {Unsupervised Estimation of Signal-Dependent CCD Camera Noise},
     journal = {EURASIP Journal on Advances in Signal Processing},
     publisher = {Springer},
     year = {2012},
     volume = {2012},
     number = {1},
     pages = {231}}
    
  2. I. Amerini, R. Caldelli, V. Cappellini, F. Picchioni & A. Piva
    Estimate of PRNU Noise Based on Different Noise Models for Source Camera Identification
    International Journal of Digital Crime and Forensics (IJDCF), 2012, Vol. 2(2), pp. 21-34
    BibTeX
    @article{Amerini2012,
     author = {Irene Amerini and Roberto Caldelli and Vito Cappellini and Francesco Picchioni and and Alessandro Piva},
     title = {Estimate of PRNU Noise Based on Different Noise Models for Source Camera Identification},
     journal = {International Journal of Digital Crime and Forensics (IJDCF)},
     year = {2012},
     volume = {2},
     number = {2},
     pages = {21-34}}
    
  3. U. Ananya, S.D. Muktanidhi & U. Mudenagudi
    Detection of doctored images using correlations of PSF
    Proceedings of the Eighth Indian Conference on Computer Vision, Graphics and Image Processing
    ACM, 2012, pp. 56:1-56:6
    BibTeX
    @inproceedings{Ananya2012,
     author = {Ananya, U. and Muktanidhi, S. D. and Mudenagudi, Uma},
     title = {Detection of doctored images using correlations of PSF},
     booktitle = {Proceedings of the Eighth Indian Conference on Computer Vision, Graphics and Image Processing},
     publisher = {ACM},
     year = {2012},
     pages = {56:1--56:6}}
    
  4. T. Baar, W. van Houten & Z. Geradts
    Camera identification by grouping images from database, based on shared noise patterns
    CoRR, 2012, Vol. abs/1207.2641, pp. -
    BibTeX
    @article{Baar2012,
     author = {Teun Baar and Wiger van Houten and Zeno Geradts},
     title = {Camera identification by grouping images from database, based on shared noise patterns},
     journal = {CoRR},
     year = {2012},
     volume = {abs/1207.2641},
     pages = {-}}
    
  5. M. Barni & A. Costanzo
    Dealing with uncertainty in image forensics: A fuzzy approach
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2012
    2012, pp. 1753-1756
    BibTeX
    @inproceedings{Barni2012,
     author = {Barni, M. and Costanzo, A. },
     title = {Dealing with uncertainty in image forensics: A fuzzy approach},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2012},
     year = {2012},
     pages = {1753--1756}}
    
  6. M. Barni, M. Fontani & B. Tondi
    A universal technique to hide traces of histogram-based image manipulations
    Proceedings of the on Multimedia and security
    ACM, 2012, pp. 97-104
    BibTeX
    @inproceedings{Barni2012b,
     author = {Barni, Mauro and Fontani, Marco and Tondi, Benedetta},
     title = {A universal technique to hide traces of histogram-based image manipulations},
     booktitle = {Proceedings of the on Multimedia and security},
     publisher = {ACM},
     year = {2012},
     pages = {97--104}}
    
  7. M. Barni & B. Tondi
    Optimum forensic and counter-forensic strategies for source identification with training data
    Proc. IEEE Int Information Forensics and Security (WIFS) Workshop
    2012, pp. 199-204
    BibTeX
    @inproceedings{Barni2012a,
     author = {Barni, Mauro and Tondi, Benedetta},
     title = {Optimum forensic and counter-forensic strategies for source identification with training data},
     booktitle = {Proc. IEEE Int Information Forensics and Security (WIFS) Workshop},
     year = {2012},
     pages = {199--204}}
    
  8. J.T. Barron & J. Malik
    Shape, albedo, and illumination from a single image of an unknown object
    Proc. IEEE Conf. Computer Vision and Pattern Recognition (CVPR)
    2012, pp. 334-341
    BibTeX
    @inproceedings{Barron2012,
     author = {Barron, J. T. and Malik, J.},
     title = {Shape, albedo, and illumination from a single image of an unknown object},
     booktitle = {Proc. IEEE Conf. Computer Vision and Pattern Recognition (CVPR)},
     year = {2012},
     pages = {334--341}}
    
  9. P. Bateman, A. Ho & J. Briffa
    Image Forensics of High Dynamic Range Imaging
    Shi, Y., Kim, H.-J. & Perez-Gonzalez, F. (ed.)
    Digital Forensics and Watermarking
    Springer Berlin / Heidelberg, 2012, Vol. 7128, pp. 336-348
    BibTeX
    @incollection{Bateman2012,
     author = {Bateman, Philip and Ho, Anthony and Briffa, Johann},
     title = {Image Forensics of High Dynamic Range Imaging},
     booktitle = {Digital Forensics and Watermarking},
     publisher = {Springer Berlin / Heidelberg},
     year = {2012},
     volume = {7128},
     pages = {336-348}}
    
  10. S. Battiato, G.M. Farinella, E. Messina & G. Puglisi
    Robust Image Alignment for Tampering Detection
    IEEE Transactions on Information Forensics and Security, 2012, Vol. 7(4), pp. 1105-1117
    BibTeX
    @article{Battiato2012a,
     author = {Battiato, S. and Farinella, G. M. and Messina, E. and Puglisi, G. },
     title = {Robust Image Alignment for Tampering Detection},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2012},
     volume = {7},
     number = {4},
     pages = {1105--1117}}
    
  11. F. Battisti, M. Carli & A. Neri
    Image forgery detection by means of no-reference quality metrics
    Memon, N. D., Alattar, A. M. & III, E. J. D. (ed.)
    Proc. SPIE 8303
    Media Watermarking, Security, and Forensics 2012, SPIE, 2012, Vol. 8303(1), pp. 83030K
    BibTeX
    @inproceedings{Battisti2012,
     author = {F. Battisti and M. Carli and A. Neri},
     title = {Image forgery detection by means of no-reference quality metrics},
     booktitle = {Proc. SPIE 8303},
     journal = {Media Watermarking, Security, and Forensics 2012},
     publisher = {SPIE},
     year = {2012},
     volume = {8303},
     number = {1},
     pages = {83030K}}
    
  12. S. Bayram, H.T. Sencar & N. Memon
    Efficient Sensor Fingerprint Matching Through Fingerprint Binarization
    IEEE Transactions on Information Forensics and Security, 2012, Vol. 7(4), pp. 1404-1413
    BibTeX
    @article{Bayram2012,
     author = {Bayram, S. and Sencar, H. T. and Memon, N.},
     title = {Efficient Sensor Fingerprint Matching Through Fingerprint Binarization},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2012},
     volume = {7},
     number = {4},
     pages = {1404--1413}}
    
  13. P. Bestagini, A. Allam, S. Milani, M. Tagliasacchi & S. Tubaro
    Video codec identification
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2012
    2012, pp. 2257-2260
    BibTeX
    @inproceedings{Bestagini2012a,
     author = {Bestagini, Paolo and Allam, Ahmed and Milani, Simone and Tagliasacchi, Marco and Tubaro, Stefano},
     title = {Video codec identification},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2012},
     year = {2012},
     pages = {2257--2260}}
    
  14. P. Bestagini, M. Fontani, S. Milani, M. Barni, A. Piva, M. Tagliasacchi & S. Tubaro
    An Overview on Video Forensics
    Poc. of the 20th European Signal Processing Conference (EUSIPCO 2012)
    2012, pp. 1234-1238
    BibTeX
    @inproceedings{Bestagini2012,
     author = {P. Bestagini and M. Fontani and S. Milani and M. Barni and A. Piva and M. Tagliasacchi and S. Tubaro},
     title = {An Overview on Video Forensics},
     booktitle = {Poc. of the 20th European Signal Processing Conference (EUSIPCO 2012)},
     year = {2012},
     pages = {1234-1238}}
    
  15. T. Bianchi & A. Piva
    Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts
    IEEE Transactions on Information Forensics and Security, 2012, Vol. 7(3), pp. 1003 - 1017
    BibTeX
    @article{Bianchi2012,
     author = {Bianchi, Tiziano and Piva, Alessandro},
     title = {Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2012},
     volume = {7},
     number = {3},
     pages = {1003 - 1017}}
    
  16. T. Bianchi & A. Piva
    Reverse engineering of double JPEG compression in the presence of image resizing
    Information Forensics and Security (WIFS), 2012 IEEE International Workshop on
    2012, pp. 127-132
    BibTeX
    @inproceedings{Bianchi2012a,
     author = {Bianchi, Tiziano and Piva, Alessandro},
     title = {Reverse engineering of double JPEG compression in the presence of image resizing},
     booktitle = {Information Forensics and Security (WIFS), 2012 IEEE International Workshop on},
     year = {2012},
     pages = {127--132}}
    
  17. T. Bianchi & A. Piva
    Detection of Nonaligned Double JPEG Compression Based on Integer Periodicity Maps
    Information Forensics and Security, IEEE Transactions on, 2012, Vol. 7(2), pp. 842-848
    BibTeX
    @article{Bianchi2012b,
     author = {Bianchi, T. and Piva, A.},
     title = {Detection of Nonaligned Double JPEG Compression Based on Integer Periodicity Maps},
     journal = {Information Forensics and Security, IEEE Transactions on},
     year = {2012},
     volume = {7},
     number = {2},
     pages = {842-848}}
    
  18. R. Böhme & M. Kirchner
    Digital Image Forensics
    Sencar, H. T. & Memon, N. (ed.)
    Chapter Counter-Forensics: Attacking Image Forensics
    Springer, 2012, pp. -
    BibTeX
    @inbook{Boehme2012,
     author = {Rainer Böhme and Matthias Kirchner},
     title = {Digital Image Forensics},
     publisher = {Springer},
     year = {2012},
     pages = {-}}
    
  19. R. Bora & N. Shahane
    Image forgery detection through motion blur estimates
    Computational Intelligence & Computing Research (ICCIC), 2012 IEEE International Conference on
    2012, pp. 1-4
    BibTeX
    @inproceedings{Bora2012,
     author = {Bora, R.M. and Shahane, N.M.},
     title = {Image forgery detection through motion blur estimates},
     booktitle = {Computational Intelligence & Computing Research (ICCIC), 2012 IEEE International Conference on},
     year = {2012},
     pages = {1--4}}
    
  20. S. Brindha & S. Kumarganesh
    Detecting Primary,secondary and Triple Jpeg Compression Having Same Quantization Matrix
    International Journal of Communications and Engineering, 2012, Vol. 3(3), pp. 8-14
    BibTeX
    @article{Brindha2012,
     author = {S. Brindha and S Kumarganesh},
     title = {Detecting Primary,secondary and Triple Jpeg Compression Having Same Quantization Matrix},
     journal = {International Journal of Communications and Engineering},
     year = {2012},
     volume = {3},
     number = {3},
     pages = {8-14}}
    
  21. W. Bu, M. Xu & N. Zheng
    A Tampered Image Detecting Method Based on Wavelet Analysis
    International Journal of Information and Electronics Engineering, 2012, Vol. 2(2), pp. 38-43
    BibTeX
    @article{Bu2012,
     author = {Wenqing Bu and Ming Xu and Ning Zheng},
     title = {A Tampered Image Detecting Method Based on Wavelet Analysis},
     journal = {International Journal of Information and Electronics Engineering},
     year = {2012},
     volume = {2},
     number = {2},
     pages = {38-43}}
    
  22. S. Cai & M. Li
    Blind CFA Interpolation Detection Based on the Entropy
    Advanced Materials Research, 2012, Vol. 532 - 533 Materials Science and Information Technology II, pp. 787-791
    BibTeX
    @article{Cai2012,
     author = {Suozhang Cai and Mingli Li},
     title = {Blind CFA Interpolation Detection Based on the Entropy},
     journal = {Advanced Materials Research},
     year = {2012},
     volume = {532 - 533 Materials Science and Information Technology II},
     pages = {787-791}}
    
  23. R. Caldelli, I. Amerini, L. Ballan, G. Serra, M. Barni & A. Costanzo
    On the effectiveness of local warping against SIFT-based copy-move detection
    Proc. 5th Int Communications Control and Signal Processing (ISCCSP) Symp
    2012, pp. 1-5
    BibTeX
    @inproceedings{Caldelli2012,
     author = {Caldelli, R. and Amerini, I. and Ballan, L. and Serra, G. and Barni, M. and Costanzo, A.},
     title = {On the effectiveness of local warping against SIFT-based copy-move detection},
     booktitle = {Proc. 5th Int Communications Control and Signal Processing (ISCCSP) Symp},
     year = {2012},
     pages = {1--5}}
    
  24. H. Cao & A. Kot
    Measuring the Statistical Correlation Inconsistencies in Mobile Images for Tamper Detection
    Shi, Y. (ed.)
    Transactions on Data Hiding and Multimedia Security VII
    Springer Berlin / Heidelberg, 2012, Vol. 7110, pp. 63-81
    BibTeX
    @incollection{Cao2012,
     author = {Cao, Hong and Kot, Alex},
     title = {Measuring the Statistical Correlation Inconsistencies in Mobile Images for Tamper Detection},
     booktitle = {Transactions on Data Hiding and Multimedia Security VII},
     publisher = {Springer Berlin / Heidelberg},
     year = {2012},
     volume = {7110},
     pages = {63-81}}
    
  25. H. Cao & A. Kot
    Detection of Tampering Inconsistencies on Mobile Photos
    Proc. Int. Workshop on Digital Watermarking
    Lecture Notes in Computer Science, 2012, Vol. -, pp. 115-119
    BibTeX
    @article{Cao2012c,
     author = {H. Cao and A.C. Kot},
     title = {Detection of Tampering Inconsistencies on Mobile Photos},
     booktitle = {Proc. Int. Workshop on Digital Watermarking},
     journal = {Lecture Notes in Computer Science},
     year = {2012},
     volume = {-},
     pages = {115--119}}
    
  26. H. Cao & A.C. Kot
    Measuring the statistical correlation inconsistencies in mobile images for tamper detection
    Shi, Y. Q. (ed.)
    Transactions on Data Hiding and Multimedia Security VII
    Chapter Measuring the statistical correlation inconsistencies in mobile images for tamper detection
    Springer-Verlag, 2012, pp. 63-81
    BibTeX
    @incollection{Cao2012b,
     author = {Cao, Hong and Kot, Alex C.},
     title = {Measuring the statistical correlation inconsistencies in mobile images for tamper detection},
     booktitle = {Transactions on Data Hiding and Multimedia Security VII},
     publisher = {Springer-Verlag},
     year = {2012},
     pages = {63--81}}
    
  27. H. Cao & A.C. Kot
    Manipulation Detection on Image Patches Using FusionBoost
    IEEE Transactions on Information Forensics and Security, 2012, Vol. 7(3), pp. 992-1002
    BibTeX
    @article{Cao2012a,
     author = {Cao, H. and Kot, A. C. },
     title = {Manipulation Detection on Image Patches Using FusionBoost},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2012},
     volume = {7},
     number = {3},
     pages = {992--1002}}
    
  28. Y. Cao
    Improvement of Real-Time Image Splicing Method Basic on Gray Level
    Computer Science & Service System (CSSS), 2012 International Conference on
    2012, pp. 1555-1558
    BibTeX
    @inproceedings{Cao2012d,
     author = {YueQin Cao},
     title = {Improvement of Real-Time Image Splicing Method Basic on Gray Level},
     booktitle = {Computer Science & Service System (CSSS), 2012 International Conference on},
     year = {2012},
     pages = {1555--1558}}
    
  29. G. Cattaneo, P. Faruolo & U.F. Petrillo
    Experiments on Improving Sensor Pattern Noise Extraction for Source Camera Identification
    Proc. Sixth Int Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS) Conf
    2012, pp. 609-616
    BibTeX
    @inproceedings{Cattaneo2012,
     author = {Giuseppe Cattaneo and Pompeo Faruolo and Umberto Ferraro Petrillo},
     title = {Experiments on Improving Sensor Pattern Noise Extraction for Source Camera Identification},
     booktitle = {Proc. Sixth Int Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS) Conf},
     year = {2012},
     pages = {609--616}}
    
  30. L.-H. Chan, N.-F. Law & W.-C. Siu
    A two dimensional camera identification method based on image sensor noise
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2012
    2012, pp. 1741-1744
    BibTeX
    @inproceedings{Chan2012,
     author = {Chan, Lit-Hung and Law, Ngai-Fong and Siu, Wan-Chi},
     title = {A two dimensional camera identification method based on image sensor noise},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2012},
     year = {2012},
     pages = {1741--1744}}
    
  31. C. Chen & J. Ni
    Median Filtering Detection Using Edge Based Prediction Matrix
    Shi, Y., Kim, H.-J. & Perez-Gonzalez, F. (ed.)
    Digital Forensics and Watermarking
    Springer Berlin / Heidelberg, 2012, Vol. 7128, pp. 361-375
    BibTeX
    @incollection{Chen2012,
     author = {Chen, Chenglong and Ni, Jiangqun},
     title = {Median Filtering Detection Using Edge Based Prediction Matrix},
     booktitle = {Digital Forensics and Watermarking},
     publisher = {Springer Berlin / Heidelberg},
     year = {2012},
     volume = {7128},
     pages = {361-375}}
    
  32. C. Chen, J. Ni, R. Huang & J.H.
    Blind Median Filtering Detection Using Statistics in Difference Domain
    ihconference.org
    2012
    BibTeX
    @inproceedings{Chen2012b,
     author = {C Chen and J Ni and R Huang and, J Huang},
     title = {Blind Median Filtering Detection Using Statistics in Difference Domain},
     booktitle = {ihconference.org},
     year = {2012}}
    
  33. L. Chen, W. Lu & J. Ni
    An Image Region Description Method Based on Step Sector Statistics and its Application in Image Copy-Rotate/Flip-Move Forgery Detection
    International Journal of Digital Crime and Forensics (IJDCF), 2012, Vol. 4(1), pp. 49-53
    BibTeX
    @article{Chen2012a,
     author = {Likai Chen and Wei Lu and Jiangqun Ni},
     title = {An Image Region Description Method Based on Step Sector Statistics and its Application in Image Copy-Rotate/Flip-Move Forgery Detection},
     journal = {International Journal of Digital Crime and Forensics (IJDCF)},
     year = {2012},
     volume = {4},
     number = {1},
     pages = {49--53}}
    
  34. Y. Chen & V.L.L. Thing
    A Study an the Photo Response Non-uniformity Noise Pattern Based Image Forensics in Real-world Applications
    Institute for Infocomm Research, 1 Fusionopolis Way, 138632, Singapore, Institute for Infocomm Research, 1 Fusionopolis Way, 138632, Singapore, 2012
    BibTeX
    @techreport{Chen2012c,
     author = {Yu Chen and Vrizlynn L. L. Thing},
     title = {A Study an the Photo Response Non-uniformity Noise Pattern Based Image Forensics in Real-world Applications},
     school = {Institute for Infocomm Research, 1 Fusionopolis Way, 138632, Singapore},
     year = {2012}}
    
  35. Z. Chen & Y. Ke
    A Novel Photographic and Computer Graphic Composites Detection Method
    Proc. of the National Conference on Information Technology and Computer Science (CITCS 2012)
    2012
    BibTeX
    @inproceedings{Chen2012e,
     author = {Chen, Zhenwei. and Ke, Yongzhen},
     title = {A Novel Photographic and Computer Graphic Composites Detection Method},
     booktitle = {Proc. of the National Conference on Information Technology and Computer Science (CITCS 2012)},
     year = {2012}}
    
  36. Z. Chen & Z. Zhou
    Source camera identification based on nonsubsampled Contourlet transform denoising filter design
    Journal of Computer Applications, 2012, Vol. 2, pp. 055
    BibTeX
    @article{Chen2012d,
     author = {Chen, Z. and Zhou, Z.},
     title = {Source camera identification based on nonsubsampled Contourlet transform denoising filter design},
     journal = {Journal of Computer Applications},
     year = {2012},
     volume = {2},
     pages = {055}}
    
  37. C.-H. Choi, M.-J. Lee, D.-K. Hyun & H.-K. Lee
    Forged Region Detection for Scanned Images
    J. (Jong Hyuk) Park, J., Chao, H.-C., S. Obaidat, M. & Kim, J. (ed.)
    Computer Science and Convergence
    Springer Netherlands, 2012, Vol. 114, pp. 687-694
    BibTeX
    @incollection{Choi2012,
     author = {Choi, Chang-Hee and Lee, Min-Jeong and Hyun, Dai-Kyung and Lee, Heung-Kyu},
     title = {Forged Region Detection for Scanned Images},
     booktitle = {Computer Science and Convergence},
     publisher = {Springer Netherlands},
     year = {2012},
     volume = {114},
     pages = {687-694}}
    
  38. V. Christlein, C. Riess, J. Jordan, C. Riess & E. Angelopoulou
    An Evaluation of Popular Copy-Move Forgery Detection Approaches
    ArXiv > Computer Science > Computer Vision and Pattern Recognition, 2012
    BibTeX
    @electronic{Christlein2012,
     author = {Vincent Christlein and Christian Riess and Johannes Jordan and Corinna Riess and Elli Angelopoulou},
     title = {An Evaluation of Popular Copy-Move Forgery Detection Approaches},
     journal = {ArXiv > Computer Science > Computer Vision and Pattern Recognition},
     year = {2012}}
    
  39. V. Christlein, C. Riess, J. Jordan, C. Riess & E. Angelopoulou
    An Evaluation of Popular Copy-Move Forgery Detection Approaches
    IEEE Transactions on Information Forensics and Security, 2012, Vol. 7(6), pp. 1841-1854
    BibTeX
    @article{Christlein2012a,
     author = {Christlein, V. and Riess, C. and Jordan, J. and Riess, C. and Angelopoulou, E.},
     title = {An Evaluation of Popular Copy-Move Forgery Detection Approaches},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2012},
     volume = {7},
     number = {6},
     pages = {1841--1854}}
    
  40. X. Chu, M.C. Stamm, W.S. Lin & K.J.R. Liu
    Forensic identification of compressively sensed images
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2012
    2012, pp. 1837-1840
    BibTeX
    @inproceedings{Chu2012,
     author = {Xiaoyu Chu and Stamm, M. C. and Lin, W. S. and Liu, K. J. R.},
     title = {Forensic identification of compressively sensed images},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2012},
     year = {2012},
     pages = {1837--1840}}
    
  41. W.-H. Chuang
    Resiliency Assessment and Enhancement of Intrinsic Fingerprinting
    Faculty of the Graduate School of the University of Maryland, College Park, Faculty of the Graduate School of the University of Maryland, College Park, 2012
    BibTeX
    @phdthesis{Chuang2012,
     author = {Wei-Hong Chuang},
     title = {Resiliency Assessment and Enhancement of Intrinsic Fingerprinting},
     school = {Faculty of the Graduate School of the University of Maryland, College Park},
     year = {2012}}
    
  42. F. Chunhui, X. Zhengquan & Z. Xinghui
    An Anti-Forensic Algorithm of JPEG Double Compression Based Forgery Detection
    Information Science and Engineering (ISISE), 2012 International Symposium on
    2012, pp. 159-164
    BibTeX
    @inproceedings{Chunhui2012,
     author = {Feng Chunhui and Xu Zhengquan and Zheng Xinghui},
     title = {An Anti-Forensic Algorithm of JPEG Double Compression Based Forgery Detection},
     booktitle = {Information Science and Engineering (ISISE), 2012 International Symposium on},
     year = {2012},
     pages = {159--164}}
    
  43. R. Ciptasari, K.-H. Rhee & K. Sakurai
    An Image Splicing Detection Based on Interpolation Analysis
    Lin, W., Xu, D., Ho, A., Wu, J., He, Y., Cai, J., Kankanhalli, M. & Sun, M.-T. (ed.)
    Advances in Multimedia Information Processing -- PCM 2012
    Springer Berlin Heidelberg, 2012, Vol. 7674, pp. 390-401
    BibTeX
    @incollection{Ciptasari2012,
     author = {Ciptasari, RimbaW. and Rhee, Kyung-Hyune and Sakurai, Kouichi},
     title = {An Image Splicing Detection Based on Interpolation Analysis},
     booktitle = {Advances in Multimedia Information Processing -- PCM 2012},
     publisher = {Springer Berlin Heidelberg},
     year = {2012},
     volume = {7674},
     pages = {390-401}}
    
  44. V. Conotter, J.F. O'Brien & H. Farid
    Exposing Digital Forgeries in Ballistic Motion
    IEEE Transactions on Information Forensics and Security, 2012, Vol. 7(1), pp. 283-296
    BibTeX
    @article{Conotter2012,
     author = {Conotter, V. and O'Brien, J. F. and Farid, H.},
     title = {Exposing Digital Forgeries in Ballistic Motion},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2012},
     volume = {7},
     number = {1},
     pages = {283--296}}
    
  45. D. Cozzolino, G. Poggi, C. Sansone & L. Verdoliva
    A Comparative Analysis of Forgery Detection Algorithms
    International Workshops on Statistical Techniques in Pattern Recognition, LNCS 7626
    2012
    BibTeX
    @inproceedings{Cozzolino2012,
     author = {D. Cozzolino and G. Poggi and C. Sansone and L. Verdoliva},
     title = {A Comparative Analysis of Forgery Detection Algorithms},
     booktitle = {International Workshops on Statistical Techniques in Pattern Recognition, LNCS 7626},
     year = {2012}}
    
  46. D.T. Dang-Nguyen, G. Boato & F.D.N.D. Natale
    Discrimination Between Computer Generated and Natural Human Faces Based on Asymmetry Information
    Poc. of the 20th European Signal Processing Conference (EUSIPCO 2012)
    2012, pp. 1234-1238
    BibTeX
    @inproceedings{Dang-Nguyen2012,
     author = {D. T. Dang-Nguyen and G. Boato and F. D. N. De Natale},
     title = {Discrimination Between Computer Generated and Natural Human Faces Based on Asymmetry Information},
     booktitle = {Poc. of the 20th European Signal Processing Conference (EUSIPCO 2012)},
     year = {2012},
     pages = {1234-1238}}
    
  47. Y. Deng, Y. Wu & L. Zhou
    Detection of Copy-Rotate-Move Forgery Using Dual Tree Complex Wavelet Transform
    Advanced Science Letters, 2012, Vol. 16(1), pp. 32-38
    BibTeX
    @article{Deng:2012:1936-6612:32,
     author = {Deng, Yu and Wu, Yunjie and Zhou, Linna},
     title = {Detection of Copy-Rotate-Move Forgery Using Dual Tree Complex Wavelet Transform},
     journal = {Advanced Science Letters},
     year = {2012},
     volume = {16},
     number = {1},
     pages = {32-38}}
    
  48. P. Deshpande & P. Kanikar
    Pixel Based Digital Image Forgery Detection Techniques
    International Journal of Engineering Research and Applications (IJERA), 2012, Vol. 2(3), pp. 539-543
    BibTeX
    @article{Deshpande2012,
     author = {Pradyumna Deshpande and Prashasti Kanikar},
     title = {Pixel Based Digital Image Forgery Detection Techniques},
     journal = {International Journal of Engineering Research and Applications (IJERA)},
     year = {2012},
     volume = {2},
     number = {3},
     pages = {539-543}}
    
  49. Z.-L. Du, X.-L. Li, L.-X. Jiao & K. Shen
    Region duplication blind detection based on multiple feature combination
    Machine Learning and Cybernetics (ICMLC), 2012 International Conference on
    2012, Vol. 1, pp. 17-21
    BibTeX
    @inproceedings{Du2012,
     author = {Zhen-Long Du and Xiao-Li Li and Li-Xin Jiao and Kangkang Shen},
     title = {Region duplication blind detection based on multiple feature combination},
     booktitle = {Machine Learning and Cybernetics (ICMLC), 2012 International Conference on},
     year = {2012},
     volume = {1},
     pages = {17--21}}
    
  50. J. Eklann & J. Lundberg
    Source Camera Classification and Clustering from Sensor Pattern Noise
    2012
    BibTeX
    @article{Eklann2012,
     author = {Eklann, J. and Lundberg, J.},
     title = {Source Camera Classification and Clustering from Sensor Pattern Noise},
     year = {2012}}
    
  51. G. Fahmy
    Detectable Tampering of JPEG Anti-Forensics
    2012, pp. 1-4
    BibTeX
    @misc{Fahmy2012,
     author = {Fahmy, Gamal},
     title = {Detectable Tampering of JPEG Anti-Forensics},
     year = {2012},
     pages = {1--4}}
    
  52. W. Fan, K. Wang, F. Cayre & Z. Xiong
    3D Lighting-Based Image Forgery Detection Using Shape-From-Shading
    Poc. of the 20th European Signal Processing Conference (EUSIPCO 2012)
    2012, pp. 1777-1781
    BibTeX
    @inproceedings{Fan2012,
     author = {W. Fan and K. Wang and F. Cayre and Z. Xiong},
     title = {3D Lighting-Based Image Forgery Detection Using Shape-From-Shading},
     booktitle = {Poc. of the 20th European Signal Processing Conference (EUSIPCO 2012)},
     year = {2012},
     pages = {1777-1781}}
    
  53. H. Farid & M.J. Bravo
    Perceptual discrimination of computer generated and photographic faces
    Digital Investigation, 2012, Vol. 8(3-4), pp. 226 - 235
    BibTeX
    @article{Farid2012,
     author = {Hany Farid and Mary J. Bravo},
     title = {Perceptual discrimination of computer generated and photographic faces},
     journal = {Digital Investigation},
     year = {2012},
     volume = {8},
     number = {3--4},
     pages = {226 - 235}}
    
  54. J.E. Farrell, P.B. Catrysse & B.A. Wandell
    Digital camera simulation
    Applied Optics, 2012, Vol. 51(4), pp. A80-A90
    BibTeX
    @article{Farrell2012,
     author = {Joyce E. Farrell and Peter B. Catrysse and Brian A. Wandell},
     title = {Digital camera simulation},
     journal = {Applied Optics},
     year = {2012},
     volume = {51},
     number = {4},
     pages = {A80-A90}}
    
  55. X. Feng, I.J. Cox & G. Doerr
    Normalized Energy Density-Based Forensic Detection of Resampled Images
    IEEE Transactions on Multimedia, 2012, Vol. 14(3), pp. 536-545
    BibTeX
    @article{Feng2012,
     author = {Feng, X. and Cox, I. J. and Doerr, G. },
     title = {Normalized Energy Density-Based Forensic Detection of Resampled Images},
     journal = {IEEE Transactions on Multimedia},
     year = {2012},
     volume = {14},
     number = {3},
     pages = {536--545}}
    
  56. P. Ferrara, T. Bianchi, A. De Rosa & A. Piva
    Image Forgery Localization via Fine-Grained Analysis of CFA Artifacts
    IEEE Transactions on Information Forensics and Security, 2012, Vol. 7(5), pp. 1566-1577
    BibTeX
    @article{Ferrara2012,
     author = {Ferrara, Pasquale and Bianchi, Tiziano and De Rosa, Alessia and Piva, Alessandro },
     title = {Image Forgery Localization via Fine-Grained Analysis of CFA Artifacts},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2012},
     volume = {7},
     number = {5},
     pages = {1566--1577}}
    
  57. M. Fontani & M. Barni
    Hiding Traces of Median Filtering in Digital Images
    Poc. of the 20th European Signal Processing Conference (EUSIPCO 2012)
    2012
    BibTeX
    @inproceedings{Fontani2012,
     author = {M. Fontani and M. Barni},
     title = {Hiding Traces of Median Filtering in Digital Images},
     booktitle = {Poc. of the 20th European Signal Processing Conference (EUSIPCO 2012)},
     year = {2012}}
    
  58. I. Franc & M. Stojmenovic
    Techniques of image manipulation and detection of copy-move attack
    Telecommunications Forum (TELFOR), 2012 20th
    2012, pp. 1625-1628
    BibTeX
    @inproceedings{Franc2012,
     author = {Franc, I. and Stojmenovic, M.},
     title = {Techniques of image manipulation and detection of copy-move attack},
     booktitle = {Telecommunications Forum (TELFOR), 2012 20th},
     year = {2012},
     pages = {1625--1628}}
    
  59. J. Fridrich
    Sensor Defects in Digital Image Forensic
    Chapter 1: Sensor Defects in Digital Image Forensic
    2012
    BibTeX
    @unpublished{Fridrich2012,
     author = {Jessica Fridrich},
     title = {Sensor Defects in Digital Image Forensic},
     year = {2012}}
    
  60. H. Fu & X. Cao
    Forgery Authentication in Extreme Wide-Angle Lens Using Distortion Cue and Fake Saliency Map
    IEEE Transactions on Information Forensics and Security, 2012, Vol. 7(4), pp. 1301-1314
    BibTeX
    @article{Fu2012,
     author = {Huazhu Fu and Xiaochun Cao},
     title = {Forgery Authentication in Extreme Wide-Angle Lens Using Distortion Cue and Fake Saliency Map},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2012},
     volume = {7},
     number = {4},
     pages = {1301--1314}}
    
  61. L. Fu & Y. Qi
    Camera Response Function Estimation and Application with a Single Image
    Yang, D. (ed.)
    Informatics in Control, Automation and Robotics
    Lecture Notes in Electrical Engineering, Springer Berlin Heidelberg, 2012, Vol. 133, pp. 149-156
    BibTeX
    @incollection{Fu2012a,
     author = {Fu, Li and Qi, Yue},
     title = {Camera Response Function Estimation and Application with a Single Image},
     booktitle = {Informatics in Control, Automation and Robotics},
     journal = {Lecture Notes in Electrical Engineering},
     publisher = {Springer Berlin Heidelberg},
     year = {2012},
     volume = {133},
     pages = {149-156}}
    
  62. S. Gao, R. Hu & G. Tian
    Using Multi-step Transition Matrices for Camera Model Identification
    International Journal of Hybrid Information Technology, 2012, Vol. 5(2), pp. 275-288
    BibTeX
    @article{Gao2012a,
     author = {Gao, S. and Hu, R.M. and Tian, G.},
     title = {Using Multi-step Transition Matrices for Camera Model Identification},
     journal = {International Journal of Hybrid Information Technology},
     year = {2012},
     volume = {5},
     number = {2},
     pages = {275--288}}
    
  63. S. Gao, G. Xu & R.-M. Hu
    Camera Model Identification Based on the Characteristic of CFA and Interpolation
    Shi, Y., Kim, H.-J. & Perez-Gonzalez, F. (ed.)
    Digital Forensics and Watermarking
    Springer Berlin / Heidelberg, 2012, Vol. 7128, pp. 268-280
    BibTeX
    @incollection{Gao2012,
     author = {Gao, Shang and Xu, Guanshuo and Hu, Rui-Min},
     title = {Camera Model Identification Based on the Characteristic of CFA and Interpolation},
     booktitle = {Digital Forensics and Watermarking},
     publisher = {Springer Berlin / Heidelberg},
     year = {2012},
     volume = {7128},
     pages = {268-280}}
    
  64. F. Gisolf
    Research on PRNU
    Nederlands Forensisch Instituut, Nederlands Forensisch Instituut, 2012
    BibTeX
    @techreport{Gisolf2012,
     author = {Floris Gisolf},
     title = {Research on PRNU},
     school = {Nederlands Forensisch Instituut},
     year = {2012}}
    
  65. T. Gloe
    Forensic analysis of ordered data structures on the example of JPEG files
    Proc. IEEE Int Information Forensics and Security (WIFS) Workshop
    2012, pp. 139-144
    BibTeX
    @inproceedings{Gloe2012,
     author = {Gloe, Thomas},
     title = {Forensic analysis of ordered data structures on the example of JPEG files},
     booktitle = {Proc. IEEE Int Information Forensics and Security (WIFS) Workshop},
     year = {2012},
     pages = {139--144}}
    
  66. T. Gloe, S. Pfennig & M. Kirchner
    Unexpected artefacts in PRNU-based camera identification: a ´Dresden Image Database´ case-study
    Proceedings of the on Multimedia and security
    ACM, 2012, pp. 109-114
    BibTeX
    @inproceedings{Gloe2012a,
     author = {Gloe, Thomas and Pfennig, Stefan and Kirchner, Matthias},
     title = {Unexpected artefacts in PRNU-based camera identification: a ´Dresden Image Database´ case-study},
     booktitle = {Proceedings of the on Multimedia and security},
     publisher = {ACM},
     year = {2012},
     pages = {109--114}}
    
  67. N. Glumov & A. Kuznetsov
    Analysis of images for local artificial changes with JPEG compression properties
    Pattern Recognition and Image Analysis, MAIK Nauka/Interperiodica distributed exclusively by Springer Science+Business Media LLC., 2012, Vol. 22, pp. 210-214
    BibTeX
    @article{Glumov2012,
     author = {Glumov, N. and Kuznetsov, A.},
     title = {Analysis of images for local artificial changes with JPEG compression properties},
     journal = {Pattern Recognition and Image Analysis},
     publisher = {MAIK Nauka/Interperiodica distributed exclusively by Springer Science+Business Media LLC.},
     year = {2012},
     volume = {22},
     pages = {210-214}}
    
  68. M. Goljan & J. Fridrich
    Sensor-Fingerprint Based Identification of Images Corrected for Lens Distortion
    Proceedings of SPIE, 2012
    BibTeX
    @article{Goljan2012,
     author = {Miroslav Goljan and Jessica Fridrich},
     title = {Sensor-Fingerprint Based Identification of Images Corrected for Lens Distortion},
     journal = {Proceedings of SPIE},
     year = {2012}}
    
  69. W. Gong, X. Wu & T. Wu
    Fakery Image Identifying Using Lighting Direction
    Journal of Information & Computational Science, 2012, Vol. 9(7), pp. 1949-1955
    BibTeX
    @article{Gong2012,
     author = {Wenyong Gong and Xinglong Wu and Tieru Wu},
     title = {Fakery Image Identifying Using Lighting Direction},
     journal = {Journal of Information & Computational Science},
     year = {2012},
     volume = {9},
     number = {7},
     pages = {1949-1955}}
    
  70. J.-M. Guo, Y.-F. Liu & Z.-J. Wu
    Duplication Forgery Detection Using Improved DAISY Descriptor
    Expert Systems with Applications, 2012, Vol. -(0), pp. -
    BibTeX
    @article{Guo2012,
     author = {Jing-Ming Guo and Yun-Fu Liu and Zong-Jhe Wu},
     title = {Duplication Forgery Detection Using Improved DAISY Descriptor},
     journal = {Expert Systems with Applications},
     year = {2012},
     volume = {-},
     number = {0},
     pages = {-}}
    
  71. M.U. Gutmann & A.H. arinen
    Noise-Contrastive Estimation of Unnormalized Statistical Models, with Applications to Natural Image Statistics
    Journal of Machine Learning Research, 2012, Vol. 13, pp. 307-361
    BibTeX
    @article{Gutmann2012,
     author = {Michael U. Gutmann and Aapo Hyv¨ arinen},
     title = {Noise-Contrastive Estimation of Unnormalized Statistical Models, with Applications to Natural Image Statistics},
     journal = {Journal of Machine Learning Research},
     year = {2012},
     volume = {13},
     pages = {307-361}}
    
  72. Z. He, W. Lu, W. Sun & J. Huang
    Digital image splicing detection based on Markov features in DCT and DWT domain
    Pattern Recognition, 2012(0), pp. -
    BibTeX
    @article{He2012,
     author = {Zhongwei He and Wei Lu and Wei Sun and Jiwu Huang},
     title = {Digital image splicing detection based on Markov features in DCT and DWT domain},
     journal = {Pattern Recognition},
     year = {2012},
     number = {0},
     pages = { - }}
    
  73. D.M. Hou, Z.Y. Bai & S.C. Liu
    A New Algorithm for Image Copy-Move Forgery Detection
    Materials Science and Information Technology, 2012, Vol. 433-440, pp. 5930-5934
    BibTeX
    @article{Hou2012,
     author = {Dong Mei Hou and Zheng Yao Bai and Shu Chun Liu},
     title = {A New Algorithm for Image Copy-Move Forgery Detection},
     journal = {Materials Science and Information Technology},
     year = {2012},
     volume = {433-440},
     pages = {5930-5934}}
    
  74. W. van Houten & Z. Geradts
    Using Anisotropic Diffusion for Efficient Extraction of Sensor Noise in Camera Identification
    Journal of Forensic Sciences, 2012, Vol. 57(2), pp. 512-527
    BibTeX
    @article{Houten2012,
     author = {Wiger van Houten and Zeno Geradts},
     title = {Using Anisotropic Diffusion for Efficient Extraction of Sensor Noise in Camera Identification},
     journal = {Journal of Forensic Sciences},
     year = {2012},
     volume = {57},
     number = {2},
     pages = {512-527}}
    
  75. C.-J. Hsieh, J.-S. Li & W.-C. Liu
    Digital evidence collection for web image access
    Security and Communication Networks, Wiley Online Library, 2012
    BibTeX
    @article{Hsieh2012,
     author = {Hsieh, Che-Jen and Li, Jung-Shian and Liu, Wei-Cheng},
     title = {Digital evidence collection for web image access},
     journal = {Security and Communication Networks},
     publisher = {Wiley Online Library},
     year = {2012}}
    
  76. H.-C. Hsu & M.-S. Wang
    Detection of copy-move forgery image using Gabor descriptor
    Proc. Int Anti-Counterfeiting, Security and Identification (ASID) Conf
    2012, pp. 1-4
    BibTeX
    @inproceedings{Hsu2012,
     author = {Hao-Chiang Hsu and Min-Shi Wang},
     title = {Detection of copy-move forgery image using Gabor descriptor},
     booktitle = {Proc. Int Anti-Counterfeiting, Security and Identification (ASID) Conf},
     year = {2012},
     pages = {1--4}}
    
  77. Y. Hu, C.-T. Li, Z. Lai & S. Zhang
    Fast camera fingerprint search algorithm for source camera identification
    Proc. 5th Int Communications Control and Signal Processing (ISCCSP) Symp
    2012, pp. 1-5
    BibTeX
    @inproceedings{Hu2012,
     author = {Yongjian Hu and Chang-Tsun Li and Zhimao Lai and Shangfan Zhang},
     title = {Fast camera fingerprint search algorithm for source camera identification},
     booktitle = {Proc. 5th Int Communications Control and Signal Processing (ISCCSP) Symp},
     year = {2012},
     pages = {1--5}}
    
  78. Y. Hu, C.-T. Li, X. Lin & B.-b. Liu
    An Improved Algorithm for Camera Model Identification Using Inter-channel Demosaicking Traces
    Proc. Eighth Int Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) Conf
    2012, pp. 325-330
    BibTeX
    @inproceedings{Hu2012b,
     author = {Hu, Yongjian and Li, Chang-Tsun and Lin, Xufeng and Liu, Bei-bei},
     title = {An Improved Algorithm for Camera Model Identification Using Inter-channel Demosaicking Traces},
     booktitle = {Proc. Eighth Int Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) Conf},
     year = {2012},
     pages = {325--330}}
    
  79. H. Huang, G. Coatrieux, H. Shu, L. Luo & C. Roux
    Blind Integrity Verification of Medical Images
    IEEE Transactions on Information Technology in Biomedicine, 2012, Vol. 16(6), pp. 1122-1126
    BibTeX
    @article{Huang2012,
     author = {Huang, H. and Coatrieux, G. and Shu, H. and Luo, L. and Roux, C. },
     title = {Blind Integrity Verification of Medical Images},
     journal = {IEEE Transactions on Information Technology in Biomedicine},
     year = {2012},
     volume = {16},
     number = {6},
     pages = {1122--1126}}
    
  80. M. Hussain, G. Muhammad, S.Q. Saleh, A.M. Mirza & G. Bebis
    Copy-Move Image Forgery Detection Using Multi-Resolution Weber Descriptors
    Proc. Eighth Int Signal Image Technology and Internet Based Systems (SITIS) Conf
    2012, pp. 395-401
    BibTeX
    @inproceedings{Hussain2012,
     author = {Hussain, Muhammad and Muhammad, Ghulam and Saleh, Sahar Q. and Mirza, Anwar M. and Bebis, George},
     title = {Copy-Move Image Forgery Detection Using Multi-Resolution Weber Descriptors},
     booktitle = {Proc. Eighth Int Signal Image Technology and Internet Based Systems (SITIS) Conf},
     year = {2012},
     pages = {395--401}}
    
  81. M.-G. Hwang & D.-H. Har
    A Novel Forged Image Detection Method Using the Characteristics of Interpolation
    Journal of Forensic Sciences, 2012, Vol. -, pp. -
    BibTeX
    @article{Hwang2012,
     author = {Hwang, Min-Gu and Har, Dong-Hwan},
     title = {A Novel Forged Image Detection Method Using the Characteristics of Interpolation},
     journal = {Journal of Forensic Sciences},
     year = {2012},
     volume = {-},
     pages = {-}}
    
  82. D.-K. Hyun, C.-H. Choi & H.-K. Lee
    Camcorder Identification for Heavily Compressed Low Resolution Videos
    J. (Jong Hyuk) Park, J. J. (J. H., Chao, H.-C., S. Obaidat, M. S. & Kim, J. (ed.)
    Computer Science and Convergence
    Springer Netherlands, 2012, Vol. 114, pp. 695-701
    BibTeX
    @incollection{Hyun2012,
     author = {Hyun, Dai-Kyung and Choi, Chang-Hee and Lee, Heung-Kyu},
     title = {Camcorder Identification for Heavily Compressed Low Resolution Videos},
     booktitle = {Computer Science and Convergence},
     publisher = {Springer Netherlands},
     year = {2012},
     volume = {114},
     pages = {695-701}}
    
  83. L. Jing & C. Shao
    Image Copy-Move Forgery Detecting Based on Local Invariant Feature
    Journal of Multimedia, 2012, Vol. 7(1), pp. 90-97
    BibTeX
    @article{Jing2012,
     author = {Li Jing and Chao Shao},
     title = {Image Copy-Move Forgery Detecting Based on Local Invariant Feature},
     journal = {Journal of Multimedia},
     year = {2012},
     volume = {7},
     number = {1},
     pages = {90-97}}
    
  84. D.-J. Jung, D.-K. Hyun, S.-J. Ryu, J.-W. Lee, H.-Y. Lee & H.-K. Lee
    Detecting Re-captured Videos Using Shot-Based Photo Response Non-Uniformity
    Shi, Y., Kim, H.-J. & Perez-Gonzalez, F. (ed.)
    Digital Forensics and Watermarking
    Springer Berlin / Heidelberg, 2012, Vol. 7128, pp. 281-291
    BibTeX
    @incollection{Jung2012,
     author = {Jung, Dae-Jin and Hyun, Dai-Kyung and Ryu, Seung-Jin and Lee, Ji-Won and Lee, Hae-Yeoun and Lee, Heung-Kyu},
     title = {Detecting Re-captured Videos Using Shot-Based Photo Response Non-Uniformity},
     booktitle = {Digital Forensics and Watermarking},
     publisher = {Springer Berlin / Heidelberg},
     year = {2012},
     volume = {7128},
     pages = {281-291}}
    
  85. P. Kakar & N. Sudha
    Exposing Postprocessed Copy--Paste Forgeries Through Transform-Invariant Features
    IEEE Transactions on Information Forensics and Security, 2012, Vol. 7(3), pp. 1018-1028
    BibTeX
    @article{Kakar2012,
     author = {Kakar, P. and Sudha, N. },
     title = {Exposing Postprocessed Copy--Paste Forgeries Through Transform-Invariant Features},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2012},
     volume = {7},
     number = {3},
     pages = {1018--1028}}
    
  86. P. Kakar & N. Sudha
    Authenticating Image Metadata Elements Using Geolocation Information and Sun Direction Estimation
    Proc. IEEE Int Multimedia and Expo (ICME) Conf
    2012, pp. 236-241
    BibTeX
    @inproceedings{Kakar2012a,
     author = {Kakar, P. and Sudha, N. },
     title = {Authenticating Image Metadata Elements Using Geolocation Information and Sun Direction Estimation},
     booktitle = {Proc. IEEE Int Multimedia and Expo (ICME) Conf},
     year = {2012},
     pages = {236--241}}
    
  87. P. Kakar & N. Sudha
    Verifying Temporal Data in Geotagged Images Via Sun Azimuth Estimation
    IEEE Transactions on Information Forensics and Security, 2012, Vol. 7(3), pp. 1029-1039
    BibTeX
    @article{Kakar2012b,
     author = {Kakar, P. and Sudha, N.},
     title = {Verifying Temporal Data in Geotagged Images Via Sun Azimuth Estimation},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2012},
     volume = {7},
     number = {3},
     pages = {1029--1039}}
    
  88. K. Kancherla & S. Mukkamala
    Novel Blind Video Forgery Detection Using Markov Models on Motion Residue
    Pan, J.-S., Chen, S.-M. & Nguyen, N. (ed.)
    Intelligent Information and Database Systems
    Springer Berlin / Heidelberg, 2012, Vol. 7198, pp. 308-315
    BibTeX
    @incollection{Kancherla2012,
     author = {Kancherla, Kesav and Mukkamala, Srinivas},
     title = {Novel Blind Video Forgery Detection Using Markov Models on Motion Residue},
     booktitle = {Intelligent Information and Database Systems},
     publisher = {Springer Berlin / Heidelberg},
     year = {2012},
     volume = {7198},
     pages = {308-315}}
    
  89. X. Kang, Y. Li, Z. Qu & J. Huang
    Enhancing Source Camera Identification Performance With a Camera Reference Phase Sensor Pattern Noise
    IEEE Transactions on Information Forensics and Security, 2012, Vol. 7(2), pp. 393-402
    BibTeX
    @article{Kang2012,
     author = {Xiangui Kang and Yinxiang Li and Zhenhua Qu and Jiwu Huang},
     title = {Enhancing Source Camera Identification Performance With a Camera Reference Phase Sensor Pattern Noise},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2012},
     volume = {7},
     number = {2},
     pages = {393--402}}
    
  90. X. Kang, M. Stamm, A. Peng & K. Liu
    Robust Median Filtering Forensics Based on the Autoregressive Model of Median Filtered Residual
    2012
    BibTeX
    @article{Kang2012a,
     author = {Kang, X. and Stamm, M.C. and Peng, A. and Liu, K.J.R.},
     title = {Robust Median Filtering Forensics Based on the Autoregressive Model of Median Filtered Residual},
     year = {2012}}
    
  91. Y.T. Kao, H.J. Lin, C.W. Wang & Y.C. Pai
    Effective Detection for Linear Up-Sampling by a Factor of Fraction
    IEEE Transactions on Image Processing, 2012, Vol. 21(8), pp. 3443-3453
    BibTeX
    @article{Kao2012,
     author = {Yang Ta Kao and Hwei Jen Lin and Chun Wei Wang and Yi Chun Pai},
     title = {Effective Detection for Linear Up-Sampling by a Factor of Fraction},
     journal = {IEEE Transactions on Image Processing},
     year = {2012},
     volume = {21},
     number = {8},
     pages = {3443--3453}}
    
  92. C.S. Kohler
    Updates to Policies and Procedures Related to Potential Scientific and Academic Misconduct in the Journals of the American Diabetes Association
    Diabetes Care, 2012, Vol. 35(1), pp. 189-190
    BibTeX
    @article{Kohler2012,
     author = {Christian S. Kohler},
     title = {Updates to Policies and Procedures Related to Potential Scientific and Academic Misconduct in the Journals of the American Diabetes Association},
     journal = {Diabetes Care},
     year = {2012},
     volume = {35},
     number = {1},
     pages = {189-190}}
    
  93. C.-W. Kwok, O. Au & S.-H. Chui
    Alternative Anti-Forensics Method for Contrast Enhancement
    Shi, Y., Kim, H.-J. & Perez-Gonzalez, F. (ed.)
    Digital Forensics and Watermarking
    Springer Berlin / Heidelberg, 2012, Vol. 7128, pp. 398-410
    BibTeX
    @incollection{Kwok2012,
     author = {Kwok, Chun-Wing and Au, O. and Chui, Sung-Him},
     title = {Alternative Anti-Forensics Method for Contrast Enhancement},
     booktitle = {Digital Forensics and Watermarking},
     publisher = {Springer Berlin / Heidelberg},
     year = {2012},
     volume = {7128},
     pages = {398-410}}
    
  94. J.-F. Lalonde, A. Efros & S. Narasimhan
    Estimating the Natural Illumination Conditions from a Single Outdoor Image
    International Journal of Computer Vision, Springer US, 2012, Vol. 98, pp. 123-145
    BibTeX
    @article{Lalonde2012,
     author = {Lalonde, Jean-François and Efros, AlexeiA. and Narasimhan, SrinivasaG.},
     title = {Estimating the Natural Illumination Conditions from a Single Outdoor Image},
     journal = {International Journal of Computer Vision},
     publisher = {Springer US},
     year = {2012},
     volume = {98},
     pages = {123-145}}
    
  95. M. Lebrun, M. Colom, A. Buades & J.M. Morel
    Secrets of image denoising cuisine
    Acta Numerica, 2012, Vol. 21, pp. 475-576
    BibTeX
    @article{Lebrun2012,
     author = {M. Lebrun and M. Colom and A. Buades and J. M. Morel},
     title = {Secrets of image denoising cuisine},
     journal = {Acta Numerica},
     year = {2012},
     volume = {21},
     pages = {475-576}}
    
  96. A.B. Lewis
    Reconstructing compressed photo and video data
    University of Cambridge - Computer Laboratory, University of Cambridge - Computer Laboratory, 2012(813)
    BibTeX
    @techreport{Lewis2012,
     author = {Andrew B. Lewis},
     title = {Reconstructing compressed photo and video data},
     school = {University of Cambridge - Computer Laboratory},
     year = {2012},
     number = {813}}
    
  97. C. Li & R. Satta
    An Empirical Investigation into the Correlation between Vignetting Effect and the Quality of Sensor Pattern Noise
    Department of Computer Science, University of Warwick, Coventry CV4 7AL, UK, Department of Computer Science, University of Warwick, Coventry CV4 7AL, UK, 2012
    BibTeX
    @techreport{Li2012b,
     author = {Li, C.T. and Satta, R.},
     title = {An Empirical Investigation into the Correlation between Vignetting Effect and the Quality of Sensor Pattern Noise},
     school = {Department of Computer Science, University of Warwick, Coventry CV4 7AL, UK},
     year = {2012}}
    
  98. C.-T. Li & Y. Li
    Color-Decoupled Photo Response Non-Uniformity for Digital Image Forensics
    IEEE Transactions on Circuits and Systems for Video Technology, 2012, Vol. 22(2), pp. 260-271
    BibTeX
    @article{Li2012,
     author = {Chang-Tsun Li and Yue Li},
     title = {Color-Decoupled Photo Response Non-Uniformity for Digital Image Forensics},
     journal = {IEEE Transactions on Circuits and Systems for Video Technology},
     year = {2012},
     volume = {22},
     number = {2},
     pages = {260--271}}
    
  99. H. Li & J. Zheng
    Blind Detection of Digital Forgery Image Based on the Edge Width
    Zhang, Y., Zhou, Z.-H., Zhang, C. & Li, Y. (ed.)
    Intelligent Science and Intelligent Data Engineering
    Springer Berlin / Heidelberg, 2012, Vol. 7202, pp. 546-553
    BibTeX
    @incollection{Li2012c,
     author = {Li, Hang and Zheng, Jiangbin},
     title = {Blind Detection of Digital Forgery Image Based on the Edge Width},
     booktitle = {Intelligent Science and Intelligent Data Engineering},
     publisher = {Springer Berlin / Heidelberg},
     year = {2012},
     volume = {7202},
     pages = {546-553}}
    
  100. L. Li, S. Li & J. Wang
    Copy-move forgery detection based on PHT
    Proc. World Congress Information and Communication Technologies (WICT)
    2012, pp. 1061-1065
    BibTeX
    @inproceedings{Li2012e,
     author = {Li, Leida and Li, Shushang and Wang, Jun},
     title = {Copy-move forgery detection based on PHT},
     booktitle = {Proc. World Congress Information and Communication Technologies (WICT)},
     year = {2012},
     pages = {1061--1065}}
    
  101. X.H. Li, Y.Q. Zhao, M. Liao & S.Y. Q
    Detection of tampered region for JPEG images by using mode-based first digit features
    EURASIP Journal on Advances in Signal Processing, 2012, Vol. 1(190)
    BibTeX
    @article{Li2012a,
     author = {Li, Xiang Hua and Zhao, Yu Qian and Liao, Miao and Shi Yun Q},
     title = {Detection of tampered region for JPEG images by using mode-based first digit features},
     journal = {EURASIP Journal on Advances in Signal Processing},
     year = {2012},
     volume = {1},
     number = {190}}
    
  102. X.-h. Li, Y.-q. Zhao, M. Liao, F. Shih & Y. Shi
    Passive detection of copy-paste forgery between JPEG images
    Journal of Central South University, Central South University, 2012, Vol. 19, pp. 2839-2851
    BibTeX
    @article{Li2012d,
     author = {Li, Xiang-hua and Zhao, Yu-qian and Liao, Miao and Shih, F.Y. and Shi, Y.Q.},
     title = {Passive detection of copy-paste forgery between JPEG images},
     journal = {Journal of Central South University},
     publisher = {Central South University},
     year = {2012},
     volume = {19},
     pages = {2839-2851}}
    
  103. H. Ling, H. Cheng, Q. Ma, F. Zou & W. Yan
    Efficient Image Copy Detection Using Multiscale Fingerprints
    IEEE Multimedia, 2012, Vol. 19(1), pp. 60-69
    BibTeX
    @article{Ling2012,
     author = {Hefei Ling and Hongrui Cheng and Qingzhen Ma and Fuhao Zou and WeiQi Yan},
     title = {Efficient Image Copy Detection Using Multiscale Fingerprints},
     journal = {IEEE Multimedia},
     year = {2012},
     volume = {19},
     number = {1},
     pages = {60--69}}
    
  104. H. Liu, Y. Yang & M. Shang
    Blind detection of image splicing based on run length matrix combined properties
    Proc. 10th World Congress Intelligent Control and Automation (WCICA)
    2012, pp. 4545-4550
    BibTeX
    @inproceedings{Liu2012a,
     author = {Liu, Han and Yang, Yun and Shang, Minqing},
     title = {Blind detection of image splicing based on run length matrix combined properties},
     booktitle = {Proc. 10th World Congress Intelligent Control and Automation (WCICA)},
     year = {2012},
     pages = {4545--4550}}
    
  105. Q. Liu, X. Li, L. Chen, H. Cho, P. Cooper, Z. Chen, M. Qiao & A. Sung
    Identification of Smartphone-Image Source and Manipulation
    Jiang, H., Ding, W., Ali, M. & Wu, X. (ed.)
    Advanced Research in Applied Artificial Intelligence
    Springer Berlin / Heidelberg, 2012, Vol. 7345, pp. 262-271
    BibTeX
    @incollection{Liu2012,
     author = {Liu, Qingzhong and Li, Xiaodong and Chen, Lei and Cho, Hyuk and Cooper, Peter and Chen, Zhongxue and Qiao, Mengyu and Sung, Andrew},
     title = {Identification of Smartphone-Image Source and Manipulation},
     booktitle = {Advanced Research in Applied Artificial Intelligence},
     publisher = {Springer Berlin / Heidelberg},
     year = {2012},
     volume = {7345},
     pages = {262-271}}
    
  106. M. Long, T. Peng & F. Peng
    A Source Cell-phone Identification Scheme Based on Canonical Correlation Analysis of Photo Response Non-uniformity
    Journal of Computational Information Systems, 2012, Vol. 8(4), pp. 1433-1440
    BibTeX
    @article{Long2012,
     author = {Min Long and Ting Peng and Fei Peng},
     title = {A Source Cell-phone Identification Scheme Based on Canonical Correlation Analysis of Photo Response Non-uniformity},
     journal = {Journal of Computational Information Systems},
     year = {2012},
     volume = {8},
     number = {4},
     pages = {1433-1440}}
    
  107. M.V. Malakooti, A. Pahlavan Tafti, F. Rohani & M.A. Moghaddasifar
    RGB digital image forgery detection using Singular Value Decomposition and One Dimensional Cellular Automata
    Proc. 8th Int Computing Technology and Information Management (ICCM) Conf
    2012, Vol. 1, pp. 483-488
    BibTeX
    @inproceedings{Malakooti2012,
     author = {Malakooti, Mohammad V. and Pahlavan Tafti, Ahmad and Rohani, Faezeh and Moghaddasifar, Mohammad Amin},
     title = {RGB digital image forgery detection using Singular Value Decomposition and One Dimensional Cellular Automata},
     booktitle = {Proc. 8th Int Computing Technology and Information Management (ICCM) Conf},
     year = {2012},
     volume = {1},
     pages = {483--488}}
    
  108. V. Mall, K. Bhatt, S.K. Mitra & A.K. Roy
    Exposing structural tampering in digital images
    Proc. IEEE Int Signal Processing, Computing and Control (ISPCC) Conf
    2012, pp. 1-6
    BibTeX
    @inproceedings{Mall2012,
     author = {Mall, V. and Bhatt, K. and Mitra, S. K. and Roy, A. K. },
     title = {Exposing structural tampering in digital images},
     booktitle = {Proc. IEEE Int Signal Processing, Computing and Control (ISPCC) Conf},
     year = {2012},
     pages = {1--6}}
    
  109. A. Malviya & S. Sandlake
    A Review on Passive Approach for Image Manipulation Detection Techniques for Copy Move Forgery
    Journal of Computing Technologies, 2012, Vol. 1(2), pp. -
    BibTeX
    @article{Malviya2012,
     author = {A.V. Malviya and S.A. Sandlake},
     title = {A Review on Passive Approach for Image Manipulation Detection Techniques for Copy Move Forgery},
     journal = {Journal of Computing Technologies},
     year = {2012},
     volume = {1},
     number = {2},
     pages = {-}}
    
  110. S. Milani, M. Tagliasacchi & S. Tubaro
    Discriminating multiple JPEG compression using first digit features
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2012
    2012, pp. 2253-2256
    BibTeX
    @inproceedings{Milani2012,
     author = {Milani, Simone and Tagliasacchi, Marco and Tubaro, Stefano},
     title = {Discriminating multiple JPEG compression using first digit features},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2012},
     year = {2012},
     pages = {2253--2256}}
    
  111. U. Mudenagudi, L.M., A.U., H. Holalad & M.S.D.
    Detection of doctored images
    International Journal of Current Engineering and Technology
    International Journal of Current Engineering and Technology, ACM, 2012
    BibTeX
    @article{Mudenagudi2012,
     author = {Uma Mudenagudi and Lalitha M. and Ananya U. and Harsh Holalad and Muktanidhi S. D.},
     title = {Detection of doctored images},
     booktitle = {International Journal of Current Engineering and Technology},
     journal = {International Journal of Current Engineering and Technology},
     publisher = {ACM},
     year = {2012}}
    
  112. G. Muhammad, M. Hussain & G. Bebis
    Passive copy move image forgery detection using undecimated dyadic wavelet transform
    Digital Investigation, 2012(0), pp. -
    BibTeX
    @article{Muhammad2012,
     author = {Ghulam Muhammad and Muhammad Hussain and George Bebis},
     title = {Passive copy move image forgery detection using undecimated dyadic wavelet transform},
     journal = {Digital Investigation},
     year = {2012},
     number = {0},
     pages = { - }}
    
  113. G. Muhammad, M. Hussain, A.M. Mirza & G. Bebis
    Dyadic wavelets and DCT based blind copy-move image forgery detection
    Proc. IET Conf. Image Processing (IPR 2012)
    2012, pp. 1-6
    BibTeX
    @inproceedings{Muhammad2012a,
     author = {Muhammad, Ghulam and Hussain, Muhammad and Mirza, Anwar M. and Bebis, George},
     title = {Dyadic wavelets and DCT based blind copy-move image forgery detection},
     booktitle = {Proc. IET Conf. Image Processing (IPR 2012)},
     year = {2012},
     pages = {1--6}}
    
  114. S. Murali, B.S. Anami & G.B. Chittapur
    Detection of digital photo image forgery
    Proc. IEEE Int Advanced Communication Control and Computing Technologies (ICACCCT) Conf
    2012, pp. 120-124
    BibTeX
    @inproceedings{Murali2012a,
     author = {Murali, S. and Anami, B. S. and Chittapur, G. B. },
     title = {Detection of digital photo image forgery},
     booktitle = {Proc. IEEE Int Advanced Communication Control and Computing Technologies (ICACCCT) Conf},
     year = {2012},
     pages = {120--124}}
    
  115. S. Murali, G.B. Chittapur & H.S. Prabhakara
    Format based photo forgery image detection
    Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
    ACM, 2012, pp. 452-457
    BibTeX
    @inproceedings{Murali2012,
     author = {Murali, S. and Chittapur, Govindraj B. and Prabhakara, H. S.},
     title = {Format based photo forgery image detection},
     booktitle = {Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology},
     publisher = {ACM},
     year = {2012},
     pages = {452--457}}
    
  116. O. Muratov, D.-T. Dang-Nguyen, G. Boato & F.G.B. De Natale
    Saliency detection as a support for image forensics
    Proc. 5th Int Communications Control and Signal Processing (ISCCSP) Symp
    2012, pp. 1-5
    BibTeX
    @inproceedings{Muratov2012,
     author = {Muratov, O. and Duc-Tien Dang-Nguyen and Boato, Giulia and De Natale, F. G. B. },
     title = {Saliency detection as a support for image forensics},
     booktitle = {Proc. 5th Int Communications Control and Signal Processing (ISCCSP) Symp},
     year = {2012},
     pages = {1--5}}
    
  117. H. Nguyen & S. Katzenbeisser
    Robust Resampling Detection in Digital Images
    De Decker, B. & Chadwick, D. (ed.)
    Communications and Multimedia Security
    Springer Berlin / Heidelberg, 2012, Vol. 7394, pp. 3-15
    BibTeX
    @incollection{Nguyen2012b,
     author = {Nguyen, Hieu and Katzenbeisser, Stefan},
     title = {Robust Resampling Detection in Digital Images},
     booktitle = {Communications and Multimedia Security},
     publisher = {Springer Berlin / Heidelberg},
     year = {2012},
     volume = {7394},
     pages = {3-15}}
    
  118. H. Nguyen & S. Katzenbeisser
    Performance and Robustness Analysis for Some Re-sampling Detection Techniques in Digital Images
    Shi, Y., Kim, H.-J. & Perez-Gonzalez, F. (ed.)
    Digital Forensics and Watermarking
    Springer Berlin / Heidelberg, 2012, Vol. 7128, pp. 387-397
    BibTeX
    @incollection{Nguyen2012a,
     author = {Nguyen, Hieu and Katzenbeisser, Stefan},
     title = {Performance and Robustness Analysis for Some Re-sampling Detection Techniques in Digital Images},
     booktitle = {Digital Forensics and Watermarking},
     publisher = {Springer Berlin / Heidelberg},
     year = {2012},
     volume = {7128},
     pages = {387-397}}
    
  119. H.C. Nguyen & S. Katzenbeisser
    Detection of Copy-move Forgery in Digital Images Using Radon Transformation and Phase Correlation
    Proc. Eighth Int Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) Conf
    2012, pp. 134-137
    BibTeX
    @inproceedings{Nguyen2012,
     author = {Nguyen, Hieu Cuong and Katzenbeisser, Stefan},
     title = {Detection of Copy-move Forgery in Digital Images Using Radon Transformation and Phase Correlation},
     booktitle = {Proc. Eighth Int Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) Conf},
     year = {2012},
     pages = {134--137}}
    
  120. J.F. O´Brien & H. Farid
    Exposing photo manipulation with inconsistent reflections
    ACM Trans. Graph., ACM, 2012, Vol. 31(1), pp. 4:1-4:11
    BibTeX
    @article{OBrien2012,
     author = {O´Brien, James F. and Farid, Hany},
     title = {Exposing photo manipulation with inconsistent reflections},
     journal = {ACM Trans. Graph.},
     publisher = {ACM},
     year = {2012},
     volume = {31},
     number = {1},
     pages = {4:1--4:11}}
    
  121. L. Özparlak & I. Avcibas
    Image manipulation detection using contourlet transform
    Proc. 20th Signal Processing and Communications Applications Conf. (SIU)
    2012, pp. 1-4
    BibTeX
    @inproceedings{Ozparlak2012,
     author = {Özparlak, L. and Avcibas, I.},
     title = {Image manipulation detection using contourlet transform},
     booktitle = {Proc. 20th Signal Processing and Communications Applications Conf. (SIU)},
     year = {2012},
     pages = {1--4}}
    
  122. X. Pan, X. Zhang & S. Lyu
    Exposing image splicing with inconsistent local noise variances
    Proc. IEEE Int Computational Photography (ICCP) Conf
    2012, pp. 1-10
    BibTeX
    @inproceedings{Pan2012,
     author = {Xunyu Pan and Xing Zhang and Siwei Lyu},
     title = {Exposing image splicing with inconsistent local noise variances},
     booktitle = {Proc. IEEE Int Computational Photography (ICCP) Conf},
     year = {2012},
     pages = {1--10}}
    
  123. X. Pan, X. Zhang & S. Lyu
    Detecting splicing in digital audios using local noise level estimation
    Acoustics, Speech and Signal Processing (ICASSP), 2012 IEEE International Conference on
    2012, pp. 1841-1844
    BibTeX
    @inproceedings{Pan2012a,
     author = {Xunyu Pan and Xing Zhang and Siwei Lyu},
     title = {Detecting splicing in digital audios using local noise level estimation},
     booktitle = {Acoustics, Speech and Signal Processing (ICASSP), 2012 IEEE International Conference on},
     year = {2012},
     pages = {1841--1844}}
    
  124. F. Peng, J. Liu & M. Long
    Identification of Natural Images and Computer Generated Graphics Based on Hybrid Features
    International Journal of Digital Crime and Forensics (IJDCF), 2012, Vol. 4(1), pp. 1-16
    BibTeX
    @article{Peng2012,
     author = {Fei Peng and Juan Liu and Min Long},
     title = {Identification of Natural Images and Computer Generated Graphics Based on Hybrid Features},
     journal = {International Journal of Digital Crime and Forensics (IJDCF)},
     year = {2012},
     volume = {4},
     number = {1},
     pages = {1-16}}
    
  125. S. Pfennig & M. Kirchner
    Spectral methods to determine the exact scaling factor of resampled digital images
    Proc. 5th Int Communications Control and Signal Processing (ISCCSP) Symp
    2012, pp. 1-6
    BibTeX
    @inproceedings{Pfennig2012,
     author = {Pfennig, S. and Kirchner, M.},
     title = {Spectral methods to determine the exact scaling factor of resampled digital images},
     booktitle = {Proc. 5th Int Communications Control and Signal Processing (ISCCSP) Symp},
     year = {2012},
     pages = {1--6}}
    
  126. V.S. Pujari & M. Sohani
    A Comparative Analysis on Copy Move Forgery Detection in Spatial Domain Method Using Lexicographic and Non Lexicographic techniques
    IJECCE, 2012, Vol. 3(1), pp. -
    BibTeX
    @article{Pujari2012,
     author = {Vidya S. Pujari and Mandar Sohani},
     title = {A Comparative Analysis on Copy Move Forgery Detection in Spatial Domain Method Using Lexicographic and Non Lexicographic techniques},
     journal = {IJECCE},
     year = {2012},
     volume = {3},
     number = {1},
     pages = {-}}
    
  127. G. Qadir, S. Yahaya & A.T.S. Ho
    Surrey University Library for Forensic Analysis (SULFA) of video content
    Proc. IET Conf. Image Processing (IPR 2012)
    2012, pp. 1-6
    BibTeX
    @inproceedings{Qadir2012,
     author = {Qadir, Ghulam and Yahaya, Syamsul and Ho, Anthony T S},
     title = {Surrey University Library for Forensic Analysis (SULFA) of video content},
     booktitle = {Proc. IET Conf. Image Processing (IPR 2012)},
     year = {2012},
     pages = {1--6}}
    
  128. R. Qian, W. Li, N. Yu & Z. Hao
    Image Forensics with Rotation-Tolerant Resampling Detection
    Proc. IEEE Int Multimedia and Expo Workshops (ICMEW) Conf
    2012, pp. 61-66
    BibTeX
    @inproceedings{Qian2012,
     author = {Qian, Ruohan and Li, Weihai and Yu, Nenghai and Hao, Zhuo},
     title = {Image Forensics with Rotation-Tolerant Resampling Detection},
     booktitle = {Proc. IEEE Int Multimedia and Expo Workshops (ICMEW) Conf},
     year = {2012},
     pages = {61--66}}
    
  129. Z. Qian & X. Zhang
    Combating Anti-forensics of Jpeg Compression
    IJCSI International Journal of Computer Science Issues, 2012, Vol. 9(3), pp. 454-459
    BibTeX
    @article{Qian2012a,
     author = {Zhenxing Qian and Xinpeng Zhang},
     title = {Combating Anti-forensics of Jpeg Compression},
     journal = {IJCSI International Journal of Computer Science Issues},
     year = {2012},
     volume = {9},
     number = {3},
     pages = {454--459}}
    
  130. Z. Qu, W. Luo & J. Huang
    Identifying Shifted Double JPEG Compression Artifacts for Non-intrusive Digital Image Forensics
    Hu, S.-M. & Martin, R. (ed.)
    Computational Visual Media
    Lecture Notes in Computer Science, Springer Berlin Heidelberg, 2012, Vol. 7633, pp. 1-8
    BibTeX
    @incollection{Qu2012,
     author = {Qu, Zhenhua and Luo, Weiqi and Huang, Jiwu},
     title = {Identifying Shifted Double JPEG Compression Artifacts for Non-intrusive Digital Image Forensics},
     booktitle = {Computational Visual Media},
     journal = {Lecture Notes in Computer Science},
     publisher = {Springer Berlin Heidelberg},
     year = {2012},
     volume = {7633},
     pages = {1-8}}
    
  131. X. Quan & H. Zhang
    Copy-move forgery detection in digital images based on local dimension estimation
    Proc. Int Cyber Security, Cyber Warfare and Digital Forensic (CyberSec) Conf
    2012, pp. 180-185
    BibTeX
    @inproceedings{Quan2012,
     author = {Xiaomei Quan and Hongbin Zhang},
     title = {Copy-move forgery detection in digital images based on local dimension estimation},
     booktitle = {Proc. Int Cyber Security, Cyber Warfare and Digital Forensic (CyberSec) Conf},
     year = {2012},
     pages = {180--185}}
    
  132. Y. Roodt, W. Clarke, P. Robinson & A. Nel
    Robust single image noise estimation from approximate local statistics
    2012
    BibTeX
    @article{Roodt2012,
     author = {Roodt, Y. and Clarke, W. and Robinson, P.E. and Nel, A.},
     title = {Robust single image noise estimation from approximate local statistics},
     year = {2012}}
    
  133. M. Rosenfeld, R. Creutzburg & C. Vielhauer
    Kamera-Sensorforensik: Erkennungsraten im Kontext von Bildkompression
    Heinrich C. Mayr, Alpen-Adria-Universität Klagenfurt, A. (C. D. F. T. U. D. G. U. F. H. f. T. S. U. F. U. D.-E. G. J.-C. F. H.-U. z. B. G. M. G. U. D.-E. G. R. H. U. B. G. M. K. U. d. B. M. G. A. L. U. d. B. M. G. E. W. M. T. U. M. G. S. S. U. S. G. I. T. U. T. K. V. H. B. G. M. W. U. K.-L. G. (ed.)
    Lecture Notes in Informatics
    Fachhochschule Brandenburg, Fachbereich Informatik und Medien PF 2132, D--14737 Brandenburg, Fachhochschule Brandenburg, Fachbereich Informatik und Medien PF 2132, D--14737 Brandenburg, 2012, Vol. P-194(2012), pp. 117
    BibTeX
    @inproceedings{Rosenfeld,
     author = {Rosenfeld, M. and Creutzburg, R. and Vielhauer, C.},
     title = {Kamera-Sensorforensik: Erkennungsraten im Kontext von Bildkompression},
     booktitle = {Lecture Notes in Informatics},
     school = {Fachhochschule Brandenburg, Fachbereich Informatik und Medien PF 2132, D--14737 Brandenburg},
     year = {2012},
     volume = {P-194(2012)},
     pages = {117}}
    
  134. R.M.S. Ruth, L. Vanitha & F.F. Gnanaraj
    Forgery detection in digital images using Self Organizing Map
    Proc. Int Devices, Circuits and Systems (ICDCS) Conf
    2012, pp. 699-703
    BibTeX
    @inproceedings{Ruth2012,
     author = {Ruth, R. M. S. and Vanitha, L. and Gnanaraj, F. F. },
     title = {Forgery detection in digital images using Self Organizing Map},
     booktitle = {Proc. Int Devices, Circuits and Systems (ICDCS) Conf},
     year = {2012},
     pages = {699--703}}
    
  135. S.Manimurugan & B. Jose
    A Novel Method for Detecting Triple JPEG Compression with the Same Quantization Matrix
    International Journal of Engineering Trends and Technology, 2012, Vol. 3(2), pp. 94-97
    BibTeX
    @article{Manimurugan2012,
     author = {S.Manimurugan and Boby Jose},
     title = {A Novel Method for Detecting Triple JPEG Compression with the Same Quantization Matrix},
     journal = {International Journal of Engineering Trends and Technology},
     year = {2012},
     volume = {3},
     number = {2},
     pages = {94-97}}
    
  136. C. Schneider, W. Rasband & K. Eliceiri
    NIH Image to ImageJ: 25 years of image analysis
    Nature Methods, Nature Publishing Group, 2012, Vol. 9(7), pp. 671-675
    BibTeX
    @article{Schneider2012,
     author = {Schneider, C.A. and Rasband, W.S. and Eliceiri, K.W.},
     title = {NIH Image to ImageJ: 25 years of image analysis},
     journal = {Nature Methods},
     publisher = {Nature Publishing Group},
     year = {2012},
     volume = {9},
     number = {7},
     pages = {671--675}}
    
  137. M. Schöberl
    Microelectronic Systems: Circuits, Systems and Applications
    Heppner, J., Heuberger, A., Kirsch, K., Elst, G. & Hanke, R. (ed.)
    Chapter Analysis of Processing Pipelines in Digital Raw Cameras
    Springer, 2012, pp. 281
    BibTeX
    @inbook{Schoeberl2012,
     author = {Michael Schöberl},
     title = {Microelectronic Systems: Circuits, Systems and Applications},
     publisher = {Springer},
     year = {2012},
     pages = {281}}
    
  138. H. Shao, T. Yu, M. Xu & W. Cui
    Image region duplication detection based on circular window expansion and phase correlation
    Forensic Science International, 2012, Vol. 04, pp. -
    BibTeX
    @article{Shao2012,
     author = {Hong Shao and Tianshu Yu and Mengjia Xu and Wencheng Cui},
     title = {Image region duplication detection based on circular window expansion and phase correlation},
     journal = {Forensic Science International},
     year = {2012},
     volume = {04},
     pages = {-}}
    
  139. W. Shen & N. Xiamu
    A Countermeasure against Double Compression Based Image Forensic
    IEICE TRANSACTIONS on Information and Systems, The Institute of Electronics, Information and Communication Engineers, 2012, Vol. 95(10), pp. 2577-2580
    BibTeX
    @article{Shen2012,
     author = {Shen, W. and Xiamu, NIU},
     title = {A Countermeasure against Double Compression Based Image Forensic},
     journal = {IEICE TRANSACTIONS on Information and Systems},
     publisher = {The Institute of Electronics, Information and Communication Engineers},
     year = {2012},
     volume = {95},
     number = {10},
     pages = {2577--2580}}
    
  140. F. Shi, B. Kang, H. Li & Y. Zhu
    A new method for detecting JEPG doubly compression images by using estimated primary quantization step
    Proc. Int Systems and Informatics (ICSAI) Conf
    2012, pp. 1810-1814
    BibTeX
    @inproceedings{Shi2012,
     author = {FangLing Shi and BaoSheng Kang and HongAn Li and Yu Zhu},
     title = {A new method for detecting JEPG doubly compression images by using estimated primary quantization step},
     booktitle = {Proc. Int Systems and Informatics (ICSAI) Conf},
     year = {2012},
     pages = {1810--1814}}
    
  141. J.Y. Shim & S.-W. Kim
    Digital Forgery Detection Scheme Incorporating Imaging Device Characteristics Using Wiener Filter
    J. (Jong Hyuk) Park, J. J. (J. H., Chao, H.-C., S. Obaidat, M. S. & Kim, J. (ed.)
    Computer Science and Convergence
    Springer Netherlands, 2012, Vol. 114, pp. 713-721
    BibTeX
    @incollection{Shim2012,
     author = {Shim, Jae Youn and Kim, Seong-Whan},
     title = {Digital Forgery Detection Scheme Incorporating Imaging Device Characteristics Using Wiener Filter},
     booktitle = {Computer Science and Convergence},
     publisher = {Springer Netherlands},
     year = {2012},
     volume = {114},
     pages = {713-721}}
    
  142. Y.-D. Shin
    Fast Detection of Copy-Move Forgery Image Using Three Step Search Algorithm in the Spatial Domain
    Lee, G., Howard, D., Kang, J. & Slezak, D. (ed.)
    Convergence and Hybrid Information Technology
    Springer Berlin / Heidelberg, 2012, Vol. 7425, pp. 389-395
    BibTeX
    @incollection{Shin2012,
     author = {Shin, Yong-Dal},
     title = {Fast Detection of Copy-Move Forgery Image Using Three Step Search Algorithm in the Spatial Domain},
     booktitle = {Convergence and Hybrid Information Technology},
     publisher = {Springer Berlin / Heidelberg},
     year = {2012},
     volume = {7425},
     pages = {389-395}}
    
  143. Y. Shuang & F. Zhen
    Primary Quality Factor Estimation in Double Compressed JPEG Images Using Quantization Error
    Zhang, W., Yang, X., Xu, Z., An, P., Liu, Q. & Lu, Y. (ed.)
    Advances on Digital Television and Wireless Multimedia Communications
    Springer Berlin Heidelberg, 2012, Vol. 331, pp. 133-139
    BibTeX
    @incollection{Shuang2012,
     author = {Shuang, Yang and Zhen, Fang},
     title = {Primary Quality Factor Estimation in Double Compressed JPEG Images Using Quantization Error},
     booktitle = {Advances on Digital Television and Wireless Multimedia Communications},
     publisher = {Springer Berlin Heidelberg},
     year = {2012},
     volume = {331},
     pages = {133-139}}
    
  144. J. Singh & B. Raman
    A High Performance Copy-Move Image Forgery Detection Scheme on GPU
    Deep, K., Nagar, A., Pant, M. & Bansal, J. C. (ed.)
    Proceedings of the International Conference on Soft Computing for Problem Solving (SocProS 2011) December 20-22, 2011
    Springer Berlin / Heidelberg, 2012, Vol. 131, pp. 239-246
    BibTeX
    @incollection{Singh2012,
     author = {Singh, Jaideep and Raman, Balasubramanian},
     title = {A High Performance Copy-Move Image Forgery Detection Scheme on GPU},
     booktitle = {Proceedings of the International Conference on Soft Computing for Problem Solving (SocProS 2011) December 20-22, 2011},
     publisher = {Springer Berlin / Heidelberg},
     year = {2012},
     volume = {131},
     pages = {239-246}}
    
  145. M. Sridevi, C. Mala & S. Sandeep
    Copy -- Move Image Forgery Detection an a Parallel Environment
    Computer Science & Information Technology, 2012, Vol. 2, pp. 19-29
    BibTeX
    @article{Sridevi2012a,
     author = {M. Sridevi and C. Mala and S. Sandeep},
     title = {Copy -- Move Image Forgery Detection an a Parallel Environment},
     journal = {Computer Science & Information Technology},
     year = {2012},
     volume = {2},
     pages = {19-29}}
    
  146. M. Sridevi, C. Mala & S. Sanyam
    Comparative Study of Image Forgery and Copy-Move Techniques
    Wyld, D. C., Zizka, J. & Nagamalai, D. (ed.)
    Advances in Computer Science, Engineering & Applications
    Springer Berlin / Heidelberg, 2012, Vol. 166, pp. 715-723
    BibTeX
    @incollection{Sridevi2012,
     author = {Sridevi, M. and Mala, C. and Sanyam, Siddhant},
     title = {Comparative Study of Image Forgery and Copy-Move Techniques},
     booktitle = {Advances in Computer Science, Engineering & Applications},
     publisher = {Springer Berlin / Heidelberg},
     year = {2012},
     volume = {166},
     pages = {715-723}}
    
  147. M.C. Stamm, W.S. Lin & K.J.R. Liu
    Temporal Forensics and Anti-Forensics for Motion Compensated Video
    IEEE Transactions on Information Forensics and Security, 2012, Vol. 7(4), pp. 1315-1329
    BibTeX
    @article{Stamm2012,
     author = {Stamm, M. C. and Lin, W. S. and Liu, K. J. R. },
     title = {Temporal Forensics and Anti-Forensics for Motion Compensated Video},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2012},
     volume = {7},
     number = {4},
     pages = {1315--1329}}
    
  148. M.C. Stamm, W.S. Lin & K.J.R. Liu
    Forensics vs. anti-forensics: A decision and game theoretic framework
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2012
    2012, pp. 1749-1752
    BibTeX
    @inproceedings{Stamm2012a,
     author = {Stamm, Matthew C. and Lin, W. Sabrina and Liu, K. J. Ray},
     title = {Forensics vs. anti-forensics: A decision and game theoretic framework},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2012},
     year = {2012},
     pages = {1749--1752}}
    
  149. T. Sun, W. Wang & X. Jiang
    Exposing video forgeries by detecting MPEG double compression
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2012
    2012, pp. 1389-1392
    BibTeX
    @inproceedings{Sun2012,
     author = {Tanfeng Sun and Wan Wang and Xinghao Jiang},
     title = {Exposing video forgeries by detecting MPEG double compression},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2012},
     year = {2012},
     pages = {1389--1392}}
    
  150. P. Sutthiwan
    Image Statistical Frameworks For Digital Image Forensics
    New Jersey Institute of Technology - Department of Electrical and Computer Engineering, New Jersey Institute of Technology - Department of Electrical and Computer Engineering, 2012
    BibTeX
    @phdthesis{Sutthiwan2012a,
     author = {Patchara Sutthiwan},
     title = {Image Statistical Frameworks For Digital Image Forensics},
     school = {New Jersey Institute of Technology - Department of Electrical and Computer Engineering},
     year = {2012}}
    
  151. P. Sutthiwan & Y. Shi
    Anti-Forensics of Double JPEG Compression Detection
    Shi, Y., Kim, H.-J. & Perez-Gonzalez, F. (ed.)
    Digital Forensics and Watermarking
    Springer Berlin / Heidelberg, 2012, Vol. 7128, pp. 411-424
    BibTeX
    @incollection{Sutthiwan2012,
     author = {Sutthiwan, Patchara and Shi, Yun},
     title = {Anti-Forensics of Double JPEG Compression Detection},
     booktitle = {Digital Forensics and Watermarking},
     publisher = {Springer Berlin / Heidelberg},
     year = {2012},
     volume = {7128},
     pages = {411-424}}
    
  152. W. Taktak & J.-L. Dugelay
    The Era of Interactive Media
    Xu, M. & Jin, J. S. (ed.)
    Chapter Digital Image Forensics: A Two-Step Approach for Identifying Source and Detecting Forgeries
    The Era of Interactive Media, Springer, 2012, pp. 37
    BibTeX
    @inbook{Taktak2012,
     author = {Taktak, Wiem and Dugelay, Jean-Luc},
     title = {The Era of Interactive Media},
     journal = {The Era of Interactive Media},
     publisher = {Springer},
     year = {2012},
     pages = {37}}
    
  153. G. Talmale & R. Jasutkar
    Analysis Of Different Techniques Of Image Forgery Detection
    International Journal of Computer Applications (IJCA), 2012, Vol. 7-8, pp. 13-18
    BibTeX
    @article{Talmale2012,
     author = {G.R. Talmale and R.W. Jasutkar},
     title = {Analysis Of Different Techniques Of Image Forgery Detection},
     journal = {International Journal of Computer Applications (IJCA)},
     year = {2012},
     volume = {7-8},
     pages = {13-18}}
    
  154. C. Tang, X. Yang & G. Zhai
    Dual-Transform Based Noise Estimation
    Proc. IEEE Int Multimedia and Expo (ICME) Conf
    2012, pp. 991-996
    BibTeX
    @inproceedings{Tang2012,
     author = {Chongwu Tang and Xiaokang Yang and Guangtao Zhai},
     title = {Dual-Transform Based Noise Estimation},
     booktitle = {Proc. IEEE Int Multimedia and Expo (ICME) Conf},
     year = {2012},
     pages = {991--996}}
    
  155. T.H. Thai, R. Cogranne & F. Retraint
    Camera Model Identification Based on Hypothesis Testing Theory
    Poc. of the 20th European Signal Processing Conference (EUSIPCO 2012)
    2012, pp. 1234-1238
    BibTeX
    @inproceedings{Thai2012,
     author = {T. H. Thai and R. Cogranne and F. Retraint},
     title = {Camera Model Identification Based on Hypothesis Testing Theory},
     booktitle = {Poc. of the 20th European Signal Processing Conference (EUSIPCO 2012)},
     year = {2012},
     pages = {1234-1238}}
    
  156. V.L.L. Thing, Y. Chen & C. Cheh
    An Improved Double Compression Detection Method for JPEG Image Forensics
    Proc. IEEE Int Multimedia (ISM) Symp
    2012, pp. 290-297
    BibTeX
    @inproceedings{Thing2012,
     author = {Thing, Vrizlynn L. L. and Chen, Yu and Cheh, Carmen},
     title = {An Improved Double Compression Detection Method for JPEG Image Forensics},
     booktitle = {Proc. IEEE Int Multimedia (ISM) Symp},
     year = {2012},
     pages = {290--297}}
    
  157. J. Tian & L. Chen
    Image Noise Estimation Using A Variation-Adaptive Evolutionary Approach
    IEEE Signal Processing Letters, 2012, Vol. 19(7), pp. 395-398
    BibTeX
    @article{Tian2012,
     author = {Tian, J. and Chen, L. },
     title = {Image Noise Estimation Using A Variation-Adaptive Evolutionary Approach},
     journal = {IEEE Signal Processing Letters},
     year = {2012},
     volume = {19},
     number = {7},
     pages = {395--398}}
    
  158. D. Tralic, J. Petrovic & S. Grgic
    JPEG image tampering detection using blocking artifacts
    Proc. 19th Int Systems, Signals and Image Processing (IWSSIP) Conf
    2012, pp. 5-8
    BibTeX
    @inproceedings{Tralic2012,
     author = {Tralic, Dijana and Petrovic, Juraj and Grgic, Sonja},
     title = {JPEG image tampering detection using blocking artifacts},
     booktitle = {Proc. 19th Int Systems, Signals and Image Processing (IWSSIP) Conf},
     year = {2012},
     pages = {5--8}}
    
  159. M.-J. Tsai, C.-S. Wang, J. Liu & J.-S. Yin
    Using decision fusion of feature selection in digital forensics for camera source model identification
    Comput. Stand. Interfaces, Elsevier Science Publishers B. V., 2012, Vol. 34(3), pp. 292-304
    BibTeX
    @article{Tsai2012,
     author = {Tsai, Min-Jen and Wang, Chen-Sheng and Liu, Jung and Yin, Jin-Sheng},
     title = {Using decision fusion of feature selection in digital forensics for camera source model identification},
     journal = {Comput. Stand. Interfaces},
     publisher = {Elsevier Science Publishers B. V.},
     year = {2012},
     volume = {34},
     number = {3},
     pages = {292--304}}
    
  160. A. Uhl & Y. Holler
    Iris-sensor authentication using camera PRNU fingerprints
    Proc. 5th IAPR Int Biometrics (ICB) Conf
    2012, pp. 230-237
    BibTeX
    @inproceedings{Uhl2012,
     author = {Uhl, A. and Holler, Y. },
     title = {Iris-sensor authentication using camera PRNU fingerprints},
     booktitle = {Proc. 5th IAPR Int Biometrics (ICB) Conf},
     year = {2012},
     pages = {230--237}}
    
  161. K.V.Hulmukhe, S.S.Sane & A.A. Borse
    Exploring Duplicated Regions in Natural Images
    IJCA Proceedings on International Conference in Computational Intelligence (ICCIA2012), 2012, Vol. iccia(3), pp. -
    BibTeX
    @article{V.Hulmukhe2012,
     author = {Kavita V.Hulmukhe and S.S.Sane and Alpana A. Borse},
     title = {Exploring Duplicated Regions in Natural Images},
     journal = {IJCA Proceedings on International Conference in Computational Intelligence (ICCIA2012)},
     year = {2012},
     volume = {iccia},
     number = {3},
     pages = {-}}
    
  162. E.E. Varsaki, V. Fotopoulos & A.N. Skodras
    Pascal transform based self-authentication of color images
    Proc. 19th Int Systems, Signals and Image Processing (IWSSIP) Conf
    2012, pp. 168-171
    BibTeX
    @inproceedings{Varsaki2012,
     author = {Varsaki, E. E. and Fotopoulos, V. and Skodras, A. N. },
     title = {Pascal transform based self-authentication of color images},
     booktitle = {Proc. 19th Int Systems, Signals and Image Processing (IWSSIP) Conf},
     year = {2012},
     pages = {168--171}}
    
  163. D. Vazquez-Padin, M. Fontani, T. Bianchi, P. Comesana, A. Piva & M. Barni
    Detection of video double encoding with GOP size estimation
    Information Forensics and Security (WIFS), 2012 IEEE International Workshop on
    2012, pp. 151-156
    BibTeX
    @inproceedings{Vazquez-Padin2012a,
     author = {Vazquez-Padin, D. and Fontani, M. and Bianchi, T. and Comesana, P. and Piva, A. and Barni, M.},
     title = {Detection of video double encoding with GOP size estimation},
     booktitle = {Information Forensics and Security (WIFS), 2012 IEEE International Workshop on},
     year = {2012},
     pages = {151--156}}
    
  164. D. Vázquez-Padín & F. Pérez-González
    Exposing Original and Duplicated Regions Using SIFT Features and Resampling Traces
    Shi, Y., Kim, H.-J. & Perez-Gonzalez, F. (ed.)
    Digital Forensics and Watermarking
    Lecture Notes in Computer Science, Springer Berlin / Heidelberg, 2012, Vol. 7128, pp. 306-320
    BibTeX
    @incollection{Vazquez-Padin2012,
     author = {Vázquez-Padín, David and Pérez-González, Fernando},
     title = {Exposing Original and Duplicated Regions Using SIFT Features and Resampling Traces},
     booktitle = {Digital Forensics and Watermarking},
     journal = {Lecture Notes in Computer Science},
     publisher = {Springer Berlin / Heidelberg},
     year = {2012},
     volume = {7128},
     pages = {306-320}}
    
  165. J. Voisin, C. Guyeux & J.M. Bahi
    The Metadata Anonymization Toolkit
    arXiv preprint arXiv:1212.3648, 2012
    BibTeX
    @article{Voisin2012,
     author = {Voisin, Julien and Guyeux, Christophe and Bahi, Jacques M},
     title = {The Metadata Anonymization Toolkit},
     journal = {arXiv preprint arXiv:1212.3648},
     year = {2012}}
    
  166. A.W.A. Wahab, A.T. Ho & S. Li
    Inter-Camera Model Image Source Identification with Conditional Probability Features
    Proc. of the 3rd IIEEJ Image Electronics and Visual Computing Workshop 2012
    2012
    BibTeX
    @inproceedings{Wahab2012,
     author = {Ainuddin Wahid Abdul Wahab and Anthony T.S. Ho and Shujun Li},
     title = {Inter-Camera Model Image Source Identification with Conditional Probability Features},
     booktitle = {Proc. of the 3rd IIEEJ Image Electronics and Visual Computing Workshop 2012},
     year = {2012}}
    
  167. B. Wang & X. Kong
    Image Splicing Localization Based on Re-demosaicing
    Zeng, D. (ed.)
    Advances in Information Technology and Industry Applications
    Springer Berlin Heidelberg, 2012, Vol. 136, pp. 725-732
    BibTeX
    @incollection{Wang2012,
     author = {Wang, Bo and Kong, Xiangwei},
     title = {Image Splicing Localization Based on Re-demosaicing},
     booktitle = {Advances in Information Technology and Industry Applications},
     publisher = {Springer Berlin Heidelberg},
     year = {2012},
     volume = {136},
     pages = {725-732}}
    
  168. S. Wang & X. Niu
    Hiding traces of double compression in JPEG images based on Tabu Search
    Neural Computing & Applications, Springer London, 2012, Vol. -, pp. 1-9
    BibTeX
    @article{Wang2012a,
     author = {Wang, Shen and Niu, Xiamu},
     title = {Hiding traces of double compression in JPEG images based on Tabu Search},
     journal = {Neural Computing & Applications},
     publisher = {Springer London},
     year = {2012},
     volume = {-},
     pages = {1-9}}
    
  169. T. Wang, J. Tang, W. Zhao, Q. Xu & B. Luo
    Blind Detection of Copy-Move Forgery Based on Multi-Scale Autoconvolution Invariants
    Liu, C.-L., Zhang, C. & Wang, L. (ed.)
    Pattern Recognition
    Springer Berlin Heidelberg, 2012, Vol. 321, pp. 438-446
    BibTeX
    @incollection{Wang2012c,
     author = {Wang, Tao and Tang, Jin and Zhao, Wei and Xu, Qin and Luo, Bin},
     title = {Blind Detection of Copy-Move Forgery Based on Multi-Scale Autoconvolution Invariants},
     booktitle = {Pattern Recognition},
     publisher = {Springer Berlin Heidelberg},
     year = {2012},
     volume = {321},
     pages = {438-446}}
    
  170. X. Wang, J. Xue, Z. Zheng, Z. Liu & N. Li
    Image forensic signature for content authenticity analysis
    Journal of Visual Communication and Image Representation, 2012, Vol. 23(5), pp. 782 - 797
    BibTeX
    @article{Wang2012d,
     author = {Xiaofeng Wang and Jianru Xue and Zhenqiang Zheng and Zhenli Liu and Ning Li},
     title = {Image forensic signature for content authenticity analysis},
     journal = {Journal of Visual Communication and Image Representation},
     year = {2012},
     volume = {23},
     number = {5},
     pages = {782 - 797}}
    
  171. Y. Wang, K. Gurule, J. Wise & J. Zheng
    Wavelet Based Region Duplication Forgery Detection
    Proc. Ninth Int Information Technology: New Generations (ITNG) Conf
    2012, pp. 30-35
    BibTeX
    @inproceedings{Wang2012b,
     author = {Wang, Yang and Gurule, Kaitlyn and Wise, Jacqueline and Zheng, Jun},
     title = {Wavelet Based Region Duplication Forgery Detection},
     booktitle = {Proc. Ninth Int Information Technology: New Generations (ITNG) Conf},
     year = {2012},
     pages = {30--35}}
    
  172. A.D. Warbhe & R.V. Dharaskar
    Article: Blind Method for Image Forgery Detection: A tool for Digital Image Forensics
    IJCA Proceedings on National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2012), 2012, Vol. ncipet(11), pp. 37-40
    BibTeX
    @article{Warbhe2012,
     author = {Anil Dada Warbhe and R. V. Dharaskar},
     title = {Article: Blind Method for Image Forgery Detection: A tool for Digital Image Forensics},
     journal = {IJCA Proceedings on National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2012)},
     year = {2012},
     volume = {ncipet},
     number = {11},
     pages = {37-40}}
    
  173. L.X. Wei, J.J. Zhu & X.Y. Yang
    An Image Forensics Algorithm for Blur Detection Based on Properties of Sharp Edge Points
    Advanced Materials Research, 2012, Vol. Volumes 341 - 342 Material and Manufacturing Technology II, pp. 743-747
    BibTeX
    @article{Wei2012,
     author = {Li Xian Wei and Jun Jie Zhu and Xiao Yuan Yang},
     title = {An Image Forensics Algorithm for Blur Detection Based on Properties of Sharp Edge Points},
     journal = {Advanced Materials Research},
     year = {2012},
     volume = {Volumes 341 - 342 Material and Manufacturing Technology II},
     pages = {743-747}}
    
  174. W. Wei & W.R. ding
    The Analysis and Detection of Double JPEG2000 Compression Based on Statistical Characterization of DWT Coefficients
    Energy Procedia, 2012, Vol. 17, Part A(0), pp. 623 - 629
    BibTeX
    @article{Wei2012a,
     author = {Wang Wei and WANG Rang-ding},
     title = {The Analysis and Detection of Double JPEG2000 Compression Based on Statistical Characterization of DWT Coefficients},
     journal = {Energy Procedia},
     year = {2012},
     volume = {17, Part A},
     number = {0},
     pages = {623 - 629}}
    
  175. G. Wu, X.K. & K.J.R. Liu
    A Context Adaptive Predictor of Sensor Pattern Noise for Camera Source Identification
    School of Information Science and Technology, School of Information Science and Technology, 2012
    BibTeX
    @techreport{Wu2012a,
     author = {Guangdong Wu and , Xiangui Kang and and K. J. Ray Liu},
     title = {A Context Adaptive Predictor of Sensor Pattern Noise for Camera Source Identification},
     school = {School of Information Science and Technology},
     year = {2012}}
    
  176. L. Wu, X. Cao, W. Zhang & Y. Wang
    Detecting image forgeries using metrology
    Machine Vision and Applications, Springer Berlin / Heidelberg, 2012, Vol. 23, pp. 363-373
    BibTeX
    @article{Wu2012,
     author = {Wu, Lin and Cao, Xiaochun and Zhang, Wei and Wang, Yang},
     title = {Detecting image forgeries using metrology},
     journal = {Machine Vision and Applications},
     publisher = {Springer Berlin / Heidelberg},
     year = {2012},
     volume = {23},
     pages = {363-373}}
    
  177. Y. Wu, Lin Wang
    Detecting image forgeries using geometric cues
    arXiv, Springer Berlin / Heidelberg, 2012
    BibTeX
    @article{Wu2012b,
     author = {Wu, Lin Wang, Yang},
     title = {Detecting image forgeries using geometric cues},
     journal = {arXiv},
     publisher = {Springer Berlin / Heidelberg},
     year = {2012}}
    
  178. B. Xu, G. Liu & Y. Dai
    A Fast Image Copy-Move Forgery Detection Method Using Phase Correlation
    Proc. Fourth Int Multimedia Information Networking and Security (MINES) Conf
    2012, pp. 319-322
    BibTeX
    @inproceedings{Xu2012a,
     author = {Xu, Bo and Liu, Guangjie and Dai, Yuewei},
     title = {A Fast Image Copy-Move Forgery Detection Method Using Phase Correlation},
     booktitle = {Proc. Fourth Int Multimedia Information Networking and Security (MINES) Conf},
     year = {2012},
     pages = {319--322}}
    
  179. G. Xu & Y.Q. Shi
    Camera Model Identification Using Local Binary Patterns
    Proc. IEEE Int Multimedia and Expo (ICME) Conf
    2012, pp. 392-397
    BibTeX
    @inproceedings{Xu2012,
     author = {Guanshuo Xu and Yun Qing Shi},
     title = {Camera Model Identification Using Local Binary Patterns},
     booktitle = {Proc. IEEE Int Multimedia and Expo (ICME) Conf},
     year = {2012},
     pages = {392--397}}
    
  180. J. Xu, Y. Yu, Y. Su, B. Dong & X. You
    Detection of Blue Screen Special Effects in Videos
    Physics Procedia, 2012, Vol. 33(0), pp. 1316 - 1322
    BibTeX
    @article{Xu2012b,
     author = {Junyu Xu and Yanru Yu and Yuting Su and Bo Dong and Xingang You},
     title = {Detection of Blue Screen Special Effects in Videos},
     journal = {Physics Procedia},
     year = {2012},
     volume = {33},
     number = {0},
     pages = {1316 - 1322}}
    
  181. P. Yadav & Y. Rathore
    Detection of Copy-Move Forgery of Images Using Discrete Wavelet Transform
    International Journal on Computer Science and Engineering (IJCSE), 2012, Vol. 4, pp. 265-270
    BibTeX
    @article{Yadav2012,
     author = {Preeti Yadav and Yogesh Rathore},
     title = {Detection of Copy-Move Forgery of Images Using Discrete Wavelet Transform},
     journal = {International Journal on Computer Science and Engineering (IJCSE)},
     year = {2012},
     volume = {4},
     pages = {265-270}}
    
  182. P. Yadav, Y. Rathore & A. Yadu
    DWT Based Copy-Move Image Forgery Detection
    International Journal of Advanced Research in Computer Science and Electroic Engineering, 2012, Vol. 1(5)
    BibTeX
    @article{Yadav2012a,
     author = {Preeti Yadav and Yogesh Rathore and Aarti Yadu},
     title = {DWT Based Copy-Move Image Forgery Detection},
     journal = {International Journal of Advanced Research in Computer Science and Electroic Engineering},
     year = {2012},
     volume = {1},
     number = {5}}
    
  183. S. Yahaya, A.T.S. Ho & A.A. Wahab
    Advanced video camera identification using Conditional Probability Features
    Proc. IET Conf. Image Processing (IPR 2012)
    2012, pp. 1-5
    BibTeX
    @inproceedings{Yahaya2012,
     author = {Yahaya, Syamsul and Ho, Anthony T S and Wahab, Ainuddin Abdul},
     title = {Advanced video camera identification using Conditional Probability Features},
     booktitle = {Proc. IET Conf. Image Processing (IPR 2012)},
     year = {2012},
     pages = {1--5}}
    
  184. Z.-C. Yang & Z.-H. Li
    An Anti-JPEG Compression Digital Watermarking Technology with an Ability in Detecting Forgery Region for Color Images
    Proc. Int Computer Distributed Control and Intelligent Environmental Monitoring (CDCIEM) Conf
    2012, pp. 93-97
    BibTeX
    @inproceedings{Yang2012,
     author = {Zheng-Chao Yang and Zhao-Hong Li},
     title = {An Anti-JPEG Compression Digital Watermarking Technology with an Ability in Detecting Forgery Region for Color Images},
     booktitle = {Proc. Int Computer Distributed Control and Intelligent Environmental Monitoring (CDCIEM) Conf},
     year = {2012},
     pages = {93--97}}
    
  185. H. Yao, S. Wang, Y. Zhao & X. Zhang
    Detecting Image Forgery Using Perspective Constraints
    IEEE Signal Processing Letters, 2012, Vol. 19(3), pp. 123-126
    BibTeX
    @article{Yao2012,
     author = {Yao, H. and Wang, S. and Zhao, Y. and Zhang, X.},
     title = {Detecting Image Forgery Using Perspective Constraints},
     journal = {IEEE Signal Processing Letters},
     year = {2012},
     volume = {19},
     number = {3},
     pages = {123--126}}
    
  186. M. Ye, Y. Yang, W. Duan & M. Yang
    Measure and redress of mode field diameter of polarization maintaining photonic crystal fibers
    Instrumentation and Control Technology (ISICT), 2012 8th IEEE International Symposium on
    2012, pp. 101-104
    BibTeX
    @inproceedings{Ye2012,
     author = {Miao Ye and Yuanhong Yang and Weiqian Duan and Mingwei Yang},
     title = {Measure and redress of mode field diameter of polarization maintaining photonic crystal fibers},
     booktitle = {Instrumentation and Control Technology (ISICT), 2012 8th IEEE International Symposium on},
     year = {2012},
     pages = {101--104}}
    
  187. L. Yong, H. Meishan & L. Bogang
    Robust Evidence Detection of Copy-Rotate-Move Forgery in Image Based on Singular Value Decomposition
    Chim, T. & Yuen, T. (ed.)
    Information and Communications Security
    Springer Berlin Heidelberg, 2012, Vol. 7618, pp. 357-364
    BibTeX
    @incollection{Yong2012,
     author = {Yong, Liu and Meishan, Huang and Bogang, Lin},
     title = {Robust Evidence Detection of Copy-Rotate-Move Forgery in Image Based on Singular Value Decomposition},
     booktitle = {Information and Communications Security},
     publisher = {Springer Berlin Heidelberg},
     year = {2012},
     volume = {7618},
     pages = {357-364}}
    
  188. F. Zach, C. Riess & E. Angelopoulou
    Automated Image Forgery Detection through Classification of JPEG Ghosts
    Pinz, A., Pock, T., Bischof, H. & Leberl, F. (ed.)
    Pattern Recognition
    Springer Berlin / Heidelberg, 2012, Vol. 7476, pp. 185-194
    BibTeX
    @incollection{Zach2012,
     author = {Zach, Fabian and Riess, Christian and Angelopoulou, Elli},
     title = {Automated Image Forgery Detection through Classification of JPEG Ghosts},
     booktitle = {Pattern Recognition},
     publisher = {Springer Berlin / Heidelberg},
     year = {2012},
     volume = {7476},
     pages = {185-194}}
    
  189. D. Zhang
    The Utility of Inconsistency in Information Security and Digital Forensics
    Özyer, T., Kianmehr, K. & Tan, M. (ed.)
    Recent Trends in Information Reuse and Integration
    Springer Vienna, 2012, Vol. -, pp. 381-397
    BibTeX
    @incollection{Zhang2012,
     author = {Zhang, Du},
     title = {The Utility of Inconsistency in Information Security and Digital Forensics},
     booktitle = {Recent Trends in Information Reuse and Integration},
     publisher = {Springer Vienna},
     year = {2012},
     volume = {-},
     pages = {381-397}}
    
  190. Y. Zhang, C. Zhao, Y. Pi & S. Li
    Revealing Image Splicing Forgery Using Local Binary Patterns of DCT Coefficients
    Liang, Q., Wang, W., Mu, J., Liang, J., Zhang, B., Pi, Y. & Zhao, C. (ed.)
    Communications, Signal Processing, and Systems
    Springer New York, 2012, Vol. 202, pp. 181-189
    BibTeX
    @incollection{Zhang2012a,
     author = {Zhang, Yujin and Zhao, Chenglin and Pi, Yiming and Li, Shenghong},
     title = {Revealing Image Splicing Forgery Using Local Binary Patterns of DCT Coefficients},
     booktitle = {Communications, Signal Processing, and Systems},
     publisher = {Springer New York},
     year = {2012},
     volume = {202},
     pages = {181-189}}
    
  191. X. Zhao, S. Wang, S. Li & J. Li
    A Comprehensive Study on Third Order Statistical Features for Image Splicing Detection
    Shi, Y., Kim, H.-J. & Perez-Gonzalez, F. (ed.)
    Digital Forensics and Watermarking
    Springer Berlin / Heidelberg, 2012, Vol. 7128, pp. 243-256
    BibTeX
    @incollection{Zhao2012,
     author = {Zhao, Xudong and Wang, Shilin and Li, Shenghong and Li, Jianhua},
     title = {A Comprehensive Study on Third Order Statistical Features for Image Splicing Detection},
     booktitle = {Digital Forensics and Watermarking},
     publisher = {Springer Berlin / Heidelberg},
     year = {2012},
     volume = {7128},
     pages = {243-256}}
    
  192. W.D. Zhong, J.J. Zhu, L.X. Wei & X.Y. Yang
    A New Algorithm to Exposing Image Forgeries by Detecting Ambient Illumination Consistency
    Zhang, C. S. (ed.)
    Materials Science and Information Technology
    2012, pp. 5463-5468
    BibTeX
    @inproceedings{Zhong2012,
     author = {Wei Dong Zhong and Jun Jie Zhu and Li Xian Wei and Xiao Yuan Yang},
     title = {A New Algorithm to Exposing Image Forgeries by Detecting Ambient Illumination Consistency},
     booktitle = {Materials Science and Information Technology},
     year = {2012},
     pages = {5463-5468}}
    
  193. L.-n. Zhou, Y.-b. Guo & X.-g. You
    Blind Copy-Paste Detection Using Improved SIFT Ring Descriptor
    Shi, Y., Kim, H.-J. & Perez-Gonzalez, F. (ed.)
    Digital Forensics and Watermarking
    Springer Berlin / Heidelberg, 2012, Vol. 7128, pp. 257-267
    BibTeX
    @incollection{Zhou2012,
     author = {Zhou, Lin-na and Guo, Yun-biao and You, Xin-gang},
     title = {Blind Copy-Paste Detection Using Improved SIFT Ring Descriptor},
     booktitle = {Digital Forensics and Watermarking},
     publisher = {Springer Berlin / Heidelberg},
     year = {2012},
     volume = {7128},
     pages = {257-267}}
    
  194. Z. Zhou & C. Zhou
    Digital Image Identification Based on Asymmetrical Distribution
    Journal of Information & Computational Science, 2012, Vol. 9(5), pp. 1337-1342
    BibTeX
    @article{Zhou2012a,
     author = {Zhou, Z. and Zhou, C.},
     title = {Digital Image Identification Based on Asymmetrical Distribution},
     journal = {Journal of Information & Computational Science},
     year = {2012},
     volume = {9},
     number = {5},
     pages = {1337--1342}}
    
  195. J.Y. Zhu, M.Y. Chen & F. Li
    Image Detection Based-on the Analysis of Interpolating Signal Periodicity
    Advanced Materials Research, 2012, Vol. 403-408, pp. 1297-1301
    BibTeX
    @article{Zhu2012,
     author = {Jue Yu Zhu and Meng Yuan Chen and Feng Li},
     title = {Image Detection Based-on the Analysis of Interpolating Signal Periodicity},
     journal = {Advanced Materials Research},
     year = {2012},
     volume = {403-408},
     pages = {1297-1301}}
    


2011

  1. S. Abramov, V. Zabrodina, V. Lukin, B. Vozel, K. Chehdi & J. Astola
    Numerical Analysis - Theory and Application
    Awrejcewicz, J. (ed.)
    Chapter Methods for Blind Estimation of the Variance of Mixed Noise and Their Performance Analysis
    InTech, 2011, pp. 49-70
    BibTeX
    @inbook{Abramov2011,
     author = {Sergey Abramov and Victoria Zabrodina and Vladimir Lukin and Benoit Vozel and Kacem Chehdi and Jaakko Astola},
     title = {Numerical Analysis - Theory and Application},
     publisher = {InTech},
     year = {2011},
     pages = {49-70}}
    
  2. I. Amerini, L. Ballan, R. Caldelli, A.D. Bimbo, L.D. Tongo & G. Serra
    An image forensics tool for copy-move detection and localization
    Irene Amerini, Lamberto Ballan, Roberto Caldelli, Alberto Del Bimbo, Luca Del Tongo, Giuseppe Serra, 2011
    BibTeX
    @techreport{Amerini2011a,
     author = {Irene Amerini and Lamberto Ballan and Roberto Caldelli and Alberto Del Bimbo and Luca Del Tongo and Giuseppe Serra},
     title = {An image forensics tool for copy-move detection and localization},
     year = {2011}}
    
  3. I. Amerini, L. Ballan, R. Caldelli, A. Del Bimbo & G. Serra
    A SIFT-based forensic method for copy-move attack detection and transformation recovery
    IEEE Transactions on Information Forensics and Security, 2011, Vol. 6(3), pp. 1099 - 1110
    BibTeX
    @article{Amerini2011,
     author = {Amerini, I. and Ballan, L. and Caldelli, R. and Del Bimbo, A. and Serra, G.},
     title = {A SIFT-based forensic method for copy-move attack detection and transformation recovery},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2011},
     volume = {6},
     number = {3},
     pages = {1099 - 1110}}
    
  4. U. Ananya & U. Mudenagudi
    Detection of doctored images using bispectral analysis
    Proc. Int Image Information Processing (ICIIP) Conf
    2011, pp. 1-6
    BibTeX
    @inproceedings{Ananya2011,
     author = {Ananya, U. and Mudenagudi, U.},
     title = {Detection of doctored images using bispectral analysis},
     booktitle = {Proc. Int Image Information Processing (ICIIP) Conf},
     year = {2011},
     pages = {1--6}}
    
  5. S.D. Anderson
    Digital Image Analysis: Analytical Framework For Authenticating Digital Images
    University of Colorado Denver, 2011
    BibTeX
    @mastersthesis{Anderson2011,
     author = {Anderson, Scott Dale},
     title = {Digital Image Analysis: Analytical Framework For Authenticating Digital Images},
     school = {University of Colorado Denver},
     year = {2011}}
    
  6. S. Battiato, G.M. Farinella, E. Messina & G. Puglisi
    Robust Image Registration and Tampering Localization Exploiting Bag of Features Based Forensic Signature
    Proceedings of the 19th ACM international conference on Multimedia
    ACM, 2011, pp. 1245-1248
    BibTeX
    @inproceedings{Battiato2011,
     author = {Sebastiano Battiato and Giovanni Maria Farinella and Enrico Messina and Giovanni Puglisi},
     title = {Robust Image Registration and Tampering Localization Exploiting Bag of Features Based Forensic Signature},
     booktitle = {Proceedings of the 19th ACM international conference on Multimedia},
     publisher = {ACM},
     year = {2011},
     pages = {1245--1248}}
    
  7. S. Battiato, G.M. Farinella, E. Messina & G. Puglisi
    A Forensic Signature Based on Spatial Distributed Bag of Features for Image Alignment and Tampering Detection
    Proceedings of the 3rd international ACM workshop on Multimedia in forensics and intelligence
    ACM, 2011, pp. 19-24
    BibTeX
    @inproceedings{Battiato2011a,
     author = {Sebastiano Battiato and Giovanni Maria Farinella and Enrico Messina and Giovanni Puglisi},
     title = {A Forensic Signature Based on Spatial Distributed Bag of Features for Image Alignment and Tampering Detection},
     booktitle = {Proceedings of the 3rd international ACM workshop on Multimedia in forensics and intelligence},
     publisher = {ACM},
     year = {2011},
     pages = {19--24}}
    
  8. S. Battiato, G.M. Farinella, E. Messina & G. Puglisi
    Understanding geometric manipulations of images through bovw-based hashing
    Proc. IEEE Int Multimedia and Expo (ICME) Conf
    2011, pp. 1-6
    BibTeX
    @inproceedings{Battiato2011b,
     author = {Battiato, S. and Farinella, G. M. and Messina, E. and Puglisi, G. },
     title = {Understanding geometric manipulations of images through bovw-based hashing},
     booktitle = {Proc. IEEE Int Multimedia and Expo (ICME) Conf},
     year = {2011},
     pages = {1--6}}
    
  9. T. Bianchi, A. De Rosa & A. Piva
    Improved DCT coefficient analysis for forgery localization in JPEG images
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2011
    2011, pp. 2444-2447
    BibTeX
    @inproceedings{Bianchi2011,
     author = {Bianchi, Tiziano and De Rosa, Alessia and Piva, Alessandro},
     title = {Improved DCT coefficient analysis for forgery localization in JPEG images},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2011},
     year = {2011},
     pages = {2444--2447}}
    
  10. T. Bianchi & A. Piva
    Detection of Non-Aligned Double JPEG Compression Based on Integer Periodicity Maps
    IEEE Transactions on Information Forensics and Security, 2011, Vol. PP(99), pp. 1
    BibTeX
    @article{Bianchi2011a,
     author = {Bianchi, Tiziano and Piva, Alessandro},
     title = {Detection of Non-Aligned Double JPEG Compression Based on Integer Periodicity Maps},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2011},
     volume = {PP},
     number = {99},
     pages = {1}}
    
  11. T. Bianchi & A. Piva
    Analysis of non-aligned double JPEG artifacts for the localization of image forgeries
    Proc. IEEE Int Information Forensics and Security (WIFS) Workshop
    2011, pp. 1-6
    BibTeX
    @inproceedings{Bianchi2011b,
     author = {Bianchi, Tiziano and Piva, Alessandro },
     title = {Analysis of non-aligned double JPEG artifacts for the localization of image forgeries},
     booktitle = {Proc. IEEE Int Information Forensics and Security (WIFS) Workshop},
     year = {2011},
     pages = {1--6}}
    
  12. T. Bianchi & A. Piva
    Detection of non-aligned double JPEG compression with estimation of primary compression parameters
    Proc. 18th IEEE Int Image Processing (ICIP) Conf
    2011, pp. 1929-1932
    BibTeX
    @inproceedings{Bianchi2011d,
     author = {Bianchi, Tiziano and Piva, Alessandro },
     title = {Detection of non-aligned double JPEG compression with estimation of primary compression parameters},
     booktitle = {Proc. 18th IEEE Int Image Processing (ICIP) Conf},
     year = {2011},
     pages = {1929--1932}}
    
  13. G. Boracchi & A. Foi
    Uniform Motion Blur in Poissonian Noise: Blur/Noise Tradeoff
    IEEE Transactions on Image Processing, 2011, Vol. 20(2), pp. 592-598
    BibTeX
    @article{Boracchi2011,
     author = {Boracchi, G. and Foi, A.},
     title = {Uniform Motion Blur in Poissonian Noise: Blur/Noise Tradeoff},
     journal = {IEEE Transactions on Image Processing},
     year = {2011},
     volume = {20},
     number = {2},
     pages = {592--598}}
    
  14. S. Bravo-Solorio & A.K. Nandi
    Exposing duplicated regions affected by reflection, rotation and scaling
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2011
    2011, pp. 1880-1883
    BibTeX
    @inproceedings{Bravo-Solorio2011,
     author = {Bravo-Solorio, Sergio and Nandi, Asoke K.},
     title = {Exposing duplicated regions affected by reflection, rotation and scaling},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2011},
     year = {2011},
     pages = {1880--1883}}
    
  15. S. Bravo-Solorio & A.K. Nandi
    Automated detection and localisation of duplicated regions affected by reflection, rotation and scaling in image forensics
    Signal Processing, 2011, Vol. 91(8), pp. 1759 - 1770
    BibTeX
    @article{Bravo-Solorio2011a,
     author = {Sergio Bravo-Solorio and Asoke K. Nandi},
     title = {Automated detection and localisation of duplicated regions affected by reflection, rotation and scaling in image forensics},
     journal = {Signal Processing},
     year = {2011},
     volume = {91},
     number = {8},
     pages = {1759 - 1770}}
    
  16. M.G.B.S. Bruna, A.R.
    Crop Detection Through Blocking Artefacts Analysis
    Proc. of the 16th International Conference on Image Analysis and Processing ICIAP 2011
    2011
    BibTeX
    @inproceedings{Bruna2011,
     author = {Bruna, A.R., Messina, G., Battiato, S.},
     title = {Crop Detection Through Blocking Artefacts Analysis},
     booktitle = {Proc. of the 16th International Conference on Image Analysis and Processing ICIAP 2011},
     year = {2011}}
    
  17. K. Cai, X. Lu, J. Song & X. Wang
    Blind Image Tampering Identification Based on Histogram Features
    Proc. Third Int Multimedia Information Networking and Security (MINES) Conf
    2011, pp. 300-303
    BibTeX
    @inproceedings{Cai2011,
     author = {Kaiwei Cai and Xiaoqing Lu and Jianguo Song and Xiao Wang},
     title = {Blind Image Tampering Identification Based on Histogram Features},
     booktitle = {Proc. Third Int Multimedia Information Networking and Security (MINES) Conf},
     year = {2011},
     pages = {300--303}}
    
  18. G. Cao, Y. Zhao & R. Ni
    Forensic identification of resampling operators: A semi non-intrusive approach
    Forensic Science International, 2011, Vol. -(0), pp. -
    BibTeX
    @article{Cao2011b,
     author = {Gang Cao and Yao Zhao and Rongrong Ni},
     title = {Forensic identification of resampling operators: A semi non-intrusive approach},
     journal = {Forensic Science International},
     year = {2011},
     volume = {-},
     number = {0},
     pages = { - }}
    
  19. G. Cao, Y. Zhao, R. Ni & A. Kot
    Unsharp Masking Sharpening Detection via Overshoot Artifacts Analysis
    IEEE Signal Processing Letters, 2011, Vol. 18(10), pp. 603-606
    BibTeX
    @article{Cao2011d,
     author = {G. Cao and Y. Zhao and R. Ni and AC Kot},
     title = {Unsharp Masking Sharpening Detection via Overshoot Artifacts Analysis},
     journal = {IEEE Signal Processing Letters},
     year = {2011},
     volume = {18},
     number = {10},
     pages = {603--606}}
    
  20. H. Cao & A. Kot
    Detection of Tampering Inconsistencies on Mobile Photos
    Kim, H.-J., Shi, Y. & Barni, M. (ed.)
    Digital Watermarking
    Springer Berlin / Heidelberg, 2011, Vol. 6526, pp. 105-119
    BibTeX
    @incollection{Cao2011,
     author = {Cao, Hong and Kot, Alex},
     title = {Detection of Tampering Inconsistencies on Mobile Photos},
     booktitle = {Digital Watermarking},
     publisher = {Springer Berlin / Heidelberg},
     year = {2011},
     volume = {6526},
     pages = {105-119}}
    
  21. H. Cao & A. Kot
    Similar DSLR Processor Identification using Compact Model Templates
    APSIPA ASC, 2011, pp. 5
    BibTeX
    @article{Cao2011c,
     author = {H. Cao and A.C. Kot},
     title = {Similar DSLR Processor Identification using Compact Model Templates},
     journal = {APSIPA ASC},
     year = {2011},
     pages = {5}}
    
  22. Y. Cao, T. Gao, L. Fan & Q. Yang
    A robust detection algorithm for copy-move forgery in digital images
    Forensic Science International, 2011, Vol. In Press, Corrected Proof, pp. -
    BibTeX
    @article{Cao2011a,
     author = {Yanjun Cao and Tiegang Gao and Li Fan and Qunting Yang},
     title = {A robust detection algorithm for copy-move forgery in digital images},
     journal = {Forensic Science International},
     year = {2011},
     volume = {In Press, Corrected Proof},
     pages = { - }}
    
  23. A. Caron & P. Jodoin
    Image Multi-Distortion Estimation
    IEEE Transactions on Image Processing, 2011, Vol. 20 Issue:12, pp. 3442 - 3454
    BibTeX
    @article{Caron2011,
     author = {Caron, A. and Jodoin, P.},
     title = {Image Multi-Distortion Estimation},
     journal = {IEEE Transactions on Image Processing},
     year = {2011},
     volume = {20 Issue:12},
     pages = {3442 - 3454}}
    
  24. A. Castiglione, G. Cattaneo & A. De Santis
    A Forensic Analysis of Images on Online Social Networks
    Proc. Third Int Intelligent Networking and Collaborative Systems (INCoS) Conf
    2011, pp. 679-684
    BibTeX
    @inproceedings{Castiglione2011,
     author = {Castiglione, A. and Cattaneo, G. and De Santis, A. },
     title = {A Forensic Analysis of Images on Online Social Networks},
     booktitle = {Proc. Third Int Intelligent Networking and Collaborative Systems (INCoS) Conf},
     year = {2011},
     pages = {679--684}}
    
  25. P. Chatterjee & P. Milanfar
    Practical Bounds on Image Denoising: From Estimation to Information
    IEEE Transactions on Image Processing, 2011, Vol. 20(5), pp. 1221-1233
    BibTeX
    @article{Chatterjee2011,
     author = {Chatterjee, P. and Milanfar, P. },
     title = {Practical Bounds on Image Denoising: From Estimation to Information},
     journal = {IEEE Transactions on Image Processing},
     year = {2011},
     volume = {20},
     number = {5},
     pages = {1221--1233}}
    
  26. Y. Chen, S. bo Fu, L. fang Fu, Z. yong Li & Y. peng Hu
    Research noise of image acquisition system on CCD
    Proc. Int Electronics and Optoelectronics (ICEOE) Conf
    2011, Vol. 2
    BibTeX
    @inproceedings{Chen2011a,
     author = {Ying Chen and Shao-bo Fu and Lan-fang Fu and Zhi-yong Li and Yun-peng Hu},
     title = {Research noise of image acquisition system on CCD},
     booktitle = {Proc. Int Electronics and Optoelectronics (ICEOE) Conf},
     year = {2011},
     volume = {2}}
    
  27. Y.-C. Chen, Y. Hu & C.-T. Li
    Further studies on forensic features for source camera identification
    Proc. th Int Imaging for Crime Detection and Prevention 2011 (ICDP 2011) Conf
    2011, pp. 1-6
    BibTeX
    @inproceedings{Chen2011b,
     author = {Ying-Chu Chen and Yongjian Hu and Chang-Tsun Li},
     title = {Further studies on forensic features for source camera identification},
     booktitle = {Proc. th Int Imaging for Crime Detection and Prevention 2011 (ICDP 2011) Conf},
     year = {2011},
     pages = {1--6}}
    
  28. Y.-L. Chen & C.-T. Hsu
    Detecting Recompression of JPEG Images via Periodicity Analysis of Compression Artifacts for Tampering Detection
    IEEE Transactions on Information Forensics and Security, 2011, Vol. 6(2), pp. 396-406
    BibTeX
    @article{Chen2011,
     author = {Yi-Lei Chen and Chiou-Ting Hsu},
     title = {Detecting Recompression of JPEG Images via Periodicity Analysis of Compression Artifacts for Tampering Detection},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2011},
     volume = {6},
     number = {2},
     pages = {396--406}}
    
  29. H. Chennamma, L. Rangarajan & M. Rao
    Efficient Image Matching using Local Invariant Features for Copy Detection
    Li, C.-T. & Ho, T. S. (ed.)
    Chapter cho18
    New Technologies for Digital Crime and Forensics: Devices, Applications, and Software, IGI Global, 2011, pp. 257-276
    BibTeX
    @inbook{Chennamma2011a,
     author = {Chennamma, H.R. and Lalitha Rangarajan and Rao, M.S.},
     title = {Efficient Image Matching using Local Invariant Features for Copy Detection},
     journal = {New Technologies for Digital Crime and Forensics: Devices, Applications, and Software},
     publisher = {IGI Global},
     year = {2011},
     pages = {257-276}}
    
  30. H.R. Chennamma & L. Rangarajan
    Image Splicing Detection Using Inherent Lens Radial Distortion
    IJCSI International Journal of Computer Science Issues, 2011, Vol. 7, pp. 49-158
    BibTeX
    @article{Chennamma2011,
     author = {H. R. Chennamma and Lalitha Rangarajan},
     title = {Image Splicing Detection Using Inherent Lens Radial Distortion},
     journal = {IJCSI International Journal of Computer Science Issues},
     year = {2011},
     volume = {7},
     pages = {49-158}}
    
  31. Z. Chi, Y. Suying & X. Jiangtao
    Noise in a CMOS digital pixel sensor
    Journal of Semiconductors, 2011, Vol. 32(11), pp. 115005
    BibTeX
    @article{Chi2011,
     author = {Zhang Chi and Yao Suying and Xu Jiangtao},
     title = {Noise in a CMOS digital pixel sensor},
     journal = {Journal of Semiconductors},
     year = {2011},
     volume = {32},
     number = {11},
     pages = {115005}}
    
  32. G. Chierchia, S. Parrilli, G. Poggi, L. Verdoliva & C. Sansone
    PRNU-based detection of small-size image forgeries
    Proc. 17th Int Digital Signal Processing (DSP) Conf
    2011, pp. 1-6
    BibTeX
    @inproceedings{Chierchia2011,
     author = {Chierchia, G. and Parrilli, S. and Poggi, G. and Verdoliva, L. and Sansone, C.},
     title = {PRNU-based detection of small-size image forgeries},
     booktitle = {Proc. 17th Int Digital Signal Processing (DSP) Conf},
     year = {2011},
     pages = {1--6}}
    
  33. C.-H. Choi, J.-H. Choi & H.-K. Lee
    CFA pattern identification of digital cameras using intermediate value counting
    Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
    ACM, 2011, pp. 21-26
    BibTeX
    @inproceedings{Choi2011,
     author = {Choi, Chang-Hee and Choi, Jung-Ho and Lee, Heung-Kyu},
     title = {CFA pattern identification of digital cameras using intermediate value counting},
     booktitle = {Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security},
     publisher = {ACM},
     year = {2011},
     pages = {21--26}}
    
  34. W.-H. Chuang, H. Su & M. Wu
    Exploring compression effects for improved source camera identification using strongly compressed video
    Proc. 18th IEEE Int Image Processing (ICIP) Conf
    2011, pp. 1953-1956
    BibTeX
    @inproceedings{Chuang2011,
     author = {Wei-Hong Chuang and Hui Su and Min Wu},
     title = {Exploring compression effects for improved source camera identification using strongly compressed video},
     booktitle = {Proc. 18th IEEE Int Image Processing (ICIP) Conf},
     year = {2011},
     pages = {1953--1956}}
    
  35. P. Clark
    Digital Forensics Tool Testing--Image Metadata in the Cloud
    Department of Computer Science and Media Technology Gjøvik University College, 2011, 2011
    BibTeX
    @mastersthesis{Clark2011,
     author = {Clark, Philip},
     title = {Digital Forensics Tool Testing--Image Metadata in the Cloud},
     school = {Department of Computer Science and Media Technology Gjøvik University College, 2011},
     year = {2011}}
    
  36. V. Conotter & G. Boato
    Analysis of sensor fingerprint for source camera identification
    Electronics Letters, 2011, Vol. 47(25), pp. 1366-1367
    BibTeX
    @article{Conotter2011,
     author = {Conotter, V. and Boato, Giulia },
     title = {Analysis of sensor fingerprint for source camera identification},
     journal = {Electronics Letters},
     year = {2011},
     volume = {47},
     number = {25},
     pages = {1366--1367}}
    
  37. A. Cortiana, V. Conotter, G. Boato & F.G.B.D. Natale
    Performance comparison of denoising filters for source camera identification
    Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
    Proceedings of SPIE
    Media Watermarking, Security, and Forensics III, SPIE, 2011, Vol. 7880(1), pp. 788007
    BibTeX
    @conference{Cortiana2011,
     author = {A. Cortiana and V. Conotter and G. Boato and F. G. B. De Natale},
     title = {Performance comparison of denoising filters for source camera identification},
     booktitle = {Proceedings of SPIE},
     journal = {Media Watermarking, Security, and Forensics III},
     publisher = {SPIE},
     year = {2011},
     volume = {7880},
     number = {1},
     pages = {788007}}
    
  38. L. Del Tongo
    Analisi e sviluppo di metodi per l'individuazione di manipolazioni copy-move in applicazioni di image forensics
    UNIVERSITA DEGLI STUDI DI FIRENZE, 2011
    BibTeX
    @mastersthesis{DelTongo2011,
     author = {Luca Del Tongo},
     title = {Analisi e sviluppo di metodi per l'individuazione di manipolazioni copy-move in applicazioni di image forensics},
     school = {UNIVERSITA DEGLI STUDI DI FIRENZE},
     year = {2011}}
    
  39. Z. Deng, A. Gijsenij & J. Zhang
    Source camera identification using Auto-White Balance approximation
    Proc. IEEE Int Computer Vision (ICCV) Conf
    2011, pp. 57-64
    BibTeX
    @inproceedings{Deng2011,
     author = {Zhonghai Deng and Gijsenij, A. and Jingyuan Zhang},
     title = {Source camera identification using Auto-White Balance approximation},
     booktitle = {Proc. IEEE Int Computer Vision (ICCV) Conf},
     year = {2011},
     pages = {57--64}}
    
  40. K.D. Devi & G. Swamy
    Digital Image Processing Techniques for Detection And Removal of Noise In Images Implementing Blind Source Separation
    International Journal on Computer Science and Engineering (IJCSE), 2011, Vol. 3(8), pp. 3108-3114
    BibTeX
    @article{Devi2011,
     author = {Devi, K. Devaki and Swamy, G.N.},
     title = {Digital Image Processing Techniques for Detection And Removal of Noise In Images Implementing Blind Source Separation},
     journal = {International Journal on Computer Science and Engineering (IJCSE)},
     year = {2011},
     volume = {3},
     number = {8},
     pages = {3108-3114}}
    
  41. L. Dong, X. Kong, B. Wang & X. You
    Double Compression Detection Based on Markov Model of the First Digits of DCT Coefficients
    Proc. Sixth Int Image and Graphics (ICIG) Conf
    2011, pp. 234-237
    BibTeX
    @inproceedings{Dong2011,
     author = {Lisha Dong and Xiangwei Kong and Bo Wang and Xin´gang You},
     title = {Double Compression Detection Based on Markov Model of the First Digits of DCT Coefficients},
     booktitle = {Proc. Sixth Int Image and Graphics (ICIG) Conf},
     year = {2011},
     pages = {234--237}}
    
  42. J. Fan, A.C. Kot, H. Cao & F. Sattar
    Modeling the EXIF-Image correlation for image manipulation detection
    Proc. 18th IEEE Int Image Processing (ICIP) Conf
    2011, pp. 1945-1948
    BibTeX
    @inproceedings{Fan2011a,
     author = {Jiayuan Fan and Kot, A. C. and Hong Cao and Sattar, F.},
     title = {Modeling the EXIF-Image correlation for image manipulation detection},
     booktitle = {Proc. 18th IEEE Int Image Processing (ICIP) Conf},
     year = {2011},
     pages = {1945--1948}}
    
  43. Z. Fan, S. Wang, S. Li & Y. Zhang
    Detection of Double-Compression in JPEG2000 by Using Markov Features
    Wu, Y. (ed.)
    Computing and Intelligent Systems
    Springer Berlin Heidelberg, 2011, Vol. 234, pp. 441-449
    BibTeX
    @incollection{Fan2011,
     author = {Fan, Zhao and Wang, Shilin and Li, Shenghong and Zhang, Yujin},
     title = {Detection of Double-Compression in JPEG2000 by Using Markov Features},
     booktitle = {Computing and Intelligent Systems},
     publisher = {Springer Berlin Heidelberg},
     year = {2011},
     volume = {234},
     pages = {441-449}}
    
  44. X. Feng, I.J. Cox & G. Doerr
    An energy-based method for the forensic detection of Re-sampled images
    Proc. IEEE Int Multimedia and Expo (ICME) Conf
    2011, pp. 1-6
    BibTeX
    @inproceedings{Feng2011,
     author = {Xiaoying Feng and Cox, Ingemar J. and Doerr, Gwenael},
     title = {An energy-based method for the forensic detection of Re-sampled images},
     booktitle = {Proc. IEEE Int Multimedia and Expo (ICME) Conf},
     year = {2011},
     pages = {1--6}}
    
  45. P. Fieguth
    Statistical Image Processing and Multidimensional Modeling
    Jordan, M., Nowak, R. & Schölkopf, B. (ed.)
    Springer, 2011
    BibTeX
    @book{Fieguth2010,
     author = {Fieguth, Paul},
     title = {Statistical Image Processing and Multidimensional Modeling},
     publisher = {Springer},
     year = {2011}}
    
  46. M. Fontani, T. Bianchi, A. De Rosa, A. Piva & M. Barni
    A Dempster-Shafer framework for decision fusion in image forensics
    Information Forensics and Security (WIFS), 2011 IEEE International Workshop on
    2011, pp. 1-6
    BibTeX
    @inproceedings{Fontani2011,
     author = {Fontani, M and Bianchi, Tiziano and De Rosa, Alessia and Piva, Alessandro and Barni, M.},
     title = {A Dempster-Shafer framework for decision fusion in image forensics},
     booktitle = {Information Forensics and Security (WIFS), 2011 IEEE International Workshop on},
     year = {2011},
     pages = {1--6}}
    
  47. J. Fridrich & M. Goljan
    Determining approximate age of digital images using sensor defects
    Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
    Proceedings of SPIE
    Media Watermarking, Security, and Forensics III, SPIE, 2011, Vol. 7880(1), pp. 788006
    BibTeX
    @conference{Fridrich2011,
     author = {Jessica Fridrich and Miroslav Goljan},
     title = {Determining approximate age of digital images using sensor defects},
     booktitle = {Proceedings of SPIE},
     journal = {Media Watermarking, Security, and Forensics III},
     publisher = {SPIE},
     year = {2011},
     volume = {7880},
     number = {1},
     pages = {788006}}
    
  48. G. Friedland, J. Choi, H. Lei & A.J.
    Multimodal Location Estimation on Flickr Videos
    -
    2011
    BibTeX
    @inproceedings{Friedland2011,
     author = {Gerald Friedland and Jaeyoung Choi and Howard Lei and, Adam Janin},
     title = {Multimodal Location Estimation on Flickr Videos},
     booktitle = {-},
     year = {2011}}
    
  49. F. Gharibi, J. RavanJamjah, F. Akhlaghian, B.Z. Azami & J. Alirezaie
    Robust detection of copy-move forgery using texture features
    Proc. 19th Iranian Conf. Electrical Engineering (ICEE)
    2011, pp. 1 - 4
    BibTeX
    @inproceedings{Gharibi2011,
     author = {Gharibi, Fereshteh and RavanJamjah, Javad and Akhlaghian, Fardin and Azami, Bahram Zahir and Alirezaie, Javad},
     title = {Robust detection of copy-move forgery using texture features},
     booktitle = {Proc. 19th Iranian Conf. Electrical Engineering (ICEE)},
     year = {2011},
     pages = {1 - 4}}
    
  50. F. Gharibi, J. RavanJamjah, B. ZahirAzami & F. Akhlaghian
    Digital Camera Identification by Modeling the Probability Distribution of Sensor Pattern Noise
    Proc. 7th Iranian Machine Vision and Image Processing (MVIP)
    2011, pp. 1-4
    BibTeX
    @inproceedings{Gharibi2011a,
     author = {Gharibi, F. and RavanJamjah, J. and ZahirAzami, B. and Akhlaghian, F. },
     title = {Digital Camera Identification by Modeling the Probability Distribution of Sensor Pattern Noise},
     booktitle = {Proc. 7th Iranian Machine Vision and Image Processing (MVIP)},
     year = {2011},
     pages = {1--4}}
    
  51. M. Ghorbani, M. Firouzmand & A. Faraahi
    DWT-DCT (QCD) based copy-move image forgery detection
    Proc. 18th Int Systems, Signals and Image Processing (IWSSIP) Conf
    2011, pp. 1-4
    BibTeX
    @inproceedings{Ghorbani2011,
     author = {Ghorbani, M. and Firouzmand, M. and Faraahi, A.},
     title = {DWT-DCT (QCD) based copy-move image forgery detection},
     booktitle = {Proc. 18th Int Systems, Signals and Image Processing (IWSSIP) Conf},
     year = {2011},
     pages = {1--4}}
    
  52. T. Gloe
    Demystifying histograms of multi-quantised DCT coefficients
    Proc. IEEE Int Multimedia and Expo (ICME) Conf
    2011, pp. 1-6
    BibTeX
    @inproceedings{Gloe2011,
     author = {Gloe, T.},
     title = {Demystifying histograms of multi-quantised DCT coefficients},
     booktitle = {Proc. IEEE Int Multimedia and Expo (ICME) Conf},
     year = {2011},
     pages = {1--6}}
    
  53. N. Glumov & A. Kuznetsov
    Detection of local artificial changes in images
    Optoelectronics, Instrumentation and Data Processing, Allerton Press, Inc. distributed exclusively by Springer Science+Business Media LLC, 2011, Vol. 47, pp. 207-214
    BibTeX
    @article{Glumov2011,
     author = {Glumov, N. and Kuznetsov, A.},
     title = {Detection of local artificial changes in images},
     journal = {Optoelectronics, Instrumentation and Data Processing},
     publisher = {Allerton Press, Inc. distributed exclusively by Springer Science+Business Media LLC},
     year = {2011},
     volume = {47},
     pages = {207-214}}
    
  54. N. Glumov & A. Kuznetsov
    Analysis of images for local artificial changes with JPEG compression properties
    Pattern Recognition and Image Analysis, MAIK Nauka/Interperiodica distributed exclusively by Springer Science+Business Media LLC., 2011, Vol. 21, pp. 251-253
    BibTeX
    @article{Glumov2011a,
     author = {Glumov, N. and Kuznetsov, A.},
     title = {Analysis of images for local artificial changes with JPEG compression properties},
     journal = {Pattern Recognition and Image Analysis},
     publisher = {MAIK Nauka/Interperiodica distributed exclusively by Springer Science+Business Media LLC.},
     year = {2011},
     volume = {21},
     pages = {251-253}}
    
  55. M. Goljan, J. Fridrich & M. Chen
    Defending Against Fingerprint-Copy Attack in Sensor-Based Camera Identification
    IEEE Transactions on Information Forensics and Security, 2011, Vol. 6(1), pp. 227-236
    BibTeX
    @article{Goljan2011,
     author = {Goljan, M. and Fridrich, J. and Mo Chen},
     title = {Defending Against Fingerprint-Copy Attack in Sensor-Based Camera Identification},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2011},
     volume = {6},
     number = {1},
     pages = {227--236}}
    
  56. J. Goodwin & G. Chetty
    Blind Video Tamper Detection Based on Fusion of Source Features
    Proc. Int Digital Image Computing Techniques and Applications (DICTA) Conf
    2011, pp. 608-613
    BibTeX
    @inproceedings{Goodwin2011,
     author = {Goodwin, J. and Chetty, G. },
     title = {Blind Video Tamper Detection Based on Fusion of Source Features},
     booktitle = {Proc. Int Digital Image Computing Techniques and Applications (DICTA) Conf},
     year = {2011},
     pages = {608--613}}
    
  57. M. Hajiaboli
    An Anisotropic Fourth-Order Diffusion Filter for Image Noise Removal
    International Journal of Computer Vision, Springer Netherlands, 2011, Vol. 92, pp. 177-191
    BibTeX
    @article{Hajiaboli2011,
     author = {Hajiaboli, Mohammad},
     title = {An Anisotropic Fourth-Order Diffusion Filter for Image Noise Removal},
     journal = {International Journal of Computer Vision},
     publisher = {Springer Netherlands},
     year = {2011},
     volume = {92},
     pages = {177-191}}
    
  58. Z. He, W. Sun, W. Lu & H. Lu
    Digital image splicing detection based on approximate run length
    Pattern Recognition Letters, 2011, Vol. 32(12), pp. 1591 - 1597
    BibTeX
    @article{He2011,
     author = {Zhongwei He and Wei Sun and Wei Lu and Hongtao Lu},
     title = {Digital image splicing detection based on approximate run length},
     journal = {Pattern Recognition Letters},
     year = {2011},
     volume = {32},
     number = {12},
     pages = {1591 - 1597}}
    
  59. T. Hoglund, P. Brolund & K. Norell
    Identifying camcorders using noise patterns from video clips recorded with image stabilisation
    Proc. 7th Int Image and Signal Processing and Analysis (ISPA) Symp
    2011, pp. 668-671
    BibTeX
    @inproceedings{Hoglund2011,
     author = {Hoglund, Tobias and Brolund, Per and Norell, Kristin},
     title = {Identifying camcorders using noise patterns from video clips recorded with image stabilisation},
     booktitle = {Proc. 7th Int Image and Signal Processing and Analysis (ISPA) Symp},
     year = {2011},
     pages = {668--671}}
    
  60. D. Hoiem & S. Savarese
    Representations and Techniques for 3D Object Recognition & Scene Interpretation (Synthesis Lectures on Artificial Intelligence and Machine Learning)
    Chapter 2 -- Single view metrology
    Morgan & Claypool Publishers, 2011, pp. 4-9
    BibTeX
    @inbook{Hoiem2011,
     author = {Derek Hoiem and Silvio Savarese},
     title = {Representations and Techniques for 3D Object Recognition & Scene Interpretation (Synthesis Lectures on Artificial Intelligence and Machine Learning)},
     publisher = {Morgan & Claypool Publishers},
     year = {2011},
     pages = {4--9}}
    
  61. A. Hore & D. Ziou
    An edge-sensing generic demosaicing algorithm with application to image resampling
    IEEE Transactions on Image Processing, 2011, Vol. 99(99), pp. 9
    BibTeX
    @article{Hore2011,
     author = {Hore, A. and Ziou, D. },
     title = {An edge-sensing generic demosaicing algorithm with application to image resampling},
     journal = {IEEE Transactions on Image Processing},
     year = {2011},
     volume = {99},
     number = {99},
     pages = {9}}
    
  62. D. Hou, Z. Bai & S. Liu
    Image copy-move forgery detection based on "crossing shadow" division
    Proc. Int Electric Information and Control Engineering (ICEICE) Conf
    2011, pp. 1416-1419
    BibTeX
    @inproceedings{Hou2011,
     author = {Dongmei Hou and Zhengyao Bai and Shuchun Liu},
     title = {Image copy-move forgery detection based on "crossing shadow" division},
     booktitle = {Proc. Int Electric Information and Control Engineering (ICEICE) Conf},
     year = {2011},
     pages = {1416--1419}}
    
  63. D. Hou, Z. Bai & S. Liu
    Image copy-move forgery detection based on crossing shadow division
    Proc. Int Electric Information and Control Engineering (ICEICE) Conf
    2011, pp. 1416-1419
    BibTeX
    @inproceedings{Hou2011a,
     author = {Dongmei Hou and Zhengyao Bai and Shuchun Liu},
     title = {Image copy-move forgery detection based on crossing shadow division},
     booktitle = {Proc. Int Electric Information and Control Engineering (ICEICE) Conf},
     year = {2011},
     pages = {1416--1419}}
    
  64. D. Hou, Z. Bai & S. Liu
    Image copy-move forgery detection based on textquotedblleftcrossing shadowtextquotedblright division
    Proc. Int Electric Information and Control Engineering (ICEICE) Conf
    2011, pp. 1416-1419
    BibTeX
    @inproceedings{Hou2011b,
     author = {Dongmei Hou and Zhengyao Bai and Shuchun Liu},
     title = {Image copy-move forgery detection based on textquotedblleftcrossing shadowtextquotedblright division},
     booktitle = {Proc. Int Electric Information and Control Engineering (ICEICE) Conf},
     year = {2011},
     pages = {1416--1419}}
    
  65. W. van Houten, I. Alberink & Z. Geradts
    Implementation of the likelihood ratio framework for camera identification based on sensor noise patterns
    Law, Probability and Risk, 2011, Vol. 10(2), pp. 149-159
    BibTeX
    @article{Houten2011,
     author = {Wiger van Houten and Ivo Alberink and Zeno Geradts},
     title = {Implementation of the likelihood ratio framework for camera identification based on sensor noise patterns},
     journal = {Law, Probability and Risk},
     year = {2011},
     volume = {10},
     number = {2},
     pages = {149-159}}
    
  66. J. Hu, Y. Li, S. Niu & X. Meng
    Exposing digital image forgeries by detecting inconsistencies in principal point
    Proc. Int Computer Science and Service System (CSSS) Conf
    2011, pp. 404-407
    BibTeX
    @inproceedings{Hu2011a,
     author = {Jing Hu and Yezhou Li and Shaozhang Niu and Xianzhe Meng},
     title = {Exposing digital image forgeries by detecting inconsistencies in principal point},
     booktitle = {Proc. Int Computer Science and Service System (CSSS) Conf},
     year = {2011},
     pages = {404--407}}
    
  67. J. Hu, H. Zhang, Q. Gao & H. Huang
    An Improved Lexicographical Sort Algorithm of Copy-move Forgery Detection
    Proc. Second Int Networking and Distributed Computing (ICNDC) Conf
    2011, pp. 23-27
    BibTeX
    @inproceedings{Hu2011,
     author = {Jie Hu and Huaxiong Zhang and Qiang Gao and Hai Huang},
     title = {An Improved Lexicographical Sort Algorithm of Copy-move Forgery Detection},
     booktitle = {Proc. Second Int Networking and Distributed Computing (ICNDC) Conf},
     year = {2011},
     pages = {23--27}}
    
  68. Y. Hu, C.-T. Li, C. Zhou & X. Lin
    Source Camera Identification Issues: Forensic Features Selection and Robustness
    International Journal of Digital Crime and Forensics (IJDCF), 2011, Vol. 3(4), pp. 1-15
    BibTeX
    @article{Hu2011b,
     author = {Yongjian Hu and Chang-Tsun Li and Changhui Zhou and Xufeng Lin},
     title = {Source Camera Identification Issues: Forensic Features Selection and Robustness},
     journal = {International Journal of Digital Crime and Forensics (IJDCF)},
     year = {2011},
     volume = {3},
     number = {4},
     pages = {1-15}}
    
  69. H. Huang, G. Coatrieux, H.Z. Shu, L.M. Luo & C. Roux
    Blind forensics in medical imaging based on Tchebichef image moments
    Proc. Annual Int Engineering in Medicine and Biology Society,EMBC Conf. of the IEEE
    2011, pp. 4473-4476
    BibTeX
    @inproceedings{Huang2011a,
     author = {Huang, H. and Coatrieux, G. and Shu, H. Z. and Luo, L. M. and Roux, C. },
     title = {Blind forensics in medical imaging based on Tchebichef image moments},
     booktitle = {Proc. Annual Int Engineering in Medicine and Biology Society,EMBC Conf. of the IEEE},
     year = {2011},
     pages = {4473--4476}}
    
  70. Y. Huang, W. Lu, W. Sun & D. Long
    Improved DCT-based detection of copy-move forgery in images
    Forensic Science International, 2011, Vol. 206(1-3), pp. 178 - 184
    BibTeX
    @article{Huang2011,
     author = {Yanping Huang and Wei Lu and Wei Sun and Dongyang Long},
     title = {Improved DCT-based detection of copy-move forgery in images},
     journal = {Forensic Science International},
     year = {2011},
     volume = {206},
     number = {1-3},
     pages = {178 - 184}}
    
  71. N. Jacobs, K. Miskell & R. Pless
    Webcam geo-localization using aggregate light levels
    Proc. IEEE Workshop Applications of Computer Vision (WACV)
    2011, pp. 132-138
    BibTeX
    @inproceedings{Jacobs2011,
     author = {Jacobs, N. and Miskell, K. and Pless, R. },
     title = {Webcam geo-localization using aggregate light levels},
     booktitle = {Proc. IEEE Workshop Applications of Computer Vision (WACV)},
     year = {2011},
     pages = {132--138}}
    
  72. Z. Kaizhen & Z.Z.
    A Novel Algorithm of Image Splicing Detection
    School of Electrical Engineering Zhengzhou University, 2011
    BibTeX
    @techreport{Kaizhen2011,
     author = {Zhu Kaizhen and, Zhen Zhang},
     title = {A Novel Algorithm of Image Splicing Detection},
     year = {2011}}
    
  73. P. Kakar & N. Sudha
    Detecting copy-paste forgeries using transform-invariant features
    Proc. IEEE 15th Int Consumer Electronics (ISCE) Symp
    2011, pp. 58-61
    BibTeX
    @inproceedings{Kakar2011,
     author = {Kakar, P. and Sudha, N. },
     title = {Detecting copy-paste forgeries using transform-invariant features},
     booktitle = {Proc. IEEE 15th Int Consumer Electronics (ISCE) Symp},
     year = {2011},
     pages = {58--61}}
    
  74. P. Kakar, N. Sudha & W. Ser
    Exposing Digital Image Forgeries by Detecting Discrepancies in Motion Blur
    IEEE Transactions on Multimedia, 2011, Vol. 13(3), pp. 443-452
    BibTeX
    @article{Kakar2011a,
     author = {Kakar, P. and Sudha, N. and Ser, W.},
     title = {Exposing Digital Image Forgeries by Detecting Discrepancies in Motion Blur},
     journal = {IEEE Transactions on Multimedia},
     year = {2011},
     volume = {13},
     number = {3},
     pages = {443--452}}
    
  75. X. Kang, Y. Li, Z. Qu & J. Huang
    Enhancing ROC performance of trustworthy camera source identification
    Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
    Proceedings of SPIE
    Media Watermarking, Security, and Forensics III, SPIE, 2011, Vol. 7880(1), pp. 788009
    BibTeX
    @conference{Kang2011,
     author = {Xiangui Kang and Yinxiang Li and Zhenhua Qu and Jiwu Huang},
     title = {Enhancing ROC performance of trustworthy camera source identification},
     booktitle = {Proceedings of SPIE},
     journal = {Media Watermarking, Security, and Forensics III},
     publisher = {SPIE},
     year = {2011},
     volume = {7880},
     number = {1},
     pages = {788009}}
    
  76. X. Kang, Y. Li, Z. Qu & J. Huang
    Enhancing Source Camera Identification Performance with a Camera Reference Phase Sensor Pattern Noise
    IEEE Transactions on Information Forensics and Security, 2011, Vol. PP Issue:99(99), pp. 1
    BibTeX
    @article{Kang2011a,
     author = {Kang, X. and Li, Y. and Qu, Z. and Huang, J.},
     title = {Enhancing Source Camera Identification Performance with a Camera Reference Phase Sensor Pattern Noise},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2011},
     volume = {PP Issue:99},
     number = {99},
     pages = {1}}
    
  77. K. Karsch, V. Hedau, D. Forsyth & D. Hoiem
    Rendering synthetic objects into legacy photographs
    Proceedings of the 2011 SIGGRAPH Asia Conference
    ACM, 2011, pp. 157:1-157:12
    BibTeX
    @inproceedings{Karsch2011,
     author = {Karsch, Kevin and Hedau, Varsha and Forsyth, David and Hoiem, Derek},
     title = {Rendering synthetic objects into legacy photographs},
     booktitle = {Proceedings of the 2011 SIGGRAPH Asia Conference},
     publisher = {ACM},
     year = {2011},
     pages = {157:1--157:12}}
    
  78. E. Kee, M.K. Johnson & H. Farid
    Digital Image Authentication From JPEG Headers
    IEEE Transactions on Information Forensics and Security, 2011, Vol. 6(3), pp. 1066-1075
    BibTeX
    @article{Kee2011,
     author = {Kee, Eric. and Johnson, Micah. Kimo and Farid, H.},
     title = {Digital Image Authentication From JPEG Headers},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2011},
     volume = {6},
     number = {3},
     pages = {1066--1075}}
    
  79. S. Khan & A. Kulkarni
    Detection of copy-move forgery using multiresolution characteristic of discrete wavelet transform
    Proceedings of the International Conference &38; Workshop on Emerging Trends in Technology
    ACM, 2011, pp. 127-131
    BibTeX
    @inproceedings{Khan2011,
     author = {Khan, S. and Kulkarni, A.},
     title = {Detection of copy-move forgery using multiresolution characteristic of discrete wavelet transform},
     booktitle = {Proceedings of the International Conference &38; Workshop on Emerging Trends in Technology},
     publisher = {ACM},
     year = {2011},
     pages = {127--131}}
    
  80. H.J. Kim, S. Lim, J. Moon, B. Kim & E.S. Jung
    A photographic forensic case study: Myths, principles and techniques
    Mathematical and Computer Modelling, 2011, Vol. In Press, Accepted Manuscript, pp. -
    BibTeX
    @article{Kim2011,
     author = {Hyoung Joong Kim and Soomin Lim and Jongsub Moon and Boram Kim and Eui S. Jung},
     title = {A photographic forensic case study: Myths, principles and techniques},
     journal = {Mathematical and Computer Modelling},
     year = {2011},
     volume = {In Press, Accepted Manuscript},
     pages = { - }}
    
  81. K.-S. Kim, M.-J. Lee, J.-W. Lee, T.-W. Oh & H.-Y. Lee
    Region-based tampering detection and recovery using homogeneity analysis in quality-sensitive imaging
    Computer Vision and Image Understanding, 2011, Vol. 115(9), pp. 1308 - 1323
    BibTeX
    @article{Kim2011a,
     author = {Kyung-Su Kim and Min-Jeong Lee and Ji-Won Lee and Tae-Woo Oh and Hae-Yeoun Lee},
     title = {Region-based tampering detection and recovery using homogeneity analysis in quality-sensitive imaging},
     journal = {Computer Vision and Image Understanding},
     year = {2011},
     volume = {115},
     number = {9},
     pages = {1308 - 1323}}
    
  82. C. Kommini, K. Ellanti & S. Asadi
    Article: Image based Secret Communication using Double Compression
    International Journal of Computer Applications, 2011, Vol. 21(7), pp. 6-9
    BibTeX
    @article{Kommini2011,
     author = {Chaitanya Kommini and Kamalesh Ellanti and Srinivasulu Asadi},
     title = {Article: Image based Secret Communication using Double Compression},
     journal = {International Journal of Computer Applications},
     year = {2011},
     volume = {21},
     number = {7},
     pages = {6--9}}
    
  83. S. Lai & R. Böhme
    Countering Counter-Forensics: The Case of JPEG Compression
    Filler, T., Pevný, T., Craver, S. & Ker, A. (ed.)
    Information Hiding
    Springer Berlin / Heidelberg, 2011, Vol. 6958, pp. 285-298
    BibTeX
    @incollection{Lai2011,
     author = {Lai, ShiYue and Böhme, Rainer},
     title = {Countering Counter-Forensics: The Case of JPEG Compression},
     booktitle = {Information Hiding},
     publisher = {Springer Berlin / Heidelberg},
     year = {2011},
     volume = {6958},
     pages = {285-298}}
    
  84. J.-F. Lalonde
    Understanding and recreating visual appearance under natural illumination
    DTIC Document, 2011
    BibTeX
    @techreport{Lalonde2011a,
     author = {Lalonde, Jean-Francois},
     title = {Understanding and recreating visual appearance under natural illumination},
     year = {2011}}
    
  85. J.-F. Lalonde, A.A. Efros & S.G. Narasimhan
    Estimating the natural illumination conditions from a single outdoor image
    International Journal of Computer Vision, 2011, Vol. -, pp. 1-25
    BibTeX
    @article{Lalonde2011,
     author = {Jean-François Lalonde and Alexei A. Efros and Srinivasa G. Narasimhan},
     title = {Estimating the natural illumination conditions from a single outdoor image},
     journal = {International Journal of Computer Vision},
     year = {2011},
     volume = {-},
     pages = {1-25}}
    
  86. C.-T. Li & R. Satta
    On the Location-Dependent Quality of the Sensor Pattern Noise and Its Implication in Multimedia Forensics
    Proceedings of the 4th International Conference on Imaging for Crime Detection and Prevention (ICDP 2011), London, United Kingdom
    4th International Conference on Imaging for Crime Detection and Prevention (ICDP 2011), 2011
    BibTeX
    @inproceedings{Li2011f,
     author = {Chang-Tzun Li and Riccardo Satta},
     title = {On the Location-Dependent Quality of the Sensor Pattern Noise and Its Implication in Multimedia Forensics},
     booktitle = {Proceedings of the 4th International Conference on Imaging for Crime Detection and Prevention (ICDP 2011), London, United Kingdom},
     journal = {4th International Conference on Imaging for Crime Detection and Prevention (ICDP 2011)},
     year = {2011}}
    
  87. L. Li, J. Xue, X. Wang & L. Tian
    A Robust Approach to Detect Tampering by Exploring Correlation Patterns
    Real, P., Diaz-Pernil, D., Molina-Abril, H., Berciano, A. & Kropatsch, W. (ed.)
    Computer Analysis of Images and Patterns
    Springer Berlin / Heidelberg, 2011, Vol. 6855, pp. 515-522
    BibTeX
    @incollection{Li2011c,
     author = {Li, Lu and Xue, Jianru and Wang, Xiaofeng and Tian, Lihua},
     title = {A Robust Approach to Detect Tampering by Exploring Correlation Patterns},
     booktitle = {Computer Analysis of Images and Patterns},
     publisher = {Springer Berlin / Heidelberg},
     year = {2011},
     volume = {6855},
     pages = {515-522}}
    
  88. X.-F. Li, X.-J. Shen & H.-P. Chen
    Blind identification algorithm for retouched images based on Bi-Laplacian
    Journal of Computer Applications, 2011, Vol. 1, pp. -
    BibTeX
    @article{Li2011,
     author = {Li, Xiao-Fei and Shen, Xuan-Jing and Chen, Hai-Peng},
     title = {Blind identification algorithm for retouched images based on Bi-Laplacian},
     journal = {Journal of Computer Applications},
     year = {2011},
     volume = {1},
     pages = {-}}
    
  89. Y. Li
    Decomposed PRNU Library for Forensics on Photos
    International Journal of Digital Library Systems,, 2011, Vol. 2(1), pp. 38
    BibTeX
    @article{Li2011b,
     author = {Yue Li},
     title = {Decomposed PRNU Library for Forensics on Photos},
     journal = {International Journal of Digital Library Systems,},
     year = {2011},
     volume = {2},
     number = {1},
     pages = {38}}
    
  90. Y. Li
    A robust forensic method based on Scale-Invariance Feature Transform
    Proc. Int Multimedia Technology (ICMT) Conf
    2011, pp. 5246-5249
    BibTeX
    @inproceedings{Li2011e,
     author = {Yue Li},
     title = {A robust forensic method based on Scale-Invariance Feature Transform},
     booktitle = {Proc. Int Multimedia Technology (ICMT) Conf},
     year = {2011},
     pages = {5246--5249}}
    
  91. Y. Li & C.-T. Li
    Optimized digital library for digital forenisc based on Decomposed PRNU
    Proc. Int Multimedia Technology (ICMT) Conf
    2011, pp. 610-613
    BibTeX
    @inproceedings{Li2011d,
     author = {Yue Li and Chang-Tsun Li},
     title = {Optimized digital library for digital forenisc based on Decomposed PRNU},
     booktitle = {Proc. Int Multimedia Technology (ICMT) Conf},
     year = {2011},
     pages = {610--613}}
    
  92. S.D. Lin & T. Wu
    An integrated technique for splicing and copy-move forgery image detection
    Proc. 4th Int Image and Signal Processing (CISP) Congress
    2011, Vol. 2, pp. 1086-1090
    BibTeX
    @inproceedings{Lin2011a,
     author = {Lin, S. D. and Tszan Wu},
     title = {An integrated technique for splicing and copy-move forgery image detection},
     booktitle = {Proc. 4th Int Image and Signal Processing (CISP) Congress},
     year = {2011},
     volume = {2},
     pages = {1086--1090}}
    
  93. Y. Lin, D. Varodayan & B. Girod
    Image Authentication Using Distributed Source Coding
    IEEE Transactions on Image Processing, 2011, Vol. PP Issue:99(99), pp. 1
    BibTeX
    @article{Lin2011,
     author = {Lin, Y. and Varodayan, D. and Girod, B.},
     title = {Image Authentication Using Distributed Source Coding},
     journal = {IEEE Transactions on Image Processing},
     year = {2011},
     volume = {PP Issue:99},
     number = {99},
     pages = {1}}
    
  94. G. Liu, J. Wang, S. Lian & Y. Dai
    Detect image splicing with artificial blurred boundary
    Mathematical and Computer Modelling, 2011, Vol. In Press, Accepted Manuscript, pp. -
    BibTeX
    @article{Liu2011,
     author = {Guangjie Liu and Junwen Wang and Shiguo Lian and Yuewei Dai},
     title = {Detect image splicing with artificial blurred boundary},
     journal = {Mathematical and Computer Modelling},
     year = {2011},
     volume = {In Press, Accepted Manuscript},
     pages = { - }}
    
  95. Q. Liu
    Detection of misaligned cropping and recompression with the same quantization matrix and relevant forgery
    Proceedings of the 3rd international ACM workshop on Multimedia in forensics and intelligence
    ACM, 2011, pp. 25-30
    BibTeX
    @inproceedings{Liu2011c,
     author = {Liu, Qingzhong},
     title = {Detection of misaligned cropping and recompression with the same quantization matrix and relevant forgery},
     booktitle = {Proceedings of the 3rd international ACM workshop on Multimedia in forensics and intelligence},
     publisher = {ACM},
     year = {2011},
     pages = {25--30}}
    
  96. Q. Liu, X. Cao, C. Deng & X. Guo
    Identifying Image Composites Through Shadow Matte Consistency
    IEEE Transactions on Information Forensics and Security, 2011, Vol. 6(3), pp. 1111-1122
    BibTeX
    @article{Liu2011e,
     author = {Qiguang Liu and Xiaochun Cao and Chao Deng and Xiaojie Guo},
     title = {Identifying Image Composites Through Shadow Matte Consistency},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2011},
     volume = {6},
     number = {3},
     pages = {1111--1122}}
    
  97. Q. Liu, A. Sung & M. Qiao
    A Method to Detect JPEG-Based Double Compression
    Liu, D., Zhang, H., Polycarpou, M., Alippi, C. & He, H. (ed.)
    Advances in Neural Networks -- ISNN 2011
    Springer Berlin / Heidelberg, 2011, Vol. 6676, pp. 466-476
    BibTeX
    @incollection{Liu2011a,
     author = {Liu, Qingzhong and Sung, Andrew and Qiao, Mengyu},
     title = {A Method to Detect JPEG-Based Double Compression},
     booktitle = {Advances in Neural Networks -- ISNN 2011},
     publisher = {Springer Berlin / Heidelberg},
     year = {2011},
     volume = {6676},
     pages = {466-476}}
    
  98. W. Liu, T. Liu, M. Rong, R. Wang & H. Zhang
    A fast noise variance estimation algorithm
    Proc. Asia Pacific Conf Microelectronics and Electronics (PrimeAsia) Postgraduate Research in
    2011, pp. 61-64
    BibTeX
    @inproceedings{Liu2011b,
     author = {Liu, Wenjiang and Liu, Tao and Rong, Mengtian and Wang, Ruolin and Zhang, Hao},
     title = {A fast noise variance estimation algorithm},
     booktitle = {Proc. Asia Pacific Conf Microelectronics and Electronics (PrimeAsia) Postgraduate Research in},
     year = {2011},
     pages = {61--64}}
    
  99. Z. Liu, X. Wang & J. Chen
    Passive Forensics Method to Detect Tampering for Double JPEG Compression Image
    Proc. IEEE Int Multimedia (ISM) Symp
    2011, pp. 185-189
    BibTeX
    @inproceedings{Liu2011d,
     author = {Liu, Zhenli and Wang, Xiaofeng and Chen, Jing},
     title = {Passive Forensics Method to Detect Tampering for Double JPEG Compression Image},
     booktitle = {Proc. IEEE Int Multimedia (ISM) Symp},
     year = {2011},
     pages = {185--189}}
    
  100. W. Lu, W. Sun, F.-L. Chung & H. Lu
    Revealing digital fakery using multiresolution decomposition and higher order statistics
    Engineering Applications of Artificial Intelligence, 2011, Vol. 24(4), pp. 666 - 672
    BibTeX
    @article{Lu2011,
     author = {Wei Lu and Wei Sun and Fu-Lai Chung and Hongtao Lu},
     title = {Revealing digital fakery using multiresolution decomposition and higher order statistics},
     journal = {Engineering Applications of Artificial Intelligence},
     year = {2011},
     volume = {24},
     number = {4},
     pages = {666 - 672}}
    
  101. A.Y.-D. Lv, B.X.-J. Shen & C.C. Hai-Peng
    Blind Identification of Image Copy-paste Tampering Based on Logarithm Polar Coordinate Transformation
    Blind Identification of Image Copy-paste Tampering Based on Logarithm Polar Coordinate Transformation, 2011
    BibTeX
    @techreport{Lv2011,
     author = {Lv , A. Ying-Da and Shen, B. Xuan-Jing and Chen C. Hai-Peng},
     title = {Blind Identification of Image Copy-paste Tampering Based on Logarithm Polar Coordinate Transformation},
     year = {2011}}
    
  102. Y. Lv, X. Shen & H. Chen
    An improved image blind identification based on inconsistency in light source direction
    The Journal of Supercomputing, Springer Netherlands, 2011, Vol. 19(2), pp. 211-218
    BibTeX
    @article{Lv2011a,
     author = {Lv, Yingda and Shen, Xuanjing and Chen, Haipeng},
     title = {An improved image blind identification based on inconsistency in light source direction},
     journal = {The Journal of Supercomputing},
     publisher = {Springer Netherlands},
     year = {2011},
     volume = {19},
     number = {2},
     pages = {211-218}}
    
  103. S.D. Mahalakshmi, K. Vijayalakshmi & S. Priyadharsini
    Digital image forgery detection and estimation by exploring basic image manipulations
    Digital Investigation, 2011, Vol. In Press, Corrected Proof, pp. -
    BibTeX
    @article{Mahalakshmi2011,
     author = {Mahalakshmi,S. Devi and K. Vijayalakshmi and S. Priyadharsini},
     title = {Digital image forgery detection and estimation by exploring basic image manipulations},
     journal = {Digital Investigation},
     year = {2011},
     volume = {In Press, Corrected Proof},
     pages = { - }}
    
  104. B. Mahdian & S. Saic
    Identifying image forgeries using change points detection
    Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
    Proceedings of SPIE
    Media Watermarking, Security, and Forensics III, SPIE, 2011, Vol. 7880(1), pp. 788008
    BibTeX
    @conference{Mahdian2011a,
     author = {Babak Mahdian and Stanislav Saic},
     title = {Identifying image forgeries using change points detection},
     booktitle = {Proceedings of SPIE},
     journal = {Media Watermarking, Security, and Forensics III},
     publisher = {SPIE},
     year = {2011},
     volume = {7880},
     number = {1},
     pages = {788008}}
    
  105. B. Mahdian & S. Saic
    Image tampering detection using methods based on JPEG compression artifacts: a real-life experiment
    Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies
    ACM, 2011, pp. 176:1-176:5
    BibTeX
    @inproceedings{Mahdian2011b,
     author = {Mahdian, Babak and Saic, Stanislav},
     title = {Image tampering detection using methods based on JPEG compression artifacts: a real-life experiment},
     booktitle = {Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies},
     publisher = {ACM},
     year = {2011},
     pages = {176:1--176:5}}
    
  106. B. Mahdian, S. Saic & R. Nedbal
    JPEG Quantization Tables Forensics: A Statistical Approach
    Sako, H., Franke, K. & Saitoh, S. (ed.)
    Computational Forensics
    Springer Berlin / Heidelberg, 2011, Vol. 6540, pp. 150-159
    BibTeX
    @incollection{Mahdian2011,
     author = {Mahdian, Babak and Saic, Stanislav and Nedbal, Radim},
     title = {JPEG Quantization Tables Forensics: A Statistical Approach},
     booktitle = {Computational Forensics},
     publisher = {Springer Berlin / Heidelberg},
     year = {2011},
     volume = {6540},
     pages = {150-159}}
    
  107. A.K. Mikkilineni, N. Khanna & E.J. Delp
    Forensic printer detection using intrinsic signatures
    Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
    Proceedings of SPIE
    Media Watermarking, Security, and Forensics III, SPIE, 2011, Vol. 7880(1), pp. 78800R
    BibTeX
    @conference{Mikkilineni2011,
     author = {Aravind K. Mikkilineni and Nitin Khanna and Edward J. Delp},
     title = {Forensic printer detection using intrinsic signatures},
     booktitle = {Proceedings of SPIE},
     journal = {Media Watermarking, Security, and Forensics III},
     publisher = {SPIE},
     year = {2011},
     volume = {7880},
     number = {1},
     pages = {78800R}}
    
  108. S. Milani, M. Tagliasacchi & S. Tubaro
    Discriminating Multiple Jpeg Compression Using First Digit Features
    Dipartimento di Elettronica e Informazione - Politecnico di Milano, 2011
    BibTeX
    @techreport{Milani2011,
     author = {Simone Milani and Marco Tagliasacchi and Stefano Tubaro},
     title = {Discriminating Multiple Jpeg Compression Using First Digit Features},
     year = {2011}}
    
  109. G. Muhammad, M. Hussain, K. Khawaji & G. Bebis
    Blind Copy Move Image Forgery Detection using Dyadic Undecimated Wavelet Transform
    Proceedings of the 17th International Conference on Digital Signal Processing
    College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia, 2011
    BibTeX
    @inproceedings{Muhammad2011,
     author = {Ghulam Muhammad and Muhammad Hussain and Khalid Khawaji and George Bebis},
     title = {Blind Copy Move Image Forgery Detection using Dyadic Undecimated Wavelet Transform},
     booktitle = {Proceedings of the 17th International Conference on Digital Signal Processing},
     year = {2011}}
    
  110. G. Muhammad & M.S. Hussain
    Robust copy-move image forgery detection using undecimated wavelets and Zernike moments
    Proceedings of the Third International Conference on Internet Multimedia Computing and Service
    ACM, 2011, pp. 95-98
    BibTeX
    @inproceedings{Muhammad2011a,
     author = {Muhammad, Ghulam and Hussain, Muhammad Shamim},
     title = {Robust copy-move image forgery detection using undecimated wavelets and Zernike moments},
     booktitle = {Proceedings of the Third International Conference on Internet Multimedia Computing and Service},
     publisher = {ACM},
     year = {2011},
     pages = {95--98}}
    
  111. N. Muhammad, M. Hussain, G. Muhammad & G. Bebis
    A Non-intrusive Method for Copy-Move Forgery Detection
    Bebis, G., Boyle, R., Parvin, B., Koracin, D., Wang, S., Kyungnam, K., Benes, B., Moreland, K., Borst, C., DiVerdi, S., Yi-Jen, C. & Ming, J. (ed.)
    Advances in Visual Computing
    Springer Berlin / Heidelberg, 2011, Vol. 6939, pp. 516-525
    BibTeX
    @incollection{Muhammad2011b,
     author = {Muhammad, Najah and Hussain, Muhammad and Muhammad, Ghulam and Bebis, George},
     title = {A Non-intrusive Method for Copy-Move Forgery Detection},
     booktitle = {Advances in Visual Computing},
     publisher = {Springer Berlin / Heidelberg},
     year = {2011},
     volume = {6939},
     pages = {516-525}}
    
  112. N. Muhammad, M. Hussain, G. Muhammad & G. Bebis
    Copy-Move Forgery Detection Using Dyadic Wavelet Transform
    Proc. Eighth Int Computer Graphics, Imaging and Visualization (CGIV) Conf
    2011, pp. 103-108
    BibTeX
    @inproceedings{Muhammad2011c,
     author = {Muhammad, Najah and Hussain, Muhammad and Muhammad, Ghulam and Bebis, George},
     title = {Copy-Move Forgery Detection Using Dyadic Wavelet Transform},
     booktitle = {Proc. Eighth Int Computer Graphics, Imaging and Visualization (CGIV) Conf},
     year = {2011},
     pages = {103--108}}
    
  113. S. Murali, B.S. Anami & G.B. Chittapur
    Detection of Copy-Create Image Forgery Using Luminance Level Techniques
    Proc. Third National Conf. Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG)
    2011, pp. 215-218
    BibTeX
    @inproceedings{Murali2011,
     author = {Murali, S. and Anami, B. S. and Chittapur, G. B. },
     title = {Detection of Copy-Create Image Forgery Using Luminance Level Techniques},
     booktitle = {Proc. Third National Conf. Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG)},
     year = {2011},
     pages = {215--218}}
    
  114. G. Narayanan & Y. Shi
    A Statistical Model for Quantized AC Block DCT Coefficients in JPEG Compression and its Application to Detecting Potential Compression History in Bitmap Images
    Kim, H.-J., Shi, Y. & Barni, M. (ed.)
    Digital Watermarking
    Lecture Notes in Computer Science, Springer Berlin / Heidelberg, 2011, Vol. 6526, pp. 75-89
    BibTeX
    @incollection{Narayanan2011,
     author = {Narayanan, Gopal and Shi, Yun},
     title = {A Statistical Model for Quantized AC Block DCT Coefficients in JPEG Compression and its Application to Detecting Potential Compression History in Bitmap Images},
     booktitle = {Digital Watermarking},
     journal = {Lecture Notes in Computer Science},
     publisher = {Springer Berlin / Heidelberg},
     year = {2011},
     volume = {6526},
     pages = {75-89}}
    
  115. H.C. Nguyen & S. Katzenbeisser
    Security of copy-move forgery detection techniques
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2011
    2011, pp. 1864-1867
    BibTeX
    @inproceedings{Nguyen2011,
     author = {Nguyen, Hieu Cuong and Katzenbeisser, Stefan},
     title = {Security of copy-move forgery detection techniques},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2011},
     year = {2011},
     pages = {1864--1867}}
    
  116. L. Özparlak & I. Avcibas
    Digital image forensics using wavelet based image models
    Proc. IEEE 19th Conf. Signal Processing and Communications Applications (SIU)
    2011, pp. 335-338
    BibTeX
    @inproceedings{Oezparlak2011,
     author = {Özparlak, L. and Avcibas, I.},
     title = {Digital image forensics using wavelet based image models},
     booktitle = {Proc. IEEE 19th Conf. Signal Processing and Communications Applications (SIU)},
     year = {2011},
     pages = {335--338}}
    
  117. L. Özparlak & I. Avcibas
    Differentiating Between Images Using Wavelet Based Transforms: A Comparative Study
    IEEE Transactions on Information Forensics and Security, 2011, Vol. PP(99), pp. 1
    BibTeX
    @article{Oezparlak2011b,
     author = {Özparlak, L. and Avcibas, I.},
     title = {Differentiating Between Images Using Wavelet Based Transforms: A Comparative Study},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2011},
     volume = {PP},
     number = {99},
     pages = {1}}
    
  118. F. Pan & J. Huang
    Discriminating Computer Graphics Images and Natural Images Using Hidden Markov Tree Model
    Kim, H.-J., Shi, Y. & Barni, M. (ed.)
    Digital Watermarking
    Springer Berlin Heidelberg, 2011, Vol. 6526, pp. 23-28
    BibTeX
    @incollection{Pan2011b,
     author = {Pan, Feng and Huang, Jiwu},
     title = {Discriminating Computer Graphics Images and Natural Images Using Hidden Markov Tree Model},
     booktitle = {Digital Watermarking},
     publisher = {Springer Berlin Heidelberg},
     year = {2011},
     volume = {6526},
     pages = {23-28}}
    
  119. L. Pan & N. Trepanic
    Image source detection : a case study on Facebook images taken by iPhones
    ATIS 2011 : Workshop proceedingof ATIS 2011. Melbourne, November 9th, 2011. Second Applications and Techniques in Information Security Workshop
    2011
    BibTeX
    @inproceedings{Pan2011a,
     author = {Pan, Lei and Trepanic, Nijaz},
     title = {Image source detection : a case study on Facebook images taken by iPhones},
     booktitle = {ATIS 2011 : Workshop proceedingof ATIS 2011. Melbourne, November 9th, 2011. Second Applications and Techniques in Information Security Workshop},
     year = {2011}}
    
  120. X. Pan, X. Zhang & S. Lyu
    Exposing image forgery with blind noise estimation
    Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
    ACM, 2011, pp. 15-20
    BibTeX
    @inproceedings{Pan2011,
     author = {Pan, Xunyu and Zhang, Xing and Lyu, Siwei},
     title = {Exposing image forgery with blind noise estimation},
     booktitle = {Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security},
     publisher = {ACM},
     year = {2011},
     pages = {15--20}}
    
  121. F. Peng & M. Long
    Identification of Photographic Images and Computer Graphics Using Fractal Feature of Sensor Pattern Noise
    International Journal of Advancements in Computing Technology, 2011, Vol. 3(3), pp. 222-227
    BibTeX
    @article{Peng2011a,
     author = {Fei Peng and Min Long},
     title = {Identification of Photographic Images and Computer Graphics Using Fractal Feature of Sensor Pattern Noise},
     journal = {International Journal of Advancements in Computing Technology},
     year = {2011},
     volume = {3},
     number = {3},
     pages = {222-227}}
    
  122. F. Peng, Y. ying Nie & M. Long
    A complete passive blind image copy-move forensics scheme based on compound statistics features
    Forensic Science International, 2011, Vol. In Press, Corrected Proof, pp. -
    BibTeX
    @article{Peng2011,
     author = {Fei Peng and Yun-ying Nie and Min Long},
     title = {A complete passive blind image copy-move forensics scheme based on compound statistics features},
     journal = {Forensic Science International},
     year = {2011},
     volume = {In Press, Corrected Proof},
     pages = { - }}
    
  123. R. Poisel & S. Tjoa
    Forensics Investigations of Multimedia Data: A Review of the State-of-the-Art
    Proc. Sixth Int IT Security Incident Management and IT Forensics (IMF) Conf
    2011, pp. 48-61
    BibTeX
    @inproceedings{Poisel2011,
     author = {Poisel, R. and Tjoa, S.},
     title = {Forensics Investigations of Multimedia Data: A Review of the State-of-the-Art},
     booktitle = {Proc. Sixth Int IT Security Incident Management and IT Forensics (IMF) Conf},
     year = {2011},
     pages = {48--61}}
    
  124. R. Poisel & S. Tjoa
    Forensische Unterschung Multimedialer Daten
    9. Sicherheitskonferenz Krems, 2011
    2011
    BibTeX
    @inproceedings{Poisel2011a,
     author = {Rainer Poisel and Simon Tjoa},
     title = {Forensische Unterschung Multimedialer Daten},
     booktitle = {9. Sicherheitskonferenz Krems, 2011},
     year = {2011}}
    
  125. G. Qadir, X. Zhao, A.T. Ho & M. Casey
    Image forensic of glare feature for improving image retrieval using Benford´s Law
    Proc. IEEE Int Circuits and Systems (ISCAS) Symp
    2011, pp. 2661-2664
    BibTeX
    @inproceedings{Qadir2011,
     author = {Qadir, Ghulam and Zhao, Xi and Ho, Anthony TS and Casey, Matthew},
     title = {Image forensic of glare feature for improving image retrieval using Benford´s Law},
     booktitle = {Proc. IEEE Int Circuits and Systems (ISCAS) Symp},
     year = {2011},
     pages = {2661--2664}}
    
  126. Y.-C. Qi, X.-S. Xing & H.-F.-Z. Zhang
    Blind Detection of Eclosion Forgeries Based on Curvelet Image Enhancement and Edge Detection
    Proc. Int Multimedia and Signal Processing (CMSP) Conf
    2011, Vol. 1, pp. 316-320
    BibTeX
    @inproceedings{Qi2011,
     author = {Qi, Yin-Cheng and Xing, Xiao-Shuang and Zhang, Hua-Fang-Zi},
     title = {Blind Detection of Eclosion Forgeries Based on Curvelet Image Enhancement and Edge Detection},
     booktitle = {Proc. Int Multimedia and Signal Processing (CMSP) Conf},
     year = {2011},
     volume = {1},
     pages = {316--320}}
    
  127. M. Qiao, A. Sung, Q. Liu & B. Ribeiro
    A Novel Approach for Detection of Copy-Move Forgery
    Proceedings of the ADVCOMP 2011, The Fifth International Conference on Advanced Engineering Computing and Applications in Sciences
    2011
    BibTeX
    @conference{Qiao2011,
     author = {Mengyu Qiao and Andrew Sung and Qingzhong Liu and Bernardete Ribeiro},
     title = {A Novel Approach for Detection of Copy-Move Forgery},
     booktitle = {Proceedings of the ADVCOMP 2011, The Fifth International Conference on Advanced Engineering Computing and Applications in Sciences},
     year = {2011}}
    
  128. A. Rocha, W. Scheirer, T. Boult & S. Goldenstein
    Vision of the unseen: Current trends and challenges in digital image and video forensics
    ACM Comput. Surv., ACM, 2011, Vol. 43(4), pp. 26:1-26:42
    BibTeX
    @article{Rocha2011,
     author = {Rocha, Anderson and Scheirer, Walter and Boult, Terrance and Goldenstein, Siome},
     title = {Vision of the unseen: Current trends and challenges in digital image and video forensics},
     journal = {ACM Comput. Surv.},
     publisher = {ACM},
     year = {2011},
     volume = {43},
     number = {4},
     pages = {26:1--26:42}}
    
  129. M. Rostami, M. Babaie-Zadeh, S. Samadi & C. Jutten
    Blind source separation of discrete finite alphabet sources using a single mixture
    Proc. IEEE Statistical Signal Processing Workshop (SSP)
    2011, pp. 709-712
    BibTeX
    @inproceedings{Rostami2011,
     author = {Rostami, M. and Babaie-Zadeh, M. and Samadi, S. and Jutten, C. },
     title = {Blind source separation of discrete finite alphabet sources using a single mixture},
     booktitle = {Proc. IEEE Statistical Signal Processing Workshop (SSP)},
     year = {2011},
     pages = {709--712}}
    
  130. A. Roy, S. Mitra & R. Agrawal
    A novel method for detecting light source for digital images forensic
    Opto-Electronics Review, Versita, co-published with Springer-Verlag GmbH, 2011, Vol. 19, pp. 211-218
    BibTeX
    @article{Roy2011,
     author = {Roy, A. and Mitra, S. and Agrawal, R.},
     title = {A novel method for detecting light source for digital images forensic},
     journal = {Opto-Electronics Review},
     publisher = {Versita, co-published with Springer-Verlag GmbH},
     year = {2011},
     volume = {19},
     pages = {211-218}}
    
  131. P. Saboia, T. Carvalho & A. Rocha
    Eye specular highlights telltales for digital forensics: A machine learning approach
    Proc. 18th IEEE Int Image Processing (ICIP) Conf
    2011, pp. 1937-1940
    BibTeX
    @inproceedings{Saboia2011,
     author = {Saboia, P. and Carvalho, T. and Rocha, A. },
     title = {Eye specular highlights telltales for digital forensics: A machine learning approach},
     booktitle = {Proc. 18th IEEE Int Image Processing (ICIP) Conf},
     year = {2011},
     pages = {1937--1940}}
    
  132. J.-J. Shen & W.-C. Huang
    The First Robust Image Tamper Detection Scheme under Brightness
    Proc. Fifth Int Genetic and Evolutionary Computing (ICGEC) Conf
    2011, pp. 200-203
    BibTeX
    @inproceedings{Shen2011,
     author = {Jau-Ji Shen and Wei-Cheng Huang},
     title = {The First Robust Image Tamper Detection Scheme under Brightness},
     booktitle = {Proc. Fifth Int Genetic and Evolutionary Computing (ICGEC) Conf},
     year = {2011},
     pages = {200--203}}
    
  133. X.-j. Shen, B.-h. Tang, i.X.-f. L & H.-p. Chen
    A Blur Image Blind Identify Algorithm Based on the Edge Feature
    Proc. Third Int Multimedia Information Networking and Security (MINES) Conf
    2011, pp. 309-313
    BibTeX
    @inproceedings{Shen2011a,
     author = {Shen, Xuan-jing and Tang, Bo-hao and L,i Xiao-fei and Chen, Hai-peng},
     title = {A Blur Image Blind Identify Algorithm Based on the Edge Feature},
     booktitle = {Proc. Third Int Multimedia Information Networking and Security (MINES) Conf},
     year = {2011},
     pages = {309--313}}
    
  134. B. Shivakumar & S. Baboo
    Automated Forensic Method for Copy-Move Forgery Detection based on Harris Interest Points and SIFT Descriptors
    International Journal of Computer Applications, 2011, Vol. 27(3), pp. 9-17
    BibTeX
    @article{Shivakumar2011,
     author = {B.L. Shivakumar and S.Santhosh Baboo},
     title = {Automated Forensic Method for Copy-Move Forgery Detection based on Harris Interest Points and SIFT Descriptors},
     journal = {International Journal of Computer Applications},
     year = {2011},
     volume = {27},
     number = {3},
     pages = {9-17}}
    
  135. V.K. Singh & R. Tripathi
    Fast and Efficient Region Duplication Detection in Digital Images Using Sub-Blocking Method
    International Journal of Advanced Science and Technology, 2011, Vol. 35, pp. 93-102
    BibTeX
    @article{Singh2011,
     author = {Vivek Kumar Singh and R.C. Tripathi},
     title = {Fast and Efficient Region Duplication Detection in Digital Images Using Sub-Blocking Method},
     journal = {International Journal of Advanced Science and Technology},
     year = {2011},
     volume = {35},
     pages = {93--102}}
    
  136. G.-S. Song, Y.-I. Yun & W.-H. Lee
    A new estimation approach of resampling factors using threshold-based peak detection
    Proc. IEEE Int Consumer Electronics (ICCE) Conf
    2011, pp. 731-732
    BibTeX
    @inproceedings{Song2011,
     author = {Geun-Sil Song and Yong-In Yun and Won-Hyung Lee},
     title = {A new estimation approach of resampling factors using threshold-based peak detection},
     booktitle = {Proc. IEEE Int Consumer Electronics (ICCE) Conf},
     year = {2011},
     pages = {731--732}}
    
  137. M.C. Stamm & K.J.R. Liu
    Anti-forensics for frame deletion/addition in MPEG video
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2011
    2011, pp. 1876-1879
    BibTeX
    @inproceedings{Stamm2011,
     author = {Stamm, Matthew C. and Liu, K. J. Ray},
     title = {Anti-forensics for frame deletion/addition in MPEG video},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2011},
     year = {2011},
     pages = {1876--1879}}
    
  138. M.C. Stamm & K.J.R. Liu
    Anti-forensics of digital image compression
    IEEE Transactions on Information Forensics and Security, 2011, Vol. 6(3), pp. 1050-1065
    BibTeX
    @article{Stamm2011a,
     author = {Stamm, M. C. and Liu, K. J. R. },
     title = {Anti-forensics of digital image compression},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2011},
     volume = {6},
     number = {3},
     pages = {1050--1065}}
    
  139. Y. Su, Y. Han & C. Zhang
    Detection of blue screen based on edge features
    Information Technology and Artificial Intelligence Conference (ITAIC), 2011 6th IEEE Joint International
    2011, Vol. 2, pp. 469-472
    BibTeX
    @inproceedings{Su2011,
     author = {Y. Su and Y. Han and C. Zhang},
     title = {Detection of blue screen based on edge features},
     booktitle = {Information Technology and Artificial Intelligence Conference (ITAIC), 2011 6th IEEE Joint International},
     year = {2011},
     volume = {2},
     pages = {469--472}}
    
  140. P.K. Sunil Kumar, S. Das & S. Mukherjee
    Copy-Move Forgery Detection in Digital Images: Progress and Challenges
    International Journal on Computer Science and Engineering, 2011, Vol. 3, pp. 652-663
    BibTeX
    @article{SunilKumar2011,
     author = {Sunil Kumar, P. K. and Das, Shally and Mukherjee, S.},
     title = {Copy-Move Forgery Detection in Digital Images: Progress and Challenges},
     journal = {International Journal on Computer Science and Engineering},
     year = {2011},
     volume = {3},
     pages = {652-663}}
    
  141. P. Sutthiwan, Y. Shi, H. Zhao, T.-T. Ng & W. Su
    Markovian Rake Transform for Digital Image Tampering Detection
    Shi, Y., Emmanuel, S., Kankanhalli, M., Chang, S.-F., Radhakrishnan, R., Ma, F. & Zhao, L. (ed.)
    Transactions on Data Hiding and Multimedia Security VI
    Springer Berlin / Heidelberg, 2011, Vol. 6730, pp. 1-17
    BibTeX
    @incollection{Sutthiwan2011,
     author = {Sutthiwan, Patchara and Shi, Yun and Zhao, Hong and Ng, Tian-Tsong and Su, Wei},
     title = {Markovian Rake Transform for Digital Image Tampering Detection},
     booktitle = {Transactions on Data Hiding and Multimedia Security VI},
     publisher = {Springer Berlin / Heidelberg},
     year = {2011},
     volume = {6730},
     pages = {1-17}}
    
  142. G.R. Talmale, A.V. Talhan & R.V. Dharaskar
    Analysis of multimedia forensic technique
    Proceedings of the 2011 International Conference on Communication, Computing & Security (ICCCS 2011)
    Proceedings of the 2011 International Conference on Communication, Computing & Security, ACM, 2011, pp. 289-294
    BibTeX
    @inproceedings{Talmale2011,
     author = {Talmale, G. R. and Talhan, A. V. and Dharaskar, R. V.},
     title = {Analysis of multimedia forensic technique},
     booktitle = {Proceedings of the 2011 International Conference on Communication, Computing & Security (ICCCS 2011)},
     journal = {Proceedings of the 2011 International Conference on Communication, Computing & Security},
     publisher = {ACM},
     year = {2011},
     pages = {289--294}}
    
  143. Y. Tomioka & H. Kitazawa
    Digital camera identification based on the clustered pattern noise of image sensors
    Proc. IEEE Int Multimedia and Expo (ICME) Conf
    2011, pp. 1-4
    BibTeX
    @inproceedings{Tomioka2011,
     author = {Tomioka, Y. and Kitazawa, H. },
     title = {Digital camera identification based on the clustered pattern noise of image sensors},
     booktitle = {Proc. IEEE Int Multimedia and Expo (ICME) Conf},
     year = {2011},
     pages = {1--4}}
    
  144. G. Valenzise, V. Nobile, M. Tagliasacchi & S. Tubaro
    Countering JPEG anti-forensics
    Proc. 18th IEEE Int Image Processing (ICIP) Conf
    2011, pp. 1949-1952
    BibTeX
    @inproceedings{Valenzise2011a,
     author = {Valenzise, Giuseppe and Nobile, V. and Tagliasacchi, Marco and Tubaro, Stefano},
     title = {Countering JPEG anti-forensics},
     booktitle = {Proc. 18th IEEE Int Image Processing (ICIP) Conf},
     year = {2011},
     pages = {1949--1952}}
    
  145. G. Valenzise, M. Tagliasacchi & S. Tubaro
    The Cost of JPEG Compression Anti-forensics
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2011
    2011
    BibTeX
    @inproceedings{Valenzise2011,
     author = {Valenzise, Giuseppe and Tagliasacchi, Marco and Tubaro, Stefano},
     title = {The Cost of JPEG Compression Anti-forensics},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2011},
     year = {2011}}
    
  146. D. Vazquez-Padin & F. Perez-Gonzalez
    Prefilter design for forensic resampling estimation
    Proc. IEEE Int Information Forensics and Security (WIFS) Workshop
    2011
    BibTeX
    @inproceedings{Vazquez-Padin2011,
     author = {Vazquez-Padin, David and Perez-Gonzalez, Fernando},
     title = {Prefilter design for forensic resampling estimation},
     booktitle = {Proc. IEEE Int Information Forensics and Security (WIFS) Workshop},
     year = {2011}}
    
  147. S.V. Viraktamath & G.V. Attimarad
    Impact of Quantization Matrix on the Performance of JPEG
    International Journal of Future Generation Communication and Networking, 2011, Vol. 4(3), pp. 107-118
    BibTeX
    @article{Viraktamath2011,
     author = {S. V. Viraktamath and Girish V. Attimarad},
     title = {Impact of Quantization Matrix on the Performance of JPEG},
     journal = {International Journal of Future Generation Communication and Networking},
     year = {2011},
     volume = {4},
     number = {3},
     pages = {107--118}}
    
  148. C.-T. Wang, C.-L. Wang, L.-C. Li & M.-Y. Hsieh
    The image tampered detection and restoration using the characteristic values
    Proc. Int Machine Learning and Cybernetics (ICMLC) Conf
    2011, Vol. 4, pp. 1845-1850
    BibTeX
    @inproceedings{Wang2011f,
     author = {Ching-Te Wang and Ching-Lin Wang and Lin-Chun Li and Ming-Yuan Hsieh},
     title = {The image tampered detection and restoration using the characteristic values},
     booktitle = {Proc. Int Machine Learning and Cybernetics (ICMLC) Conf},
     year = {2011},
     volume = {4},
     pages = {1845--1850}}
    
  149. W. Wang, J. Dong & T. Tan
    Tampered Region Localization of Digital Color Images Based on JPEG Compression Noise
    Kim, H.-J., Shi, Y. & Barni, M. (ed.)
    Digital Watermarking
    Springer Berlin / Heidelberg, 2011, Vol. 6526, pp. 120-133
    BibTeX
    @incollection{Wang2011,
     author = {Wang, Wei and Dong, Jing and Tan, Tieniu},
     title = {Tampered Region Localization of Digital Color Images Based on JPEG Compression Noise},
     booktitle = {Digital Watermarking},
     publisher = {Springer Berlin / Heidelberg},
     year = {2011},
     volume = {6526},
     pages = {120-133}}
    
  150. W. Wang, J. Dong & T. Tan
    Exploring DCT coefficient quantization effect for image tampering localization
    Proc. IEEE Int Information Forensics and Security (WIFS) Workshop
    2011, pp. 1-6
    BibTeX
    @inproceedings{Wang2011b,
     author = {Wei Wang and Jing Dong and Tieniu Tan},
     title = {Exploring DCT coefficient quantization effect for image tampering localization},
     booktitle = {Proc. IEEE Int Information Forensics and Security (WIFS) Workshop},
     year = {2011},
     pages = {1--6}}
    
  151. W. Wang & R.D. Wang
    The Analysis and Detection of Double JPEG2000 Compression
    Key Engineering Materials, 2011, Vol. (Volumes 474 - 476) Advanced Materials and Computer Science, pp. 2043-2048
    BibTeX
    @article{Wang2011a,
     author = {Wei Wang and Rang Ding Wang},
     title = {The Analysis and Detection of Double JPEG2000 Compression},
     journal = {Key Engineering Materials},
     year = {2011},
     volume = {(Volumes 474 - 476) Advanced Materials and Computer Science},
     pages = {2043-2048}}
    
  152. X. Wang, X. Zhang, Z. Li & S. Wang
    A DWT-DCT Based Passive Forensics Method for Copy-Move Attacks
    Multimedia Information Networking and Security (MINES), 2011 Third International Conference on
    2011, pp. 304-308
    BibTeX
    @inproceedings{Wang2011c,
     author = {Xiaofeng Wang and Xiaoni Zhang and Zhen Li and Shangping Wang},
     title = {A DWT-DCT Based Passive Forensics Method for Copy-Move Attacks},
     booktitle = {Multimedia Information Networking and Security (MINES), 2011 Third International Conference on},
     year = {2011},
     pages = {304--308}}
    
  153. Q. Wu, S. Wang & X. Zhang
    Log-Polar Based Scheme for Revealing Duplicated Regions in Digital Images
    IEEE Signal Processing Letters, 2011, Vol. 18(10), pp. 559-562
    BibTeX
    @article{Wu2011,
     author = {Qiumin Wu and Shuozhong Wang and Xinpeng Zhang},
     title = {Log-Polar Based Scheme for Revealing Duplicated Regions in Digital Images},
     journal = {IEEE Signal Processing Letters},
     year = {2011},
     volume = {18},
     number = {10},
     pages = {559--562}}
    
  154. R. Wu, X. Li & B. Yang
    Identifying computer generated graphics via histogram features
    Image Processing (ICIP), 2011 18th IEEE International Conference on
    2011, pp. 1933-1936
    BibTeX
    @inproceedings{Wu2011b,
     author = {Ruoyu Wu and Xiaolong Li and Bin Yang},
     title = {Identifying computer generated graphics via histogram features},
     booktitle = {Image Processing (ICIP), 2011 18th IEEE International Conference on},
     year = {2011},
     pages = {1933--1936}}
    
  155. X. Wu & Z. Fang
    Image Splicing Detection Using Illuminant Color Inconsistency
    Proc. Third Int Multimedia Information Networking and Security (MINES) Conf
    2011, pp. 600-603
    BibTeX
    @inproceedings{Wu2011a,
     author = {Xuemin Wu and Zhen Fang},
     title = {Image Splicing Detection Using Illuminant Color Inconsistency},
     booktitle = {Proc. Third Int Multimedia Information Networking and Security (MINES) Conf},
     year = {2011},
     pages = {600--603}}
    
  156. B. Xu, J. Wang, G. Liu & Y. Dai
    Photorealistic computer graphics forensics based on leading digit law
    Journal of Electronics (China), Science Press, co-published with Springer-Verlag GmbH, 2011, Vol. 28, pp. 95-100
    BibTeX
    @article{Xu2011,
     author = {Xu, Bo and Wang, Junwen and Liu, Guangjie and Dai, Yuewei},
     title = {Photorealistic computer graphics forensics based on leading digit law},
     journal = {Journal of Electronics (China)},
     publisher = {Science Press, co-published with Springer-Verlag GmbH},
     year = {2011},
     volume = {28},
     pages = {95-100}}
    
  157. H. Yao, T. Qiao, Z. Tang, Y. Zhao & H. Mao
    Detecting Copy-Move Forgery Using Non-negative Matrix Factorization
    Proc. Third Int Multimedia Information Networking and Security (MINES) Conf
    2011, pp. 591-594
    BibTeX
    @inproceedings{Yao2011,
     author = {Heng Yao and Tong Qiao and Zhenjun Tang and Yan Zhao and Hualing Mao},
     title = {Detecting Copy-Move Forgery Using Non-negative Matrix Factorization},
     booktitle = {Proc. Third Int Multimedia Information Networking and Security (MINES) Conf},
     year = {2011},
     pages = {591--594}}
    
  158. I. Yerushalmy & H. Hel-Or
    Digital Image Forgery Detection Based on Lens and Sensor Aberration
    International Journal of Computer Vision, Springer Netherlands, 2011, Vol. 92, pp. 71-91
    BibTeX
    @article{Yerushalmy2011,
     author = {Yerushalmy, Ido and Hel-Or, Hagit},
     title = {Digital Image Forgery Detection Based on Lens and Sensor Aberration},
     journal = {International Journal of Computer Vision},
     publisher = {Springer Netherlands},
     year = {2011},
     volume = {92},
     pages = {71-91}}
    
  159. J. Yu, S. Craver & E. Li
    Toward the identification of DSLR lenses by chromatic aberration
    Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
    Proceedings of SPIE
    Media Watermarking, Security, and Forensics III, SPIE, 2011, Vol. 7880(1), pp. 788010
    BibTeX
    @conference{Yu2011,
     author = {Jun Yu and Scott Craver and Enping Li},
     title = {Toward the identification of DSLR lenses by chromatic aberration},
     booktitle = {Proceedings of SPIE},
     journal = {Media Watermarking, Security, and Forensics III},
     publisher = {SPIE},
     year = {2011},
     volume = {7880},
     number = {1},
     pages = {788010}}
    
  160. H. Yuan
    Blind Forensics of Median Filtering in Digital Images
    Proc. Fourth Int Computational Sciences and Optimization (CSO) Joint ConfMedian
    IEEE Transactions on Information Forensics and Security, 2011(99), pp. 332 - 335
    BibTeX
    @inproceedings{Yuan,
     author = {Yuan, H.},
     title = {Blind Forensics of Median Filtering in Digital Images},
     booktitle = {Proc. Fourth Int Computational Sciences and Optimization (CSO) Joint ConfMedian},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2011},
     number = {99},
     pages = {332 - 335}}
    
  161. X. Zhao, P. Bateman & A. Ho
    Image Authentication Using Active Watermarking and Passive Forensics Techniques
    Lin, W., Tao, D., Kacprzyk, J., Li, Z., Izquierdo, E. & Wang, H. (ed.)
    Multimedia Analysis, Processing and Communications
    Springer Berlin / Heidelberg, 2011, Vol. 346, pp. 139-183
    BibTeX
    @incollection{Zhao2011,
     author = {Zhao, Xi and Bateman, Philip and Ho, Anthony},
     title = {Image Authentication Using Active Watermarking and Passive Forensics Techniques},
     booktitle = {Multimedia Analysis, Processing and Communications},
     publisher = {Springer Berlin / Heidelberg},
     year = {2011},
     volume = {346},
     pages = {139-183}}
    
  162. X. Zhao, J. Li, S. Li & S. Wang
    Detecting Digital Image Splicing in Chroma Spaces
    Kim, H.-J., Shi, Y. & Barni, M. (ed.)
    Digital Watermarking
    Springer Berlin / Heidelberg, 2011, Vol. 6526, pp. 12-22
    BibTeX
    @incollection{Zhao2011a,
     author = {Zhao, Xudong and Li, Jianhua and Li, Shenghong and Wang, Shilin},
     title = {Detecting Digital Image Splicing in Chroma Spaces},
     booktitle = {Digital Watermarking},
     publisher = {Springer Berlin / Heidelberg},
     year = {2011},
     volume = {6526},
     pages = {12--22}}
    
  163. Y. Zhao, F. Shih & Y. Shi
    Passive Detection of Paint-Doctored JPEG Images
    Kim, H.-J., Shi, Y. & Barni, M. (ed.)
    Digital Watermarking
    Springer Berlin / Heidelberg, 2011, Vol. 6526, pp. 1-11
    BibTeX
    @incollection{Zhao2011b,
     author = {Zhao, Yu and Shih, Frank and Shi, Yun},
     title = {Passive Detection of Paint-Doctored JPEG Images},
     booktitle = {Digital Watermarking},
     publisher = {Springer Berlin / Heidelberg},
     year = {2011},
     volume = {6526},
     pages = {1-11}}
    
  164. G. Zhou & D. Lv
    An Overview of Digital Watermarking in Image Forensics
    Proc. Fourth Int Computational Sciences and Optimization (CSO) Joint Conf
    2011, pp. 332-335
    BibTeX
    @inproceedings{Zhou,
     author = {Zhou, Guojuan and Lv, Dianji},
     title = {An Overview of Digital Watermarking in Image Forensics},
     booktitle = {Proc. Fourth Int Computational Sciences and Optimization (CSO) Joint Conf},
     year = {2011},
     pages = {332--335}}
    
  165. S. Zhu, X. Cao & H. Zhao
    Photographic Composite Detection Using Two Circles
    Proc. Sixth Int Image and Graphics (ICIG) Conf
    2011, pp. 858-863
    BibTeX
    @inproceedings{Zhu2011,
     author = {Shuyi Zhu and Xiaochun Cao and Handong Zhao},
     title = {Photographic Composite Detection Using Two Circles},
     booktitle = {Proc. Sixth Int Image and Graphics (ICIG) Conf},
     year = {2011},
     pages = {858--863}}
    
  166. L. Zhulong, L. Xianghua & Z. Yuqian
    Passive Detection of Copy-paste Tampering for Digital Image Forensics
    Proc. Int Intelligent Computation Technology and Automation (ICICTA) Conf
    2011, Vol. 2, pp. 649-652
    BibTeX
    @inproceedings{Zhulong2011,
     author = {Liu Zhulong and Li Xianghua and Zhao Yuqian},
     title = {Passive Detection of Copy-paste Tampering for Digital Image Forensics},
     booktitle = {Proc. Int Intelligent Computation Technology and Automation (ICICTA) Conf},
     year = {2011},
     volume = {2},
     pages = {649--652}}
    
  167. M. Zimba & S. Xingming
    DWT-PCA (EVD) Based Copy-move Image Forgery Detection
    International Journal of Digital Content Technology and its Applications., 2011, Vol. 5, pp. 251-258
    BibTeX
    @article{Zimba2011,
     author = {Michael Zimba and Sun Xingming},
     title = {DWT-PCA (EVD) Based Copy-move Image Forgery Detection},
     journal = {International Journal of Digital Content Technology and its Applications.},
     year = {2011},
     volume = {5},
     pages = {251--258}}
    
  168. J. Zuo, S. Pan, B. Liu & X. Liao
    Tampering detection for composite images based on re-sampling and JPEG compression
    Proc. First Asian Conf. Pattern Recognition (ACPR)
    2011, pp. 169-173
    BibTeX
    @inproceedings{Zuo2011,
     author = {Juxian Zuo and Shengjun Pan and Benyong Liu and Xiang Liao},
     title = {Tampering detection for composite images based on re-sampling and JPEG compression},
     booktitle = {Proc. First Asian Conf. Pattern Recognition (ACPR)},
     year = {2011},
     pages = {169--173}}
    


2010

  1. Adobe
    XMP Specification Part 1 Data Model, Serialization, and Core Properties
    Adobe, 2010
    BibTeX
    @standard{Adobe2010,
     author = {Adobe},
     title = {XMP Specification Part 1 Data Model, Serialization, and Core Properties},
     year = {2010}}
    
  2. Adobe
    XMP Specification Part 2 Additional Properties
    Adobe, 2010
    BibTeX
    @standard{Adobe2010a,
     author = {Adobe},
     title = {XMP Specification Part 2 Additional Properties},
     year = {2010}}
    
  3. Adobe
    XMP Specification Part 3 Storage in Files
    Adobe, 2010
    BibTeX
    @standard{Adobe2010b,
     author = {Adobe},
     title = {XMP Specification Part 3 Storage in Files},
     year = {2010}}
    
  4. I. Amerini, L. Ballan, R. Caldelli, A.D. Bimbo & G. Serra
    Geometric tampering estimation by means of a sift-based forensic analysis
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2010
    International Conference on Acoustics, Speech, and Signal Processing, 2010
    BibTeX
    @inproceedings{Amerini2010,
     author = {Amerini, Irene and Ballan, Lamberto and Caldelli, Roberto and Bimbo, Alberto Del and Serra, Giuseppe},
     title = {Geometric tampering estimation by means of a sift-based forensic analysis},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2010},
     journal = {International Conference on Acoustics, Speech, and Signal Processing},
     year = {2010}}
    
  5. I. Amerini, L. Ballan, R. Caldelli, A. Del Bimbo & G. Serra
    Geometric tampering estimation by means of a SIFT-based forensic analysis
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2010
    2010, pp. 1702-1705
    BibTeX
    @inproceedings{Amerini2010b,
     author = {Amerini, I. and Ballan, L. and Caldelli, R. and Del Bimbo, A. and Serra, G. },
     title = {Geometric tampering estimation by means of a SIFT-based forensic analysis},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2010},
     year = {2010},
     pages = {1702--1705}}
    
  6. E. Ardizzone, A. Bruno & G. Mazzola
    Detecting multiple copies in tampered images
    Proc. 17th IEEE Int Image Processing (ICIP) Conf
    2010, pp. 2117-2120
    BibTeX
    @inproceedings{Ardizzone2010,
     author = {Ardizzone, E. and Bruno, A. and Mazzola, G.},
     title = {Detecting multiple copies in tampered images},
     booktitle = {Proc. 17th IEEE Int Image Processing (ICIP) Conf},
     year = {2010},
     pages = {2117--2120}}
    
  7. M. Barni, A. Costanzo & L. Sabatini
    Identification of Cut & Paste Tampering by Means of Double-JPEG Detection and Image Segmentation
    International Symposium on Circuits and Systems
    2010
    BibTeX
    @inproceedings{Barni2010,
     author = {Barni, Mauro and Costanzo, Andrea and Sabatini, Lara},
     title = {Identification of Cut & Paste Tampering by Means of Double-JPEG Detection and Image Segmentation},
     booktitle = {International Symposium on Circuits and Systems},
     year = {2010}}
    
  8. M. Bashar, K. Noda, N. Ohnishi & K. Mori
    Exploring Duplicated Regions in Natural Images
    IEEE Transactions on Image Processing, 2010, Vol. PP Issue:99(99), pp. 1
    BibTeX
    @article{Bashar2010,
     author = {Bashar, M. and Noda, K. and Ohnishi, N. and Mori, K.},
     title = {Exploring Duplicated Regions in Natural Images},
     journal = {IEEE Transactions on Image Processing},
     year = {2010},
     volume = {PP Issue:99},
     number = {99},
     pages = {1}}
    
  9. S. Battiato, G. Messina & D. Strano
    Chain of evidence generation for contrast enhancement in digital image forensics
    Creutzburg, R. & Akopian, D. (ed.)
    Proc. SPIE 7542
    Multimedia on Mobile Devices 2010, SPIE, 2010, Vol. 7542(1), pp. 75420E
    BibTeX
    @conference{Battiato2010,
     author = {Sebastiano Battiato and Giuseppe Messina and Daniela Strano},
     title = {Chain of evidence generation for contrast enhancement in digital image forensics},
     booktitle = {Proc. SPIE 7542},
     journal = {Multimedia on Mobile Devices 2010},
     publisher = {SPIE},
     year = {2010},
     volume = {7542},
     number = {1},
     pages = {75420E}}
    
  10. S. Bayram, H.T. Sencar & N. Memon
    Efficient techniques for sensor fingerprint matching in large image and video databases
    Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
    Media Forensics and Security II
    Media Forensics and Security II, SPIE, 2010, Vol. 7541(1), pp. 754109
    BibTeX
    @inproceedings{Bayram2010,
     author = {Sevinc Bayram and H. Taha Sencar and Nasir Memon},
     title = {Efficient techniques for sensor fingerprint matching in large image and video databases},
     booktitle = {Media Forensics and Security II},
     journal = {Media Forensics and Security II},
     publisher = {SPIE},
     year = {2010},
     volume = {7541},
     number = {1},
     pages = {754109}}
    
  11. J. Bijhold, A. Ruifrok & Z.J. Geradts
    Forensic visual evidence 2007-2010: A Review
    Proceeding of the 16th INTERPOL Forensic Science Symposium, Lyon, France, October 2010
    2010
    BibTeX
    @conference{Bijhold2010,
     author = {Bijhold, J. and Ruifrok, A. and Geradts, Z. J.},
     title = {Forensic visual evidence 2007-2010: A Review},
     booktitle = {Proceeding of the 16th INTERPOL Forensic Science Symposium, Lyon, France, October 2010},
     year = {2010}}
    
  12. X. Bo, W. Junwen, L. Guangjie & D. Yuewei
    Image Copy-Move Forgery Detection Based on SURF
    Proc. Int Multimedia Information Networking and Security (MINES) Conf
    2010, pp. 889-892
    BibTeX
    @inproceedings{Bo2010,
     author = {Xu Bo and Wang Junwen and Liu Guangjie and Dai Yuewei},
     title = {Image Copy-Move Forgery Detection Based on SURF},
     booktitle = {Proc. Int Multimedia Information Networking and Security (MINES) Conf},
     year = {2010},
     pages = {889--892}}
    
  13. R.A.G.D.B.S.R.R. Bosco, A.; Bruna
    Signal-dependent raw image denoising using sensor noise characterization via multiple acquisitions
    Imai, Francisco; Sampat, N. X. F. (ed.)
    Digital Photography VI
    2010, Vol. Proceedings of the SPIE, Volume 7537
    BibTeX
    @inproceedings{Bosco2010,
     author = {Bosco, A.; Bruna, R. A.; Giacalone, D.; Battiato, S.; Rizzo, R.},
     title = {Signal-dependent raw image denoising using sensor noise characterization via multiple acquisitions},
     booktitle = {Digital Photography VI},
     year = {2010},
     volume = {Proceedings of the SPIE, Volume 7537}}
    
  14. K. Cai, X. Li, B. Yang & X. Lu
    Blind Tampering Identification by Incorporating EFR and Calibration
    Proc. Int Multimedia Information Networking and Security (MINES) Conf
    2010, pp. 379-383
    BibTeX
    @inproceedings{Cai2010,
     author = {Kaiwei Cai and Xiaolong Li and Bin Yang and Xiaoqing Lu},
     title = {Blind Tampering Identification by Incorporating EFR and Calibration},
     booktitle = {Proc. Int Multimedia Information Networking and Security (MINES) Conf},
     year = {2010},
     pages = {379--383}}
    
  15. R. Caldelli, I. Amerini & F. Picchioni
    A DFT-Based Analysis to Discern Between Camera and Scanned Images
    International Journal of Digital Crime and Forensics (IJDCF), 2010, Vol. 2(1), pp. 21-29
    BibTeX
    @article{Caldelli2010,
     author = {Caldelli, Roberto and Amerini, Irene and Picchioni, Francesco},
     title = {A DFT-Based Analysis to Discern Between Camera and Scanned Images},
     journal = {International Journal of Digital Crime and Forensics (IJDCF)},
     year = {2010},
     volume = {2},
     number = {1},
     pages = {21-29}}
    
  16. R. Caldelli, I. Amerini, F. Picchioni, A.D. Rosa & F. Uccheddu
    Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions
    Klinger, K. (ed.)
    Chapter Multimedia Forensic Techniques for Acquisition Device Identification and Digital Image Authentication (Chapter 6)
    Information Science Reference, 2010, pp. 130-154
    BibTeX
    @inbook{Caldelli2010a,
     author = {Caldelli, Roberto and Amerini, Irene and Picchioni, Francesco and Rosa, Alessia De and Uccheddu, Francesca},
     title = {Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions},
     publisher = {Information Science Reference},
     year = {2010},
     pages = {130-154}}
    
  17. G. Cao, Y. Zhao & R. Ni
    Edge-based Blur Metric for Tamper Detection
    Journal of Information Hiding and Multimedia Signal Processing, 2010, Vol. 1(1), pp. 20-27
    BibTeX
    @article{Cao2010,
     author = {Cao, Gang and Zhao, Yao and Ni, Rongrong},
     title = {Edge-based Blur Metric for Tamper Detection},
     journal = {Journal of Information Hiding and Multimedia Signal Processing},
     year = {2010},
     volume = {1},
     number = {1},
     pages = {20-27}}
    
  18. G. Cao, Y. Zhao & R. Ni
    Forensic Estimation of Gamma Correction in Digital Images
    International Conference on Image Processing
    2010
    BibTeX
    @inproceedings{Cao2010d,
     author = {Cao, Gang and Zhao, Yao and Ni, Rongrong},
     title = {Forensic Estimation of Gamma Correction in Digital Images},
     booktitle = {International Conference on Image Processing},
     year = {2010}}
    
  19. G. Cao, Y. Zhao, R. Ni & H. Tian
    Anti-forensics of contrast enhancement in digital images
    Proceedings of the 12th ACM workshop on Multimedia and security
    ACM, 2010, pp. 25-34
    BibTeX
    @inproceedings{Cao2010b,
     author = {Cao, Gang and Zhao, Yao and Ni, Rongrong and Tian, Huawei},
     title = {Anti-forensics of contrast enhancement in digital images},
     booktitle = {Proceedings of the 12th ACM workshop on Multimedia and security},
     publisher = {ACM},
     year = {2010},
     pages = {25--34}}
    
  20. G. Cao, Y. Zhao, R. Ni, L. Yu & H. Tian
    Forensic Detection of Median Filtering in Digital Images
    IEEE International Conference on Multimedia and EXPO
    2010
    BibTeX
    @inproceedings{Cao2010e,
     author = {Cao, Gang and Zhao, Yao and Ni, Rongrong and Yu, Lifang and Tian, Huawei},
     title = {Forensic Detection of Median Filtering in Digital Images},
     booktitle = {IEEE International Conference on Multimedia and EXPO},
     year = {2010}}
    
  21. H. Cao & A.C. Kot
    Identification of recaptured photographs on LCD screens
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2010
    2010, pp. 1790-1793
    BibTeX
    @inproceedings{Cao2010a,
     author = {Cao, Hong and Kot, Alex C.},
     title = {Identification of recaptured photographs on LCD screens},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2010},
     year = {2010},
     pages = {1790--1793}}
    
  22. H. Cao & A.C. Kot
    Mobile Camera Identification Using Demosaicing Features
    International Symposium on Circuits and Systems
    2010
    BibTeX
    @inproceedings{Cao2010c,
     author = {Cao, Hong and Kot, Alex C.},
     title = {Mobile Camera Identification Using Demosaicing Features},
     booktitle = {International Symposium on Circuits and Systems},
     year = {2010}}
    
  23. H. Cao & A.C. Kot
    Identification of recaptured photographs on LCD screens
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2010
    2010, pp. 1790-1793
    BibTeX
    @inproceedings{Cao2010f,
     author = {Hong Cao and Alex C. Kot},
     title = {Identification of recaptured photographs on LCD screens},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2010},
     year = {2010},
     pages = {1790--1793}}
    
  24. A. Caron, P. Jodoin & C. Charrier
    Search Strategies for Image Multi-distortion Estimation
    Proc. 20th Int Pattern Recognition (ICPR) Conf
    2010, pp. 2824-2827
    BibTeX
    @inproceedings{Caron2010,
     author = {Caron, A. and Jodoin, P. and Charrier, C. },
     title = {Search Strategies for Image Multi-distortion Estimation},
     booktitle = {Proc. 20th Int Pattern Recognition (ICPR) Conf},
     year = {2010},
     pages = {2824--2827}}
    
  25. A. Castiglione, G. Cattaneo, M. Cembalo & U.F. Petrillo
    Source Camera Identification in Real Practice: A Preliminary Experimentation
    Proceedings of the Fifth International Conference on Broadband and Wireless Computing, Communication and Applications, BWCCA 2010, November 4-6, 2010, Fukuoka Institute of Technology, Fukuoka, Japan (In conjunction with the 3PGCIC-2010 International Conference)
    2010, pp. 417-422
    BibTeX
    @inproceedings{Castiglione2010,
     author = {Castiglione, A. and Cattaneo, G. and Cembalo, M. and Petrillo, U. F.},
     title = {Source Camera Identification in Real Practice: A Preliminary Experimentation},
     booktitle = {Proceedings of the Fifth International Conference on Broadband and Wireless Computing, Communication and Applications, BWCCA 2010, November 4-6, 2010, Fukuoka Institute of Technology, Fukuoka, Japan (In conjunction with the 3PGCIC-2010 International Conference)},
     year = {2010},
     pages = {417--422}}
    
  26. H. Chen, G. Grider, C. Scott, M. Turley, A. Torres, K. Sanchez & J. Bremer
    Integration Experiences and Performance Studies of A COTS Parallel Archive System
    Cluster Computing (CLUSTER), 2010 IEEE International Conference on
    2010, pp. 166-177
    BibTeX
    @inproceedings{Chen2010a,
     author = {Chen, H. and Grider, G. and Scott, C. and Turley, M. and Torres, A. and Sanchez, K. and Bremer, J.},
     title = {Integration Experiences and Performance Studies of A COTS Parallel Archive System},
     booktitle = {Cluster Computing (CLUSTER), 2010 IEEE International Conference on},
     year = {2010},
     pages = {166--177}}
    
  27. H. Chen, X. Shen & Y. Lv
    Blind Identification Method for Authenticity of Infinite Light Source Images
    Proc. Fifth Int Frontier of Computer Science and Technology (FCST) Conf
    2010, pp. 131-135
    BibTeX
    @inproceedings{Chen2010,
     author = {Haipeng Chen and Xuanjing Shen and Yingda Lv},
     title = {Blind Identification Method for Authenticity of Infinite Light Source Images},
     booktitle = {Proc. Fifth Int Frontier of Computer Science and Technology (FCST) Conf},
     year = {2010},
     pages = {131--135}}
    
  28. H.R. Chennamma & L. Rangarajan
    Source Camera Identification Based on Sensor Readout Noise
    International Journal of Digital Crime and Forensics (IJDCF), 2010, Vol. 2(3), pp. 28-43
    BibTeX
    @article{Chennamma2010,
     author = {H. R. Chennamma and Lalitha Rangarajan},
     title = {Source Camera Identification Based on Sensor Readout Noise},
     journal = {International Journal of Digital Crime and Forensics (IJDCF)},
     year = {2010},
     volume = {2},
     number = {3},
     pages = {28-43}}
    
  29. G. Chetty
    Blind and passive digital video tamper detection based on multimodal fusion
    Proceedings of the 14th WSEAS international conference on Communications
    World Scientific and Engineering Academy and Society (WSEAS), 2010, pp. 109-117
    BibTeX
    @inproceedings{Chetty2010a,
     author = {Chetty, Girija},
     title = {Blind and passive digital video tamper detection based on multimodal fusion},
     booktitle = {Proceedings of the 14th WSEAS international conference on Communications},
     publisher = {World Scientific and Engineering Academy and Society (WSEAS)},
     year = {2010},
     pages = {109--117}}
    
  30. G. Chetty
    Nonintrusive Image Tamper Detection Based on Fuzzy Fusion
    Journal of Computer Science and Network Security, 2010, Vol. 10(9), pp. 86-90
    BibTeX
    @article{Chetty2010b,
     author = {Chetty, Girija},
     title = {Nonintrusive Image Tamper Detection Based on Fuzzy Fusion},
     journal = {Journal of Computer Science and Network Security},
     year = {2010},
     volume = {10},
     number = {9},
     pages = {86-90}}
    
  31. G. Chetty, M. Biswas & R. Singh
    Digital Video Tamper Detection Based on Multimodal Fusion of Residue Features
    Proc. 4th Int Network and System Security (NSS) Conf
    2010, pp. 606-613
    BibTeX
    @inproceedings{Chetty2010d,
     author = {Chetty, G. and Biswas, M. and Singh, R. },
     title = {Digital Video Tamper Detection Based on Multimodal Fusion of Residue Features},
     booktitle = {Proc. 4th Int Network and System Security (NSS) Conf},
     year = {2010},
     pages = {606--613}}
    
  32. G. Chetty, J. Goodwin & M. Singh
    Digital Image Tamper Detection Based on Multimodal Fusion of Residue Features
    Blanc-Talon, J., Bone, D., Philips, W., Popescu, D. & Scheunders, P. (ed.)
    Advanced Concepts for Intelligent Vision Systems
    Springer Berlin / Heidelberg, 2010, Vol. 6475, pp. 79-87
    BibTeX
    @incollection{Chetty2010c,
     author = {Chetty, Girija and Goodwin, Julian and Singh, Monica},
     title = {Digital Image Tamper Detection Based on Multimodal Fusion of Residue Features},
     booktitle = {Advanced Concepts for Intelligent Vision Systems},
     publisher = {Springer Berlin / Heidelberg},
     year = {2010},
     volume = {6475},
     pages = {79-87}}
    
  33. G. Chetty, M. Singh & M. White
    Blind Image Tamper Detection Based on Multimodal Fusion
    Wong, K., Mendis, B. & Bouzerdoum, A. (ed.)
    Neural Information Processing. Models and Applications
    Springer Berlin / Heidelberg, 2010, Vol. 6444, pp. 557-564
    BibTeX
    @incollection{Chetty2010,
     author = {Chetty, Girija and Singh, Monica and White, Matthew},
     title = {Blind Image Tamper Detection Based on Multimodal Fusion},
     booktitle = {Neural Information Processing. Models and Applications},
     publisher = {Springer Berlin / Heidelberg},
     year = {2010},
     volume = {6444},
     pages = {557-564}}
    
  34. Chiang, Khanna, Mikkilineni, Segovia, Chiu & E.J. Delp
    Intelligent Multimedia Analysis for Security Applications
    Husrev T. Sencar, Sergio Velastin, N. N. S. L. (ed.)
    Chapter Printer and Scanner Forensics: Models and Methods
    Springer Berlin / Heidelberg, 2010, pp. 145-187
    BibTeX
    @inbook{Chiang2010,
     author = {Chiang and Khanna and Mikkilineni and Segovia and Chiu and Delp, E. J.},
     title = {Intelligent Multimedia Analysis for Security Applications},
     publisher = {Springer Berlin / Heidelberg},
     year = {2010},
     pages = {145-187}}
    
  35. P.-J. Chiang, N. Khanna, A.K. Mikkilineni, M.V.O. Segovia, J.P. Allebach, G.T.C. Chiu & E.J. Delp
    Studies in Computational Intelligence
    Chapter Printer and Scanner Forensics: Models and Methods
    Springer, 2010, pp. 145-187
    BibTeX
    @inbook{Chiang2010a,
     author = {Pei-Ju Chiang and Nitin Khanna and Aravind K. Mikkilineni and Maria V. Ortiz Segovia and Jan P. Allebach and George T. C. Chiu and Edward J. Delp},
     title = {Studies in Computational Intelligence},
     publisher = {Springer},
     year = {2010},
     pages = {145-187}}
    
  36. G. Chierchia, S. Parrilli, G. Poggi, C. Sansone & L. Verdoliva
    On the influence of denoising in PRNU based forgery detection
    Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence
    ACM, 2010, pp. 117-122
    BibTeX
    @inproceedings{Chierchia:2010:IDP:1877972.1878002,
     author = {Chierchia, Giovanni and Parrilli, Sara and Poggi, Giovanni and Sansone, Carlo and Verdoliva, Luisa},
     title = {On the influence of denoising in PRNU based forgery detection},
     booktitle = {Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence},
     publisher = {ACM},
     year = {2010},
     pages = {117--122}}
    
  37. C.-H. Choi, M.-J. Lee & H.-K. Lee
    Scanner Identification Using Spectral Noise in the Frequency Domain
    International Conference on Image Processing
    2010
    BibTeX
    @inproceedings{Choi2010,
     author = {Choi, Chang-Hee and Lee, Min-Jeong and Lee, Heung-Kyu},
     title = {Scanner Identification Using Spectral Noise in the Frequency Domain},
     booktitle = {International Conference on Image Processing},
     year = {2010}}
    
  38. V. Christlein, C. Riess & E. Angelopoulou
    A Study on Features for the Detection of Copy-Move Forgeries
    Information Security Solutions Europe
    2010
    BibTeX
    @inproceedings{Christlein2010,
     author = {Christlein, Vincent and Riess, Christian and Angelopoulou, Elli},
     title = {A Study on Features for the Detection of Copy-Move Forgeries},
     booktitle = {Information Security Solutions Europe},
     year = {2010}}
    
  39. V. Christlein, C. Riess & E. Angelopoulou
    On rotation invariance in copy-move forgery detection
    Proc. IEEE Int Information Forensics and Security (WIFS) Workshop
    2010, pp. 1-6
    BibTeX
    @inproceedings{Christlein2010a,
     author = {Christlein, V. and Riess, C. and Angelopoulou, E.},
     title = {On rotation invariance in copy-move forgery detection},
     booktitle = {Proc. IEEE Int Information Forensics and Security (WIFS) Workshop},
     year = {2010},
     pages = {1--6}}
    
  40. W.-H. Chuang & M. Wu
    Semi non-intrusive training for cell-phone camera model linkage
    Proc. IEEE Int Information Forensics and Security (WIFS) Workshop
    2010, pp. 1-6
    BibTeX
    @inproceedings{Chuang2010,
     author = {Wei-Hong Chuang and Min Wu},
     title = {Semi non-intrusive training for cell-phone camera model linkage},
     booktitle = {Proc. IEEE Int Information Forensics and Security (WIFS) Workshop},
     year = {2010},
     pages = {1--6}}
    
  41. S.-W. Chung, B.-K. Kim & W.-J. Song
    Removing chromatic aberration by digital image processing
    Optical Engineering, SPIE, 2010, Vol. 49(6), pp. 067002
    BibTeX
    @article{Chung2010,
     author = {Soon-Wook Chung and Byoung-Kwang Kim and Woo-Jin Song},
     title = {Removing chromatic aberration by digital image processing},
     journal = {Optical Engineering},
     publisher = {SPIE},
     year = {2010},
     volume = {49},
     number = {6},
     pages = {067002}}
    
  42. CIPA
    Exchangable image file format dor digital still cameras: EXIF Version 2.3
    CIPA, 2010
    BibTeX
    @standard{CIPA2010,
     author = {CIPA},
     title = {Exchangable image file format dor digital still cameras: EXIF Version 2.3},
     year = {2010}}
    
  43. P. Comon & C. Jutten
    Handbook of Blind Source Separation: Independent Component Analysis and Applications
    Academic Press, 2010
    BibTeX
    @book{Comon2010,
     author = {Comon, Pierre and Jutten, Christian},
     title = {Handbook of Blind Source Separation: Independent Component Analysis and Applications},
     publisher = {Academic Press},
     year = {2010}}
    
  44. V. Conotter, G. Boato & H. Farid
    Detecting Photo Manipulation on Signs and Billboards
    International Conference on Image Processing
    2010
    BibTeX
    @inproceedings{Conotter2010,
     author = {Conotter, Valentina and Boato, Giulia and Farid, Hany},
     title = {Detecting Photo Manipulation on Signs and Billboards},
     booktitle = {International Conference on Image Processing},
     year = {2010}}
    
  45. D. Cromey
    Avoiding Twisted Pixels: Ethical Guidelines for the Appropriate Use and Manipulation of Scientific Digital Images
    Science and Engineering Ethics, Springer Netherlands, 2010, Vol. 16, pp. 639-667
    BibTeX
    @article{Cromey2010,
     author = {Cromey, Douglas},
     title = {Avoiding Twisted Pixels: Ethical Guidelines for the Appropriate Use and Manipulation of Scientific Digital Images},
     journal = {Science and Engineering Ethics},
     publisher = {Springer Netherlands},
     year = {2010},
     volume = {16},
     pages = {639-667}}
    
  46. Y. Dai, H. Xiang, P. Lu & W. Feng
    Image splicing detection based on estimation of camera intrinsic parameters
    Proc. Int Audio Language and Image Processing (ICALIP) Conf
    2010, pp. 214-218
    BibTeX
    @inproceedings{Dai2010,
     author = {Yanfei Dai and Hui Xiang and Peng Lu and Wenjuan Feng},
     title = {Image splicing detection based on estimation of camera intrinsic parameters},
     booktitle = {Proc. Int Audio Language and Image Processing (ICALIP) Conf},
     year = {2010},
     pages = {214--218}}
    
  47. Z. Daixian
    SIFT algorithm analysis and optimization
    Proc. Int Image Analysis and Signal Processing (IASP) Conf
    2010, pp. 415-419
    BibTeX
    @inproceedings{Daixian2010,
     author = {Zhu Daixian},
     title = {SIFT algorithm analysis and optimization},
     booktitle = {Proc. Int Image Analysis and Signal Processing (IASP) Conf},
     year = {2010},
     pages = {415--419}}
    
  48. N. Dalgaard, C. Mosquera & F. Perez-Gonzalez
    On the Role of Differentiation for Resampling Detection
    International Conference on Image Processing
    2010
    BibTeX
    @inproceedings{Dalgaard2010,
     author = {Dalgaard, Nahuel and Mosquera, Carlos and Perez-Gonzalez, Fernando},
     title = {On the Role of Differentiation for Resampling Detection},
     booktitle = {International Conference on Image Processing},
     year = {2010}}
    
  49. F. De Simone, L. Goldmann, D. Filimonov & T. Ebrahimi
    On the Limits of Perceptually Optimized JPEG
    Multimedia Signal Processing Group (MMSPG) Ecole Polytechnique F´ed´erale de Lausanne (EPFL) CH-1015 Lausanne, Switzerland, 2010
    BibTeX
    @techreport{DeSimone2010,
     author = {De Simone, Francesca and Goldmann, Lutz and Filimonov, Denis and Ebrahimi, Touradj},
     title = {On the Limits of Perceptually Optimized JPEG},
     year = {2010}}
    
  50. V.G. Edupuganti & F.Y. Shih
    Authentication of JPEG Images Based on Genetic Algorithms
    The Open Artificial Intelligence Journal, 2010, Vol. 4, pp. 30-36
    BibTeX
    @article{Edupuganti2010,
     author = {Edupuganti, Venkata Gopal and Shih, Frank. Y},
     title = {Authentication of JPEG Images Based on Genetic Algorithms},
     journal = {The Open Artificial Intelligence Journal},
     year = {2010},
     volume = {4},
     pages = {30-36}}
    
  51. Z. Fang, S. Wang & X. Zhang
    Image Splicing Detection Using Color Edge Inconsistency
    Proc. Int Multimedia Information Networking and Security (MINES) Conf
    2010, pp. 923-926
    BibTeX
    @inproceedings{Fang2010,
     author = {Zhen Fang and Shuozhong Wang and Xinpeng Zhang},
     title = {Image Splicing Detection Using Color Edge Inconsistency},
     booktitle = {Proc. Int Multimedia Information Networking and Security (MINES) Conf},
     year = {2010},
     pages = {923--926}}
    
  52. H. Farid
    A 3-D Photo Forensic Analysis of the Lee Harvey Oswald Backyard Photo
    Department of Computer Science, Dartmouth College, 2010(TR2010-669)
    BibTeX
    @techreport{Farid2010a,
     author = {Farid, Hany},
     title = {A 3-D Photo Forensic Analysis of the Lee Harvey Oswald Backyard Photo},
     year = {2010},
     number = {TR2010-669}}
    
  53. H. Farid & M.J. Bravo
    Image forensic analyses that elude the human visual system
    Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
    Media Forensics and Security II
    Media Forensics and Security II, SPIE, 2010, Vol. 7541(1), pp. 754106
    BibTeX
    @inproceedings{Farid2010,
     author = {Hany Farid and Mary J. Bravo},
     title = {Image forensic analyses that elude the human visual system},
     booktitle = {Media Forensics and Security II},
     journal = {Media Forensics and Security II},
     publisher = {SPIE},
     year = {2010},
     volume = {7541},
     number = {1},
     pages = {754106}}
    
  54. X. Feng & G. Doërr
    JPEG recompression detection
    Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
    Media Forensics and Security II
    Media Forensics and Security II, SPIE, 2010, Vol. 7541(1), pp. 75410J
    BibTeX
    @inproceedings{Feng2010,
     author = {Feng, Xiaoying and Doërr, Gwenaël},
     title = {JPEG recompression detection},
     booktitle = {Media Forensics and Security II},
     journal = {Media Forensics and Security II},
     publisher = {SPIE},
     year = {2010},
     volume = {7541},
     number = {1},
     pages = {75410J}}
    
  55. C. Fillion & G. Sharma
    Detecting content adaptive scaling of images for forensic applications
    Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
    Media Forensics and Security II
    Media Forensics and Security II, SPIE, 2010, Vol. 7541(1), pp. 75410Z
    BibTeX
    @inproceedings{Fillion2010,
     author = {Claude Fillion and Gaurav Sharma},
     title = {Detecting content adaptive scaling of images for forensic applications},
     booktitle = {Media Forensics and Security II},
     journal = {Media Forensics and Security II},
     publisher = {SPIE},
     year = {2010},
     volume = {7541},
     number = {1},
     pages = {75410Z}}
    
  56. D. Flemström & M. Roth
    Die digitale Erkennung von Bildbearbeitung
    Deutsche Schule Stockholm Karlavägen 25 11431 Stockholm SCHWEDEN, 2010
    BibTeX
    @techreport{Flemstroem2010,
     author = {David Flemström and Moritz Roth},
     title = {Die digitale Erkennung von Bildbearbeitung},
     year = {2010}}
    
  57. A. Flores & S. Belongie
    Removing pedestrians from Google street view images
    Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition Workshops (CVPRW)
    2010, pp. 53-58
    BibTeX
    @inproceedings{Flores2010,
     author = {Flores, Arturo and Belongie, Serge},
     title = {Removing pedestrians from Google street view images},
     booktitle = {Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition Workshops (CVPRW)},
     year = {2010},
     pages = {53--58}}
    
  58. G. Friedland, O. Vinyals & T. Darrell
    Multimodal location estimation
    Proceedings of the international conference on Multimedia
    ACM, 2010, pp. 1245-1252
    BibTeX
    @inproceedings{Friedland2010,
     author = {Friedland, Gerald and Vinyals, Oriol and Darrell, Trevor},
     title = {Multimodal location estimation},
     booktitle = {Proceedings of the international conference on Multimedia},
     publisher = {ACM},
     year = {2010},
     pages = {1245--1252}}
    
  59. X. Gao, T.-T. Ng, B. Qiu & S.-F. Chang
    Single-View Recaptured Image Detection Based on Physics-Based Features
    IEEE International Conference on Multimedia and EXPO
    2010
    BibTeX
    @inproceedings{Gao2010,
     author = {Gao, Xinting and Ng, Tian-Tsong and Qiu, Bo and Chang, Shih-Fu},
     title = {Single-View Recaptured Image Detection Based on Physics-Based Features},
     booktitle = {IEEE International Conference on Multimedia and EXPO},
     year = {2010}}
    
  60. D. Garcia-Romero & C. Espy-Wilson
    Automatic Acquisition Device Identification from Speech Recordings
    International Conference on Acoustics, Speech, and Signal Processing
    2010, pp. 1806-1809
    BibTeX
    @inproceedings{Garcia-Romero2010,
     author = {Garcia-Romero, Daniel and Espy-Wilson, Carol},
     title = {Automatic Acquisition Device Identification from Speech Recordings},
     booktitle = {International Conference on Acoustics, Speech, and Signal Processing},
     year = {2010},
     pages = {1806-1809}}
    
  61. F. Gharibi, F. Akhlaghian, J. RavanJamjah & B. ZahirAzami
    Using the local information of image to identify the source camera
    Proc. IEEE Int Signal Processing and Information Technology (ISSPIT) Symp
    2010, pp. 515-519
    BibTeX
    @inproceedings{Gharibi2010,
     author = {Gharibi, F. and Akhlaghian, F. and RavanJamjah, J. and ZahirAzami, B. },
     title = {Using the local information of image to identify the source camera},
     booktitle = {Proc. IEEE Int Signal Processing and Information Technology (ISSPIT) Symp},
     year = {2010},
     pages = {515--519}}
    
  62. T. Gloe & R. Böhme
    The ´Dresden Image Database´ for benchmarking digital image forensics
    SAC ´10: Proceedings of the 2010 ACM Symposium on Applied Computing
    ACM, 2010, pp. 1584-1590
    BibTeX
    @inproceedings{Gloe2010a,
     author = {Gloe, Thomas and Böhme, Rainer},
     title = {The ´Dresden Image Database´ for benchmarking digital image forensics},
     booktitle = {SAC ´10: Proceedings of the 2010 ACM Symposium on Applied Computing},
     publisher = {ACM},
     year = {2010},
     pages = {1584--1590}}
    
  63. T. Gloe, K. Borowka & A. Winkler
    Efficient estimation and large-scale evaluation of lateral chromatic aberration for digital image forensics
    Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
    Media Forensics and Security II
    Media Forensics and Security II, SPIE, 2010, Vol. 7541(1), pp. 754107
    BibTeX
    @inproceedings{Gloe2010,
     author = {Thomas Gloe and Karsten Borowka and Antje Winkler},
     title = {Efficient estimation and large-scale evaluation of lateral chromatic aberration for digital image forensics},
     booktitle = {Media Forensics and Security II},
     journal = {Media Forensics and Security II},
     publisher = {SPIE},
     year = {2010},
     volume = {7541},
     number = {1},
     pages = {754107}}
    
  64. M. Goljan, J. Fridrich & M. Chen
    Sensor noise camera identification: countering counter-forensics
    Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
    Media Forensics and Security II
    Media Forensics and Security II, SPIE, 2010, Vol. 7541(1), pp. 75410S
    BibTeX
    @inproceedings{Goljan2010a,
     author = {Miroslav Goljan and Jessica Fridrich and Mo Chen},
     title = {Sensor noise camera identification: countering counter-forensics},
     booktitle = {Media Forensics and Security II},
     journal = {Media Forensics and Security II},
     publisher = {SPIE},
     year = {2010},
     volume = {7541},
     number = {1},
     pages = {75410S}}
    
  65. M. Goljan, J. Fridrich & T. Filler
    Managing a large database of camera fingerprints
    Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
    Media Forensics and Security II
    Media Forensics and Security II, SPIE, 2010, Vol. 7541(1), pp. 754108
    BibTeX
    @inproceedings{Goljan2010,
     author = {Miroslav Goljan and Jessica Fridrich and Filler, Tomáš},
     title = {Managing a large database of camera fingerprints},
     booktitle = {Media Forensics and Security II},
     journal = {Media Forensics and Security II},
     publisher = {SPIE},
     year = {2010},
     volume = {7541},
     number = {1},
     pages = {754108}}
    
  66. R.E.J. Granty, T.S. Aditya & S.S. Madhu
    Survey on passive methods of image tampering detection
    Proc. Int Communication and Computational Intelligence (INCOCCI) Conf
    2010, pp. 431-436
    BibTeX
    @inproceedings{Granty2010,
     author = {Granty, R. E. J. and Aditya, T. S. and Madhu, S. S. },
     title = {Survey on passive methods of image tampering detection},
     booktitle = {Proc. Int Communication and Computational Intelligence (INCOCCI) Conf},
     year = {2010},
     pages = {431--436}}
    
  67. U. Greveler & D. Löhr
    Deanonymisierung von Profilen sozialer Netzwerke unter Nutzung von Metadaten aus Bildern
    Proceedings of D•A•CH Security 2010
    2010
    BibTeX
    @inproceedings{Greveler2010,
     author = {Ulrich Greveler and Dennis Löhr},
     title = {Deanonymisierung von Profilen sozialer Netzwerke unter Nutzung von Metadaten aus Bildern},
     booktitle = {Proceedings of D•A•CH Security 2010},
     year = {2010}}
    
  68. J. Grim, P. Somol & P. Pudil
    Digital Image Forgery Detection by Local Statistical Models
    International Conference on Intelligent Information Hiding and Multimedia Signal Processing
    2010, pp. 579-582
    BibTeX
    @inproceedings{Grim2010,
     author = {Grim, Jiri and Somol, Petr and Pudil, Pavel},
     title = {Digital Image Forgery Detection by Local Statistical Models},
     booktitle = {International Conference on Intelligent Information Hiding and Multimedia Signal Processing},
     year = {2010},
     pages = {579-582}}
    
  69. G. Gul, I. Avcibas & F. Kurugollu
    SVD based image manipulation detection
    Proc. 17th IEEE Int Image Processing (ICIP) Conf
    2010, pp. 1765-1768
    BibTeX
    @inproceedings{Gul2010,
     author = {Gul, Gokhan and Avcibas, Ismail and Kurugollu, Fatih},
     title = {SVD based image manipulation detection},
     booktitle = {Proc. 17th IEEE Int Image Processing (ICIP) Conf},
     year = {2010},
     pages = {1765--1768}}
    
  70. S. Hamdy, H. El-Messiry, M. Roushdy & E. Kahlifa
    Retrieval of Bitmap Compression History
    International Journal of Computer Science and Information Security, 2010, Vol. 8, pp. 141-146
    BibTeX
    @article{Hamdy2010,
     author = {Salma Hamdy and Haytham El-Messiry and Mohamed Roushdy and Essam Kahlifa},
     title = {Retrieval of Bitmap Compression History},
     journal = {International Journal of Computer Science and Information Security},
     year = {2010},
     volume = {8},
     pages = {141-146}}
    
  71. S. Hamdy, H. El-Messiry, M. Roushdy & E. Kahlifa
    Quantization Table Estimation in JPEG Images
    International Journal of Advanced Computer Sciences and Applications, 2010, Vol. 1, pp. 17-23
    BibTeX
    @article{Hamdy2010a,
     author = {Salma Hamdy and Haytham El-Messiry and Mohamed Roushdy and Essam Kahlifa},
     title = {Quantization Table Estimation in JPEG Images},
     journal = {International Journal of Advanced Computer Sciences and Applications},
     year = {2010},
     volume = {1},
     pages = {17-23}}
    
  72. J. Hanjun & S. Huali
    Rendering fake soft shadows based on the erosion and dilation
    Proc. 2nd Int Computer Engineering and Technology (ICCET) Conf
    2010, Vol. 6
    BibTeX
    @inproceedings{Hanjun2010,
     author = {Jin Hanjun and Sun Huali},
     title = {Rendering fake soft shadows based on the erosion and dilation},
     booktitle = {Proc. 2nd Int Computer Engineering and Technology (ICCET) Conf},
     year = {2010},
     volume = {6}}
    
  73. J. Ho, O.C. Au & J. Zhou
    Inter-Channel Demosaicking Traces for Digital Image Forensics
    IEEE International Conference on Multimedia and EXPO
    2010
    BibTeX
    @inproceedings{Ho2010,
     author = {Ho, John and Au, Oscar C. and Zhou, Jiantao},
     title = {Inter-Channel Demosaicking Traces for Digital Image Forensics},
     booktitle = {IEEE International Conference on Multimedia and EXPO},
     year = {2010}}
    
  74. Y.F. Hsu & S.F. Chang
    Camera Response Functions For Image Forensics: An Automatic Algorithm for Splicing Detection
    IEEE Transactions on Information Forensics and Security, 2010, Vol. 5(5), pp. 1
    BibTeX
    @article{Hsu2010,
     author = {Hsu, Y. F. and Chang, S. F.},
     title = {Camera Response Functions For Image Forensics: An Automatic Algorithm for Splicing Detection},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2010},
     volume = {5},
     number = {5},
     pages = {1}}
    
  75. Y. Hu, C. Jian & C.-T. Li
    Using improved imaging sensor pattern noise for source camera identification
    Proc. IEEE Int Multimedia and Expo (ICME) Conf
    2010, pp. 1481-1486
    BibTeX
    @inproceedings{Hu2010b,
     author = {Yongjian Hu and Chao Jian and Chang-Tsun Li},
     title = {Using improved imaging sensor pattern noise for source camera identification},
     booktitle = {Proc. IEEE Int Multimedia and Expo (ICME) Conf},
     year = {2010},
     pages = {1481--1486}}
    
  76. Y. Hu, C.-T. Li & C. Jian
    Building fingerprints with information from three color bands for source camera identification
    Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence
    ACM, 2010, pp. 111-116
    BibTeX
    @inproceedings{Hu2010a,
     author = {Hu, Yongjian and Li, Chang-Tsun and Jian, Chao},
     title = {Building fingerprints with information from three color bands for source camera identification},
     booktitle = {Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence},
     publisher = {ACM},
     year = {2010},
     pages = {111--116}}
    
  77. Y. Hu, C.-T. Li & C. Zhou
    Selecting forensic features for robust source camera identification
    Proc. Int. Computer Symp. (ICS)
    2010, pp. 506-511
    BibTeX
    @inproceedings{Hu2010,
     author = {Yongjian Hu and Chang-Tsun Li and Changhui Zhou},
     title = {Selecting forensic features for robust source camera identification},
     booktitle = {Proc. Int. Computer Symp. (ICS)},
     year = {2010},
     pages = {506--511}}
    
  78. F. Huang, J. Huang & Y.Q. Shi
    Detecting Double JPEG Compression With the Same Quantization Matrix
    IEEE Transactions on Information Forensics and Security, 2010, Vol. 5(4), pp. 848-856
    BibTeX
    @article{Huang2010a,
     author = {Fangjun Huang and Jiwu Huang and Yun Qing Shi},
     title = {Detecting Double JPEG Compression With the Same Quantization Matrix},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2010},
     volume = {5},
     number = {4},
     pages = {848--856}}
    
  79. H. Huang, G. Coatrieux, H.Z. Shu, L.M. Luo & C. Roux
    Medical image tamper approximation based on an image moment signature
    Proc. 12th IEEE Int e-Health Networking Applications and Services (Healthcom) Conf
    2010, pp. 254-259
    BibTeX
    @inproceedings{Huang2010b,
     author = {Huang, H. and Coatrieux, G. and Shu, H. Z. and Luo, L. M. and Roux, C.},
     title = {Medical image tamper approximation based on an image moment signature},
     booktitle = {Proc. 12th IEEE Int e-Health Networking Applications and Services (Healthcom) Conf},
     year = {2010},
     pages = {254--259}}
    
  80. Y. Huang & N. Fang
    Learning from Interpolated Images using Neural Networks for Digital Forensics
    Computer Sciences Department University of Wisconsin-Madison, 2010
    BibTeX
    @techreport{Huang2010,
     author = {Huang, Y. and Fang, N.},
     title = {Learning from Interpolated Images using Neural Networks for Digital Forensics},
     year = {2010}}
    
  81. IPTC
    IPTC Standard Photo Metadata IPTC Core Specification Version 1.1 IPTC Extension Specification Version 1.1
    IPTC, 2010
    BibTeX
    @standard{IPTC2010,
     author = {IPTC},
     title = {IPTC Standard Photo Metadata IPTC Core Specification Version 1.1 IPTC Extension Specification Version 1.1},
     year = {2010}}
    
  82. B. Jajal & V. Desai
    Identification of copy--paste regions in digital image
    International Journal of Imaging Systems and Technology, 2010, Vol. 20(4), pp. 367-369
    BibTeX
    @article{Jajal2010,
     author = {Brijesh Jajal and Vipul Desai},
     title = {Identification of copy--paste regions in digital image},
     journal = {International Journal of Imaging Systems and Technology},
     year = {2010},
     volume = {20},
     number = {4},
     pages = {367--369}}
    
  83. W. Jiang, A. Ho, H. Treharne & Y. Shi
    A Novel Multi-size Block Benford’s Law Scheme for Printer Identification
    Qiu, G., Lam, K., Kiya, H., Xue, X.-Y., Kuo, C.-C. & Lew, M. (ed.)
    Advances in Multimedia Information Processing - PCM 2010
    Springer Berlin Heidelberg, 2010, Vol. 6297, pp. 643-652
    BibTeX
    @incollection{Jiang2010,
     author = {Jiang, Weina and Ho, AnthonyT.S. and Treharne, Helen and Shi, YunQ.},
     title = {A Novel Multi-size Block Benford’s Law Scheme for Printer Identification},
     booktitle = {Advances in Multimedia Information Processing - PCM 2010},
     publisher = {Springer Berlin Heidelberg},
     year = {2010},
     volume = {6297},
     pages = {643-652}}
    
  84. X. Jin
    Artificial Joint Surface Fitting Based on Moving Least Squares Methods
    Proc. Int Internet Technology and Applications Conf
    2010, pp. 1-4
    BibTeX
    @inproceedings{Jin2010,
     author = {Xiangyang Jin},
     title = {Artificial Joint Surface Fitting Based on Moving Least Squares Methods},
     booktitle = {Proc. Int Internet Technology and Applications Conf},
     year = {2010},
     pages = {1--4}}
    
  85. T. Jing, X. Li & F. Zhang
    Image tamper detection algorithm based on Radon and Fourier-Mellin transform
    Proc. IEEE Int Information Theory and Information Security (ICITIS) Conf
    2010, pp. 212-215
    BibTeX
    @inproceedings{Jing2010,
     author = {Tao Jing and Xinghua Li and Feifei Zhang},
     title = {Image tamper detection algorithm based on Radon and Fourier-Mellin transform},
     booktitle = {Proc. IEEE Int Information Theory and Information Security (ICITIS) Conf},
     year = {2010},
     pages = {212--215}}
    
  86. I.N. Junejo & H. Foroosh
    GPS coordinates estimation and camera calibration from solar shadows
    Computer Vision and Image Understanding, 2010, Vol. 114(9), pp. 991 - 1003
    BibTeX
    @article{Junejo2010,
     author = {Junejo, Imran N. and Foroosh, Hassan},
     title = {GPS coordinates estimation and camera calibration from solar shadows},
     journal = {Computer Vision and Image Understanding},
     year = {2010},
     volume = {114},
     number = {9},
     pages = {991 - 1003}}
    
  87. Z. Junhong
    Detection of Copy-Move Forgery based on one improved LLE method
    Proc. 2nd Int Advanced Computer Control (ICACC) Conf
    2010, Vol. 4, pp. 547-550
    BibTeX
    @inproceedings{Junhong2010,
     author = {Zhao Junhong},
     title = {Detection of Copy-Move Forgery based on one improved LLE method},
     booktitle = {Proc. 2nd Int Advanced Computer Control (ICACC) Conf},
     year = {2010},
     volume = {4},
     pages = {547--550}}
    
  88. P. Kakar, S. Natarajan & W. Ser
    Detecting Digital Image Forgeries Through Inconsistent Motion Blur
    IEEE International Conference on Multimedia and EXPO
    2010
    BibTeX
    @inproceedings{Kakar2010,
     author = {Kakar, Pravin and Natarajan, Sudha and Ser, Wee},
     title = {Detecting Digital Image Forgeries Through Inconsistent Motion Blur},
     booktitle = {IEEE International Conference on Multimedia and EXPO},
     year = {2010}}
    
  89. P. Kakar, S. Natarajan & W. Ser
    Image authentication by motion blur consistency verification
    TENCON 2010 - 2010 IEEE Region 10 Conference
    2010, pp. 188-193
    BibTeX
    @inproceedings{Kakar2010a,
     author = {Kakar, P. and Natarajan, S. and Wee Ser},
     title = {Image authentication by motion blur consistency verification},
     booktitle = {TENCON 2010 - 2010 IEEE Region 10 Conference},
     year = {2010},
     pages = {188--193}}
    
  90. L. Kang & X. ping Cheng
    Copy-move forgery detection in digital image
    Proc. 3rd Int Image and Signal Processing (CISP) Congress
    2010, Vol. 5, pp. 2419-2421
    BibTeX
    @inproceedings{Kang2010,
     author = {Li Kang and Xiao-ping Cheng},
     title = {Copy-move forgery detection in digital image},
     booktitle = {Proc. 3rd Int Image and Signal Processing (CISP) Congress},
     year = {2010},
     volume = {5},
     pages = {2419--2421}}
    
  91. E. Kee & H. Farid
    Digital image authentication from thumbnails
    Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
    Media Forensics and Security II
    Media Forensics and Security II, SPIE, 2010, Vol. 7541(1), pp. 75410E
    BibTeX
    @inproceedings{Kee2010,
     author = {Kee, Eric and Farid, Hany},
     title = {Digital image authentication from thumbnails},
     booktitle = {Media Forensics and Security II},
     journal = {Media Forensics and Security II},
     publisher = {SPIE},
     year = {2010},
     volume = {7541},
     number = {1},
     pages = {75410E}}
    
  92. E. Kee & H. Farid
    Exposing Digital Forgeries from 3-D Lighting Environments
    IEEE International Workshop on Information Forensics and Security
    2010
    BibTeX
    @misc{Kee2010a,
     author = {Kee, Eric and Farid, Hany},
     title = {Exposing Digital Forgeries from 3-D Lighting Environments},
     booktitle = {IEEE International Workshop on Information Forensics and Security},
     year = {2010}}
    
  93. S. Khan & A. Kulkarni
    An Efficient Method for Detection of Copy-Move Forgery Using Discrete Wavelet Transform.
    International Journal on Computer Science and Engineering, 2010, Vol. 2, pp. 1801-1806
    BibTeX
    @article{Khan2010,
     author = {Saiqa Khan and Arun Kulkarni},
     title = {An Efficient Method for Detection of Copy-Move Forgery Using Discrete Wavelet Transform.},
     journal = {International Journal on Computer Science and Engineering},
     year = {2010},
     volume = {2},
     pages = {1801-1806}}
    
  94. S. Khan & A. Kulkarni
    Reduced Time Complexity for Detection of Copy-Move Forgery Using Discrete Wavelet Transform
    International Journal of Computer Applications, 2010, Vol. 6, pp. 31-36
    BibTeX
    @article{Khan2010a,
     author = {Saiqa Khan and Arun Kulkarni},
     title = {Reduced Time Complexity for Detection of Copy-Move Forgery Using Discrete Wavelet Transform},
     journal = {International Journal of Computer Applications},
     year = {2010},
     volume = {6},
     pages = {31-36}}
    
  95. S. Khan & A. Kulkarni
    Robust method for detection of copy-move forgery in digital images
    Proc. Int Signal and Image Processing (ICSIP) Conf
    2010, pp. 69-73
    BibTeX
    @inproceedings{Khan2010b,
     author = {Khan, S. and Kulkarni, A. },
     title = {Robust method for detection of copy-move forgery in digital images},
     booktitle = {Proc. Int Signal and Image Processing (ICSIP) Conf},
     year = {2010},
     pages = {69--73}}
    
  96. N. Khanna & E.J. Delp
    Intrinsic Signatures for Scanned Documents Forensics : Effect of Font Shape and Size
    International Symposium on Circuits and Systems
    2010
    BibTeX
    @inproceedings{Khanna2010a,
     author = {Khanna, Nitin and Delp, Edward J.},
     title = {Intrinsic Signatures for Scanned Documents Forensics : Effect of Font Shape and Size},
     booktitle = {International Symposium on Circuits and Systems},
     year = {2010}}
    
  97. M. Kirchner
    Efficient estimation of CFA pattern configuration in digital camera images
    Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
    Proc. SPIE
    Media Forensics and Security II, SPIE, 2010, Vol. 7541(1), pp. 754111
    BibTeX
    @conference{Kirchner2010,
     author = {Matthias Kirchner},
     title = {Efficient estimation of CFA pattern configuration in digital camera images},
     booktitle = {Proc. SPIE},
     journal = {Media Forensics and Security II},
     publisher = {SPIE},
     year = {2010},
     volume = {7541},
     number = {1},
     pages = {754111}}
    
  98. M. Kirchner
    Linear row and column predictors for the analysis of resized images
    Proceedings of the 12th ACM workshop on Multimedia and security
    ACM, 2010, pp. 13-18
    BibTeX
    @inproceedings{Kirchner2010a,
     author = {Kirchner, Matthias},
     title = {Linear row and column predictors for the analysis of resized images},
     booktitle = {Proceedings of the 12th ACM workshop on Multimedia and security},
     publisher = {ACM},
     year = {2010},
     pages = {13--18}}
    
  99. M. Kirchner & J. Fridrich
    On detection of median filtering in digital images
    Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
    Proc. SPIE
    Media Forensics and Security II, SPIE, 2010, Vol. 7541(1), pp. 754110
    BibTeX
    @conference{Kirchner2010b,
     author = {Matthias Kirchner and Jessica Fridrich},
     title = {On detection of median filtering in digital images},
     booktitle = {Proc. SPIE},
     journal = {Media Forensics and Security II},
     publisher = {SPIE},
     year = {2010},
     volume = {7541},
     number = {1},
     pages = {754110}}
    
  100. M. Kobayashi, T. Okabe & Y. Sato
    Detecting Forgery from Static-Scene Video Based on Inconsistency in Noise Level Functions
    IEEE Transactions on Information Forensics and Security, 2010, Vol. 5(4), pp. 1
    BibTeX
    @article{Kobayashi2010,
     author = {Kobayashi, M. and Okabe, T. and Sato, Y.},
     title = {Detecting Forgery from Static-Scene Video Based on Inconsistency in Noise Level Functions},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2010},
     volume = {5},
     number = {4},
     pages = {1}}
    
  101. J.-F. Lalonde, A. Efros & S. Narasimhan
    Detecting Ground Shadows in Outdoor Consumer Photographs
    Daniilidis, K., Maragos, P. & Paragios, N. (ed.)
    Computer Vision -- ECCV 2010
    Springer Berlin Heidelberg, 2010, Vol. 6312, pp. 322-335
    BibTeX
    @incollection{Lalonde2010,
     author = {Lalonde, Jean-François and Efros, AlexeiA. and Narasimhan, SrinivasaG.},
     title = {Detecting Ground Shadows in Outdoor Consumer Photographs},
     booktitle = {Computer Vision -- ECCV 2010},
     publisher = {Springer Berlin Heidelberg},
     year = {2010},
     volume = {6312},
     pages = {322-335}}
    
  102. D. Langlois, S. Chartier & D. Gosselin
    An Introduction to Independent Component Analysis: InfoMax and FastICA algorithms
    Tutorials in Quantitative Methods for Psychology, 2010, Vol. 6(1), pp. 31-38
    BibTeX
    @article{Langlois2010,
     author = {Dominic Langlois and Sylvain Chartier and Dominique Gosselin},
     title = {An Introduction to Independent Component Analysis: InfoMax and FastICA algorithms},
     journal = {Tutorials in Quantitative Methods for Psychology},
     year = {2010},
     volume = {6(1)},
     pages = {31--38}}
    
  103. A.B. Lewis & M.G. Kuhn
    Exact JPEG recompression
    Visual Information Processing and Communication
    Visual Information Processing and Communication, SPIE, 2010, Vol. 7543(1), pp. 75430V
    BibTeX
    @conference{Lewis2010,
     author = {Andrew B. Lewis and Markus G. Kuhn},
     title = {Exact JPEG recompression},
     booktitle = {Visual Information Processing and Communication},
     journal = {Visual Information Processing and Communication},
     publisher = {SPIE},
     year = {2010},
     volume = {7543},
     number = {1},
     pages = {75430V}}
    
  104. C.-T. Li
    Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions
    Klinger, K. (ed.)
    Hershey, New York, 2010
    BibTeX
    @book{Li2010c,
     author = {Chang-Tsun Li},
     title = {Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions},
     publisher = {Hershey, New York},
     year = {2010}}
    
  105. C.-T. Li
    Source Camera Identification Using Enhanced Sensor Pattern Noise
    IEEE Transactions on Information Forensics and Security, 2010, Vol. 5(2), pp. 280-287
    BibTeX
    @article{Li2010,
     author = {Li, Chang-Tsun},
     title = {Source Camera Identification Using Enhanced Sensor Pattern Noise},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2010},
     volume = {5},
     number = {2},
     pages = {280-287}}
    
  106. C.-T. Li
    Unsupervised Classification of Digital Images Using Enhanced Sensor Pattern Noise
    IEEE International Symposium on Circuits and Systems
    2010
    BibTeX
    @inproceedings{Li2010b,
     author = {Li, Chang-Tsun},
     title = {Unsupervised Classification of Digital Images Using Enhanced Sensor Pattern Noise},
     booktitle = {IEEE International Symposium on Circuits and Systems},
     year = {2010}}
    
  107. C.-T. Li, C.-Y. Chang & Y. Li
    On the Repudiability of Device Identification and Image Integrity Verification Using Sensor Pattern Noise
    Akan, O., Bellavista, P., Cao, J., Dressler, F., Ferrari, D., Gerla, M., Kobayashi, H., Palazzo, S., Sahni, S., Shen, X. (S., Stan, M., Xiaohua, J., Zomaya, A., Coulson, G. & Weerasinghe, D. (ed.)
    Information Security and Digital Forensics
    Springer Berlin Heidelberg, 2010, Vol. 41, pp. 19-25
    BibTeX
    @incollection{Li2010e,
     author = {Li, Chang-Tsun and Chang, Chih-Yuan and Li, Yue},
     title = {On the Repudiability of Device Identification and Image Integrity Verification Using Sensor Pattern Noise},
     booktitle = {Information Security and Digital Forensics},
     publisher = {Springer Berlin Heidelberg},
     year = {2010},
     volume = {41},
     pages = {19-25}}
    
  108. C.-T. Li & Y. Li
    Digital Camera Identification Using Colour-Decoupled Photo Response Non-Uniformity Noise Pattern
    International Symposium on Circuits and Systems
    2010
    BibTeX
    @inproceedings{Li2010a,
     author = {Li, Chang-Tsun and Li, Yue},
     title = {Digital Camera Identification Using Colour-Decoupled Photo Response Non-Uniformity Noise Pattern},
     booktitle = {International Symposium on Circuits and Systems},
     year = {2010}}
    
  109. S. ping Li, Z. Han, Y. zhen Chen, B. Fu, C. Lu & X. Yao
    Resampling forgery detection in JPEG-compressed images
    Proc. 3rd Int Image and Signal Processing (CISP) Congress
    2010, Vol. 3, pp. 1166-1170
    BibTeX
    @inproceedings{Li2010g,
     author = {Shu-ping Li and Zhi Han and Yi-zhen Chen and Bo Fu and Chunhui Lu and Xiaohui Yao},
     title = {Resampling forgery detection in JPEG-compressed images},
     booktitle = {Proc. 3rd Int Image and Signal Processing (CISP) Congress},
     year = {2010},
     volume = {3},
     pages = {1166--1170}}
    
  110. W. Li & N. Yu
    Rotation Robust Detection of Copy-Move Forgery
    Image Processing (ICIP), 2010 17th IEEE International Conference on
    2010
    BibTeX
    @inproceedings{Li2010f,
     author = {Li, Weihai and Yu, Nenghai},
     title = {Rotation Robust Detection of Copy-Move Forgery},
     booktitle = {Image Processing (ICIP), 2010 17th IEEE International Conference on},
     year = {2010}}
    
  111. W. Li, N. Yu & Y. Yuan
    Identifying camera and processing from cropped JPEG photos via tensor analysis
    Proc. IEEE Int Systems Man and Cybernetics (SMC) Conf
    2010, pp. 3889-3895
    BibTeX
    @inproceedings{Li2010h,
     author = {Weihai Li and Nenghai Yu and Yuan Yuan},
     title = {Identifying camera and processing from cropped JPEG photos via tensor analysis},
     booktitle = {Proc. IEEE Int Systems Man and Cybernetics (SMC) Conf},
     year = {2010},
     pages = {3889--3895}}
    
  112. W. Li, T. Zhang, E. Zheng & X. Ping
    Identifying photorealistic computer graphics using second-order difference statistics
    Proc. Seventh Int Fuzzy Systems and Knowledge Discovery (FSKD) Conf
    2010, Vol. 5, pp. 2316-2319
    BibTeX
    @inproceedings{Li2010d,
     author = {Wenxiang Li and Tao Zhang and Ergong Zheng and Xijian Ping},
     title = {Identifying photorealistic computer graphics using second-order difference statistics},
     booktitle = {Proc. Seventh Int Fuzzy Systems and Knowledge Discovery (FSKD) Conf},
     year = {2010},
     volume = {5},
     pages = {2316--2319}}
    
  113. X. Li, T. Jing & X. Li
    Image splicing detection based on moment features and Hilbert-Huang Transform
    Proc. IEEE Int Information Theory and Information Security (ICITIS) Conf
    2010, pp. 1127-1130
    BibTeX
    @inproceedings{Li2010i,
     author = {Xuefang Li and Tao Jing and Xinghua Li},
     title = {Image splicing detection based on moment features and Hilbert-Huang Transform},
     booktitle = {Proc. IEEE Int Information Theory and Information Security (ICITIS) Conf},
     year = {2010},
     pages = {1127--1130}}
    
  114. S. Lian & Y. Zhang
    Multimedia Forensics for Detecting Forgeries
    Stavroulakis, P. & Stamp, M. (ed.)
    Handbook of Information and Communication Security
    Springer Berlin Heidelberg, 2010, pp. 809-828
    BibTeX
    @incollection{Lian2010,
     author = {Lian, Shiguo and Zhang, Yan},
     title = {Multimedia Forensics for Detecting Forgeries},
     booktitle = {Handbook of Information and Communication Security},
     publisher = {Springer Berlin Heidelberg},
     year = {2010},
     pages = {809-828}}
    
  115. C.-C. Lien, C.-L. Shih & C.-H. Chou
    Fast Forgery Detection with the Intrinsic Resampling Properties
    Proc. Sixth Int Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) Conf
    2010, pp. 232-235
    BibTeX
    @inproceedings{Lien2010,
     author = {Lien, Cheng-Chang and Shih, Cheng-Lun and Chou, Chih-Hsun},
     title = {Fast Forgery Detection with the Intrinsic Resampling Properties},
     booktitle = {Proc. Sixth Int Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) Conf},
     year = {2010},
     pages = {232--235}}
    
  116. G.-S. Lin, M.-K. Chang & Y. lin Chen
    A passive scheme for tampering detection based on quantization table estimation
    Frossard, P., Li, H., Wu, F., Girod, B., Li, S. & Wei, G. (ed.)
    Proceedings of SPIE
    Visual Communications and Image Processing 2010, SPIE, 2010, Vol. 7744(1), pp. 774433
    BibTeX
    @conference{Lin2010,
     author = {Guo-Shiang Lin and Min-Kuan Chang and You-lin Chen},
     title = {A passive scheme for tampering detection based on quantization table estimation},
     booktitle = {Proceedings of SPIE},
     journal = {Visual Communications and Image Processing 2010},
     publisher = {SPIE},
     year = {2010},
     volume = {7744},
     number = {1},
     pages = {774433}}
    
  117. B. bei Liu, H.-K. Lee, Y. Hu & C.-H. Choi
    On classification of source cameras: A graph based approach
    Proc. IEEE Int Information Forensics and Security (WIFS) Workshop
    2010, pp. 1-5
    BibTeX
    @inproceedings{Liu2010c,
     author = {Bei-bei Liu and Heung-Kyu Lee and Yongjian Hu and Chang-Hee Choi},
     title = {On classification of source cameras: A graph based approach},
     booktitle = {Proc. IEEE Int Information Forensics and Security (WIFS) Workshop},
     year = {2010},
     pages = {1--5}}
    
  118. B.-B. Liu, Y. Hu & H.-K. Lee
    Source camera identification from significant noise residual regions
    Proc. 17th IEEE Int Image Processing (ICIP) Conf
    2010, pp. 1749-1752
    BibTeX
    @inproceedings{Liu2010b,
     author = {Liu, Bei-Bei and Hu, Yongjian and Lee, Heung-Kyu},
     title = {Source camera identification from significant noise residual regions},
     booktitle = {Proc. 17th IEEE Int Image Processing (ICIP) Conf},
     year = {2010},
     pages = {1749--1752}}
    
  119. J. Liu, H. Ling, F. Zou, W. Yan & Z. Lu
    Digital Image Forensics Using Multi-Resolution Histograms
    International Journal of Digital Crime and Forensics (IJDCF), 2010, Vol. 2(4), pp. 37-51
    BibTeX
    @article{Liu2010d,
     author = {Jin Liu and Hefei Ling and Fuhao Zou and WeiQi Yan and and Zhengding Lu},
     title = {Digital Image Forensics Using Multi-Resolution Histograms},
     journal = {International Journal of Digital Crime and Forensics (IJDCF)},
     year = {2010},
     volume = {2},
     number = {4},
     pages = {37-51}}
    
  120. C.R.W.L. Liu, L. & D. Cohen-Or
    Optimizing Photo Composition
    Computer Graphics Forum, 2010, Vol. 29(2), pp. 469-478
    BibTeX
    @article{Liu2010,
     author = {Liu, L., Chen, R., Wolf, L. and Cohen-Or, D},
     title = {Optimizing Photo Composition},
     journal = {Computer Graphics Forum},
     year = {2010},
     volume = {29},
     number = {2},
     pages = {469-478}}
    
  121. M. Liu, N. Yu & W. Li
    Camera Model Identification for JPEG Images via Tensor Analysis
    International Conference on Intelligent Information Hiding and Multimedia Signal Processing
    2010, pp. 462-465
    BibTeX
    @inproceedings{Liu2010a,
     author = {Liu, Ming and Yu, Nenghai and Li, Weihai},
     title = {Camera Model Identification for JPEG Images via Tensor Analysis},
     booktitle = {International Conference on Intelligent Information Hiding and Multimedia Signal Processing},
     year = {2010},
     pages = {462-465}}
    
  122. W. Lu, A.L. Varna & M. Wu
    Forensic hash for multimedia information
    Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
    Proc. SPIE
    Media Forensics and Security II, SPIE, 2010, Vol. 7541(1), pp. 75410Y
    BibTeX
    @conference{Lu2010,
     author = {Wenjun Lu and Avinash L. Varna and Min Wu},
     title = {Forensic hash for multimedia information},
     booktitle = {Proc. SPIE},
     journal = {Media Forensics and Security II},
     publisher = {SPIE},
     year = {2010},
     volume = {7541},
     number = {1},
     pages = {75410Y}}
    
  123. S. Luo, D. Wu & S. Wang
    Hiding traces of the blurring effect in digital forgeries
    Proc. Int Information Networking and Automation (ICINA) Conf
    2010, Vol. 2
    BibTeX
    @inproceedings{Luo2010a,
     author = {Siqing Luo and Di Wu and Shen Wang},
     title = {Hiding traces of the blurring effect in digital forgeries},
     booktitle = {Proc. Int Information Networking and Automation (ICINA) Conf},
     year = {2010},
     volume = {2}}
    
  124. W. Luo, J. Huang & G. Qiu
    JPEG Error Analysis and Its Applications to Digital Image Forensics
    IEEE Transactions on Information Forensics and Security, 2010, Vol. PP Issue:99(99), pp. 1
    BibTeX
    @article{Luo2010,
     author = {Luo, W and Huang, J and Qiu, G},
     title = {JPEG Error Analysis and Its Applications to Digital Image Forensics},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2010},
     volume = {PP Issue:99},
     number = {99},
     pages = {1}}
    
  125. S. Lyu
    Estimating vignetting function from a single image for image authentication
    Proceedings of the 12th ACM workshop on Multimedia and security
    ACM, 2010, pp. 3-12
    BibTeX
    @inproceedings{Lyu2010,
     author = {Lyu, Siwei},
     title = {Estimating vignetting function from a single image for image authentication},
     booktitle = {Proceedings of the 12th ACM workshop on Multimedia and security},
     publisher = {ACM},
     year = {2010},
     pages = {3--12}}
    
  126. J. Mace
    Printer Identification Techniques and Their Privacy Implications
    Newcastle University, University of Newcastle upon Tyne, Computing Science, 2010
    BibTeX
    @techreport{Mace2010,
     author = {Mace, John},
     title = {Printer Identification Techniques and Their Privacy Implications},
     publisher = {University of Newcastle upon Tyne, Computing Science},
     year = {2010}}
    
  127. B. Mahdian & S. Saic
    A bibliography on blind methods for identifying image forgery
    Signal Processing: Image Communication, 2010, Vol. 25(6), pp. 389 - 399
    BibTeX
    @article{Mahdian2010,
     author = {Babak Mahdian and Stanislav Saic},
     title = {A bibliography on blind methods for identifying image forgery},
     journal = {Signal Processing: Image Communication},
     year = {2010},
     volume = {25},
     number = {6},
     pages = {389 - 399}}
    
  128. B. Mahdian & S. Saic
    Blind methods for detecting image fakery
    IEEE Aerospace and Electronic Systems Magazine, 2010, Vol. 25(4), pp. 18-24
    BibTeX
    @article{Mahdian2010a,
     author = {Mahdian, B. and Saic, S.},
     title = {Blind methods for detecting image fakery},
     journal = {IEEE Aerospace and Electronic Systems Magazine},
     year = {2010},
     volume = {25},
     number = {4},
     pages = {18--24}}
    
  129. P. Meerwald & A. Uhl
    Watermarking of Raw Digital Images in Camera Firmware
    IPSJ Transactions on Computer Vision and Applications, 2010, Vol. 2( ), pp. 16-24
    BibTeX
    @article{Meerwald2010,
     author = {Meerwald, Peter and Uhl, Andreas},
     title = {Watermarking of Raw Digital Images in Camera Firmware},
     journal = {IPSJ Transactions on Computer Vision and Applications},
     year = {2010},
     volume = {2},
     number = { },
     pages = {16-24}}
    
  130. X.-z. Meng, S.-z. Niu & J.-c. Zou
    Tamper Detection for Shifted Double JPEG Compression
    Proc. Sixth Int Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) Conf
    2010, pp. 434-437
    BibTeX
    @inproceedings{Meng2010,
     author = {Meng, Xian-zhe and Niu, Shao-zhang and Zou, Jian-chen},
     title = {Tamper Detection for Shifted Double JPEG Compression},
     booktitle = {Proc. Sixth Int Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) Conf},
     year = {2010},
     pages = {434--437}}
    
  131. A.K. Mikkilineni, N. Khanna & E.J. Delp
    Texture based attacks on intrinsic signature based printer identification
    Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
    Media Forensics and Security II
    Media Forensics and Security II, SPIE, 2010, Vol. 7541(1), pp. 75410T
    BibTeX
    @inproceedings{Mikkilineni2010,
     author = {Aravind K. Mikkilineni and Nitin Khanna and Edward J. Delp},
     title = {Texture based attacks on intrinsic signature based printer identification},
     booktitle = {Media Forensics and Security II},
     journal = {Media Forensics and Security II},
     publisher = {SPIE},
     year = {2010},
     volume = {7541},
     number = {1},
     pages = {75410T}}
    
  132. L. Nataraj, A. Sarkar & B.S. Manjunath
    Improving re-sampling detection by adding noise
    Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
    Media Forensics and Security II
    Media Forensics and Security II, SPIE, 2010, Vol. 7541(1), pp. 75410I
    BibTeX
    @inproceedings{Nataraj2010a,
     author = {Lakshmanan Nataraj and Anindya Sarkar and B. S. Manjunath},
     title = {Improving re-sampling detection by adding noise},
     booktitle = {Media Forensics and Security II},
     journal = {Media Forensics and Security II},
     publisher = {SPIE},
     year = {2010},
     volume = {7541},
     number = {1},
     pages = {75410I}}
    
  133. L. Nataraj, A. Sarkar & B.S. Manjunath
    Improving re-sampling detection by adding noise
    Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series
    2010, Vol. 7541
    BibTeX
    @inproceedings{Nataraj2010,
     author = {Nataraj, L. and Sarkar, A. and Manjunath, B.~S.},
     title = {Improving re-sampling detection by adding noise},
     booktitle = {Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series},
     year = {2010},
     volume = {7541}}
    
  134. X. Pan & S. Lyu
    Detecting Image Region Duplication Using SIFT Features
    International Conference on Acoustics, Speech, and Signal Processing
    2010
    BibTeX
    @inproceedings{Pan2010,
     author = {Pan, Xunyu and Lyu, Siwei},
     title = {Detecting Image Region Duplication Using SIFT Features},
     booktitle = {International Conference on Acoustics, Speech, and Signal Processing},
     year = {2010}}
    
  135. X. Pan & S. Lyu
    Region Duplication Detection Using Image Feature Matching
    IEEE Transactions on Information Forensics and Security, 2010, Vol. 5(4), pp. 857-867
    BibTeX
    @article{Pan2010a,
     author = {Pan, Xunyu. and Lyu, Siwei},
     title = {Region Duplication Detection Using Image Feature Matching},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2010},
     volume = {5},
     number = {4},
     pages = {857--867}}
    
  136. F. Peng & X. lan Wang
    Digital Image Forgery Forensics by Using Blur Estimation and Abnormal Hue Detection
    Proc. Symp. Photonics and Optoelectronic (SOPO)
    2010, pp. 1-4
    BibTeX
    @inproceedings{Peng2010,
     author = {Fei Peng and Xi-lan Wang},
     title = {Digital Image Forgery Forensics by Using Blur Estimation and Abnormal Hue Detection},
     booktitle = {Proc. Symp. Photonics and Optoelectronic (SOPO)},
     year = {2010},
     pages = {1--4}}
    
  137. S. Prasad
    Signal Processing Algorithms For Digital Image Forensics
    Faculty of Engineering, 2010
    BibTeX
    @mastersthesis{Prasad2010,
     author = {Prasad, S},
     title = {Signal Processing Algorithms For Digital Image Forensics},
     school = {Faculty of Engineering},
     year = {2010}}
    
  138. G. Qadir, X. Zhao & A.T.S. Ho
    Estimating JPEG2000 compression for image forensics using Benford´s Law
    Schelkens, P., Ebrahimi, T., Cristobal, G., Truchetet, F. & Saarikko, P. (ed.)
    Proc. SPIE 7723
    Optics, Photonics, and Digital Technologies for Multimedia Applications, SPIE, 2010, Vol. 7723(1), pp. 77230J
    BibTeX
    @conference{Qadir2010,
     author = {Ghulam Qadir and Xi Zhao and Anthony T. S. Ho},
     title = {Estimating JPEG2000 compression for image forensics using Benford´s Law},
     booktitle = {Proc. SPIE 7723},
     journal = {Optics, Photonics, and Digital Technologies for Multimedia Applications},
     publisher = {SPIE},
     year = {2010},
     volume = {7723},
     number = {1},
     pages = {77230J}}
    
  139. Z. Qidan & L. Ke
    Image stitching using simplified SIFT
    Proc. IEEE Int Information and Automation (ICIA) Conf
    2010, pp. 1134-1137
    BibTeX
    @inproceedings{Qidan2010,
     author = {Zhu Qidan and Li Ke},
     title = {Image stitching using simplified SIFT},
     booktitle = {Proc. IEEE Int Information and Automation (ICIA) Conf},
     year = {2010},
     pages = {1134--1137}}
    
  140. F. Ramsthaler, M. Kettner, S. Potente, A. Gehl, K. Kreutz & M. Verhoff
    Original oder manipuliert?
    Rechtsmedizin, 2010, Vol. -, pp. -
    BibTeX
    @article{Ramsthaler2010,
     author = {Ramsthaler, F. and Kettner, M. and Potente, S. and Gehl, A. and Kreutz, K. and Verhoff, M.A.},
     title = {Original oder manipuliert?},
     journal = {Rechtsmedizin},
     year = {2010},
     volume = {-},
     pages = {--}}
    
  141. J. Redi, W. Taktak & J.-L. Dugelay
    Digital image forensics: a booklet for beginners
    Multimedia Tools and Applications, Springer Netherlands, 2010, pp. 1-30
    BibTeX
    @booklet{Redi2010,
     author = {Redi, Judith and Taktak, Wiem and Dugelay, Jean-Luc},
     title = {Digital image forensics: a booklet for beginners},
     journal = {Multimedia Tools and Applications},
     publisher = {Springer Netherlands},
     year = {2010},
     pages = {1-30}}
    
  142. C. Riess & E. Angelopoulou
    Scene Illumination as an Indicator of Image Manipulation
    International Workshop on Information Hiding
    2010
    BibTeX
    @inproceedings{Riess2010,
     author = {Riess, Christian and Angelopoulou, Elli},
     title = {Scene Illumination as an Indicator of Image Manipulation},
     booktitle = {International Workshop on Information Hiding},
     year = {2010}}
    
  143. A.D. Rosa, F. Uccheddu, A. Costanzo, A. Piva & M. Barni
    Exploring image dependencies: a new challenge in image forensics
    Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
    Media Forensics and Security II
    Media Forensics and Security II, SPIE, 2010, Vol. 7541(1), pp. 75410X
    BibTeX
    @inproceedings{Rosa2010,
     author = {A. De Rosa and F. Uccheddu and A. Costanzo and A. Piva and M. Barni},
     title = {Exploring image dependencies: a new challenge in image forensics},
     booktitle = {Media Forensics and Security II},
     journal = {Media Forensics and Security II},
     publisher = {SPIE},
     year = {2010},
     volume = {7541},
     number = {1},
     pages = {75410X}}
    
  144. S.-J. Ryu, H.-Y. Lee, D.-H. Im, J.-H. Choi & H.-K. Lee
    Electrophotographic Printer Identification by Halftone Texture Analysis
    IEEE International Conference on Acoustics, Speech and Signal Processing
    2010, pp. 1846-1849
    BibTeX
    @inproceedings{Ryu2010a,
     author = {Ryu, Seung-Jin and Lee, Hae-Yeoun and Im, Dong-Hyuck and Choi, Jung-Ho and Lee, Heung-Kyu},
     title = {Electrophotographic Printer Identification by Halftone Texture Analysis},
     booktitle = {IEEE International Conference on Acoustics, Speech and Signal Processing},
     year = {2010},
     pages = {1846-1849}}
    
  145. S.-J. Ryu, M.-J. Lee & H.-K. Lee
    Detection of Copy-Rotate-Move Forgery using Zernike Moments
    International Workshop on Information Hiding
    2010
    BibTeX
    @inproceedings{Ryu2010,
     author = {Ryu, Seung-Jin and Lee, Min-Jeong and Lee, Heung-Kyu},
     title = {Detection of Copy-Rotate-Move Forgery using Zernike Moments},
     booktitle = {International Workshop on Information Hiding},
     year = {2010}}
    
  146. M. Sharma & S. Jha
    Uses of software in digital image analysis: a forensic report
    Jusoff, K. & Xie, Y. (ed.)
    Second International Conference on Digital Image Processing
    Second International Conference on Digital Image Processing, SPIE, 2010, Vol. 7546(1), pp. 75462B
    BibTeX
    @conference{Sharma2010,
     author = {Mukesh Sharma and Shailendra Jha},
     title = {Uses of software in digital image analysis: a forensic report},
     booktitle = {Second International Conference on Digital Image Processing},
     journal = {Second International Conference on Digital Image Processing},
     publisher = {SPIE},
     year = {2010},
     volume = {7546},
     number = {1},
     pages = {75462B}}
    
  147. F.Y. Shih
    Image processing and pattern recognition
    Hanzo, L. (ed.)
    Wiley-Interscience, 2010
    BibTeX
    @book{Shih2010,
     author = {Frank Y. Shih},
     title = {Image processing and pattern recognition},
     publisher = {Wiley-Interscience},
     year = {2010}}
    
  148. F.Y. Shih & Y. Yuan
    A Comparison Study on Copy-Cover Image Forgery Detection
    The Open Artificial Intelligence Journal, 2010, Vol. 4, pp. 49-54
    BibTeX
    @article{Shih,
     author = {Shih, Frank Y. and Yuan, Yuan},
     title = {A Comparison Study on Copy-Cover Image Forgery Detection},
     journal = {The Open Artificial Intelligence Journal},
     year = {2010},
     volume = {4},
     pages = {49-54}}
    
  149. B. Shivakumar & L.D.S.S. Baboo
    Detecting Copy-Move Forgery in Digital Images:A Survey and Analysis of Current Methods
    Global Journal of Computer Science and Technology, 2010, Vol. 10(7), pp. 61-65
    BibTeX
    @article{Shivakumar2010,
     author = {B.L. Shivakumar and Lt. Dr. S. Santhosh Baboo},
     title = {Detecting Copy-Move Forgery in Digital Images:A Survey and Analysis of Current Methods},
     journal = {Global Journal of Computer Science and Technology},
     year = {2010},
     volume = {10},
     number = {7},
     pages = {61-65}}
    
  150. M. Sorell
    Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions
    Klinger, K. (ed.)
    Chapter Digital Camera Photographic Provenance (Chapter 5)
    Information Science Reference, 2010, pp. 104-129
    BibTeX
    @inbook{Sorell2010,
     author = {Matthew Sorell},
     title = {Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions},
     publisher = {Information Science Reference},
     year = {2010},
     pages = {104-129}}
    
  151. M. Stamm & J.R. Liu
    Forensic Detection of Image Manipulation Using Statistical Intrinsic Fingerprints
    IEEE Transactions on Information Forensics and Security, 2010, Vol. PP Issue:99(99), pp. 1
    BibTeX
    @article{Stamm2010a,
     author = {Stamm, M and Liu, J. R.},
     title = {Forensic Detection of Image Manipulation Using Statistical Intrinsic Fingerprints},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2010},
     volume = {PP Issue:99},
     number = {99},
     pages = {1}}
    
  152. M. Stamm & K.J.R. Liu
    Wavelet-Based Image Compression Anti-Forensics
    International Conference on Image Processing
    2010
    BibTeX
    @inproceedings{Stamm2010b,
     author = {Stamm, Matthew and Liu, K. J. Ray},
     title = {Wavelet-Based Image Compression Anti-Forensics},
     booktitle = {International Conference on Image Processing},
     year = {2010}}
    
  153. M. Stamm, S. Tjoa, W.S. Lin & K.J.R. Liu
    Undetectable Image Tampering Through JPEG Compression Anti-Forensics
    International Conference on Image Processing
    2010
    BibTeX
    @inproceedings{Stamm2010d,
     author = {Stamm, Matthew and Tjoa, Steven and Lin, W. Sabrina and Liu, K. J. Ray},
     title = {Undetectable Image Tampering Through JPEG Compression Anti-Forensics},
     booktitle = {International Conference on Image Processing},
     year = {2010}}
    
  154. M.C. Stamm & K.J.R. Liu
    Forensic estimation and reconstruction of a contrast enhancement mapping
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2010
    2010, pp. 1698-1701
    BibTeX
    @inproceedings{Stamm2010c,
     author = {Stamm, Matthew C. and Liu, K. J. Ray},
     title = {Forensic estimation and reconstruction of a contrast enhancement mapping},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2010},
     year = {2010},
     pages = {1698--1701}}
    
  155. M.C. Stamm, S.K. Tjoa, W.S. Lin & K.J.R. Liu
    Anti-forensics of JPEG compression
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2010
    2010, pp. 1694-1697
    BibTeX
    @inproceedings{Stamm2010,
     author = {Stamm, Matthew C. and Tjoa, Steven K. and Lin, W. Sabrina and Liu, K. J. Ray},
     title = {Anti-forensics of JPEG compression},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2010},
     year = {2010},
     pages = {1694--1697}}
    
  156. M. Steinebach, H. Liu, P. Fan & S. Katzenbeisser
    Cell Phone Camera Ballistics: Attacks and Countermeasures
    SPIE Conference on Multimedia on Mobile Devices
    2010
    BibTeX
    @inproceedings{Steinebach2010a,
     author = {Steinebach, Martin and Liu, Huajian and Fan, Peishuai and Katzenbeisser, Stefan},
     title = {Cell Phone Camera Ballistics: Attacks and Countermeasures},
     booktitle = {SPIE Conference on Multimedia on Mobile Devices},
     year = {2010}}
    
  157. M. Steinebach, H.L. Mohamed El Ouariachi & S. Katzenbeisser
    On the Reliability of Cell Phone Camera Fingerprint Recognition
    Goel, S. (ed.)
    Chapter On the Reliability of Cell Phone Camera Fingerprint Recognition
    Springer Berlin Heidelberg, 2010, Vol. 31, pp. 69-76
    BibTeX
    @inbook{Steinebach2010,
     author = {Steinebach, Martin and Mohamed El Ouariachi, Huajian Liu and Stefan Katzenbeisser},
     title = {On the Reliability of Cell Phone Camera Fingerprint Recognition},
     publisher = {Springer Berlin Heidelberg},
     year = {2010},
     volume = {31},
     pages = {69-76}}
    
  158. Y. Su & J. Xu
    Detection of Double-Compression in MPEG-2 Videos
    Proc. 2nd Int Intelligent Systems and Applications (ISA) Workshop
    2010, pp. 1-4
    BibTeX
    @inproceedings{Su2010a,
     author = {Yuting Su and Junyu Xu},
     title = {Detection of Double-Compression in MPEG-2 Videos},
     booktitle = {Proc. 2nd Int Intelligent Systems and Applications (ISA) Workshop},
     year = {2010},
     pages = {1--4}}
    
  159. Y. Su, J. Zhang, Y. Han, J. Chen & Q. Liu
    Exposing Digital Video Logo-removal Forgery by Inconsistency of Blur
    International Journal of Pattern Recognition and Artificial Intelligence (IJPRAI), 2010, Vol. 24(7), pp. 1027-1046
    BibTeX
    @article{Su2010,
     author = {Yuting Su and Jing Zhang and Yu Han and Jing Chen and Qingzhong Liu},
     title = {Exposing Digital Video Logo-removal Forgery by Inconsistency of Blur},
     journal = {International Journal of Pattern Recognition and Artificial Intelligence (IJPRAI)},
     year = {2010},
     volume = {24},
     number = {7},
     pages = {1027-1046}}
    
  160. P. Sutthiwan, Y.Q. Shi, J. Dong, T. Tan & T.-T. Ng
    New Developments in Color Image Tampering Detection
    International Symposium on Circuits and Systems
    2010
    BibTeX
    @inproceedings{Sutthiwan2010a,
     author = {Sutthiwan, Patchara and Shi, Yun Qing and Dong, Jing and Tan, Tieniu and Ng, Tian-Tsong},
     title = {New Developments in Color Image Tampering Detection},
     booktitle = {International Symposium on Circuits and Systems},
     year = {2010}}
    
  161. P. Sutthiwan, Y.Q. Shi, W. Su & T.-T. Ng
    Rake Transform and Edge Statistics for Image Forgery Detection
    IEEE International Conference on Multimedia and EXPO
    2010
    BibTeX
    @inproceedings{Sutthiwan2010,
     author = {Sutthiwan, Patchara and Shi, Yun Qing and Su, Wei and Ng, Tian-Tsong},
     title = {Rake Transform and Edge Statistics for Image Forgery Detection},
     booktitle = {IEEE International Conference on Multimedia and EXPO},
     year = {2010}}
    
  162. J. Takamatsu, T. Ogasawara, Y. Matsushita & K. Ikeuchi
    Estimating demosaicing algorithms using image noise variance
    Nara Institute of Science and Technology, 2010
    BibTeX
    @techreport{Takamatsu2010,
     author = {Takamatsu, Jun and Ogasawara, Tsukasa and Matsushita, Yasuyuki and Ikeuchi, Katsushi},
     title = {Estimating demosaicing algorithms using image noise variance},
     year = {2010}}
    
  163. P. Tuladhar
    Non­attribution Properties of JPEG Quantization Tables
    University of New Orleans, 2010
    BibTeX
    @mastersthesis{Tuladhar2010,
     author = {Punnya Tuladhar},
     title = {Non­attribution Properties of JPEG Quantization Tables},
     school = {University of New Orleans},
     year = {2010}}
    
  164. F. Uccheddu, A.D. Rosa, A. Piva & M. Barni
    Detection of resampled images: performance analysis and practical challenges
    Proceedings of the 18th European Signal Processing Conference (EUSIPCO-2010)
    2010
    BibTeX
    @inproceedings{Uccheddu2010,
     author = {F. Uccheddu and A. De Rosa and A. Piva and M. Barni},
     title = {Detection of resampled images: performance analysis and practical challenges},
     booktitle = {Proceedings of the 18th European Signal Processing Conference (EUSIPCO-2010)},
     year = {2010}}
    
  165. D. Vazquez-Padin, C. Mosquera & F. Perez-Gonzalez
    Two-Dimensional Statistical Test for the Presence of Almost Cyclostationarity on Images
    International Conference on Image Processing
    2010
    BibTeX
    @inproceedings{Vazquez-Padin2010,
     author = {Vazquez-Padin, David and Mosquera, Carlos and Perez-Gonzalez, Fernando},
     title = {Two-Dimensional Statistical Test for the Presence of Almost Cyclostationarity on Images},
     booktitle = {International Conference on Image Processing},
     year = {2010}}
    
  166. A.W.A. Wahab & P. Bateman
    Conditional Probability Based Camera Identification
    International Journal of Cryptology Research, 2010, Vol. 2(1), pp. 63-71
    BibTeX
    @article{Wahab2010,
     author = {Ainuddin Wahid Abdul Wahab and Philip Bateman},
     title = {Conditional Probability Based Camera Identification},
     journal = {International Journal of Cryptology Research},
     year = {2010},
     volume = {2},
     number = {1},
     pages = {63-71}}
    
  167. G. Wang, W. Lang & J. Wang
    Improved method for source camera forensics using JPEG compression images
    Proc. IEEE Int Information Theory and Information Security (ICITIS) Conf
    2010, pp. 84-87
    BibTeX
    @inproceedings{Wang2010a,
     author = {Gengzhong Wang and Wenhui Lang and Jianshe Wang},
     title = {Improved method for source camera forensics using JPEG compression images},
     booktitle = {Proc. IEEE Int Information Theory and Information Security (ICITIS) Conf},
     year = {2010},
     pages = {84--87}}
    
  168. J. Wang, G. Liu, B. Xu, H. Li, Y. Dai & Z. Wang
    Image Forgery Forensics Based on Manual Blurred Edge Detection
    Proc. Int Multimedia Information Networking and Security (MINES) Conf
    2010, pp. 907-911
    BibTeX
    @inproceedings{Wang2010d,
     author = {Junwen Wang and Guangjie Liu and Bo Xu and Hongyuan Li and Yuewei Dai and Zhiquan Wang},
     title = {Image Forgery Forensics Based on Manual Blurred Edge Detection},
     booktitle = {Proc. Int Multimedia Information Networking and Security (MINES) Conf},
     year = {2010},
     pages = {907--911}}
    
  169. W. Wang, J. Dong & T. Tan
    Image tampering detection based on stationary distribution of Markov chain
    Proc. 17th IEEE Int Image Processing (ICIP) Conf
    2010, pp. 2101-2104
    BibTeX
    @inproceedings{Wang2010,
     author = {Wang, Wei and Dong, Jing and Tan, Tieniu},
     title = {Image tampering detection based on stationary distribution of Markov chain},
     booktitle = {Proc. 17th IEEE Int Image Processing (ICIP) Conf},
     year = {2010},
     pages = {2101--2104}}
    
  170. W. Wei, S. Wang, X. Zhang & Z. Tang
    Estimation of Image Rotation Angle Using Interpolation-Related Spectral Signatures With Application to Blind Detection of Image Forgery
    IEEE Transactions on Information Forensics and Security, 2010, Vol. 5(3), pp. 507-517
    BibTeX
    @article{Wei2010,
     author = {Weimin Wei and Shuozhong Wang and Xinpeng Zhang and Zhenjun Tang},
     title = {Estimation of Image Rotation Angle Using Interpolation-Related Spectral Signatures With Application to Blind Detection of Image Forgery},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2010},
     volume = {5},
     number = {3},
     pages = {507--517}}
    
  171. J. Weir & W. Yan
    Resolution variant visual cryptography for street view of Google Maps
    Proc. IEEE Int Circuits and Systems (ISCAS) Symp
    2010, pp. 1695-1698
    BibTeX
    @inproceedings{Weir2010,
     author = {Weir, Jonathan and Yan, WeiQi},
     title = {Resolution variant visual cryptography for street view of Google Maps},
     booktitle = {Proc. IEEE Int Circuits and Systems (ISCAS) Symp},
     year = {2010},
     pages = {1695--1698}}
    
  172. M. Wohlmayr
    Blind Source Separation: Eine Einführung
    2010
    BibTeX
    @misc{Wohlmayr2010,
     author = {Wohlmayr, Michael},
     title = {Blind Source Separation: Eine Einführung},
     year = {2010}}
    
  173. L. Wu & X. Cao
    Geo-location estimation from two shadow trajectories
    Proc. IEEE Conf. Computer Vision and Pattern Recognition (CVPR)
    2010, pp. 585-590
    BibTeX
    @inproceedings{Wu2010a,
     author = {Wu, Lin and Cao, Xiaochun},
     title = {Geo-location estimation from two shadow trajectories},
     booktitle = {Proc. IEEE Conf. Computer Vision and Pattern Recognition (CVPR)},
     year = {2010},
     pages = {585--590}}
    
  174. L. Wu, X. Cao & H. Foroosh
    Camera calibration and geo-location estimation from two shadow trajectories
    Computer Vision and Image Understanding, 2010, Vol. 114(8), pp. 915 - 927
    BibTeX
    @article{Wu2010,
     author = {Lin Wu and Xiaochun Cao and Hassan Foroosh},
     title = {Camera calibration and geo-location estimation from two shadow trajectories},
     journal = {Computer Vision and Image Understanding},
     year = {2010},
     volume = {114},
     number = {8},
     pages = {915 - 927}}
    
  175. W. Xu, H. Huang & W. Yu
    A study of medical image tampering detection
    Proc. Int Medical Image Analysis and Clinical Applications (MIACA) Conf
    2010, pp. 131-134
    BibTeX
    @inproceedings{Xu2010,
     author = {Weijian Xu and Hui Huang and Wenxue Yu},
     title = {A study of medical image tampering detection},
     booktitle = {Proc. Int Medical Image Analysis and Clinical Applications (MIACA) Conf},
     year = {2010},
     pages = {131--134}}
    
  176. T. Yamasaki, T. Matsunami & K. Aizawa
    Detecting Resized JPEG Images by Analyzing High Frequency Elements in DCT Coefficients
    Proc. Sixth Int Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) Conf
    2010, pp. 567-570
    BibTeX
    @inproceedings{Yamasaki2010,
     author = {Yamasaki, Toshihiko and Matsunami, Tomoaki and Aizawa, Kiyoharu},
     title = {Detecting Resized JPEG Images by Analyzing High Frequency Elements in DCT Coefficients},
     booktitle = {Proc. Sixth Int Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) Conf},
     year = {2010},
     pages = {567--570}}
    
  177. R. Yang, Y.Q. Shi & J. Huang
    Detecting Double Compression of Audio Signal
    SPIE Conference on Media Forensics and Security
    2010
    BibTeX
    @inproceedings{Yang2010,
     author = {Yang, Rui and Shi, Yun Qing and Huang, Jiwu},
     title = {Detecting Double Compression of Audio Signal},
     booktitle = {SPIE Conference on Media Forensics and Security},
     year = {2010}}
    
  178. C. Zhang & H. Zhang
    Exposing Digital Image Forgeries by Using Canonical Correlation Analysis
    Proc. 20th Int Pattern Recognition (ICPR) Conf
    2010, pp. 838-841
    BibTeX
    @inproceedings{Zhang2010b,
     author = {Chi Zhang and Hongbin Zhang},
     title = {Exposing Digital Image Forgeries by Using Canonical Correlation Analysis},
     booktitle = {Proc. 20th Int Pattern Recognition (ICPR) Conf},
     year = {2010},
     pages = {838--841}}
    
  179. C. Zhang & H. Zhang
    Identifying color image origin using curvelet transform
    Proc. 17th IEEE Int Image Processing (ICIP) Conf
    2010, pp. 2125-2128
    BibTeX
    @inproceedings{Zhang2010c,
     author = {Zhang, Chi and Zhang, Hongbin},
     title = {Identifying color image origin using curvelet transform},
     booktitle = {Proc. 17th IEEE Int Image Processing (ICIP) Conf},
     year = {2010},
     pages = {2125--2128}}
    
  180. W. Zhang, X. Cao, Y. Qu, Y. Hou, H. Zhao & C. Zhang
    Detecting and Extracting the Photo Composites Using Planar Homography and Graph Cut
    IEEE Transactions on Information Forensics and Security, 2010, Vol. 5(3), pp. 544-555
    BibTeX
    @article{Zhang2010,
     author = {Zhang, W. and Cao, X. and Qu, Y. and Hou, Y. and Zhao, H. and Zhang, C.},
     title = {Detecting and Extracting the Photo Composites Using Planar Homography and Graph Cut},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2010},
     volume = {5},
     number = {3},
     pages = {544--555}}
    
  181. Z. Zhang, Z. Yu & B. Su
    Detection of composite forged image
    Proc. Int Computer Application and System Modeling (ICCASM) Conf
    2010, Vol. 11
    BibTeX
    @inproceedings{Zhang2010a,
     author = {Zhen Zhang and Zhou Yu and BaiNa Su},
     title = {Detection of composite forged image},
     booktitle = {Proc. Int Computer Application and System Modeling (ICCASM) Conf},
     year = {2010},
     volume = {11}}
    
  182. F. Zhao, Z. Yu & S. Li
    Detecting Double Compressed JPEG Images by Using Moment Features of Mode Based DCT Histograms
    Proc. Int Multimedia Technology (ICMT) Conf
    2010, pp. 1-4
    BibTeX
    @inproceedings{Zhao2010,
     author = {Feng Zhao and Zhenhua Yu and Shenghong Li},
     title = {Detecting Double Compressed JPEG Images by Using Moment Features of Mode Based DCT Histograms},
     booktitle = {Proc. Int Multimedia Technology (ICMT) Conf},
     year = {2010},
     pages = {1--4}}
    
  183. E. Zheng, X. Ping & T. Zhang
    Detecting Composite JPEG Images in Transform Domain
    Proc. Int Multimedia Information Networking and Security (MINES) Conf
    2010, pp. 340-344
    BibTeX
    @inproceedings{Zheng2010,
     author = {Ergong Zheng and Xijian Ping and Tao Zhang},
     title = {Detecting Composite JPEG Images in Transform Domain},
     booktitle = {Proc. Int Multimedia Information Networking and Security (MINES) Conf},
     year = {2010},
     pages = {340--344}}
    
  184. Q. Zheng, W. Sun & W. Lu
    Digital spliced image forensics based on edge blur measurement
    Proc. IEEE Int Information Theory and Information Security (ICITIS) Conf
    2010, pp. 399-402
    BibTeX
    @inproceedings{Zheng2010a,
     author = {Qianru Zheng and Wei Sun and Wei Lu},
     title = {Digital spliced image forensics based on edge blur measurement},
     booktitle = {Proc. IEEE Int Information Theory and Information Security (ICITIS) Conf},
     year = {2010},
     pages = {399--402}}
    
  185. Z.-p. Zhou & X.-x. Zhang
    Image splicing detection based on image quality and analysis of variance
    Proc. 2nd Int Education Technology and Computer (ICETC) Conf
    2010, Vol. 4
    BibTeX
    @inproceedings{Zhou2010,
     author = {Zhou, Zhi-ping and Zhang, Xiao-xiang},
     title = {Image splicing detection based on image quality and analysis of variance},
     booktitle = {Proc. 2nd Int Education Technology and Computer (ICETC) Conf},
     year = {2010},
     volume = {4}}
    


2009

  1. R. Achanta & S. Susstrunk
    Saliency detection for content-aware image resizing
    Proc. 16th IEEE Int Image Processing (ICIP) Conf
    2009, pp. 1005-1008
    BibTeX
    @inproceedings{Achanta2009,
     author = {Achanta, R. and Susstrunk, S. },
     title = {Saliency detection for content-aware image resizing},
     booktitle = {Proc. 16th IEEE Int Image Processing (ICIP) Conf},
     year = {2009},
     pages = {1005--1008}}
    
  2. S. Aja-Fernández, G.V. Sánchez-Ferrero, M. Martín-Fernández & C. Alberola-López
    Automatic noise estimation in images using local statistics. Additive and multiplicative cases
    Image and Vision Computing , 2009, Vol. 27(6), pp. 756 - 770
    BibTeX
    @article{Aja-Fernandez2009,
     author = {Santiago Aja-Fernández and Gonzalo Vegas-Sánchez-Ferrero and Marcos Martín-Fernández and Carlos Alberola-López},
     title = {Automatic noise estimation in images using local statistics. Additive and multiplicative cases },
     journal = {Image and Vision Computing },
     year = {2009},
     volume = {27},
     number = {6},
     pages = {756 - 770}}
    
  3. E.J. Alles, Z.J. Geradts & C.J. Veenman
    Source Camera Identification for Heavily JPEG Compressed Low Resolution Still Images
    Journal of Forensic Sciences, 2009, Vol. 54(3), pp. 628-638
    BibTeX
    @article{Alles2009,
     author = {Alles, Erwin J. and Geradts, Zeno J. and Veenman, Cor. J.},
     title = {Source Camera Identification for Heavily JPEG Compressed Low Resolution Still Images},
     journal = {Journal of Forensic Sciences},
     year = {2009},
     volume = {54},
     number = {3},
     pages = {628-638}}
    
  4. I. Amerini, R. Caldelli, V. Cappellini, F. Picchioni & A. Piva
    Analysis of denoising filters for photo response non uniformity noise extraction in source camera identification
    DSP´09: Proceedings of the 16th international conference on Digital Signal Processing
    IEEE Press, 2009, pp. 511-517
    BibTeX
    @inproceedings{Amerini2009,
     author = {Amerini, Irene and Caldelli, Roberto and Cappellini, Vito and Picchioni, Francesco and Piva, Alessandro},
     title = {Analysis of denoising filters for photo response non uniformity noise extraction in source camera identification},
     booktitle = {DSP´09: Proceedings of the 16th international conference on Digital Signal Processing},
     publisher = {IEEE Press},
     year = {2009},
     pages = {511--517}}
    
  5. E. Ardizzone & G. Mazzola
    Detection of Duplicated Regions in Tampered Digital Images by Bit-Plane Analysis
    Image Analysis and Processing
    2009, pp. 893-901
    BibTeX
    @inproceedings{Ardizzone2009,
     author = {Ardizzone, Edoardo and Mazzola, Giuseppe},
     title = {Detection of Duplicated Regions in Tampered Digital Images by Bit-Plane Analysis},
     booktitle = {Image Analysis and Processing},
     year = {2009},
     pages = {893-901}}
    
  6. N. Bartlow, N. Kalka, B. Cukic & A. Ross
    Identifying sensors from fingerprint images
    Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition Workshops CVPR Workshops 2009
    2009, pp. 78-84
    BibTeX
    @inproceedings{Bartlow2009,
     author = {Bartlow, N. and Kalka, N. and Cukic, B. and Ross, A.},
     title = {Identifying sensors from fingerprint images},
     booktitle = {Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition Workshops CVPR Workshops 2009},
     year = {2009},
     pages = {78--84}}
    
  7. P. Bateman, A.T.S. Ho & A. Woodward
    Image Forensics of Digital Cameras by Analysing Image Variations Using Statistical Process Control
    International Conference on Information, Communications and Signal Processing
    2009
    BibTeX
    @inproceedings{Bateman2009,
     author = {Bateman, Philip and Ho, Anthony T. S. and Woodward, Alan},
     title = {Image Forensics of Digital Cameras by Analysing Image Variations Using Statistical Process Control},
     booktitle = {International Conference on Information, Communications and Signal Processing},
     year = {2009}}
    
  8. S. Battiato & G. Messina
    Digital forgery estimation into DCT domain: a critical analysis
    MiFor ´09: Proceedings of the First ACM workshop on Multimedia in forensics
    ACM, 2009, pp. 37-42
    BibTeX
    @inproceedings{Battiato2009,
     author = {Battiato, Sebastiano and Messina, Giuseppe},
     title = {Digital forgery estimation into DCT domain: a critical analysis},
     booktitle = {MiFor ´09: Proceedings of the First ACM workshop on Multimedia in forensics},
     publisher = {ACM},
     year = {2009},
     pages = {37--42}}
    
  9. S. Battiato, G. Messina & R. Rizzo
    Image Forensics
    Università di Catania Dipartimento di Matematica ed Informatica Image Processing Laboratory, 2009
    BibTeX
    @techreport{Battiato2009a,
     author = {Battiato, Sebastiano and Messina, Giuseppe and Rizzo, Rosetta},
     title = {Image Forensics},
     year = {2009}}
    
  10. S. Bayram, H.T. Sencar & N. Memon
    An efficient and robust method for detecting copy-move forgery
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2009
    2009, pp. 1053-1056
    BibTeX
    @inproceedings{Bayram2009,
     author = {Bayram, S. and Sencar, H. T. and Memon, N.},
     title = {An efficient and robust method for detecting copy-move forgery},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2009},
     year = {2009},
     pages = {1053--1056}}
    
  11. R. Böhme, F. Freiling, T. Gloe & M. Kirchner
    Multimedia-Forensik als Teildisziplin der digitalen Forensik
    Fischer, S., Maehle, E. & Reischuk, R. (ed.)
    Informatik 2009, Im Fokus das Leben, 28.9.-2.10.2009, Lübeck,
    2009, Vol. 154
    BibTeX
    @conference{Boehme2009,
     author = {Böhme, R. and Freiling, F. and Gloe, T. and Kirchner, M.},
     title = {Multimedia-Forensik als Teildisziplin der digitalen Forensik},
     booktitle = {Informatik 2009, Im Fokus das Leben, 28.9.-2.10.2009, Lübeck,},
     year = {2009},
     volume = {154}}
    
  12. R. Böhme, F. Freiling, T. Gloe & M. Kirchner
    Multimedia Forensics is not Computer Forensics
    Geradts, Z. J., Franke, K. Y. & Veenman, C. J. (ed.)
    Third International Workshop on Computational Forensics
    2009, pp. 90-103
    BibTeX
    @inproceedings{Bohme2009,
     author = {Böhme, Rainer and Freiling, Felix and Gloe, Thomas and Kirchner, Matthias},
     title = {Multimedia Forensics is not Computer Forensics},
     booktitle = {Third International Workshop on Computational Forensics},
     year = {2009},
     pages = {90-103}}
    
  13. A. Bovik
    The Essential Guide to Image Processing
    Academic Press, 2009
    BibTeX
    @book{Bovik2009,
     author = {Bovik, Al},
     title = {The Essential Guide to Image Processing},
     publisher = {Academic Press},
     year = {2009}}
    
  14. S. Bravo-Solorio & A.K. Nandi
    Passive Forensic Method for Detecting Duplicated Regions Affected by Reflection, Rotation and Scaling
    Proceedings of the 17th European Signal Processing Conference (EUSIPCO 2009)
    2009, pp. 824-828
    BibTeX
    @inproceedings{Bravo-Solorio2009,
     author = {Bravo-Solorio, Sergio and Nandi, Asoke K.},
     title = {Passive Forensic Method for Detecting Duplicated Regions Affected by Reflection, Rotation and Scaling},
     booktitle = {Proceedings of the 17th European Signal Processing Conference (EUSIPCO 2009)},
     year = {2009},
     pages = {824-828}}
    
  15. S. Bravo-Solorio & A.K. Nandi
    Passive Method for Detecting Duplicated Regions Affected by Reflection, Rotation and Scaling
    European Signal Processing Conference
    2009, pp. 824-828
    BibTeX
    @inproceedings{Bravo-Solorio2009a,
     author = {Bravo-Solorio, Sergio and Nandi, Asoke K.},
     title = {Passive Method for Detecting Duplicated Regions Affected by Reflection, Rotation and Scaling},
     booktitle = {European Signal Processing Conference},
     year = {2009},
     pages = {824-828}}
    
  16. O. Bulan, J. Mao & G. Sharma
    Geometric Distortion Signatures for Printer Identification
    IEEE International Conference on Acoustics, Speech, and Signal Processing
    2009, pp. 1401-1404
    BibTeX
    @inproceedings{Bulan2009,
     author = {Bulan, Orhan and Mao, Junwen and Sharma, Gaurav},
     title = {Geometric Distortion Signatures for Printer Identification},
     booktitle = {IEEE International Conference on Acoustics, Speech, and Signal Processing},
     year = {2009},
     pages = {1401-1404}}
    
  17. R. Caldelli, I. Amerini & F. Picchioni
    Forensics in Telecommunications, Information and Multimedia
    Sorell, M. (ed.)
    Forensics in Telecommunications, Information and Multimedia
    Chapter Distinguishing between Camera and Scanned Images by Means of Frequency Analysis
    Springer Berlin Heidelberg, 2009, pp. 95-+
    BibTeX
    @inbook{Caldelli2009,
     author = {Caldelli, R. and Amerini, I. and Picchioni, F.},
     title = {Forensics in Telecommunications, Information and Multimedia},
     booktitle = {Forensics in Telecommunications, Information and Multimedia},
     publisher = {Springer Berlin Heidelberg},
     year = {2009},
     pages = {95-+}}
    
  18. R. Caldelli, I. Amerini & F. Picchioni
    Distinguishing Between Camera and Scanned Images by Means of Frequency Analysis
    Sorell, M. (ed.)
    International Conference on Forensics in Telecommunications, Information and Multimedia
    2009
    BibTeX
    @inproceedings{Caldelli2009c,
     author = {Caldelli, Roberto and Amerini, Irene and Picchioni, Francesco},
     title = {Distinguishing Between Camera and Scanned Images by Means of Frequency Analysis},
     booktitle = {International Conference on Forensics in Telecommunications, Information and Multimedia},
     year = {2009}}
    
  19. R. Caldelli, I. Amerini, F. Picchioni, A.D. Rosa & V. Cappellini
    Multimedia Forensics: Technologies for Imagery Investigation
    Electronic Information, the Visual Arts and Beyond
    2009, pp. 87-92
    BibTeX
    @inproceedings{Caldelli2009a,
     author = {Caldelli, Roberto and Amerini, Irene and Picchioni, Francesco and Rosa, Alessia De and Cappellini, Vito},
     title = {Multimedia Forensics: Technologies for Imagery Investigation},
     booktitle = {Electronic Information, the Visual Arts and Beyond},
     year = {2009},
     pages = {87-92}}
    
  20. G. Cao, Y. Zhao & R. Ni
    Detection of image sharpening based on histogram aberration and ringing artifacts
    ICME´09: Proceedings of the 2009 IEEE international conference on Multimedia and Expo
    IEEE Press, 2009, pp. 1026-1029
    BibTeX
    @inproceedings{Cao2009b,
     author = {Cao, Gang and Zhao, Yao and Ni, Rongrong},
     title = {Detection of image sharpening based on histogram aberration and ringing artifacts},
     booktitle = {ICME´09: Proceedings of the 2009 IEEE international conference on Multimedia and Expo},
     publisher = {IEEE Press},
     year = {2009},
     pages = {1026--1029}}
    
  21. H. Cao & A.C. Kot
    RAW Tool Identification Though Detected Demosaicing Regularity
    Proc. 16th IEEE Int Image Processing (ICIP) Conf, 2009
    2009
    BibTeX
    @inproceedings{Cao2009,
     author = {Cao, Hong and Kot, Alex C},
     title = {RAW Tool Identification Though Detected Demosaicing Regularity},
     booktitle = {Proc. 16th IEEE Int Image Processing (ICIP) Conf, 2009},
     year = {2009}}
    
  22. H. Cao & A.C. Kot
    Accurate detection of demosaicing regularity for digital image forensics
    Trans. Info. For. Sec., IEEE Press, 2009, Vol. 4(4), pp. 899-910
    BibTeX
    @article{Cao2009a,
     author = {Cao, Hong and Kot, Alex C.},
     title = {Accurate detection of demosaicing regularity for digital image forensics},
     journal = {Trans. Info. For. Sec.},
     publisher = {IEEE Press},
     year = {2009},
     volume = {4},
     number = {4},
     pages = {899--910}}
    
  23. D. Chen, J. Li, S. Wang & S. Li
    Identifying computer generated and digital camera images using fractional lower order moments
    Proc. 4th IEEE Conf. Industrial Electronics and Applications ICIEA 2009
    2009, pp. 230-235
    BibTeX
    @inproceedings{Chen2009,
     author = {Dongmei Chen and Jianhua Li and Shilin Wang and Shenghong Li},
     title = {Identifying computer generated and digital camera images using fractional lower order moments},
     booktitle = {Proc. 4th IEEE Conf. Industrial Electronics and Applications ICIEA 2009},
     year = {2009},
     pages = {230--235}}
    
  24. J. Chen, C.-K. Tang & J. Wang
    Noise brush: interactive high quality image-noise separation
    ACM Transactions on Graphics, 2009, Vol. 28, pp. 146:1-146:10
    BibTeX
    @article{Chen2009b,
     author = {Chen, Jia and Tang, Chi-Keung and Wang, Jue},
     title = {Noise brush: interactive high quality image-noise separation},
     journal = {ACM Transactions on Graphics},
     year = {2009},
     volume = {28},
     pages = {146:1--146:10}}
    
  25. J. Chen, K. Venkataraman, D. Bakin, B. Rodricks, R. Gravelle, P. Rao & Y. Ni
    Digital Camera Imaging System Simulation
    IEEE Transactions on Electron Devices, 2009, Vol. 56(11), pp. 2496-2505
    BibTeX
    @article{Chen2009c,
     author = {Junqing Chen and Venkataraman, K. and Bakin, D. and Rodricks, B. and Gravelle, R. and Rao, P. and Yongshen Ni},
     title = {Digital Camera Imaging System Simulation},
     journal = {IEEE Transactions on Electron Devices},
     year = {2009},
     volume = {56},
     number = {11},
     pages = {2496--2505}}
    
  26. Y.-L. Chen & C.-T. Hsu
    Detecting Doubly Compressed Images Based on Quantization Noise Model and Image Restoration
    IEEE Workshop on Multimedia Signal Processing
    2009
    BibTeX
    @inproceedings{Chen2009a,
     author = {Chen, Yi-Lei and Hsu, Chiou-Ting},
     title = {Detecting Doubly Compressed Images Based on Quantization Noise Model and Image Restoration},
     booktitle = {IEEE Workshop on Multimedia Signal Processing},
     year = {2009}}
    
  27. P.-J. Chiang, N. Khanna, A.K. Mikkilineni, M.V.O. Segovia, S. Suh, J.P. Allebach, G.T.-C. Chiu & E.J. Delp
    Printer and Scanner Forensics
    IEEE Signal Processing Magazine, 2009, Vol. 26(2), pp. 72-83
    BibTeX
    @article{Chiang2009,
     author = {Chiang, Pei-Ju and Khanna, Nitin and Mikkilineni, Aravind K. and Segovia, Maria V. Ortiz and Suh, Sungjoo and Allebach, Jan P. and Chiu, George T.-C. and Delp, Edward J.},
     title = {Printer and Scanner Forensics},
     journal = {IEEE Signal Processing Magazine},
     year = {2009},
     volume = {26},
     number = {2},
     pages = {72-83}}
    
  28. J.-H. Choi, D.-H. Im, H.-Y. Lee, J.-T. Oh, J.-H. Ryu & H.-K. Lee
    Color Laser Printer Identification by Analyzing Statistical Features on Discrete Wavelet Transform
    IEEE International Conference on Image Processing
    2009, pp. 1505-1508
    BibTeX
    @inproceedings{Choi2009,
     author = {Choi, Jung-Ho and Im, Dong-Hyuck and Lee, Hae-Yeoun and Oh, Jun-Taek and Ryu, Jin-Ho and Lee, Heung-Kyu},
     title = {Color Laser Printer Identification by Analyzing Statistical Features on Discrete Wavelet Transform},
     booktitle = {IEEE International Conference on Image Processing},
     year = {2009},
     pages = {1505-1508}}
    
  29. W.-H. Chuang, A. Swaminathan & M. Wu
    Tampering identification using Empirical Frequency Response
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2009
    2009, pp. 1517-1520
    BibTeX
    @inproceedings{Chuang2009,
     author = {Wei-Hong Chuang and Swaminathan, A. and Min Wu},
     title = {Tampering identification using Empirical Frequency Response},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2009},
     year = {2009},
     pages = {1517--1520}}
    
  30. S.-W. Chung, B.-K. Kim & W.-J. Song
    Detecting and eliminating chromatic aberration in digital images
    Proc. 16th IEEE Int Image Processing (ICIP) Conf
    2009, pp. 3905-3908
    BibTeX
    @inproceedings{Chung2009,
     author = {Soon-Wook Chung and Byoung-Kwang Kim and Woo-Jin Song},
     title = {Detecting and eliminating chromatic aberration in digital images},
     booktitle = {Proc. 16th IEEE Int Image Processing (ICIP) Conf},
     year = {2009},
     pages = {3905--3908}}
    
  31. B. DAlessandro & Y.Q. Shi
    MP3Bit Rate Quality Detection Through Frequency Spectrum Analysis
    ACM Proceedings of the Multimedia and Security Workshop
    2009, pp. 57-62
    BibTeX
    @inproceedings{DAlessandro2009,
     author = {DAlessandro, Brian and Shi, Yun Qing},
     title = {MP3Bit Rate Quality Detection Through Frequency Spectrum Analysis},
     booktitle = {ACM Proceedings of the Multimedia and Security Workshop},
     year = {2009},
     pages = {57-62}}
    
  32. M.U. Devi, A. Agarwal & C.R. Rao
    Gaussian Variogram Model for Printing Technology Identification
    Proc. Third Asia Int. Conf. Modelling & Simulation AMS ´09
    2009, pp. 320-325
    BibTeX
    @inproceedings{Devi2009,
     author = {Devi, M. U. and Agarwal, A. and Rao, C. R.},
     title = {Gaussian Variogram Model for Printing Technology Identification},
     booktitle = {Proc. Third Asia Int. Conf. Modelling & Simulation AMS ´09},
     year = {2009},
     pages = {320--325}}
    
  33. A.E. Dirik & N. Memon
    Image tamper detection based on demosaicing artifacts
    Proc. 16th IEEE Int Image Processing (ICIP) Conf
    2009, pp. 1497-1500
    BibTeX
    @inproceedings{Dirik2009,
     author = {Dirik, A. E. and Memon, N.},
     title = {Image tamper detection based on demosaicing artifacts},
     booktitle = {Proc. 16th IEEE Int Image Processing (ICIP) Conf},
     year = {2009},
     pages = {1497--1500}}
    
  34. A.E. Dirik, H.T. Sencar & N. Memon
    Flatbed Scanner Identification Based on Dust and Scratches Over Scanner Platen
    IEEE International Conference on Acoustics, Speech, and Signal Processing
    2009, pp. 1385-1388
    BibTeX
    @inproceedings{Dirik2009a,
     author = {Dirik, Ahmet Emir and Sencar, Husrev T. and Memon, Nasir},
     title = {Flatbed Scanner Identification Based on Dust and Scratches Over Scanner Platen},
     booktitle = {IEEE International Conference on Acoustics, Speech, and Signal Processing},
     year = {2009},
     pages = {1385-1388}}
    
  35. N. Fan, C. Jin & Y. Huang
    A pixel-based digital photo authentication framework via demosaicking inter-pixel correlation
    MM&38;Sec ´09: Proceedings of the 11th ACM workshop on Multimedia and security
    ACM, 2009, pp. 125-130
    BibTeX
    @inproceedings{Fan2009,
     author = {Fan, Na and Jin, Cheng and Huang, Yizhen},
     title = {A pixel-based digital photo authentication framework via demosaicking inter-pixel correlation},
     booktitle = {MM&38;Sec ´09: Proceedings of the 11th ACM workshop on Multimedia and security},
     publisher = {ACM},
     year = {2009},
     pages = {125--130}}
    
  36. Y. Fang, A.E. Dirik, X. Sun & N. Memon
    Source Class Identification for DSLR and Compact Cameras
    IEEE Workshop on Multimedia Signal Processing
    2009
    BibTeX
    @inproceedings{Fang2009b,
     author = {Fang, Yanmei and Dirik, Ahmet Emir and Sun, Xiaoxi and Memon, Nasir},
     title = {Source Class Identification for DSLR and Compact Cameras},
     booktitle = {IEEE Workshop on Multimedia Signal Processing},
     year = {2009}}
    
  37. Z. Fang, S. Wang & X. Zhang
    Image Splicing Detection Using Camera Characteristic Inconsistency
    Proc. Int. Conf. Multimedia Information Networking and Security MINES ´09
    2009, Vol. 1, pp. 20-24
    BibTeX
    @inproceedings{Fang2009,
     author = {Zhen Fang and Shuozhong Wang and Xinpeng Zhang},
     title = {Image Splicing Detection Using Camera Characteristic Inconsistency},
     booktitle = {Proc. Int. Conf. Multimedia Information Networking and Security MINES ´09},
     year = {2009},
     volume = {1},
     pages = {20--24}}
    
  38. H. Farid
    Advances in Computers
    Zelkowitz, M. (ed.)
    Chapter Photo Fakery and Forensics
    Elsevier, 2009, Vol. 77, pp. 1-55
    BibTeX
    @inbook{Farid2009h,
     author = {Farid, Hany},
     title = {Advances in Computers},
     publisher = {Elsevier},
     year = {2009},
     volume = {77},
     pages = {1-55}}
    
  39. H. Farid
    Image forgery detection
    IEEE Signal Processing Magazine, 2009, Vol. 26(2), pp. 16-25
    BibTeX
    @article{Farid2009,
     author = {Farid, Hany},
     title = {Image forgery detection},
     journal = {IEEE Signal Processing Magazine},
     year = {2009},
     volume = {26},
     number = {2},
     pages = {16--25}}
    
  40. H. Farid
    Seeing is not believing
    IEEE Spectrum, 2009, Vol. 46(8), pp. 44-51
    BibTeX
    @article{Farid2009a,
     author = {Farid, Hany},
     title = {Seeing is not believing},
     journal = {IEEE Spectrum},
     year = {2009},
     volume = {46},
     number = {8},
     pages = {44--51}}
    
  41. H. Farid
    Exposing Digital Forgeries From JPEG Ghosts
    IEEE Transactions on Information Forensics and Security, 2009, Vol. 4(1), pp. 154-160
    BibTeX
    @article{Farid2009b,
     author = {Farid, Hany},
     title = {Exposing Digital Forgeries From JPEG Ghosts},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2009},
     volume = {4},
     number = {1},
     pages = {154--160}}
    
  42. H. Farid
    A Survey of Image Forgery Detection
    IEEE Signal Processing Magazine, 2009, Vol. 2(26), pp. 16-25
    BibTeX
    @article{Farid2009d,
     author = {Farid, Hany},
     title = {A Survey of Image Forgery Detection},
     journal = {IEEE Signal Processing Magazine},
     year = {2009},
     volume = {2},
     number = {26},
     pages = {16-25}}
    
  43. H. Farid
    The Lee Harvey Oswald Backyard Photos: Real or Fake?
    Perception, 2009, Vol. 11(38), pp. 1731-1734
    BibTeX
    @article{Farid2009f,
     author = {Farid, Hany},
     title = {The Lee Harvey Oswald Backyard Photos: Real or Fake?},
     journal = {Perception},
     year = {2009},
     volume = {11},
     number = {38},
     pages = {1731-1734}}
    
  44. H. Farid
    Deception: Methods, Motives, Contexts and Consequences
    Chapter Digital Doctoring: can we trust photographs?
    Stanford University Press, 2009, pp. 95-108
    BibTeX
    @inbook{Farid2009g,
     author = {Farid, Hany},
     title = {Deception: Methods, Motives, Contexts and Consequences},
     publisher = {Stanford University Press},
     year = {2009},
     pages = {95-108}}
    
  45. D.F. Francisco Estrada & A. Jepson
    Stochastic Image Denoising
    Proceedings of the British Machine Vision Conference (BMVC)
    2009
    BibTeX
    @inproceedings{Estrada2009,
     author = {Francisco Estrada, David Fleet and Allan Jepson},
     title = {Stochastic Image Denoising},
     booktitle = {Proceedings of the British Machine Vision Conference (BMVC)},
     year = {2009}}
    
  46. J. Fridrich
    Digital Image Forensics Using Sensor Noise
    IEEE Signal Processing Magazine, 2009, Vol. 26(2), pp. 26-37
    BibTeX
    @article{Fridrich2009,
     author = {Jessica Fridrich},
     title = {Digital Image Forensics Using Sensor Noise},
     journal = {IEEE Signal Processing Magazine},
     year = {2009},
     volume = {26},
     number = {2},
     pages = {26--37}}
    
  47. J. Fridrich
    Digital Image Forensics
    IEEE Signal Processing Magazine, 2009, Vol. 26(2), pp. 26-37
    BibTeX
    @article{Fridrich2009a,
     author = {Fridrich, J.},
     title = {Digital Image Forensics},
     journal = {IEEE Signal Processing Magazine},
     year = {2009},
     volume = {26},
     number = {2},
     pages = {26--37}}
    
  48. M.D. Gaubatz & S.J. Simske
    Printer-scanner identification via analysis of structured security deterrents
    Proceedings of the 2009 First IEEE International Workshop on Information Forensics and Security
    2009, pp. 151-155
    BibTeX
    @inproceedings{Gaubatz2009,
     author = {Matthew D. Gaubatz and Steven J. Simske},
     title = {Printer-scanner identification via analysis of structured security deterrents},
     booktitle = {Proceedings of the 2009 First IEEE International Workshop on Information Forensics and Security},
     year = {2009},
     pages = {151--155}}
    
  49. M.D. Gaubatz, R. Ulichney & D. Rouse
    A Low-complexity Reduced-reference Print Identification Algorithm
    IEEE International Conference on Image Processing
    2009, pp. 1281-1284
    BibTeX
    @inproceedings{Gaubatz2009a,
     author = {Gaubatz, Matthew D. and Ulichney, Robert and Rouse, David},
     title = {A Low-complexity Reduced-reference Print Identification Algorithm},
     booktitle = {IEEE International Conference on Image Processing},
     year = {2009},
     pages = {1281-1284}}
    
  50. T. Gloe, K. Borowka & A. Winkler
    Feature-Based Camera Model Identification Works in Practice: Results of a Comprehensive Evaluation Study
    Katzenbeisser, S. & Sadeghi, A.-R. (ed.)
    International Workshop on Information Hiding
    2009, pp. 262-276
    BibTeX
    @inproceedings{Gloe2009,
     author = {Gloe, Thomas and Borowka, Karsten and Winkler, Antje},
     title = {Feature-Based Camera Model Identification Works in Practice: Results of a Comprehensive Evaluation Study},
     booktitle = {International Workshop on Information Hiding},
     year = {2009},
     pages = {262-276}}
    
  51. S. Goldenstein & A. Rocha
    High-profile forensic analysis of images
    Proc. rd Int Crime Detection and Prevention (ICDP 2009) Conf
    2009, pp. 1-6
    BibTeX
    @inproceedings{Goldenstein2009,
     author = {Goldenstein, Siome and Rocha, Anderson},
     title = {High-profile forensic analysis of images},
     booktitle = {Proc. rd Int Crime Detection and Prevention (ICDP 2009) Conf},
     year = {2009},
     pages = {1--6}}
    
  52. T. Goldstein & S. Osher
    The Split Bregman Method for L1-Regularized Problems
    SIAM Journal on Imaging Sciences, SIAM, 2009, Vol. 2(2), pp. 323-343
    BibTeX
    @article{Goldstein2009,
     author = {Tom Goldstein and Stanley Osher},
     title = {The Split Bregman Method for L1-Regularized Problems},
     journal = {SIAM Journal on Imaging Sciences},
     publisher = {SIAM},
     year = {2009},
     volume = {2},
     number = {2},
     pages = {323-343}}
    
  53. M. Goljan
    Digital Camera Identification from Images - Estimating False Acceptance Probability
    Digital Watermarking, Springer-Verlag, 2009, Vol. 5450/2009, pp. 454-468
    BibTeX
    @article{Goljan2009,
     author = {Goljan, Miroslav},
     title = {Digital Camera Identification from Images - Estimating False Acceptance Probability},
     journal = {Digital Watermarking},
     publisher = {Springer-Verlag},
     year = {2009},
     volume = {5450/2009},
     pages = {454--468}}
    
  54. M. Goljan, J. Fridrich & T. Filler
    Large Scale Test of Sensor Fingerprint Camera Identification
    SPIE Conference on Media Forensics and Security
    2009
    BibTeX
    @inproceedings{Goljan2009a,
     author = {Goljan, Miroslav and Fridrich, Jessica and Filler, Tomáš},
     title = {Large Scale Test of Sensor Fingerprint Camera Identification},
     booktitle = {SPIE Conference on Media Forensics and Security},
     year = {2009}}
    
  55. H. Gou, A. Swaminathan & M. Wu
    Intrinsic Sensor Noise Features for Forensic Analysis on Scanners and Scanned Images
    IEEE Transactions on Information Forensics and Security, 2009, Vol. 4(3), pp. 476-491
    BibTeX
    @article{Gou2009,
     author = {Hongmei Gou and Swaminathan, A. and Min Wu},
     title = {Intrinsic Sensor Noise Features for Forensic Analysis on Scanners and Scanned Images},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2009},
     volume = {4},
     number = {3},
     pages = {476--491}}
    
  56. C. Grigoras, A. Cooper & M. Michalek
    Forensic Speech and Audio Analysis Working Group - Best Practice Guidelines for ENF Analysis in Forensic Authentication of Digital Evidence
    2009
    BibTeX
    @misc{Grigoras2009,
     author = {Grigoras, Catalin and Cooper, Alan and Michalek, Marcin},
     title = {Forensic Speech and Audio Analysis Working Group - Best Practice Guidelines for ENF Analysis in Forensic Authentication of Digital Evidence},
     year = {2009}}
    
  57. G. Gül & I. Avcibas
    Source Cell Phone Camera Identification Based on Singular Value Decomposition
    IEEE Workshop on Information Forensics and Security
    2009, pp. 171-175
    BibTeX
    @inproceedings{Gul2009,
     author = {Gül, Gökhan and Avcibas, Ismail},
     title = {Source Cell Phone Camera Identification Based on Singular Value Decomposition},
     booktitle = {IEEE Workshop on Information Forensics and Security},
     year = {2009},
     pages = {171-175}}
    
  58. M. Huijbregtse & Z.J. Geradts
    Using the ENF Criterion for Determining the Time of Recording of Short Digital Audio Recordings
    Geradts, Z. J., Franke, K. Y. & Veenman, C. J. (ed.)
    International Workshop on Computational Forensics
    2009, pp. 116-124
    BibTeX
    @inproceedings{Huijbregtse2009,
     author = {Huijbregtse, Maarten and Geradts, Zeno J.},
     title = {Using the ENF Criterion for Determining the Time of Recording of Short Digital Audio Recordings},
     booktitle = {International Workshop on Computational Forensics},
     year = {2009},
     pages = {116-124}}
    
  59. N. Jenkins
    Digital Camera Identification
    2009
    BibTeX
    @misc{Jenkins2009,
     author = {Jenkins, Neil},
     title = {Digital Camera Identification},
     year = {2009}}
    
  60. L. Jiaxue & G. Lei
    Image Denoising Using Adaptive Threshold Based on Second Generation Bandelets Transform
    Proc. Int. Forum Computer Science-Technology and Applications IFCSTA ´09
    2009, Vol. 1, pp. 444-447
    BibTeX
    @inproceedings{Jiaxue2009,
     author = {Liu Jiaxue and Guo Lei},
     title = {Image Denoising Using Adaptive Threshold Based on Second Generation Bandelets Transform},
     booktitle = {Proc. Int. Forum Computer Science-Technology and Applications IFCSTA ´09},
     year = {2009},
     volume = {1},
     pages = {444--447}}
    
  61. T. Jing, Y. Peng, F. Zhang & Y. Huo
    Blind Detection of Digital Forgeries Using Detection Trace of Eclosion
    Proc. Int. Conf. Computational Intelligence and Software Engineering CiSE 2009
    2009, pp. 1-4
    BibTeX
    @inproceedings{Jing2009,
     author = {Tao Jing and Yuefeng Peng and Feifei Zhang and Yan Huo},
     title = {Blind Detection of Digital Forgeries Using Detection Trace of Eclosion},
     booktitle = {Proc. Int. Conf. Computational Intelligence and Software Engineering CiSE 2009},
     year = {2009},
     pages = {1--4}}
    
  62. N. Joshi, C.L. Zitnick, R. Szeliski & D.J. Kriegman
    Image deblurring and denoising using color priors
    Proc. IEEE Conf. Computer Vision and Pattern Recognition CVPR 2009
    2009, pp. 1550-1557
    BibTeX
    @inproceedings{Joshi2009,
     author = {Joshi, N. and Zitnick, C. L. and Szeliski, R. and Kriegman, D. J. },
     title = {Image deblurring and denoising using color priors},
     booktitle = {Proc. IEEE Conf. Computer Vision and Pattern Recognition CVPR 2009},
     year = {2009},
     pages = {1550--1557}}
    
  63. K. Kayabol, E. Kuruoglu & B. Sankur
    Image Source Separation Using Color Channel Dependencies
    Adali, T., Jutten, C., Romano, J. & Barros, A. (ed.)
    Independent Component Analysis and Signal Separation
    Springer Berlin / Heidelberg, 2009, Vol. 5441, pp. 499-506
    BibTeX
    @incollection{Kayabol2009,
     author = {Kayabol, Koray and Kuruoglu, Ercan and Sankur, Bulent},
     title = {Image Source Separation Using Color Channel Dependencies},
     booktitle = {Independent Component Analysis and Signal Separation},
     publisher = {Springer Berlin / Heidelberg},
     year = {2009},
     volume = {5441},
     pages = {499-506}}
    
  64. E. Kee & H. Farid
    Detecting Photographic Composites of Famous People
    Department of Computer Science, Dartmouth College, 2009(TR2009-656)
    BibTeX
    @techreport{Kee2009,
     author = {Kee, Eric and Farid, Hany},
     title = {Detecting Photographic Composites of Famous People},
     year = {2009},
     number = {TR2009-656}}
    
  65. N. Khanna & E.J. Delp
    Source Scanner Identification for Scanned Documents
    IEEE Workshop on Information Forensics and Security
    2009, pp. 166-170
    BibTeX
    @inproceedings{Khanna2009c,
     author = {Khanna, Nitin and Delp, Edward J.},
     title = {Source Scanner Identification for Scanned Documents},
     booktitle = {IEEE Workshop on Information Forensics and Security},
     year = {2009},
     pages = {166-170}}
    
  66. N. Khanna, A.K. Mikkilineni & E.J. Delp
    Scanner Identification Using Feature-Based Processing and Analysis
    IEEE Transactions on Information Forensics and Security, 2009, Vol. 4(1), pp. 123-139
    BibTeX
    @article{Khanna2009,
     author = {Khanna, N. and Mikkilineni, A. K. and Delp, E. J.},
     title = {Scanner Identification Using Feature-Based Processing and Analysis},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2009},
     volume = {4},
     number = {1},
     pages = {123--139}}
    
  67. N. Khanna, A.K. Mikkilineni & E.J. Delp
    Forensic Camera Classification: Verification of Sensor Pattern Noise Approach
    Forensic Science Communications, 2009, Vol. 11(1), pp. 10
    BibTeX
    @article{Khanna2009b,
     author = {Khanna, Nitin and Mikkilineni, Aravind K. and Delp, Edward J.},
     title = {Forensic Camera Classification: Verification of Sensor Pattern Noise Approach},
     journal = {Forensic Science Communications},
     year = {2009},
     volume = {11},
     number = {1},
     pages = {10}}
    
  68. S. Kiltz, T. Hoppe & J. Dittmann
    A New Forensic Model And Its Application To The Collection, Extraction And Long Term Storage Of Screen Content Off A Memory Dump
    International Conference on Digital Signal Processing
    2009, pp. 1135-1140
    BibTeX
    @inproceedings{Kiltz2009a,
     author = {Kiltz, Stefan and Hoppe, Tobias and Dittmann, Jana},
     title = {A New Forensic Model And Its Application To The Collection, Extraction And Long Term Storage Of Screen Content Off A Memory Dump},
     booktitle = {International Conference on Digital Signal Processing},
     year = {2009},
     pages = {1135-1140}}
    
  69. S. Kiltz, T. Hoppe, J. Dittmann & C. Vielhauer
    Video Surveillance: A new forensic model for the forensically sound retrival of picture content off a memory dump
    Fischer, S., Maehle, E. & Reischuk, R. (ed.)
    Informatik2009 - Digitale Multimedia-Forensik
    2009, pp. 1619-1633
    BibTeX
    @inproceedings{Kiltz2009,
     author = {Kiltz, Stefan and Hoppe, Tobias and Dittmann, Jana and Vielhauer, Claus},
     title = {Video Surveillance: A new forensic model for the forensically sound retrival of picture content off a memory dump},
     booktitle = {Informatik2009 - Digitale Multimedia-Forensik},
     year = {2009},
     pages = {1619-1633}}
    
  70. M. Kirchner & R. Böhme
    Synthesis of color filter array pattern in digital images
    Proceedings of SPIE
    2009, Vol. 7254, pp. 72540K
    BibTeX
    @inproceedings{Kirchner2009,
     author = {Matthias Kirchner and Rainer Böhme},
     title = {Synthesis of color filter array pattern in digital images},
     booktitle = {Proceedings of SPIE},
     year = {2009},
     volume = {7254},
     pages = {72540K}}
    
  71. M. Kirchner & T. Gloe
    On resampling detection in re-compressed images
    Proceedings of the 2009 First IEEE International Workshop on Information Forensics and Security
    2009, pp. 21-25
    BibTeX
    @inproceedings{Kirchner2009a,
     author = {Kirchner, Matthias and Gloe, Thomas},
     title = {On resampling detection in re-compressed images},
     booktitle = {Proceedings of the 2009 First IEEE International Workshop on Information Forensics and Security},
     year = {2009},
     pages = {21--25}}
    
  72. S. Knight, S. Moschou & M. Sorell
    Forensics in Telecommunications, Information and Multimedia
    Sorell, M. (ed.)
    Forensics in Telecommunications, Information and Multimedia (Proceedings of the International Conference on Forensics in Telecommunications, Information and Multimedia)
    Chapter Analysis of Sensor Photo Response Non-Uniformity in RAW Images
    Springer, 2009, pp. 130-141
    BibTeX
    @inbook{Knight2009,
     author = {Knight, Simon and Moschou, Simon and Sorell, Matthew},
     title = {Forensics in Telecommunications, Information and Multimedia},
     booktitle = {Forensics in Telecommunications, Information and Multimedia (Proceedings of the International Conference on Forensics in Telecommunications, Information and Multimedia)},
     publisher = {Springer},
     year = {2009},
     pages = {130-141}}
    
  73. M. Kobayashi, T. Okabe & Y. Sato
    Detecting Video Forgeries Based on Noise Characteristics
    Wada, T., Huang, F. & Lin, S. (ed.)
    Advances in Image and Video Technology, Third Pacific Rim Symposium
    2009, pp. 306-317
    BibTeX
    @inproceedings{Kobayashi2009,
     author = {Kobayashi, Michihiro and Okabe, Takahiro and Sato, Yoichi},
     title = {Detecting Video Forgeries Based on Noise Characteristics},
     booktitle = {Advances in Image and Video Technology, Third Pacific Rim Symposium},
     year = {2009},
     pages = {306-317}}
    
  74. M. Konrad, H. Stögner & A. Uhl
    Custom Design of JPEG Quantisation Tables for Compressing Iris Polar Images to Improve Recognition Accuracy
    Tistarelli, M. & Nixon, M. (ed.)
    Advances in Biometrics
    Springer Berlin Heidelberg, 2009, Vol. 5558, pp. 1091-1101
    BibTeX
    @incollection{Konrad2009,
     author = {Konrad, Mario and Stögner, Herbert and Uhl, Andreas},
     title = {Custom Design of JPEG Quantisation Tables for Compressing Iris Polar Images to Improve Recognition Accuracy},
     booktitle = {Advances in Biometrics},
     publisher = {Springer Berlin Heidelberg},
     year = {2009},
     volume = {5558},
     pages = {1091-1101}}
    
  75. C.-L. Lai & Y.-S. Chen
    The application of intelligent system to digital image forensics
    Proc. Int Machine Learning and Cybernetics Conf
    2009, Vol. 5, pp. 2991-2998
    BibTeX
    @inproceedings{Lai2009,
     author = {Cheng-Liang Lai and Yi-Shiang Chen},
     title = {The application of intelligent system to digital image forensics},
     booktitle = {Proc. Int Machine Learning and Cybernetics Conf},
     year = {2009},
     volume = {5},
     pages = {2991--2998}}
    
  76. J.-F. Lalonde, A.A. Efros & S.G. Narasimhan
    Estimating natural illumination from a single outdoor image
    Proc. IEEE 12th Int Computer Vision Conf
    2009, pp. 183-190
    BibTeX
    @inproceedings{Lalonde2009,
     author = {Lalonde, J.-F. and Efros, A. A. and Narasimhan, S. G.},
     title = {Estimating natural illumination from a single outdoor image},
     booktitle = {Proc. IEEE 12th Int Computer Vision Conf},
     year = {2009},
     pages = {183--190}}
    
  77. F. Lefebvre, B. Chupeau, A. Massoudi & E. Diehl
    Image and Video Fingerprinting: Forensic Applications
    SPIE Conference on Media Forensics and Security
    2009
    BibTeX
    @inproceedings{Lefebvre2009,
     author = {Lefebvre, Frederic and Chupeau, Bertrand and Massoudi, Ayoub and Diehl, Eric},
     title = {Image and Video Fingerprinting: Forensic Applications},
     booktitle = {SPIE Conference on Media Forensics and Security},
     year = {2009}}
    
  78. A. Levin, Y. Weiss, F. Durand & W.T. Freeman
    Understanding and evaluating blind deconvolution algorithms
    Proc. IEEE Conf. Computer Vision and Pattern Recognition CVPR 2009
    2009, pp. 1964-1971
    BibTeX
    @inproceedings{Levin2009,
     author = {Levin, A. and Weiss, Y. and Durand, F. and Freeman, W. T. },
     title = {Understanding and evaluating blind deconvolution algorithms},
     booktitle = {Proc. IEEE Conf. Computer Vision and Pattern Recognition CVPR 2009},
     year = {2009},
     pages = {1964--1971}}
    
  79. C.-T. Li
    Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
    Sorell, M. (ed.)
    Forensics in Telecommunications, Information and Multimedia
    Chapter Detection of Block Artifacts for Digital Forensic Analysis
    Springer Berlin Heidelberg, 2009, Vol. Volume 8, pp. 173-178
    BibTeX
    @inbook{Li2009a,
     author = {Li, Chang-Tsun},
     title = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering},
     booktitle = {Forensics in Telecommunications, Information and Multimedia},
     publisher = {Springer Berlin Heidelberg},
     year = {2009},
     volume = {Volume 8},
     pages = {173-178}}
    
  80. C.-T. Li
    Detection of Block Artifacts for Digital Forensic Analysis
    Sorell, M. (ed.)
    International Conference on Forensics in Telecommunications, Information and Multimedia
    2009, pp. 173-178
    BibTeX
    @inproceedings{Li2009g,
     author = {Li, Chang-Tsun},
     title = {Detection of Block Artifacts for Digital Forensic Analysis},
     booktitle = {International Conference on Forensics in Telecommunications, Information and Multimedia},
     year = {2009},
     pages = {173-178}}
    
  81. C.-T. Li
    Source camera linking using enhanced sensor pattern noise extracted from images
    IET Seminar Digests, IEE, 2009, Vol. 2009(2), pp. P46-P46
    BibTeX
    @article{Li2009b,
     author = {Chang-Tsun Li},
     title = {Source camera linking using enhanced sensor pattern noise extracted from images},
     journal = {IET Seminar Digests},
     publisher = {IEE},
     year = {2009},
     volume = {2009},
     number = {2},
     pages = {P46-P46}}
    
  82. C.-T. Li
    Source Camera Identification Using Enhanced Sensor Pattern Noise
    IEEE International Conference on Image Processing
    2009
    BibTeX
    @inproceedings{Li2009e,
     author = {Li, Chang-Tsun},
     title = {Source Camera Identification Using Enhanced Sensor Pattern Noise},
     booktitle = {IEEE International Conference on Image Processing},
     year = {2009}}
    
  83. C.-T. Li, C.-Y. Chang & Y. Li
    On the Repudiability of Device Identification and Image Integrity Verification Using Sensor Pattern Noise
    International Conference on Information Security and Digital Forensics
    2009, pp. 19-25
    BibTeX
    @inproceedings{Li2009h,
     author = {Li, Chang-Tsun and Chang, Chih-Yuan and Li, Yue},
     title = {On the Repudiability of Device Identification and Image Integrity Verification Using Sensor Pattern Noise},
     booktitle = {International Conference on Information Security and Digital Forensics},
     year = {2009},
     pages = {19-25}}
    
  84. T. Li, M. He, N. Lei, C. Li & Q. Wang
    TDI CCD non-uniformity correction algorithm
    Proc. 4th IEEE Conf. Industrial Electronics and Applications ICIEA 2009
    2009, pp. 1483-1487
    BibTeX
    @inproceedings{Li2009f,
     author = {Tao Li and Mingyi He and Ning Lei and Chunmei Li and Qingyuan Wang},
     title = {TDI CCD non-uniformity correction algorithm},
     booktitle = {Proc. 4th IEEE Conf. Industrial Electronics and Applications ICIEA 2009},
     year = {2009},
     pages = {1483--1487}}
    
  85. W. Li, Y. Yuan & N. Yu
    Passive Detection of Doctored JPEG Image Via Block Artifact Grid Extraction
    IEEE Transactions on Signal Processing, 2009, Vol. 89(9), pp. 1821-1829
    BibTeX
    @article{Li2009c,
     author = {Li, Weihai and Yuan, Yuan and Yu, Nenghai},
     title = {Passive Detection of Doctored JPEG Image Via Block Artifact Grid Extraction},
     journal = {IEEE Transactions on Signal Processing},
     year = {2009},
     volume = {89},
     number = {9},
     pages = {1821-1829}}
    
  86. Y. Li & C.-T. Li
    Decomposed Photo Response Non-Uniformity for Digital Forensic Analysis
    Sorell, M. (ed.)
    International Conference on Forensics in Telecommunications, Information and Multimedia
    2009, pp. 166-172
    BibTeX
    @inproceedings{Li2009d,
     author = {Li, Yue and Li, Chang-Tsun},
     title = {Decomposed Photo Response Non-Uniformity for Digital Forensic Analysis},
     booktitle = {International Conference on Forensics in Telecommunications, Information and Multimedia},
     year = {2009},
     pages = {166-172}}
    
  87. Z. Li & J.-B. Zheng
    Blind Detection of Digital Forgery Image Based on the Local Entropy of the Gradient
    Digital Watermarking, Springer-Verlag, 2009, Vol. 5450/2009, pp. 161-169
    BibTeX
    @article{Li2009,
     author = {Li, Zhe and Zheng, Jiang-Bin},
     title = {Blind Detection of Digital Forgery Image Based on the Local Entropy of the Gradient},
     journal = {Digital Watermarking},
     publisher = {Springer-Verlag},
     year = {2009},
     volume = {5450/2009},
     pages = {161--169}}
    
  88. D.Y. Liliana & T. Basaruddin
    Image Fakery Detection Based on Singular Value Decomposition
    Makara Seri Sains, 2009, Vol. 13(2), pp. 180-184
    BibTeX
    @article{Liliana2009,
     author = {Liliana, Dewi Yanti and T. Basaruddin},
     title = {Image Fakery Detection Based on Singular Value Decomposition},
     journal = {Makara Seri Sains},
     year = {2009},
     volume = {13},
     number = {2},
     pages = {180-184}}
    
  89. H.-J. Lin, C.-W. Wang & Y.-T. Kao
    Fast copy-move forgery detection
    WSEAS Trans. Sig. Proc., World Scientific and Engineering Academy and Society (WSEAS), 2009, Vol. 5(5), pp. 188-197
    BibTeX
    @article{Lin2009,
     author = {Lin, Hwei-Jen and Wang, Chun-Wei and Kao, Yang-Ta},
     title = {Fast copy-move forgery detection},
     journal = {WSEAS Trans. Sig. Proc.},
     publisher = {World Scientific and Engineering Academy and Society (WSEAS)},
     year = {2009},
     volume = {5},
     number = {5},
     pages = {188--197}}
    
  90. H.-J. Lin, C.-W. Wang & Y.-T. Kao
    An Efficient Method for Copy-Move Forgery Detection
    Proceedings of the 8th WSEAS International Conference on Applied Computer and Applied Computational Science
    2009
    BibTeX
    @inproceedings{Lin2009a,
     author = {Lin, Hwei-Jen and Wang, Chun-Wei and Kao, Yang-Ta},
     title = {An Efficient Method for Copy-Move Forgery Detection},
     booktitle = {Proceedings of the 8th WSEAS International Conference on Applied Computer and Applied Computational Science},
     year = {2009}}
    
  91. T.-k. Lin & C.-L. Huang
    Digital Image Forensics Using EM Algorithm
    Muneesawang, P., Wu, F., Kumazawa, I., Roeksabutr, A., Liao, M. & Tang, X. (ed.)
    Advances in Multimedia Information Processing - PCM 2009
    Springer Berlin / Heidelberg, 2009, Vol. 5879, pp. 994-998
    BibTeX
    @incollection{Lin2009c,
     author = {Lin, Tim-kun and Huang, Chung-Lin},
     title = {Digital Image Forensics Using EM Algorithm},
     booktitle = {Advances in Multimedia Information Processing - PCM 2009},
     publisher = {Springer Berlin / Heidelberg},
     year = {2009},
     volume = {5879},
     pages = {994-998}}
    
  92. W.S. Lin, S. Tjoa, H.V. Zhao & K.J.R. Liu
    Digital Image Source Coder Forensics via Intrinsic Fingerprints
    IEEE Transactions on Information Forensics and Security, 2009, Vol. 4(3), pp. 460-475
    BibTeX
    @article{Lin2009e,
     author = {Lin, W. Sabrina and Tjoa, Steven and Zhao, H. Vicky and Liu, K. J. Ray},
     title = {Digital Image Source Coder Forensics via Intrinsic Fingerprints},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2009},
     volume = {4},
     number = {3},
     pages = {460-475}}
    
  93. Z. Lin, J. He, X. Tang & C.-K. Tang
    Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis
    Pattern Recognition, 2009, Vol. 42(11), pp. 2492 - 2501
    BibTeX
    @article{Lin2009b,
     author = {Zhouchen Lin and Junfeng He and Xiaoou Tang and Chi-Keung Tang},
     title = {Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis},
     journal = {Pattern Recognition},
     year = {2009},
     volume = {42},
     number = {11},
     pages = {2492 - 2501}}
    
  94. Q. Liu & A.H. Sung
    A new approach for JPEG resize and image splicing detection
    MiFor ´09: Proceedings of the First ACM workshop on Multimedia in forensics
    ACM, 2009, pp. 43-48
    BibTeX
    @inproceedings{Liu2009,
     author = {Liu, Qingzhong and Sung, Andrew H.},
     title = {A new approach for JPEG resize and image splicing detection},
     booktitle = {MiFor ´09: Proceedings of the First ACM workshop on Multimedia in forensics},
     publisher = {ACM},
     year = {2009},
     pages = {43--48}}
    
  95. Y.-D. Lu, X.-J. Shen, H.-P. Chen & Y.-W. Wang
    Blind identification for digital images based on inconsistency of illuminant direction
    Journal of Jilin University
    2009, Vol. 27(3), pp. 293-298
    BibTeX
    @inproceedings{Lu2009,
     author = {Lu, Ying-Da and Shen, Xuan-Jing and Chen, Hai-Peng and Wang, You-Wei},
     title = {Blind identification for digital images based on inconsistency of illuminant direction},
     booktitle = {Journal of Jilin University},
     year = {2009},
     volume = {27},
     number = {3},
     pages = {293-298}}
    
  96. W. Luo, J. Huang & G. Qiu
    A Novel Method for Block Size Forensics Based on Morphological Operations
    Lecture Notes In Computer Science, Springer-Verlag, 2009, Vol. 5450/2009, pp. 229-239
    BibTeX
    @article{Luo2009,
     author = {Luo, Weiqi and Huang, Jiwu and Qiu, Guoping},
     title = {A Novel Method for Block Size Forensics Based on Morphological Operations},
     journal = {Lecture Notes In Computer Science},
     publisher = {Springer-Verlag},
     year = {2009},
     volume = {5450/2009},
     pages = {229--239}}
    
  97. Y. Lv, X. Shen & H. Chen
    Identifying Image Authenticity by Detecting Inconsistency in Light Source Direction
    Proc. Int. Conf. Information Engineering and Computer Science ICIECS 2009
    2009, pp. 1-5
    BibTeX
    @inproceedings{Lv2009,
     author = {Yingda Lv and Xuanjing Shen and Haipeng Chen},
     title = {Identifying Image Authenticity by Detecting Inconsistency in Light Source Direction},
     booktitle = {Proc. Int. Conf. Information Engineering and Computer Science ICIECS 2009},
     year = {2009},
     pages = {1--5}}
    
  98. B. Mahdian & S. Saic
    Detection and description of geometrically transformed digital images
    Delp, E. J., Dittmann, J., Memon, N. D. & Wong, P. W. (ed.)
    Proceedings of SPIE-IS&T Electronic Imaging: Media Forensics and Security XI
    2009, Vol. 7254, pp. 72540J
    BibTeX
    @inproceedings{Mahdian2009,
     author = {Babak Mahdian and Stanislav Saic},
     title = {Detection and description of geometrically transformed digital images},
     booktitle = {Proceedings of SPIE-IS&T Electronic Imaging: Media Forensics and Security XI},
     year = {2009},
     volume = {7254},
     pages = {72540J}}
    
  99. B. Mahdian & S. Saic
    A Cyclostationarity Analysis Applied to Scaled Images
    Leung C.S., Lee M., C. J. (ed.)
    International Conference on Neural Information Processing (ICONIP 2009)
    2009, Vol. 16
    BibTeX
    @inproceedings{Mahdian2009d,
     author = {Babak Mahdian and Stanislav Saic},
     title = {A Cyclostationarity Analysis Applied to Scaled Images},
     booktitle = {International Conference on Neural Information Processing (ICONIP 2009)},
     year = {2009},
     volume = {16}}
    
  100. B. Mahdian & S. Saic
    Using noise inconsistencies for blind image forensics
    Image and Vision Computing, 2009, Vol. 27, pp. 1497-1503
    BibTeX
    @article{Mahdian2009a,
     author = {Mahdian, Babak and Saic, Stanislav},
     title = {Using noise inconsistencies for blind image forensics},
     journal = {Image and Vision Computing},
     year = {2009},
     volume = {27},
     pages = {1497--1503}}
    
  101. B. Mahdian & S. Saic
    A cyclostationarity analysis applied to image forensics
    Proc. Workshop Applications of Computer Vision (WACV)
    2009, pp. 1-6
    BibTeX
    @inproceedings{Mahdian2009b,
     author = {Mahdian, B. and Saic, S.},
     title = {A cyclostationarity analysis applied to image forensics},
     booktitle = {Proc. Workshop Applications of Computer Vision (WACV)},
     year = {2009},
     pages = {1--6}}
    
  102. B. Mahdian & S. Saic
    Detecting double compressed JPEG images
    Proc. rd Int Crime Detection and Prevention (ICDP 2009) Conf
    2009, pp. 1-6
    BibTeX
    @inproceedings{Mahdian2009c,
     author = {Mahdian, Babak and Saic, Stanislav},
     title = {Detecting double compressed JPEG images},
     booktitle = {Proc. rd Int Crime Detection and Prevention (ICDP 2009) Conf},
     year = {2009},
     pages = {1--6}}
    
  103. J. Mao, O. Bulan, G. Sharma & S. Datta
    Device Temporal Forensics: An Information Theoretic Approach
    IEEE International Conference on Image Processing
    2009, pp. 1501-1504
    BibTeX
    @inproceedings{Mao2009,
     author = {Mao, Junwen and Bulan, Orhan and Sharma, Gaurav and Datta, Suprakash},
     title = {Device Temporal Forensics: An Information Theoretic Approach},
     booktitle = {IEEE International Conference on Image Processing},
     year = {2009},
     pages = {1501-1504}}
    
  104. K. Matsushita & H. Kitazawa
    An improved camera identification method based on the texture complexity and the image restoration
    Proceedings of the 2009 International Conference on Hybrid Information Technology
    ACM, 2009, Vol. 3(1), pp. 171-175
    BibTeX
    @inproceedings{Matsushita2009,
     author = {Matsushita, Kazuya and Kitazawa, Hitoshi},
     title = {An improved camera identification method based on the texture complexity and the image restoration},
     booktitle = {Proceedings of the 2009 International Conference on Hybrid Information Technology},
     publisher = {ACM},
     year = {2009},
     volume = {3},
     number = {1},
     pages = {171--175}}
    
  105. G. Messina
    Presented to Interpol Crime Against Children Group
    Interpol Crime Against Children Group, Lyon, 25 March 2009
    2009
    BibTeX
    @conference{Messina2009,
     author = {Messina, Giuseppe},
     title = {Presented to Interpol Crime Against Children Group},
     booktitle = {Interpol Crime Against Children Group, Lyon, 25 March 2009},
     year = {2009}}
    
  106. S.Z.B. Mohd Shaid
    Estimating Optimal Block Size for Copy-Move Attack Detection on Highly Textured Image
    UNIVERSITI TEKNOLOGI MALAYSIA, 2009
    BibTeX
    @mastersthesis{MohdShaid2009,
     author = {Mohd Shaid, Syed Zainudeen Bin},
     title = {Estimating Optimal Block Size for Copy-Move Attack Detection on Highly Textured Image},
     school = {UNIVERSITI TEKNOLOGI MALAYSIA},
     year = {2009}}
    
  107. L. Nataraj, A. Sarkar & B.S. Manjunath
    Adding Gaussian Noise to "Denoise" JPEG for detecting Image Resizing
    Proceedings of the International Conference on Image Processing 2009, Cairo, Egypt9
    2009, pp. 1493-1496
    BibTeX
    @inproceedings{Nataraj2009,
     author = {Lakshmanan Nataraj and Anindya Sarkar and B. S. Manjunath},
     title = {Adding Gaussian Noise to "Denoise" JPEG for detecting Image Resizing},
     booktitle = {Proceedings of the International Conference on Image Processing 2009, Cairo, Egypt9},
     year = {2009},
     pages = {1493--1496}}
    
  108. T.-T. Ng
    Camera response function signature for digital forensics --- Part II: Signature extraction
    Proceedings of the 2009 First IEEE International Workshop on Information Forensics and Security
    2009, pp. 161-165
    BibTeX
    @inproceedings{Ng2009a,
     author = {Tian-Tsong Ng},
     title = {Camera response function signature for digital forensics --- Part II: Signature extraction},
     booktitle = {Proceedings of the 2009 First IEEE International Workshop on Information Forensics and Security},
     year = {2009},
     pages = {161--165}}
    
  109. T.-T. Ng & S.-F. Chang
    Identifying and prefiltering images
    IEEE Signal Processing Magazine, 2009, Vol. 26(2), pp. 49-58
    BibTeX
    @article{Ng2009b,
     author = {Tian-Tsong Ng and Shih-Fu Chang},
     title = {Identifying and prefiltering images},
     journal = {IEEE Signal Processing Magazine},
     year = {2009},
     volume = {26},
     number = {2},
     pages = {49--58}}
    
  110. T.-T. Ng & M.-P. Tsui
    Camera response function signature for digital forensics --- Part I: Theory and data selection
    Proceedings of the 2009 First IEEE International Workshop on Information Forensics and Security
    2009, pp. 156-160
    BibTeX
    @inproceedings{Ng2009,
     author = {Tian-Tsong Ng and Mao-Pei Tsui},
     title = {Camera response function signature for digital forensics --- Part I: Theory and data selection},
     booktitle = {Proceedings of the 2009 First IEEE International Workshop on Information Forensics and Security},
     year = {2009},
     pages = {156--160}}
    
  111. D. Parrish & B. Noonan
    Image Manipulation as Research Misconduct
    Science and Engineering Ethics, Springer Netherlands, 2009, Vol. 15, pp. 161-167
    BibTeX
    @article{Parrish2009,
     author = {Parrish, Debra and Noonan, Bridget},
     title = {Image Manipulation as Research Misconduct},
     journal = {Science and Engineering Ethics},
     publisher = {Springer Netherlands},
     year = {2009},
     volume = {15},
     pages = {161-167}}
    
  112. Z. Qu, G. Qiu & J. Huang
    Detect Digital Image Splicing with Visual Cues
    Katzenbeisser, S. & Sadeghi, A.-R. (ed.)
    International Workshop on Information Hiding
    2009, pp. 247-261
    BibTeX
    @inproceedings{Qu2009,
     author = {Qu, Zhenhua and Qiu, Guoping and Huang, Jiwu},
     title = {Detect Digital Image Splicing with Visual Cues},
     booktitle = {International Workshop on Information Hiding},
     year = {2009},
     pages = {247-261}}
    
  113. K. Rosenfeld & H.T. Sencar
    A Study of the Robustness of PRNU-Based Camera Identification
    Delp, E. J., Dittmann, J., Memon, N. & Wong, P. W. (ed.)
    SPIE Conference on Media Forensics and Security
    2009
    BibTeX
    @inproceedings{Rosenfeld2009,
     author = {Rosenfeld, Kurt and Sencar, Husrev T.},
     title = {A Study of the Robustness of PRNU-Based Camera Identification},
     booktitle = {SPIE Conference on Media Forensics and Security},
     year = {2009}}
    
  114. G. Sankar, H.V. Zhao & Y.-H. Yang
    Feature Based Classification of Computer Graphics and Real Images
    IEEE International Conference on Acoustics, Speech, and Signal Processing
    2009, pp. 1513-1516
    BibTeX
    @inproceedings{Sankar2009,
     author = {Sankar, Gopinath and Zhao, H. Vicky and Yang, Yee-Hong},
     title = {Feature Based Classification of Computer Graphics and Real Images},
     booktitle = {IEEE International Conference on Acoustics, Speech, and Signal Processing},
     year = {2009},
     pages = {1513-1516}}
    
  115. A. Sarkar, L. Nataraj & B.S. Manjunath
    Detection of seam carving and localization of seam insertions in digital images
    MM&38;Sec ´09: Proceedings of the 11th ACM workshop on Multimedia and security
    ACM, 2009, pp. 107-116
    BibTeX
    @inproceedings{Sarkar2009,
     author = {Sarkar, Anindya and Nataraj, Lakshmanan and Manjunath, B. S.},
     title = {Detection of seam carving and localization of seam insertions in digital images},
     booktitle = {MM&38;Sec ´09: Proceedings of the 11th ACM workshop on Multimedia and security},
     publisher = {ACM},
     year = {2009},
     pages = {107--116}}
    
  116. H.T. Sencar & N. Memon
    Identification and recovery of JPEG files with missing fragments
    Digital Investigation , 2009, Vol. 6, Supplement(0), pp. S88 - S98
    BibTeX
    @article{Sencar2009,
     author = {Husrev T. Sencar and Nasir Memon},
     title = {Identification and recovery of JPEG files with missing fragments },
     journal = {Digital Investigation },
     year = {2009},
     volume = {6, Supplement},
     number = {0},
     pages = {S88 - S98}}
    
  117. S. Senpathi
    Detection of manipulated images
    Wichita State University, 2009
    BibTeX
    @mastersthesis{Senpathi2009,
     author = {Senpathi, Santoshi},
     title = {Detection of manipulated images},
     school = {Wichita State University},
     year = {2009}}
    
  118. T. Shahid & A. Bin Mansoor
    Copy-Move Forgery Detection Algorithm for Digital Images and a New Accuracy Metric
    International Journal of Recent Trends in Engineering,, 2009, Vol. 2(2), pp. 159-161
    BibTeX
    @article{Shahid2009,
     author = {Shahid, Tehseen and Bin Mansoor, Atif},
     title = {Copy-Move Forgery Detection Algorithm for Digital Images and a New Accuracy Metric},
     journal = {International Journal of Recent Trends in Engineering,},
     year = {2009},
     volume = {2},
     number = {2},
     pages = {159--161}}
    
  119. C. Shengbing, C. Zuguo, H. Qiangbo & Y. Shaojun
    Image Self-Embedding Technology Research Based on Discrete Cosine Transform
    Proc. Int. Conf. Networks Security, Wireless Communications and Trusted Computing NSWCTC ´09
    2009, Vol. 1, pp. 42-46
    BibTeX
    @inproceedings{Shengbing2009,
     author = {Che Shengbing and Che Zuguo and Huang Qiangbo and Yu Shaojun},
     title = {Image Self-Embedding Technology Research Based on Discrete Cosine Transform},
     booktitle = {Proc. Int. Conf. Networks Security, Wireless Communications and Trusted Computing NSWCTC ´09},
     year = {2009},
     volume = {1},
     pages = {42--46}}
    
  120. M. Stamm & K.J.R. Liu
    Forensic Detection of Image Tampering Using Intrinsic Statistical Fingerprints in Histograms
    Proc. APSIPA Annual Summit and Conference
    2009
    BibTeX
    @inproceedings{Stamm2009,
     author = {Stamm, Matthew and Liu, K. J. Ray},
     title = {Forensic Detection of Image Tampering Using Intrinsic Statistical Fingerprints in Histograms},
     booktitle = {Proc. APSIPA Annual Summit and Conference},
     year = {2009}}
    
  121. P. Sutthiwan, X. Cai, Y.Q. Shi & H. Zhang
    Computer Graphics Classification Based on Markov Process Model and Boosting Feature Selection Technique
    IEEE International Conference on Image Processing
    2009, pp. 2913-2916
    BibTeX
    @inproceedings{Sutthiwan2009a,
     author = {Sutthiwan, Patchara and Cai, Xiao and Shi, Yun Qing and Zhang, Hong},
     title = {Computer Graphics Classification Based on Markov Process Model and Boosting Feature Selection Technique},
     booktitle = {IEEE International Conference on Image Processing},
     year = {2009},
     pages = {2913-2916}}
    
  122. P. Sutthiwan, J. Ye & Y.Q. Shi
    An Enhanced Statistical Approach to Identifying Photorealistic Images
    Ho, A. T. S., Shi, Y. Q., Kim, H.-J. & Barni, M. (ed.)
    International Workshop on Digital Watermarking
    2009, pp. 323-335
    BibTeX
    @inproceedings{Sutthiwan2009,
     author = {Sutthiwan, Patchara and Ye, Jingyu and Shi, Yun Qing},
     title = {An Enhanced Statistical Approach to Identifying Photorealistic Images},
     booktitle = {International Workshop on Digital Watermarking},
     year = {2009},
     pages = {323-335}}
    
  123. A. Swaminathan, M. Wu & K.J.R. Liu
    Component forensics
    IEEE Signal Processing Magazine, 2009, Vol. 26(2), pp. 38-48
    BibTeX
    @article{Swaminathan2009,
     author = {Swaminathan, Ashwin and Min Wu and Liu, K. J. R.},
     title = {Component forensics},
     journal = {IEEE Signal Processing Magazine},
     year = {2009},
     volume = {26},
     number = {2},
     pages = {38--48}}
    
  124. M. Tagliasacchi, G. Valenzise & S. Tubaro
    Hash-Based Identification of Sparse Image Tampering
    IEEE Transactions on Image Processing, 2009, Vol. 18(11), pp. 2491-2504
    BibTeX
    @article{Tagliasacchi2009,
     author = {Tagliasacchi, Marco and Valenzise, Giuseppe and Tubaro, Stefano },
     title = {Hash-Based Identification of Sparse Image Tampering},
     journal = {IEEE Transactions on Image Processing},
     year = {2009},
     volume = {18},
     number = {11},
     pages = {2491--2504}}
    
  125. Z. Ting & W.R. ding
    Copy-Move Forgery Detection Based on SVD in Digital Image
    Proc. 2nd Int. Congress Image and Signal Processing CISP ´09
    2009, pp. 1-5
    BibTeX
    @inproceedings{Ting2009a,
     author = {Zhang Ting and Wang Rang-ding},
     title = {Copy-Move Forgery Detection Based on SVD in Digital Image},
     booktitle = {Proc. 2nd Int. Congress Image and Signal Processing CISP ´09},
     year = {2009},
     pages = {1--5}}
    
  126. Z. Ting & W. Rangding
    Doctored JPEG image detection based on double compression features analysis
    Proc. ISECS Int. Colloquium Computing, Communication, Control, and Management CCCM 2009
    2009, Vol. 2, pp. 76-80
    BibTeX
    @inproceedings{Ting2009b,
     author = {Zhang Ting and Wang Rangding},
     title = {Doctored JPEG image detection based on double compression features analysis},
     booktitle = {Proc. ISECS Int. Colloquium Computing, Communication, Control, and Management CCCM 2009},
     year = {2009},
     volume = {2},
     pages = {76--80}}
    
  127. Z. Ting & W. Rang-ding
    Copy-Move Forgery Detection Based on SVD in Digital Image
    Proc. 2nd Int. Congress Image and Signal Processing CISP ´09
    2009, pp. 1-5
    BibTeX
    @inproceedings{Ting2009,
     author = {Ting, Zhang and Rang-ding, Wang},
     title = {Copy-Move Forgery Detection Based on SVD in Digital Image},
     booktitle = {Proc. 2nd Int. Congress Image and Signal Processing CISP ´09},
     year = {2009},
     pages = {1--5}}
    
  128. J. Toriwaki & H. Yoshida
    Fundamentals of Three-Dimensional Digital Image Processing
    Springer, 2009
    BibTeX
    @book{Toriwaki2009,
     author = {Junichiro Toriwaki and Hiroyuki Yoshida},
     title = {Fundamentals of Three-Dimensional Digital Image Processing},
     publisher = {Springer},
     year = {2009}}
    
  129. R. Tortorella
    Richard Tortorella
    NARCAP, 2009
    BibTeX
    @techreport{Tortorella2009,
     author = {Richard Tortorella},
     title = {Richard Tortorella},
     year = {2009}}
    
  130. M.-J. Tsai, C.-S. Wang & J. Liu
    A Hybrid Model for Digital Camera Source Identification
    IEEE International Conference on Image Processing
    2009, pp. 2901-2904
    BibTeX
    @inproceedings{Tsai2009,
     author = {Tsai, Min-Jen and Wang, Cheng-Sheng and Liu, Jung},
     title = {A Hybrid Model for Digital Camera Source Identification},
     booktitle = {IEEE International Conference on Image Processing},
     year = {2009},
     pages = {2901-2904}}
    
  131. W. Van Houten & Z.J. Geradts
    Using Sensor Noise to Identify Low Resolution Compressed Videos from YouTube
    Geradts, Z. J., Franke, K. Y. & Veenman, C. J. (ed.)
    International Workshop on Computational Forensics
    2009, pp. 104-115
    BibTeX
    @inproceedings{VanHouten2009a,
     author = {Van Houten, Wiger and Geradts, Zeno J.},
     title = {Using Sensor Noise to Identify Low Resolution Compressed Videos from YouTube},
     booktitle = {International Workshop on Computational Forensics},
     year = {2009},
     pages = {104-115}}
    
  132. W. Van Houten & Z.J. Geradts
    Source Video Camera Identification for Multiply Compressed Videos Originating from YouTube
    Digital Investigation, 2009, Vol. 6(1-2), pp. 48-60
    BibTeX
    @article{VanHouten2009,
     author = {Van Houten, Wiger and Geradts, Zeno J.},
     title = {Source Video Camera Identification for Multiply Compressed Videos Originating from YouTube},
     journal = {Digital Investigation},
     year = {2009},
     volume = {6},
     number = {1-2},
     pages = {48-60}}
    
  133. E.E. Varsaki, V. Fotopoulos & A.N. Skodras
    Self-authentication of natural color images in Pascal transform domain
    DSP´09: Proceedings of the 16th international conference on Digital Signal Processing
    IEEE Press, 2009, pp. 1068-1073
    BibTeX
    @inproceedings{Varsaki2009,
     author = {Varsaki, E. E. and Fotopoulos, V. and Skodras, A. N.},
     title = {Self-authentication of natural color images in Pascal transform domain},
     booktitle = {DSP´09: Proceedings of the 16th international conference on Digital Signal Processing},
     publisher = {IEEE Press},
     year = {2009},
     pages = {1068--1073}}
    
  134. B. Wang, Y. Guo, X. Kong & F. Meng
    Source Camera Identification Forensics Based on Wavelet Features
    Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2009. IIH-MSP '09.
    2009, pp. 702-705
    BibTeX
    @inproceedings{Wang2009h,
     author = {Bo Wang and Yiping Guo and Xiangwei Kong and Fanjie Meng},
     title = {Source Camera Identification Forensics Based on Wavelet Features},
     booktitle = {Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2009. IIH-MSP '09.},
     year = {2009},
     pages = {702--705}}
    
  135. B. Wang, X. Kong & X. You
    Source Camera Identification Using Support Vector Machines
    Advances in Digital Forensics V
    2009, pp. 107-118
    BibTeX
    @inproceedings{Wang2009e,
     author = {Wang, Bo and Kong, Xiangwei and You, Xingang},
     title = {Source Camera Identification Using Support Vector Machines},
     booktitle = {Advances in Digital Forensics V},
     year = {2009},
     pages = {107-118}}
    
  136. G. Wang, H.-T. Tsui & Q.M. Jonathan Wu
    What can we learn about the scene structure from three orthogonal vanishing points in images
    Pattern Recogn. Lett., Elsevier Science Inc., 2009, Vol. 30(3), pp. 192-202
    BibTeX
    @article{Wang2009d,
     author = {Wang, Guanghui and Tsui, Hung-Tat and Jonathan Wu, Q. M.},
     title = {What can we learn about the scene structure from three orthogonal vanishing points in images},
     journal = {Pattern Recogn. Lett.},
     publisher = {Elsevier Science Inc.},
     year = {2009},
     volume = {30},
     number = {3},
     pages = {192--202}}
    
  137. J. Wang, B.-H. Cha, S.-H. Cho & C.C.J. Kuo
    Understanding Benford´s Law and its Vulnerability in Image Forensics
    IEEE International Conference on Multimedia and Expo
    2009, pp. 1568-1571
    BibTeX
    @inproceedings{Wang2009j,
     author = {Wang, Jingwei and Cha, Byung-Ho and Cho, Seong-Ho and Kuo, C. -C. Jay},
     title = {Understanding Benford´s Law and its Vulnerability in Image Forensics},
     booktitle = {IEEE International Conference on Multimedia and Expo},
     year = {2009},
     pages = {1568-1571}}
    
  138. J. Wang, G. Liu, H. Li, Y. Dai & Z. Wang
    Detection of Image Region Duplication Forgery Using Model with Circle Block
    Proc. Int. Conf. Multimedia Information Networking and Security MINES ´09
    2009, Vol. 1, pp. 25-29
    BibTeX
    @inproceedings{Wang2009,
     author = {Junwen Wang and Guangjie Liu and Hongyuan Li and Yuewei Dai and Zhiquan Wang},
     title = {Detection of Image Region Duplication Forgery Using Model with Circle Block},
     booktitle = {Proc. Int. Conf. Multimedia Information Networking and Security MINES ´09},
     year = {2009},
     volume = {1},
     pages = {25--29}}
    
  139. R. Wang & X. Ping
    Detection of Resampling Based on Singular Value Decomposition
    Proc. Fifth Int. Conf. Image and Graphics ICIG ´09
    2009, pp. 879-884
    BibTeX
    @inproceedings{Wang2009a,
     author = {Ran Wang and Xijian Ping},
     title = {Detection of Resampling Based on Singular Value Decomposition},
     booktitle = {Proc. Fifth Int. Conf. Image and Graphics ICIG ´09},
     year = {2009},
     pages = {879--884}}
    
  140. W. Wang
    Digital Video Forensics
    Department of Computer Science, Dartmouth College, 2009
    BibTeX
    @phdthesis{Wang2009i,
     author = {Wang, Weihong},
     title = {Digital Video Forensics},
     school = {Department of Computer Science, Dartmouth College},
     year = {2009}}
    
  141. W. Wang, J. Dong & T. Tan
    A Survey of Passive Image Tampering Detection
    Ho, A. T. S., Shi, Y. Q., Kim, H.-J. & Barni, M. (ed.)
    International Workshop on Digital Watermarking
    2009, pp. 308-322
    BibTeX
    @inproceedings{Wang2009g,
     author = {Wang, Wei and Dong, Jing and Tan, Tieniu},
     title = {A Survey of Passive Image Tampering Detection},
     booktitle = {International Workshop on Digital Watermarking},
     year = {2009},
     pages = {308-322}}
    
  142. W. Wang, J. Dong & T. Tan
    Effective image splicing detection based on image chroma
    ICIP´09: Proceedings of the 16th IEEE international conference on Image processing
    IEEE Press, 2009, pp. 1249-1252
    BibTeX
    @inproceedings{Wang2009c,
     author = {Wang, Wei and Dong, Jing and Tan, Tieniu},
     title = {Effective image splicing detection based on image chroma},
     booktitle = {ICIP´09: Proceedings of the 16th IEEE international conference on Image processing},
     publisher = {IEEE Press},
     year = {2009},
     pages = {1249--1252}}
    
  143. W. Wang & H. Farid
    Exposing Digital Forgeries in Video by Detecting Double Quantization
    ACM Multimedia and Security Workshop
    2009, pp. 39-48
    BibTeX
    @inproceedings{Wang2009f,
     author = {Wang, Weihong and Farid, Hany},
     title = {Exposing Digital Forgeries in Video by Detecting Double Quantization},
     booktitle = {ACM Multimedia and Security Workshop},
     year = {2009},
     pages = {39-48}}
    
  144. X. Wang, B. Xuan & S.-L. Peng
    Detection of copy-transform-move forgery in color digital image
    Jisuanji Gongcheng / Computer Engineering, 2009, Vol. 35(16), pp. 20-22
    BibTeX
    @article{Wang2009b,
     author = {Wang, Xin and Xuan, Bo and Peng, Si-Long},
     title = {Detection of copy-transform-move forgery in color digital image},
     journal = {Jisuanji Gongcheng / Computer Engineering},
     year = {2009},
     volume = {35},
     number = {16},
     pages = {20-22}}
    
  145. P. Wendykier
    High Performance Java Software for Image Processing
    Emory University, 2009
    BibTeX
    @phdthesis{Wendykier2009,
     author = {Wendykier, Piotr},
     title = {High Performance Java Software for Image Processing},
     school = {Emory University},
     year = {2009}}
    
  146. Y. Wu, X. Kong, X. You & Y. Guo
    Printer Forensics Based on Page Document´s Geometric Distortion
    IEEE International Conference on Image Processing
    2009, pp. 2909-2912
    BibTeX
    @inproceedings{Wu2009,
     author = {Wu, Yubao and Kong, Xiangwei and You, Xingang and Guo, Yiping},
     title = {Printer Forensics Based on Page Document´s Geometric Distortion},
     booktitle = {IEEE International Conference on Image Processing},
     year = {2009},
     pages = {2909-2912}}
    
  147. G. Xu, S. Gao, Y.Q. Shi, R. Hu & W. Su
    Camera-Model Identification Using Markovian Transition Probability Matrix
    Ho, A. T. S., Shi, Y. Q., Kim, H.-J. & Barni, M. (ed.)
    International Workshop on Digital Watermarking
    2009, pp. 294-307
    BibTeX
    @inproceedings{Xu2009a,
     author = {Xu, Guanshuo and Gao, Shang and Shi, Yun Qing and Hu, RuiMin and Su, Wei},
     title = {Camera-Model Identification Using Markovian Transition Probability Matrix},
     booktitle = {International Workshop on Digital Watermarking},
     year = {2009},
     pages = {294-307}}
    
  148. G. Xu, Y.Q. Shi & W. Su
    Camera brand and model identification using moments of 1-D and 2-D characteristic functions
    Proc. 16th IEEE Int Image Processing (ICIP) Conf
    2009, pp. 2917-2920
    BibTeX
    @inproceedings{Xu2009,
     author = {Guanshuo Xu and Yun Qing Shi and Wei Su},
     title = {Camera brand and model identification using moments of 1-D and 2-D characteristic functions},
     booktitle = {Proc. 16th IEEE Int Image Processing (ICIP) Conf},
     year = {2009},
     pages = {2917--2920}}
    
  149. Q.-C. Yang & C.-L. Huang
    Copy-Move Forgery Detection in Digital Image
    PCM ´09: Proceedings of the 10th Pacific Rim Conference on Multimedia
    Springer-Verlag, 2009, pp. 816-825
    BibTeX
    @inproceedings{Yang2009,
     author = {Yang, Qing-Chu and Huang, Chung-Lin},
     title = {Copy-Move Forgery Detection in Digital Image},
     booktitle = {PCM ´09: Proceedings of the 10th Pacific Rim Conference on Multimedia},
     publisher = {Springer-Verlag},
     year = {2009},
     pages = {816--825}}
    
  150. R. Yang, Y.Q. Shi & J. Huang
    Defeating Fake-Quality MP3
    ACM Proceedings of the Multimedia and Security Workshop
    2009, pp. 117-124
    BibTeX
    @inproceedings{Yang2009a,
     author = {Yang, Rui and Shi, Yun Qing and Huang, Jiwu},
     title = {Defeating Fake-Quality MP3},
     booktitle = {ACM Proceedings of the Multimedia and Security Workshop},
     year = {2009},
     pages = {117-124}}
    
  151. K.-H. Yap, L. Guan, S.W. Perry & H.S. Wong
    Adaptive Image Processing: A Computational Intelligence Perspective
    Laplante, P. A. (ed.)
    CRC Press, 2009
    BibTeX
    @book{Yap2009,
     author = {Kim-Hui Yap and Ling Guan and Stuart William Perry and Hau San Wong},
     title = {Adaptive Image Processing: A Computational Intelligence Perspective},
     publisher = {CRC Press},
     year = {2009}}
    
  152. C. Zhang & H. Zhang
    Digital Camera Identification Based on Curvelet Transform
    IEEE International Conference on Acoustics, Speech, and Signal Processing
    2009, pp. 1389-1392
    BibTeX
    @inproceedings{Zhang2009e,
     author = {Zhang, Chi and Zhang, Hongbin},
     title = {Digital Camera Identification Based on Curvelet Transform},
     booktitle = {IEEE International Conference on Acoustics, Speech, and Signal Processing},
     year = {2009},
     pages = {1389-1392}}
    
  153. J. Zhang & Y. Su
    Detecting logo-removal forgery by inconsistencies of blur
    Proc. Int. Conf. Industrial Mechatronics and Automation ICIMA 2009
    2009, pp. 32-36
    BibTeX
    @inproceedings{Zhang2009d,
     author = {Jing Zhang and Yuting Su},
     title = {Detecting logo-removal forgery by inconsistencies of blur},
     booktitle = {Proc. Int. Conf. Industrial Mechatronics and Automation ICIMA 2009},
     year = {2009},
     pages = {32--36}}
    
  154. J. Zhang, Y. Su & M. Zhang
    Exposing Digital Video Forgery by Ghost Shadow Artifact
    ACM Workshop on Multimedia in Forensics
    2009, pp. 49-54
    BibTeX
    @inproceedings{Zhang2009g,
     author = {Zhang, Jing and Su, Yuting and Zhang, Mingyu},
     title = {Exposing Digital Video Forgery by Ghost Shadow Artifact},
     booktitle = {ACM Workshop on Multimedia in Forensics},
     year = {2009},
     pages = {49-54}}
    
  155. J. Zhang, H. Wang & Y. Su
    Detection of Double-Compression in JPEG2000 Images for Application in Image Forensics
    Journal of Multimedia, 2009, Vol. 4(6), pp. 379-388
    BibTeX
    @article{Zhang2009f,
     author = {Jing Zhang and Haiying Wang and Yuting Su},
     title = {Detection of Double-Compression in JPEG2000 Images for Application in Image Forensics},
     journal = {Journal of Multimedia},
     year = {2009},
     volume = {4},
     number = {6},
     pages = {379-388}}
    
  156. J. Zhang, Y. Zhao & Y. Su
    A new approach merging markov and DCT features for image splicing detection
    Proc. IEEE Int. Conf. Intelligent Computing and Intelligent Systems ICIS 2009
    2009, Vol. 4, pp. 390-394
    BibTeX
    @inproceedings{Zhang2009b,
     author = {Jing Zhang and Yun Zhao and Yuting Su},
     title = {A new approach merging markov and DCT features for image splicing detection},
     booktitle = {Proc. IEEE Int. Conf. Intelligent Computing and Intelligent Systems ICIS 2009},
     year = {2009},
     volume = {4},
     pages = {390--394}}
    
  157. P. Zhang & X. Kong
    Detecting Image Tampering Using Feature Fusion
    Proc. Int. Conf. Availability, Reliability and Security ARES ´09
    2009, pp. 335-340
    BibTeX
    @inproceedings{Zhang2009a,
     author = {Pin Zhang and Xiangwei Kong},
     title = {Detecting Image Tampering Using Feature Fusion},
     booktitle = {Proc. Int. Conf. Availability, Reliability and Security ARES ´09},
     year = {2009},
     pages = {335--340}}
    
  158. W. Zhang, X. Cao, Z. Feng, J. Zhang & P. Wang
    Detecting photographic composites using two-view geometrical constraints
    Proc. IEEE Int. Conf. Multimedia and Expo ICME 2009
    2009, pp. 1078-1081
    BibTeX
    @inproceedings{Zhang2009c,
     author = {Wei Zhang and Xiaochun Cao and Zhiyong Feng and Jiawan Zhang and Ping Wang},
     title = {Detecting photographic composites using two-view geometrical constraints},
     booktitle = {Proc. IEEE Int. Conf. Multimedia and Expo ICME 2009},
     year = {2009},
     pages = {1078--1081}}
    
  159. W. Zhang, X. Cao, J. Zhang, J. Zhu & P. Wang
    Detecting photographic composites using shadows
    Proc. IEEE International Conference on Multimedia and Expo ICME 2009
    2009, pp. 1042-1045
    BibTeX
    @inproceedings{Zhang2009,
     author = {Zhang, Wei and Cao, Xiaochun and Zhang, Jiawan and Zhu, Jigui and Wang, Ping},
     title = {Detecting photographic composites using shadows},
     booktitle = {Proc. IEEE International Conference on Multimedia and Expo ICME 2009},
     year = {2009},
     pages = {1042--1045}}
    
  160. X. Zhao, A.T.S. Ho & Y.Q. Shi
    Image forensics using generalised Benford's Law for accurate detection of unknown JPEG compression in watermarked images
    Proc. 16th Int Digital Signal Processing Conf
    2009, pp. 1-8
    BibTeX
    @inproceedings{Zhao2009,
     author = {Xi Zhao and Ho, A. T. S. and Shi, Y. Q.},
     title = {Image forensics using generalised Benford's Law for accurate detection of unknown JPEG compression in watermarked images},
     booktitle = {Proc. 16th Int Digital Signal Processing Conf},
     year = {2009},
     pages = {1--8}}
    
  161. J. Zheng & M. Liu
    A Digital Forgery Image Detection Algorithm Based on Wavelet Homomorphic Filtering
    Lecture Notes In Computer Science, Springer-Verlag, 2009, Vol. 5450, pp. 152-160
    BibTeX
    @article{Zheng2009,
     author = {Zheng, Jiangbin and Liu, Miao},
     title = {A Digital Forgery Image Detection Algorithm Based on Wavelet Homomorphic Filtering},
     journal = {Lecture Notes In Computer Science},
     publisher = {Springer-Verlag},
     year = {2009},
     volume = {5450},
     pages = {152--160}}
    
  162. D. Zoran & Y. Weiss
    Scale invariance and noise in natural images
    Proc. IEEE 12th Int Computer Vision Conf
    2009, pp. 2209-2216
    BibTeX
    @inproceedings{Zoran2009,
     author = {Zoran, D. and Weiss, Y. },
     title = {Scale invariance and noise in natural images},
     booktitle = {Proc. IEEE 12th Int Computer Vision Conf},
     year = {2009},
     pages = {2209--2216}}
    
  163. I. van Zyl Marais & W.H. Steyn
    A fast parallel algorithm for blind estimation of noise variance
    University of Stellenbosch, 2009
    BibTeX
    @techreport{ZylMarais2009,
     author = {Izak van Zyl Marais and Willem Herman Steyn},
     title = {A fast parallel algorithm for blind estimation of noise variance},
     year = {2009}}
    
  164. Computational Forensics
    Geradts, Z. J. M. H., Franke, K. Y. & (Eds.), C. J. V. (ed.)
    Springer, 2009, Vol. 5718
    BibTeX
    @proceedings{Geradts2009,,
     title = {Computational Forensics},
     publisher = {Springer},
     year = {2009},
     volume = {5718}}
    
  165. Multimedia Forensics and Security
    Li, C.-T. (ed.)
    Hershey, New York, 2009
    BibTeX
    @book{Li2009i,,
     title = {Multimedia Forensics and Security},
     publisher = {Hershey, New York},
     year = {2009}}
    
  166. Forensics in Telecommunications, Information and Multimedia
    Sorell, M. (ed.)
    Springer, 2009
    @book{Sorell2009,,
     title = {Forensics in Telecommunications, Information and Multimedia},
     publisher = {Springer},
     year = {2009}}
    


2008

  1. R. Achanta, F. Estrada, P. Wils & S. Süsstrunk
    Salient region detection and segmentation
    ICVS´08: Proceedings of the 6th international conference on Computer vision systems
    Springer-Verlag, 2008, pp. 66-75
    BibTeX
    @inproceedings{Achanta2008,
     author = {Achanta, Radhakrishna and Estrada, Francisco and Wils, Patricia and Süsstrunk, Sabine},
     title = {Salient region detection and segmentation},
     booktitle = {ICVS´08: Proceedings of the 6th international conference on Computer vision systems},
     publisher = {Springer-Verlag},
     year = {2008},
     pages = {66--75}}
    
  2. E.J. Alles, Z.J. Geradts & C.J. Veenman
    Source Camera Identification for Low Resolution Heavily Compressed Images
    International Conference on Computational Sciences and Its Applications
    2008, pp. 557-567
    BibTeX
    @inproceedings{Alles2008,
     author = {Alles, Erwin J. and Geradts, Zeno J. and Veenman, Cor. J.},
     title = {Source Camera Identification for Low Resolution Heavily Compressed Images},
     booktitle = {International Conference on Computational Sciences and Its Applications},
     year = {2008},
     pages = {557-567}}
    
  3. I. Amerini
    Image Forensics: Source Identification and Tampering Detection
    Universit` a degli Studi di Firenze, 2008
    BibTeX
    @phdthesis{Amerini2008,
     author = {Irene Amerini},
     title = {Image Forensics: Source Identification and Tampering Detection},
     school = {Universit` a degli Studi di Firenze},
     year = {2008}}
    
  4. S. Bayram
    A Survey of Copy-Move Forgery Detection Techniques
    2008
    BibTeX
    @misc{Bayram2008,
     author = {Bayram, Sevinc},
     title = {A Survey of Copy-Move Forgery Detection Techniques},
     year = {2008}}
    
  5. S. Bayram, H.T. Sencar & N. Memon
    Classification of digital camera-models based on demosaicing artifacts
    Digital Investigation, 2008, Vol. 5(1-2), pp. 49 - 59
    BibTeX
    @article{Bayram2008a,
     author = {Sevinc Bayram and Husrev T. Sencar and Nasir Memon},
     title = {Classification of digital camera-models based on demosaicing artifacts},
     journal = {Digital Investigation},
     year = {2008},
     volume = {5},
     number = {1-2},
     pages = {49 - 59}}
    
  6. S. Bayram, H.T. Sencar & N. Memon
    Video Copy Detection Based on Source Device Characteristics: A Complementary Approach to Content-Based Methods
    ACM International Conference on Multimedia Information Retrieval
    2008, pp. 435-442
    BibTeX
    @inproceedings{Bayram2008c,
     author = {Bayram, Sevinc and Sencar, Husrev T. and Memon, Nasir},
     title = {Video Copy Detection Based on Source Device Characteristics: A Complementary Approach to Content-Based Methods},
     booktitle = {ACM International Conference on Multimedia Information Retrieval},
     year = {2008},
     pages = {435-442}}
    
  7. T.E. Bishop, R. Molina & J.R. Hopgood
    Blind restoration of blurred photographs via AR modelling and MCMC
    Proc. 15th IEEE International Conference on Image Processing ICIP 2008
    2008, pp. 669-672
    BibTeX
    @inproceedings{Bishop2008,
     author = {Bishop, T. E. and Molina, R. and Hopgood, J. R.},
     title = {Blind restoration of blurred photographs via AR modelling and MCMC},
     booktitle = {Proc. 15th IEEE International Conference on Image Processing ICIP 2008},
     year = {2008},
     pages = {669--672}}
    
  8. G.J. Bloy
    Blind Camera Fingerprinting and Image Clustering
    IEEE Transactions on Pattern Analysis and Machine Intelligence, 2008, Vol. 30(3), pp. 532-535
    BibTeX
    @article{Bloy2008,
     author = {Bloy, Greg J.},
     title = {Blind Camera Fingerprinting and Image Clustering},
     journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence},
     year = {2008},
     volume = {30},
     number = {3},
     pages = {532-535}}
    
  9. A. Büllesbach
    Global, lokal, digital - Fotojournalismus heute
    Elke, G., Neverla, I. & Ammann, I. (ed.)
    Chapter Digitale Bildmanipulation und Ethik. Aktuelle Tendenzen im Fotojournalismus.
    Herbert von Halem-Verlag, 2008, pp. 108-136
    BibTeX
    @inbook{Buellesbach2008,
     author = {Büllesbach, Alfred},
     title = {Global, lokal, digital - Fotojournalismus heute},
     publisher = {Herbert von Halem-Verlag},
     year = {2008},
     pages = {108-136}}
    
  10. G. Cao, Y. Zhao & R. Ni
    Image Composition Detection Using Object-Based Color Consistency
    IEEE International Conference on Signal Processing
    2008, pp. 1186-1189
    BibTeX
    @inproceedings{Cao2008a,
     author = {Cao, Gang and Zhao, Yao and Ni, Rongrong},
     title = {Image Composition Detection Using Object-Based Color Consistency},
     booktitle = {IEEE International Conference on Signal Processing},
     year = {2008},
     pages = {1186-1189}}
    
  11. H. Cao & A.C. Kot
    A generalized model for detection of demosaicing characteristics
    Proc. IEEE Int Multimedia and Expo Conf
    2008, pp. 1513-1516
    BibTeX
    @inproceedings{Cao2008,
     author = {Hong Cao and Kot, A. C.},
     title = {A generalized model for detection of demosaicing characteristics},
     booktitle = {Proc. IEEE Int Multimedia and Expo Conf},
     year = {2008},
     pages = {1513--1516}}
    
  12. P.C.P. Carvalho, L.H.D. Figueiredo, J. Gomes & L. Velho
    Mathematical Optimization in Computer Graphics and Vision
    Morgan Kaufman Publishers, 2008
    BibTeX
    @book{Carvalho2008,
     author = {Paulo Cezar Pinto Carvalho and Luiz Henrique De Figueiredo and Jonas Gomes and Luiz Velho},
     title = {Mathematical Optimization in Computer Graphics and Vision},
     publisher = {Morgan Kaufman Publishers},
     year = {2008}}
    
  13. O. Celiktutan, B. Sankur & I. Avcibas
    Blind Identification of Source Cell-Phone Model
    IEEE Transactions on Information Forensics and Security, 2008, Vol. 3(3), pp. 553-566
    BibTeX
    @article{Celiktutan2008,
     author = {Celiktutan, O. and Sankur, B. and Avcibas, I.},
     title = {Blind Identification of Source Cell-Phone Model},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2008},
     volume = {3},
     number = {3},
     pages = {553--566}}
    
  14. C.-C. Chang, J.-C. Chuang & Y.-Z. Wang
    VQ-Based Oriented Image Tamper Proofing Schemes for Digital Grayscale Images
    Proc. Second Int. Symp. Intelligent Information Technology Application IITA ´08
    2008, Vol. 2, pp. 1000-1004
    BibTeX
    @inproceedings{Chang2008,
     author = {Chin-Chen Chang and Jun-Chou Chuang and Yu-Zheng Wang},
     title = {VQ-Based Oriented Image Tamper Proofing Schemes for Digital Grayscale Images},
     booktitle = {Proc. Second Int. Symp. Intelligent Information Technology Application IITA ´08},
     year = {2008},
     volume = {2},
     pages = {1000--1004}}
    
  15. M. Chen, J. Fridrich, M. Goljan & J. Lukáš
    Determining image origin and integrity using sensor noise
    IEEE Transactions on Information Forensics and Security, 2008, Vol. 3(1), pp. 74-90
    BibTeX
    @article{Chen2008,
     author = {Mo Chen and Jessica Fridrich and Miroslav Goljan and Jan Lukáš},
     title = {Determining image origin and integrity using sensor noise},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2008},
     volume = {3},
     number = {1},
     pages = {74--90}}
    
  16. W. Chen
    Detection of digital image and video forgeries
    New Jersey Institute of Technology, New Jersey Institute of Technology, 2008
    BibTeX
    @phdthesis{Chen2008d,
     author = {Chen, Wen},
     title = {Detection of digital image and video forgeries},
     publisher = {New Jersey Institute of Technology},
     school = {New Jersey Institute of Technology},
     year = {2008}}
    
  17. W. Chen & Y.Q. Shi
    Detection of Double MPEG Video Compression Using First Digits Statistics
    International Workshop on Digital Watermarking
    2008
    BibTeX
    @inproceedings{Chen2008c,
     author = {Chen, Wen and Shi, Yun Qing},
     title = {Detection of Double MPEG Video Compression Using First Digits Statistics},
     booktitle = {International Workshop on Digital Watermarking},
     year = {2008}}
    
  18. W. Chen, Y.Q. Shi, G.R. Xuan & W. Su
    Computer Graphics Identification Using Genetic Algorithm
    IEEE International Conference on Pattern Recognition
    2008
    BibTeX
    @inproceedings{Chen2008b,
     author = {Chen, Wen and Shi, Yun Qing and Xuan, Guo Rong and Su, Wei},
     title = {Computer Graphics Identification Using Genetic Algorithm},
     booktitle = {IEEE International Conference on Pattern Recognition},
     year = {2008}}
    
  19. Y.-L. Chen & C.-T. Hsu
    Image tampering detection by blocking periodicity analysis in JPEG compressed images
    Proc. IEEE 10th Workshop Multimedia Signal Processing
    2008, pp. 803-808
    BibTeX
    @inproceedings{Chen2008a,
     author = {Yi-Lei Chen and Chiou-Ting Hsu},
     title = {Image tampering detection by blocking periodicity analysis in JPEG compressed images},
     booktitle = {Proc. IEEE 10th Workshop Multimedia Signal Processing},
     year = {2008},
     pages = {803--808}}
    
  20. C. Chunhua, Y.Q. Shi & S. Wei
    A Machine Learning Based Scheme for Double JPEG Compression Detection
    International Conference on Pattern Recognition
    2008, pp. 1-4
    BibTeX
    @inproceedings{Chunhua2008,
     author = {Chunhua, Chen and Shi, Yun Qing and Wei, Su},
     title = {A Machine Learning Based Scheme for Double JPEG Compression Detection},
     booktitle = {International Conference on Pattern Recognition},
     year = {2008},
     pages = {1-4}}
    
  21. W. Deng, Q. Chen, F. Yuan & Y. Yan
    Printer Identification Based on Distance Transform
    International Conference on Intelligent Networks and Intelligent Systems
    2008, pp. 565-568
    BibTeX
    @inproceedings{Deng2008,
     author = {Deng, Wei and Chen, Qinghu and Yuan, Feng and Yan, Yuchen},
     title = {Printer Identification Based on Distance Transform},
     booktitle = {International Conference on Intelligent Networks and Intelligent Systems},
     year = {2008},
     pages = {565-568}}
    
  22. A.E. Dirik, H.T. Sencar & N. Memon
    Digital Single Lens Reflex Camera Identification From Traces of Sensor Dust
    IEEE Transactions on Information Forensics and Security, 2008, Vol. 3(3), pp. 539-552
    BibTeX
    @article{Dirik2008,
     author = {Dirik, A. E. and Sencar, H. T. and Memon, N. },
     title = {Digital Single Lens Reflex Camera Identification From Traces of Sensor Dust},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2008},
     volume = {3},
     number = {3},
     pages = {539--552}}
    
  23. J.A. Dobrosotskaya & A.L. Bertozzi
    A Wavelet-Laplace Variational Technique for Image Deconvolution and Inpainting
    IEEE Transactions on Image Processing, 2008, Vol. 17(5), pp. 657-663
    BibTeX
    @article{Dobrosotskaya2008,
     author = {Dobrosotskaya, J. A. and Bertozzi, A. L. },
     title = {A Wavelet-Laplace Variational Technique for Image Deconvolution and Inpainting},
     journal = {IEEE Transactions on Image Processing},
     year = {2008},
     volume = {17},
     number = {5},
     pages = {657--663}}
    
  24. J. Dong, W. Wang, T. Tan & Y.Q. Shi
    Run-Length and Edge Statistics Based Approach for Image Splicing Detection
    International Workshop on Digital Watermarking
    2008, pp. 76-87
    BibTeX
    @inproceedings{Dong2008,
     author = {Dong, Jing and Wang, Wei and Tan, Tieniu and Shi, Yun Qing},
     title = {Run-Length and Edge Statistics Based Approach for Image Splicing Detection},
     booktitle = {International Workshop on Digital Watermarking},
     year = {2008},
     pages = {76-87}}
    
  25. S.M. Elshoura & D.B. Megherbi
    Comparison of Zernike and Tchebichef Moments for Image Tampering Detection Sensitivity and Watermark Recovery
    Proc. IEEE Conf. Technologies for Homeland Security
    2008, pp. 615-619
    BibTeX
    @inproceedings{Elshoura2008,
     author = {Elshoura, S. M. and Megherbi, D. B. },
     title = {Comparison of Zernike and Tchebichef Moments for Image Tampering Detection Sensitivity and Watermark Recovery},
     booktitle = {Proc. IEEE Conf. Technologies for Homeland Security},
     year = {2008},
     pages = {615--619}}
    
  26. H. Farid
    Digital Image Ballistics from JPEG Quantization: A Followup Study
    Department of Computer Science, Dartmouth College, 2008(TR2008-638)
    BibTeX
    @techreport{Farid2008,
     author = {Farid, Hany},
     title = {Digital Image Ballistics from JPEG Quantization: A Followup Study},
     year = {2008},
     number = {TR2008-638}}
    
  27. H. Farid
    Digital Image Forensics
    Scientific American, 2008, Vol. 6(298), pp. 66-71
    BibTeX
    @article{Farid2008a,
     author = {Farid, Hany},
     title = {Digital Image Forensics},
     journal = {Scientific American},
     year = {2008},
     volume = {6},
     number = {298},
     pages = {66-71}}
    
  28. T. Filler, J. Fridrich & M. Goljan
    Using sensor pattern noise for camera model identification
    15th IEEE International Conference on Image Processing ICIP 2008
    Image Processing, 2008. ICIP 2008. 15th IEEE International Conference on, 2008, pp. 1296-1299
    BibTeX
    @inproceedings{Filler2008b,
     author = {Filler, Tomáš and Fridrich, Jessica and Goljan, Miroslav},
     title = {Using sensor pattern noise for camera model identification},
     booktitle = {15th IEEE International Conference on Image Processing ICIP 2008},
     journal = {Image Processing, 2008. ICIP 2008. 15th IEEE International Conference on},
     year = {2008},
     pages = {1296-1299}}
    
  29. K. Franke & S. Srihari
    Computational Forensics: An Overview
    Srihari, S. & Franke, K. (ed.)
    Computational Forensics
    Springer Berlin / Heidelberg, 2008, Vol. 5158, pp. 1-10
    BibTeX
    @incollection{Franke2008,
     author = {Franke, Katrin and Srihari, Sargur},
     title = {Computational Forensics: An Overview},
     booktitle = {Computational Forensics},
     publisher = {Springer Berlin / Heidelberg},
     year = {2008},
     volume = {5158},
     pages = {1-10}}
    
  30. A.C. Gallagher & T. Chen
    Image authentication by detecting traces of demosaicing
    Proc. IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops CVPR Workshops 2008
    2008, pp. 1-8
    BibTeX
    @inproceedings{Gallagher2008,
     author = {Gallagher, A. C. and Tsuhan Chen},
     title = {Image authentication by detecting traces of demosaicing},
     booktitle = {Proc. IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops CVPR Workshops 2008},
     year = {2008},
     pages = {1--8}}
    
  31. A. Garg, A. Hailu & R. Sridharan
    Image Forgery Identification Using JPEG Intrinsic Fingerprints
    Stanford Center for Image Systems Engineering, 2008
    BibTeX
    @techreport{Garg2008,
     author = {Garg, A. and Hailu, A. and Sridharan, R.},
     title = {Image Forgery Identification Using JPEG Intrinsic Fingerprints},
     year = {2008}}
    
  32. S. Gholap & P.K. Bora
    Illuminant Colour Based Image Forensics
    IEEE Region 10 Conference (TENCON 2008)
    2008
    BibTeX
    @inproceedings{Gholap2008,
     author = {Gholap, Sandeep and Bora, P. K.},
     title = {Illuminant Colour Based Image Forensics},
     booktitle = {IEEE Region 10 Conference (TENCON 2008)},
     year = {2008}}
    
  33. M. Goljan & J. Fridrich
    Camera identification from cropped and scaled images
    III, E. J. D., Wong, P. W., Dittmann, J. & Memon, N. D. (ed.)
    Proc. SPIE 6819, 68190E (2008)
    Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, SPIE, 2008, Vol. 6819(1), pp. 68190E
    BibTeX
    @conference{Goljan2008,
     author = {Miroslav Goljan and Jessica Fridrich},
     title = {Camera identification from cropped and scaled images},
     booktitle = {Proc. SPIE 6819, 68190E (2008)},
     journal = {Security, Forensics, Steganography, and Watermarking of Multimedia Contents X},
     publisher = {SPIE},
     year = {2008},
     volume = {6819},
     number = {1},
     pages = {68190E}}
    
  34. M. Goljan, J. Fridrich & J. Lukáš
    Camera Identification From Printed Images
    Delp, E. J., Wong, P. W., Dittmann, J. & Memon, N. (ed.)
    SPIE Conference on Security, Forensics, Steganography, and Watermarking of Multimedia Contents
    2008, Vol. 6819
    BibTeX
    @inproceedings{Goljan2008a,
     author = {Goljan, Miroslav and Fridrich, Jessica and Lukáš, Jan},
     title = {Camera Identification From Printed Images},
     booktitle = {SPIE Conference on Security, Forensics, Steganography, and Watermarking of Multimedia Contents},
     year = {2008},
     volume = {6819}}
    
  35. J. Hays & A.A. Efros
    IM2GPS: estimating geographic information from a single image
    Proc. IEEE Conf. Computer Vision and Pattern Recognition CVPR 2008
    2008, pp. 1-8
    BibTeX
    @inproceedings{Hays2008,
     author = {Hays, J. and Efros, A. A.},
     title = {IM2GPS: estimating geographic information from a single image},
     booktitle = {Proc. IEEE Conf. Computer Vision and Pattern Recognition CVPR 2008},
     year = {2008},
     pages = {1--8}}
    
  36. C.-C. Hsu, T.-Y. Hung, C.-W. Lin & C.-T. Hsu
    Video Forgery Detection Using Correlation of Noise Residue
    IEEE Workshop on Multimedia Signal Processing
    2008, pp. 170-174
    BibTeX
    @inproceedings{Hsu2008a,
     author = {Hsu, Chih-Chung and Hung, Tzu-Yi and Lin, Chia-Wen and Hsu, Chiou-Ting},
     title = {Video Forgery Detection Using Correlation of Noise Residue},
     booktitle = {IEEE Workshop on Multimedia Signal Processing},
     year = {2008},
     pages = {170-174}}
    
  37. Y.-F. Hsu & S.-F. Chang
    Statistical fusion of multiple cues for image tampering detection
    Proc. 42nd Asilomar Conf. Signals, Systems and Computers
    2008, pp. 1386-1390
    BibTeX
    @inproceedings{Hsu2008,
     author = {Yu-Feng Hsu and Shih-Fu Chang},
     title = {Statistical fusion of multiple cues for image tampering detection},
     booktitle = {Proc. 42nd Asilomar Conf. Signals, Systems and Computers},
     year = {2008},
     pages = {1386--1390}}
    
  38. H. Huang, W. Guo & Y. Zhang
    Detection of Copy-Move Forgery in Digital Images Using SIFT Algorithm
    Proc. Pacific-Asia Workshop on Computational Intelligence and Industrial Application PACIIA ´08
    2008, Vol. 2, pp. 272-276
    BibTeX
    @inproceedings{Huang2008,
     author = {Huang, Hailing and Guo, Weiqiang and Zhang, Yu},
     title = {Detection of Copy-Move Forgery in Digital Images Using SIFT Algorithm},
     booktitle = {Proc. Pacific-Asia Workshop on Computational Intelligence and Industrial Application PACIIA ´08},
     year = {2008},
     volume = {2},
     pages = {272--276}}
    
  39. Y. Huang
    Demosaicking Recognition with Applications in Digital Photo Authentication based on a Quadratic Pixel Correlation Model
    Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition
    2008
    BibTeX
    @inproceedings{Huang2008a,
     author = {Yizhen Huang},
     title = {Demosaicking Recognition with Applications in Digital Photo Authentication based on a Quadratic Pixel Correlation Model},
     booktitle = {Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition},
     year = {2008}}
    
  40. IPTC
    IPTC Standard: Information Interchange Model (IIM) - IIM Schema for XMP Specification Version 1.0
    IPTC, 2008
    BibTeX
    @standard{IPTC2008,
     author = {IPTC},
     title = {IPTC Standard: Information Interchange Model (IIM) - IIM Schema for XMP Specification Version 1.0},
     year = {2008}}
    
  41. X. Kang & S. Wei
    Identifying Tampered Regions Using Singular Value Decomposition in Digital Image Forensics
    Proc. International Conference on Computer Science and Software Engineering
    2008, Vol. 3, pp. 926-930
    BibTeX
    @inproceedings{Kang2008,
     author = {Kang, XiaoBing and Wei, ShengMin},
     title = {Identifying Tampered Regions Using Singular Value Decomposition in Digital Image Forensics},
     booktitle = {Proc. International Conference on Computer Science and Software Engineering},
     year = {2008},
     volume = {3},
     pages = {926--930}}
    
  42. E. Kee & H. Farid
    Printer Profiling for Forensics and Ballistics
    ACM Multimedia and Security Workshop
    2008, pp. 3-10
    BibTeX
    @inproceedings{Kee2008,
     author = {Kee, Eric and Farid, Hany},
     title = {Printer Profiling for Forensics and Ballistics},
     booktitle = {ACM Multimedia and Security Workshop},
     year = {2008},
     pages = {3-10}}
    
  43. N. Khanna, G.T.-C. Chiu, J.P. Allebach & E.J. Delp
    Forensic techniques for classifying scanner, computer generated and digital camera images
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2008
    2008, pp. 1653-1656
    BibTeX
    @inproceedings{Khanna2008,
     author = {Khanna, N. and Chiu, G. T.-C. and Allebach, J. P. and Delp, E. J. },
     title = {Forensic techniques for classifying scanner, computer generated and digital camera images},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2008},
     year = {2008},
     pages = {1653--1656}}
    
  44. N. Khanna, G.-T.-C. Chiu, J.-P. Allebach & E.-J. Delp
    Scanner identification with extension to forgery detection
    Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series
    2008, Vol. 6819
    BibTeX
    @inproceedings{Khanna2008a,
     author = {Khanna, N. and Chiu, G.-T.-C. and Allebach, J.-P. and Delp, E.-J.},
     title = {Scanner identification with extension to forgery detection},
     booktitle = {Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series},
     year = {2008},
     volume = {6819}}
    
  45. N. Khanna, A.K. Mikkilineni, G.T.-C. Chiu, J.P. Allebach & E.J. Delp
    Survey of Scanner and Printer Forensics at Purdue University
    International Workshop on Computational Forensics
    2008, pp. 22-34
    BibTeX
    @inproceedings{Khanna2008b,
     author = {Khanna, Nitin and Mikkilineni, Aravind K. and Chiu, George T.-C. and Allebach, Jan P. and Delp, Edward J.},
     title = {Survey of Scanner and Printer Forensics at Purdue University},
     booktitle = {International Workshop on Computational Forensics},
     year = {2008},
     pages = {22-34}}
    
  46. B.-K. Kim & R.-H. Park
    Automatic detection and correction of purple fringing using the gradient information and desaturation
    Proceedings of the 16th European Signal Processing Conference (EUSIPCO 2008)
    2008
    BibTeX
    @inproceedings{Kim2008,
     author = {Baek-Kyu Kim and Rae-Hong Park},
     title = {Automatic detection and correction of purple fringing using the gradient information and desaturation},
     booktitle = {Proceedings of the 16th European Signal Processing Conference (EUSIPCO 2008)},
     year = {2008}}
    
  47. M. Kirchner
    On the Detectability of Local Resampling in Digital Images
    Delp, E. J., Wong, P. W., Dittmann, J. & Memon, N. (ed.)
    SPIE Conference on Security, Forensics, Steganography, and Watermarking of Multimedia Contents
    2008, Vol. 6819
    BibTeX
    @inproceedings{Kirchner2008a,
     author = {Kirchner, Matthias},
     title = {On the Detectability of Local Resampling in Digital Images},
     booktitle = {SPIE Conference on Security, Forensics, Steganography, and Watermarking of Multimedia Contents},
     year = {2008},
     volume = {6819}}
    
  48. M. Kirchner
    Fast and Reliable Resampling Detection by Spectral Analysis of Fixed Linear Predictor Residue
    ACM Multimedia and Security Workshop
    2008, pp. 11-20
    BibTeX
    @inproceedings{Kirchner2008c,
     author = {Kirchner, Matthias},
     title = {Fast and Reliable Resampling Detection by Spectral Analysis of Fixed Linear Predictor Residue},
     booktitle = {ACM Multimedia and Security Workshop},
     year = {2008},
     pages = {11-20}}
    
  49. M. Kirchner & R. Bohme
    Hiding Traces of Resampling in Digital Images
    IEEE Transactions on Information Forensics and Security, 2008, Vol. 3(4), pp. 582-592
    BibTeX
    @article{Kirchner2008,
     author = {Kirchner, M. and Bohme, R.},
     title = {Hiding Traces of Resampling in Digital Images},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2008},
     volume = {3},
     number = {4},
     pages = {582--592}}
    
  50. J.D. Kornblum
    Using JPEG quantization tables to identify imagery processed by software
    Digital Investigation, 2008, Vol. 5, pp. S21-S25
    BibTeX
    @article{Kornblum2008,
     author = {Jesse D. Kornblum},
     title = {Using JPEG quantization tables to identify imagery processed by software},
     journal = {Digital Investigation},
     year = {2008},
     volume = {5},
     pages = {S21-S25}}
    
  51. A. Koschan & M. Abidi
    Digital color image processing
    Wiley-Interscience, 2008
    BibTeX
    @book{Koschan2008,
     author = {Koschan, Andreas and Abidi, Mongi},
     title = {Digital color image processing},
     publisher = {Wiley-Interscience},
     year = {2008}}
    
  52. J.-F. Lalonde, S. Narasimhan & A. Efros
    What Does the Sky Tell Us about the Camera?
    Forsyth, D., Torr, P. & Zisserman, A. (ed.)
    Computer Vision -- ECCV 2008
    Springer Berlin / Heidelberg, 2008, Vol. 5305, pp. 354-367
    BibTeX
    @incollection{Lalonde2008,
     author = {Lalonde, Jean-François and Narasimhan, Srinivasa and Efros, Alexei},
     title = {What Does the Sky Tell Us about the Camera?},
     booktitle = {Computer Vision -- ECCV 2008},
     publisher = {Springer Berlin / Heidelberg},
     year = {2008},
     volume = {5305},
     pages = {354-367}}
    
  53. B. Li, Y.Q. Shi & J. Huang
    Detecting Doubly Compressed JPEG Images by Using Mode Based First Digit Features
    IEEE Workshop on Multimedia Signal Processing
    2008, pp. 730-735
    BibTeX
    @inproceedings{Li2008e,
     author = {Li, Bin and Shi, Yun Qing and Huang, Jiwu},
     title = {Detecting Doubly Compressed JPEG Images by Using Mode Based First Digit Features},
     booktitle = {IEEE Workshop on Multimedia Signal Processing},
     year = {2008},
     pages = {730-735}}
    
  54. W. Li, N. Yu & Y. Yuan
    Doctored JPEG image detection
    Proc. IEEE Int Multimedia and Expo Conf
    2008, pp. 253-256
    BibTeX
    @inproceedings{Li2008b,
     author = {Weihai Li and Nenghai Yu and Yuan Yuan},
     title = {Doctored JPEG image detection},
     booktitle = {Proc. IEEE Int Multimedia and Expo Conf},
     year = {2008},
     pages = {253--256}}
    
  55. W. Li, N. Yu & Y. Yuan
    Doctored JPEG Image Detection
    IEEE International Conference on Multimedia and Expo
    2008, pp. 253-256
    BibTeX
    @inproceedings{Li2008d,
     author = {Li, Weihai and Yu, Nenghai and Yuan, Yuan},
     title = {Doctored JPEG Image Detection},
     booktitle = {IEEE International Conference on Multimedia and Expo},
     year = {2008},
     pages = {253-256}}
    
  56. W. Li, Y. Yuan & N. Yu
    Detecting copy-paste Forgery of JPEG Image via Block Artifact Grid Extraction
    Proceedings of the 2008 International Workshop on Local and Non-Local Approximation in Image Processing
    2008
    BibTeX
    @inproceedings{Li2008,
     author = {Weihai Li and Yuan Yuan and Nenghai Yu},
     title = {Detecting copy-paste Forgery of JPEG Image via Block Artifact Grid Extraction},
     booktitle = {Proceedings of the 2008 International Workshop on Local and Non-Local Approximation in Image Processing},
     year = {2008}}
    
  57. X. Li, B. Gunturk & L. Zhang
    Image demosaicing: A systematic survey
    Proc. of SPIE
    2008, Vol. 6822, pp. 68221J-68221J
    BibTeX
    @inproceedings{Li2008c,
     author = {Li, X. and Gunturk, B. and Zhang, L.},
     title = {Image demosaicing: A systematic survey},
     booktitle = {Proc. of SPIE},
     year = {2008},
     volume = {6822},
     pages = {68221J--68221J}}
    
  58. Z. Li, A.Y.C. Nee, S.K. Ong & W. Gong
    Tampered Image Detection Using Image Matching
    Proc. Fifth Int. Conf. Computer Graphics, Imaging and Visualisation CGIV ´08
    2008, pp. 174-179
    BibTeX
    @inproceedings{Li2008a,
     author = {Zhenghao Li and Nee, A. Y. C. and Ong, S. K. and Weiguo Gong},
     title = {Tampered Image Detection Using Image Matching},
     booktitle = {Proc. Fifth Int. Conf. Computer Graphics, Imaging and Visualisation CGIV ´08},
     year = {2008},
     pages = {174--179}}
    
  59. Y.-C. Lin, D. Varodayan, T. Fink, E. Betters & B. Girod
    Localization of tampering in contrast and brightness adjusted images using distributed source coding and expectation maximization
    Proc. 15th IEEE Int. Conf. Image Processing ICIP 2008
    2008, pp. 2204-2207
    BibTeX
    @inproceedings{Lin2008,
     author = {Yao-Chung Lin and Varodayan, D. and Fink, T. and Betters, E. and Girod, B. },
     title = {Localization of tampering in contrast and brightness adjusted images using distributed source coding and expectation maximization},
     booktitle = {Proc. 15th IEEE Int. Conf. Image Processing ICIP 2008},
     year = {2008},
     pages = {2204--2207}}
    
  60. C. Liu, R. Szeliski, S.B. Kang, C.L. Zitnick & W.T. Freeman
    Automatic Estimation and Removal of Noise from a Single Image
    IEEE Transactions on Pattern Analysis and Machine Intelligence, 2008, Vol. 30(2), pp. 299-314
    BibTeX
    @article{Liu2008,
     author = {Ce Liu and Szeliski, R. and Sing Bing Kang and Zitnick, C. L. and Freeman, W. T.},
     title = {Automatic Estimation and Removal of Noise from a Single Image},
     journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence},
     year = {2008},
     volume = {30},
     number = {2},
     pages = {299--314}}
    
  61. W. Lu, W. Sun, J. Huang & H.-T. Lu
    Digital Image Forensics Using Statistical Features and Neural Network Classifier
    International Conference on Machine Learning and Cybernetics
    2008, pp. 2831-2834
    BibTeX
    @inproceedings{Lu2008,
     author = {Lu, Wei and Sun, Wei and Huang, Jiwu and Lu, Hong-Tao},
     title = {Digital Image Forensics Using Statistical Features and Neural Network Classifier},
     booktitle = {International Conference on Machine Learning and Cybernetics},
     year = {2008},
     pages = {2831-2834}}
    
  62. W. Luo, M. Wu & J. Huang
    MPEG Recompression Detection Based on Block Artifacts
    SPIE Conference on Security, Forensics, Steganography, and Watermarking of Multimedia Contents
    2008
    BibTeX
    @inproceedings{Luo2008,
     author = {Luo, Weiqi and Wu, Min and Huang, Jiwu},
     title = {MPEG Recompression Detection Based on Block Artifacts},
     booktitle = {SPIE Conference on Security, Forensics, Steganography, and Watermarking of Multimedia Contents},
     year = {2008}}
    
  63. B. Mahdian & S. Saic
    Detection of Resampling Supplemented with Noise Inconsistencies Analysis for Image Forensics
    Proc. International Conference on Computational Sciences and Its Applications ICCSA ´08
    2008, pp. 546-556
    BibTeX
    @inproceedings{Mahdian2008,
     author = {Mahdian, B. and Saic, S.},
     title = {Detection of Resampling Supplemented with Noise Inconsistencies Analysis for Image Forensics},
     booktitle = {Proc. International Conference on Computational Sciences and Its Applications ICCSA ´08},
     year = {2008},
     pages = {546--556}}
    
  64. B. Mahdian & S. Saic
    Blind methods for detecting image fakery
    Proc. 42nd Annual IEEE International Carnahan Conference on Security Technology ICCST 2008
    2008, pp. 280-286
    BibTeX
    @inproceedings{Mahdian2008a,
     author = {Mahdian, B. and Saic, S.},
     title = {Blind methods for detecting image fakery},
     booktitle = {Proc. 42nd Annual IEEE International Carnahan Conference on Security Technology ICCST 2008},
     year = {2008},
     pages = {280--286}}
    
  65. B. Mahdian & S. Saic
    Blind Authentication Using Periodic Properties of Interpolation
    IEEE Transactions on Information Forensics and Security, 2008, Vol. 3(3), pp. 529-538
    BibTeX
    @article{Mahdian2008d,
     author = {Mahdian, B. and Saic, S.},
     title = {Blind Authentication Using Periodic Properties of Interpolation},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2008},
     volume = {3},
     number = {3},
     pages = {529--538}}
    
  66. J.-B. Maillard, D. Levesque & F. Deschenes
    Detection of digital processing of images through a realistic model of CCD noise
    Proc. 19th International Conference on Pattern Recognition ICPR 2008
    2008, pp. 1-4
    BibTeX
    @inproceedings{Maillard2008,
     author = {Maillard, J.-B. and Levesque, D. and Deschenes, F.},
     title = {Detection of digital processing of images through a realistic model of CCD noise},
     booktitle = {Proc. 19th International Conference on Pattern Recognition ICPR 2008},
     year = {2008},
     pages = {1--4}}
    
  67. S. McCloskey
    Confidence Weighting for Sensor Fingerprinting
    Computer Vision and Pattern Recognition
    2008, pp. 1-6
    BibTeX
    @inproceedings{McCloskey2008,
     author = {McCloskey, Scott},
     title = {Confidence Weighting for Sensor Fingerprinting},
     booktitle = {Computer Vision and Pattern Recognition},
     year = {2008},
     pages = {1-6}}
    
  68. C. McKay, A. Swaminathan, H. Gou & M. Wu
    Image acquisition forensics: Forensic analysis to identify imaging source
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2008
    2008, pp. 1657-1660
    BibTeX
    @inproceedings{McKay2008,
     author = {McKay, C. and Swaminathan, A. and Hongmei Gou and Min Wu},
     title = {Image acquisition forensics: Forensic analysis to identify imaging source},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2008},
     year = {2008},
     pages = {1657--1660}}
    
  69. F. Meng, X. Kong & X. You
    A New Feature-Based Method for Source Camera Identification
    Ray, I. & Shenoi, S. (ed.)
    Advances in Digital Forensics IV
    2008, Vol. 285, pp. 207-218
    BibTeX
    @inproceedings{Meng2008,
     author = {Meng, Fanjie and Kong, Xiangwei and You, Xingang},
     title = {A New Feature-Based Method for Source Camera Identification},
     booktitle = {Advances in Digital Forensics IV},
     year = {2008},
     volume = {285},
     pages = {207-218}}
    
  70. M.S. Nixon & A.S. Aguado
    Feature Extraction and Image Processing
    Academic Press, 2008
    BibTeX
    @book{Nixon2008,
     author = {Mark S. Nixon and Alberto S. Aguado},
     title = {Feature Extraction and Image Processing},
     publisher = {Academic Press},
     year = {2008},
     edition = {2nd}}
    
  71. M.S. Olivier
    Using Sensor Dirt for Toolmark Analysis of Digital Photographs
    Ray, I. & Shenoi, S. (ed.)
    Advances in Digital Forensics IV
    2008, Vol. 285, pp. 193-206
    BibTeX
    @inproceedings{Olivier2008a,
     author = {Olivier, Martin S.},
     title = {Using Sensor Dirt for Toolmark Analysis of Digital Photographs},
     booktitle = {Advances in Digital Forensics IV},
     year = {2008},
     volume = {285},
     pages = {193-206}}
    
  72. M.S. Olivier
    On the Probability of a False Positive Match for Digital Camera Identification based on Sensor Dirt Location
    South African Computer Journal, 2008, Vol. 41, pp. 21-28
    BibTeX
    @article{Olivier2008,
     author = {Olivier, Martin S.},
     title = {On the Probability of a False Positive Match for Digital Camera Identification based on Sensor Dirt Location},
     journal = {South African Computer Journal},
     year = {2008},
     volume = {41},
     pages = {21-28}}
    
  73. A. Petkov & S. Cottier
    Image Quality Estimation for JPEG-Compressed Images without the Original Image
    Stanford Center for Image Systems Engineering, 2008
    BibTeX
    @techreport{Petkov2008,
     author = {Petkov, Atanas and Cottier, Scott},
     title = {Image Quality Estimation for JPEG-Compressed Images without the Original Image},
     year = {2008}}
    
  74. T. Pevny & J. Fridrich
    Detection of Double-Compression in JPEG Images for Applications in Steganography
    IEEE Transactions on Information Forensics and Security, 2008, Vol. 3(2), pp. 247-258
    BibTeX
    @article{Pevny2008,
     author = {Pevny, T. and Fridrich, J. },
     title = {Detection of Double-Compression in JPEG Images for Applications in Steganography},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2008},
     volume = {3},
     number = {2},
     pages = {247--258}}
    
  75. M.-C. Poilpré, P. Perrot & H. Talbot
    Image tampering detection using Bayer interpolation and JPEG compression
    e-Forensics ´08: Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop
    ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), 2008, pp. 1-5
    BibTeX
    @inproceedings{Poilpre2008,
     author = {Poilpré, Marie-Charlotte and Perrot, Patrick and Talbot, Hugues},
     title = {Image tampering detection using Bayer interpolation and JPEG compression},
     booktitle = {e-Forensics ´08: Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop},
     publisher = {ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)},
     year = {2008},
     pages = {1--5}}
    
  76. Z. Qu, W. Luo & J. Huang
    A Convolutive Mixing Model for Shifted Double JPEG Compression with Application to Passive Image Authentication
    IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
    2008, pp. 1661-1664
    BibTeX
    @inproceedings{Qu2008,
     author = {Qu, Zhenhua and Luo, Weiqi and Huang, Jiwu},
     title = {A Convolutive Mixing Model for Shifted Double JPEG Compression with Application to Passive Image Authentication},
     booktitle = {IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP)},
     year = {2008},
     pages = {1661-1664}}
    
  77. REUTERS
    Reuters Handbook of Journalism
    2008
    BibTeX
    @electronic{REUTERS2008,
     author = {REUTERS},
     title = {Reuters Handbook of Journalism},
     year = {2008}}
    
  78. C. Rhemann, C. Rother & M. Gelautz
    Improving Color Modeling for Alpha Matting
    Proceedings of the British Machine Vision Conference 2008, CiteSeerX - Scientific Literature Digital Library and Search Engine [http://citeseerx.ist.psu.edu/oai2] (United States), 2008, Vol. -, pp. 1155 - 1164
    BibTeX
    @article{Rhemann2009,
     author = {Christoph Rhemann and Carsten Rother and Margrit Gelautz},
     title = {Improving Color Modeling for Alpha Matting},
     journal = {Proceedings of the British Machine Vision Conference 2008},
     year = {2008},
     volume = {-},
     pages = {1155 - 1164}}
    
  79. A. Saxena, S. Chung & A. Ng
    3-D Depth Reconstruction from a Single Still Image
    International Journal of Computer Vision, Springer Netherlands, 2008, Vol. 76, pp. 53-69
    BibTeX
    @article{Saxena2008,
     author = {Saxena, Ashutosh and Chung, Sung and Ng, Andrew},
     title = {3-D Depth Reconstruction from a Single Still Image},
     journal = {International Journal of Computer Vision},
     publisher = {Springer Netherlands},
     year = {2008},
     volume = {76},
     pages = {53-69}}
    
  80. H.T. Sencar & N. Memon
    Algorithms, Architectures and Information Systems Security
    Bagchi, A., Bhattacharya, B. B., Sur-kolay, S. & Nandy, S. C. (ed.)
    Chapter Overview of State-of-the-art in Digital Image Forensics
    World Scientific Publishing Co., Inc., 2008, pp. 325-348
    BibTeX
    @inbook{Sencar2008,
     author = {Sencar, Husrev T. and Memon, Nasir},
     title = {Algorithms, Architectures and Information Systems Security},
     publisher = {World Scientific Publishing Co., Inc.},
     year = {2008},
     pages = {325-348}}
    
  81. Y.Q. Shi
    First Digit Law and its Application to Digital Forensics
    International Workshop on Digital Watermarking
    2008
    BibTeX
    @inproceedings{Shi2008,
     author = {Shi, Yun Qing},
     title = {First Digit Law and its Application to Digital Forensics},
     booktitle = {International Workshop on Digital Watermarking},
     year = {2008}}
    
  82. Y.Q. Shi, C. Chen, G. Xuan & W. Su
    Steganalysis Versus Splicing Detection
    IWDW ´07: Proceedings of the 6th International Workshop on Digital Watermarking
    Springer-Verlag, 2008, pp. 158-172
    BibTeX
    @inproceedings{Shi2008a,
     author = {Shi, Yun Q. and Chen, Chunhua and Xuan, Guorong and Su, Wei},
     title = {Steganalysis Versus Splicing Detection},
     booktitle = {IWDW ´07: Proceedings of the 6th International Workshop on Digital Watermarking},
     publisher = {Springer-Verlag},
     year = {2008},
     pages = {158--172}}
    
  83. M.J. Sorell
    Conditions for effective detection and identification of primary quantization of re-quantized JPEG images
    e-Forensics ´08: Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop
    ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), 2008, pp. 1-6
    BibTeX
    @inproceedings{Sorell2008,
     author = {Sorell, Matthew James},
     title = {Conditions for effective detection and identification of primary quantization of re-quantized JPEG images},
     booktitle = {e-Forensics ´08: Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop},
     publisher = {ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)},
     year = {2008},
     pages = {1--6}}
    
  84. G.C. Sroubek & J. Flusser
    Simultaneous super-resolution and blind deconvolution
    Journal of Physics:Conference Series
    2008
    BibTeX
    @conference{Sroubek2008,
     author = {Sroubek, G Cristobal and J Flusser},
     title = {Simultaneous super-resolution and blind deconvolution},
     booktitle = {Journal of Physics:Conference Series},
     year = {2008}}
    
  85. M. Stamm & K.J.R. Liu
    Blind forensics of contrast enhancement in digital images
    Proc. 15th IEEE Int. Conf. Image Processing ICIP 2008
    2008, pp. 3112-3115
    BibTeX
    @inproceedings{Stamm2008a,
     author = {Stamm, M. and Liu, K. J. R.},
     title = {Blind forensics of contrast enhancement in digital images},
     booktitle = {Proc. 15th IEEE Int. Conf. Image Processing ICIP 2008},
     year = {2008},
     pages = {3112--3115}}
    
  86. A. Suwendi & J.P. Allebach
    Nearest-Neighbor and Bilinear Resampling Factor Estimation to Detect Blockiness or Blurriness of an Image
    Journal of Electronic Imaging, 2008, Vol. 17(2), pp. 94-101
    BibTeX
    @article{Suwendi2008,
     author = {Suwendi, Ariawan and Allebach, Jan P.},
     title = {Nearest-Neighbor and Bilinear Resampling Factor Estimation to Detect Blockiness or Blurriness of an Image},
     journal = {Journal of Electronic Imaging},
     year = {2008},
     volume = {17},
     number = {2},
     pages = {94-101}}
    
  87. A. Swaminathan, M. Wu & K.J.R. Liu
    Digital Image Forensics via Intrinsic Fingerprints
    IEEE Transactions on Information Forensics and Security, 2008, Vol. 3(1), pp. 101-117
    BibTeX
    @article{Swaminathan2008,
     author = {Swaminathan, Ashwin and Min Wu and Liu, K. J. R.},
     title = {Digital Image Forensics via Intrinsic Fingerprints},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2008},
     volume = {3},
     number = {1},
     pages = {101--117}}
    
  88. A. Swaminathan, M. Wu & K.J.R. Liu
    A pattern classification framework for theoretical analysis of component forensics
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2008
    2008, pp. 1665-1668
    BibTeX
    @inproceedings{Swaminathan2008b,
     author = {Swaminathan, Ashwin. and Min Wu and Liu, K. J. R.},
     title = {A pattern classification framework for theoretical analysis of component forensics},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2008},
     year = {2008},
     pages = {1665--1668}}
    
  89. M. Tagliasacchi, G. Valenzise & S. Tubaro
    Localization of sparse image tampering via random projections
    Proc. 15th IEEE Int. Conf. Image Processing ICIP 2008
    2008, pp. 2092-2095
    BibTeX
    @inproceedings{Tagliasacchi2008,
     author = {Tagliasacchi, Marco and Valenzise, Giuseppe and Tubaro, Stefano},
     title = {Localization of sparse image tampering via random projections},
     booktitle = {Proc. 15th IEEE Int. Conf. Image Processing ICIP 2008},
     year = {2008},
     pages = {2092--2095}}
    
  90. S.-C. Tai & S.-M. Yang
    A fast method for image noise estimation using Laplacian operator and adaptive edge detection
    Proc. 3rd International Symposium on Communications, Control and Signal Processing ISCCSP 2008
    2008, pp. 1077-1081
    BibTeX
    @inproceedings{Tai2008,
     author = {Shen-Chuan Tai and Shih-Ming Yang},
     title = {A fast method for image noise estimation using Laplacian operator and adaptive edge detection},
     booktitle = {Proc. 3rd International Symposium on Communications, Control and Signal Processing ISCCSP 2008},
     year = {2008},
     pages = {1077--1081}}
    
  91. M.-J. Tsai & C.-S. Wang
    Adaptive feature selection for digital camera source identification
    Proc. IEEE Int. Symp. Circuits and Systems ISCAS 2008
    2008, pp. 412-415
    BibTeX
    @inproceedings{Tsai2008,
     author = {Min-Jen Tsai and Cheng-Sheng Wang},
     title = {Adaptive feature selection for digital camera source identification},
     booktitle = {Proc. IEEE Int. Symp. Circuits and Systems ISCAS 2008},
     year = {2008},
     pages = {412--415}}
    
  92. T. Tuytelaars & K. Mikolajczyk
    Local invariant feature detectors: a survey
    Found. Trends. Comput. Graph. Vis., Now Publishers Inc., 2008, Vol. 3(3), pp. 177-280
    BibTeX
    @article{Tuytelaars2008,
     author = {Tuytelaars, Tinne and Mikolajczyk, Krystian},
     title = {Local invariant feature detectors: a survey},
     journal = {Found. Trends. Comput. Graph. Vis.},
     publisher = {Now Publishers Inc.},
     year = {2008},
     volume = {3},
     number = {3},
     pages = {177--280}}
    
  93. Velho, Luiz, A.C. Frery & J. Gomes
    Image Processing for Computer Graphics and Vision
    Gries, D. & Schneider, F. B. (ed.)
    Springer, 2008
    BibTeX
    @book{Velho2008,
     author = {Velho, Luiz, and Frery, Alejandro C. and Gomes, Jonas},
     title = {Image Processing for Computer Graphics and Vision},
     publisher = {Springer},
     year = {2008}}
    
  94. W. Wang & H. Farid
    Detecting Re-Projected Video
    International Workshop on Information Hiding
    2008, pp. 72-86
    BibTeX
    @inproceedings{Wang2008b,
     author = {Wang, Weihong and Farid, Hany},
     title = {Detecting Re-Projected Video},
     booktitle = {International Workshop on Information Hiding},
     year = {2008},
     pages = {72-86}}
    
  95. X. Wang, B. Xuan & S. long Peng
    Digital Image Forgery Detection Based on the Consistency of Defocus Blur
    Proc. IIHMSP ´08 International Conference on Intelligent Information Hiding and Multimedia Signal Processing
    2008, pp. 192-195
    BibTeX
    @inproceedings{Wang2008,
     author = {Wang, Xin and Xuan, Bo and long Peng, Si},
     title = {Digital Image Forgery Detection Based on the Consistency of Defocus Blur},
     booktitle = {Proc. IIHMSP ´08 International Conference on Intelligent Information Hiding and Multimedia Signal Processing},
     year = {2008},
     pages = {192--195}}
    
  96. W. Weimin, W. Shuozhong & T. Zhenjun
    Estimation of rescaling factor and detection of image splicing
    Proc. 11th IEEE Int. Conf. Communication Technology ICCT 2008
    2008, pp. 676-679
    BibTeX
    @inproceedings{Weimin2008,
     author = {Wei Weimin and Wang Shuozhong and Tang Zhenjun},
     title = {Estimation of rescaling factor and detection of image splicing},
     booktitle = {Proc. 11th IEEE Int. Conf. Communication Technology ICCT 2008},
     year = {2008},
     pages = {676--679}}
    
  97. P. Wendykier & J.G. Nagy
    Image Processing on Modern CPUs and GPUs
    Emory University, 2008(TR-2008-023)
    BibTeX
    @techreport{Wendykier2008,
     author = {Wendykier, Piotr and Nagy, James G.},
     title = {Image Processing on Modern CPUs and GPUs},
     year = {2008},
     number = {TR-2008-023}}
    
  98. Y. Wo, G.-Q. Han & B. Zhang
    Geometrically robust image content authentication using Zernike moments
    Proc. Int Machine Learning and Cybernetics Conf
    2008, Vol. 5, pp. 2874-2879
    BibTeX
    @inproceedings{Wo2008,
     author = {Yan Wo and Guo-Qiang Han and Bo Zhang},
     title = {Geometrically robust image content authentication using Zernike moments},
     booktitle = {Proc. Int Machine Learning and Cybernetics Conf},
     year = {2008},
     volume = {5},
     pages = {2874--2879}}
    
  99. Q. Wu, S.-J. Sun, W. Zhu, G.-H. Li & D. Tu
    Detection of Digital Doctoring in Exemplar-Based Inpainted Images
    International Conference on Machine Learning and Cybernetics
    2008, pp. 1222-1226
    BibTeX
    @inproceedings{Wu2008,
     author = {Wu, Qiong and Sun, Shao-Jie and Zhu, Wei and Li, Guo-Hui and Tu, Dan},
     title = {Detection of Digital Doctoring in Exemplar-Based Inpainted Images},
     booktitle = {International Conference on Machine Learning and Cybernetics},
     year = {2008},
     pages = {1222-1226}}
    
  100. R. Yang, Z. Qu & J. Huang
    Detecting Digital Audio Forgeries by Checking Frame Offsets
    ACM Proceedings of the Multimedia and Security Workshop
    2008, pp. 21-26
    BibTeX
    @inproceedings{Yang2008,
     author = {Yang, Rui and Qu, Zhenhua and Huang, Jiwu},
     title = {Detecting Digital Audio Forgeries by Checking Frame Offsets},
     booktitle = {ACM Proceedings of the Multimedia and Security Workshop},
     year = {2008},
     pages = {21-26}}
    
  101. C. Ying & W. Yuping
    Exposing Digital Forgeries by Detecting Traces of Smoothing
    Proc. 9th Int. Conf. for Young Computer Scientists ICYCS 2008
    2008, pp. 1440-1445
    BibTeX
    @inproceedings{Ying2008,
     author = {Chen Ying and Wang Yuping},
     title = {Exposing Digital Forgeries by Detecting Traces of Smoothing},
     booktitle = {Proc. 9th Int. Conf. for Young Computer Scientists ICYCS 2008},
     year = {2008},
     pages = {1440--1445}}
    
  102. H. Yu, T.-T. Ng & Q. Sun
    Recaptured Photo Detection using Specularity Distribution
    IEEE International Conference on Image Processing
    2008
    BibTeX
    @inproceedings{Yu2008,
     author = {Yu, Hang and Ng, Tian-Tsong and Sun, Qibin},
     title = {Recaptured Photo Detection using Specularity Distribution},
     booktitle = {IEEE International Conference on Image Processing},
     year = {2008}}
    
  103. Y.-I. Yun, J.-B. Lee, D. un Jung, D.-H. Har & J.-S. Choi
    Detection of digital forgeries using an image interpolation from digital images
    Proc. IEEE Int. Symp. Consumer Electronics ISCE 2008
    2008, pp. 1-4
    BibTeX
    @inproceedings{Yun2008,
     author = {Yong-In Yun and Jung-Beom Lee and Da-un Jung and Dong-Hwan Har and Jong-Soo Choi},
     title = {Detection of digital forgeries using an image interpolation from digital images},
     booktitle = {Proc. IEEE Int. Symp. Consumer Electronics ISCE 2008},
     year = {2008},
     pages = {1--4}}
    
  104. C. Zhang & H. Zhang
    Digital Camera Identification Based on Canonical Correlation Analysis
    IEEE Workshop on Multimedia Signal Processing
    2008, pp. 769-773
    BibTeX
    @inproceedings{Zhang2008d,
     author = {Zhang, Chi and Zhang, Hongbin},
     title = {Digital Camera Identification Based on Canonical Correlation Analysis},
     booktitle = {IEEE Workshop on Multimedia Signal Processing},
     year = {2008},
     pages = {769-773}}
    
  105. J. Zhang, Z. Feng & Y. Su
    A new approach for detecting Copy-Move forgery in digital images
    Proc. 11th IEEE Singapore International Conference on Communication Systems ICCS 2008
    2008, pp. 362-366
    BibTeX
    @inproceedings{Zhang2008,
     author = {Zhang, Jing and Feng, Zhanlei and Su, Yuting},
     title = {A new approach for detecting Copy-Move forgery in digital images},
     booktitle = {Proc. 11th IEEE Singapore International Conference on Communication Systems ICCS 2008},
     year = {2008},
     pages = {362--366}}
    
  106. Z. Zhang, Y. Bian & X. Ping
    Image Blind Forensics Using Artificial Neural Network
    Proc. Int Computer Science and Software Engineering Conf
    2008, Vol. 4, pp. 847-850
    BibTeX
    @inproceedings{Zhang2008g,
     author = {Zhen Zhang and Yukun Bian and Xijian Ping},
     title = {Image Blind Forensics Using Artificial Neural Network},
     booktitle = {Proc. Int Computer Science and Software Engineering Conf},
     year = {2008},
     volume = {4},
     pages = {847--850}}
    
  107. Z. Zhang, J. Kang & Y. Ren
    An Effective Algorithm of Image Splicing Detection
    Proc. International Conference on Computer Science and Software Engineering
    2008, Vol. 1, pp. 1035-1039
    BibTeX
    @inproceedings{Zhang2008a,
     author = {Zhang, Zhen and Kang, Jiquan and Ren, Yuan},
     title = {An Effective Algorithm of Image Splicing Detection},
     booktitle = {Proc. International Conference on Computer Science and Software Engineering},
     year = {2008},
     volume = {1},
     pages = {1035--1039}}
    
  108. Z. Zhang, Y. Ren, X.-J. Ping, Z.-Y. He & S.-Z. Zhang
    A survey on passive-blind image forgery by doctor method detection
    Proc. Int Machine Learning and Cybernetics Conf
    2008, Vol. 6, pp. 3463-3467
    BibTeX
    @inproceedings{Zhang2008c,
     author = {Zhen Zhang and Yuan Ren and Xi-Jian Ping and Zhi-Yong He and Shan-Zhong Zhang},
     title = {A survey on passive-blind image forgery by doctor method detection},
     booktitle = {Proc. Int Machine Learning and Cybernetics Conf},
     year = {2008},
     volume = {6},
     pages = {3463--3467}}
    
  109. Z. Zhang, Y. Zhou, J. Kang & Y. Ren
    Study of Image Splicing Detection
    International Conference on Intelligent Computing
    2008, pp. 1103-1110
    BibTeX
    @inproceedings{Zhang2008b,
     author = {Zhang, Zhen and Zhou, Ying and Kang, Jiquan and Ren, Yuan},
     title = {Study of Image Splicing Detection},
     booktitle = {International Conference on Intelligent Computing},
     year = {2008},
     pages = {1103-1110}}
    


2007

  1. C. Albrecht
    Mit Bildern lügen
    Metten, T. (ed.)
    Chapter Wörter lügen manchmal, Bilder immer. Wissenschaft nach der Wende zum Bild.
    Herbert von Halem Verlag, 2007
    BibTeX
    @inbook{Albrecht2007,
     author = {Albrecht, Clemens},
     title = {Mit Bildern lügen},
     publisher = {Herbert von Halem Verlag},
     year = {2007}}
    
  2. M.K. Bashar, K. Noda, N. Ohnishi, H. Kudo, T. Matsumoto & Y. Takeuchi
    Wavelet-Based Multiresolution Features for Detecting Duplications in Images
    Machine Vision Application
    2007, pp. 264-267
    BibTeX
    @inproceedings{Bashar2007,
     author = {Bashar, Md. Khayrul and Noda, Keiji and Ohnishi, Noboru and Kudo, Hiroaki and Matsumoto, Tetsuya and Takeuchi, Yoshinori},
     title = {Wavelet-Based Multiresolution Features for Detecting Duplications in Images},
     booktitle = {Machine Vision Application},
     year = {2007},
     pages = {264-267}}
    
  3. R. Basri, D. Jacobs & I. Kemelmacher
    Photometric Stereo with General, Unknown Lighting
    International Journal of Computer Vision, Springer Netherlands, 2007, Vol. 72, pp. 239-257
    BibTeX
    @article{Basri2007,
     author = {Basri, Ronen and Jacobs, David and Kemelmacher, Ira},
     title = {Photometric Stereo with General, Unknown Lighting},
     journal = {International Journal of Computer Vision},
     publisher = {Springer Netherlands},
     year = {2007},
     volume = {72},
     pages = {239-257}}
    
  4. J. Bijhold, A. Ruifrok, M. Jessen, Z.J. Geradts, S. Ehrhardt & I. Alberink
    Forensic Audio and Visual Evidence
    International Forensic Science Symposium
    2007, pp. 372-413
    BibTeX
    @inproceedings{Bijhold2007,
     author = {Bijhold, Jurrien and Ruifrok, Arnout and Jessen, Michael and Geradts, Zeno J. and Ehrhardt, Sabine and Alberink, Ivo},
     title = {Forensic Audio and Visual Evidence},
     booktitle = {International Forensic Science Symposium},
     year = {2007},
     pages = {372-413}}
    
  5. O. Celiktutan, I. Avcibas & B. Sankur
    Blind Identification of Cellular Phone Cameras
    Delp, E. J. & Wong, P. W. (ed.)
    SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents
    2007, Vol. 6505
    BibTeX
    @inproceedings{Celiktutan2007a,
     author = {Celiktutan, Oya and Avcibas, Ismail and Sankur, Bulent},
     title = {Blind Identification of Cellular Phone Cameras},
     booktitle = {SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents},
     year = {2007},
     volume = {6505}}
    
  6. O. Celiktutan, B. Sankur & I. Avcibas
    Digital Camera Identification
    Proc. IEEE 15th Signal Processing and Communications Applications SIU 2007
    2007, pp. 1-4
    BibTeX
    @inproceedings{Celiktutan2007,
     author = {Celiktutan, O. and Sankur, B. and Avcibas, I.},
     title = {Digital Camera Identification},
     booktitle = {Proc. IEEE 15th Signal Processing and Communications Applications SIU 2007},
     year = {2007},
     pages = {1--4}}
    
  7. S.-F. Chang
    Blind Passive Media Forensics: Motivation and Opportunity
    Multimedia Content Analysis and Mining
    2007, pp. 57-59
    BibTeX
    @inproceedings{Chang2007,
     author = {Chang, Shih-Fu},
     title = {Blind Passive Media Forensics: Motivation and Opportunity},
     booktitle = {Multimedia Content Analysis and Mining},
     year = {2007},
     pages = {57-59}}
    
  8. M. Chen, J. Fridrich, M. Goljan & J. Lukaš
    Source digital camcorder identification using sensor photo response non-uniformity
    III, E. J. D. & Wong, P. W. (ed.)
    Proceeding of the SPIE, 2007
    Security, Steganography, and Watermarking of Multimedia Contents IX, SPIE, 2007, Vol. 6505(1), pp. 65051G
    BibTeX
    @conference{Chen2007b,
     author = {Mo Chen and Jessica Fridrich and Miroslav Goljan and Jan Lukaš},
     title = {Source digital camcorder identification using sensor photo response non-uniformity},
     booktitle = {Proceeding of the SPIE, 2007},
     journal = {Security, Steganography, and Watermarking of Multimedia Contents IX},
     publisher = {SPIE},
     year = {2007},
     volume = {6505},
     number = {1},
     pages = {65051G}}
    
  9. S.-H. Chen & C.-T. Hsu
    Source Camera Identification Based on Camera Gain Histogram
    IEEE International Conference on Image Processing
    2007, Vol. 4, pp. IV-429-IV-432
    BibTeX
    @inproceedings{Chen2007e,
     author = {Chen, Sz-Han and Hsu, Chiou-Ting},
     title = {Source Camera Identification Based on Camera Gain Histogram},
     booktitle = {IEEE International Conference on Image Processing},
     year = {2007},
     volume = {4},
     pages = {IV-429-IV-432}}
    
  10. W. Chen & Y.Q. Shi
    Image splicing detection using 2-D phase congruency and statistical moments of characteristic function
    Proc. SPIE
    2007
    BibTeX
    @inproceedings{Chen2007a,
     author = {Wen Chen and Yun Q. Shi},
     title = {Image splicing detection using 2-D phase congruency and statistical moments of characteristic function},
     booktitle = {Proc. SPIE},
     year = {2007}}
    
  11. W. Chen, Y.Q. Shi & G. Xuan
    Identifying Computer Graphics using HSV Color Model and Statistical Moments of Characteristic Functions
    Proc. IEEE Int Multimedia and Expo Conf
    2007, pp. 1123-1126
    BibTeX
    @inproceedings{Chen2007c,
     author = {Wen Chen and Shi, Y. Q. and Guorong Xuan},
     title = {Identifying Computer Graphics using HSV Color Model and Statistical Moments of Characteristic Functions},
     booktitle = {Proc. IEEE Int Multimedia and Expo Conf},
     year = {2007},
     pages = {1123--1126}}
    
  12. K. Cohen
    Digital still camera forensics
    Small Scale Digital Device Forensics Journal, 2007, Vol. 1(1), pp. 1-8
    BibTeX
    @article{Cohen2007,
     author = {Cohen, K.},
     title = {Digital still camera forensics},
     journal = {Small Scale Digital Device Forensics Journal},
     year = {2007},
     volume = {1},
     number = {1},
     pages = {1--8}}
    
  13. O. Deussen
    Bildmanipulation: Wie Computer unsere Wirklichkeit verzerren (German)
    Deussen, O. (ed.)
    Spektrum Akademischer Verlag, 2007, pp. 185
    BibTeX
    @book{Deussen2007,
     author = {Oliver Deussen},
     title = {Bildmanipulation: Wie Computer unsere Wirklichkeit verzerren (German)},
     publisher = {Spektrum Akademischer Verlag},
     year = {2007},
     pages = {185}}
    
  14. A.E. Dirik, S. Bayram, H.T. Sencar & N. Memon
    New Features to Identify Computer Generated Images
    Proc. IEEE International Conference on Image Processing ICIP 2007
    2007, Vol. 4, pp. IV-433-IV-436
    BibTeX
    @inproceedings{Dirik2007a,
     author = {Dirik, A. E. and Bayram, S. and Sencar, H. T. and Memon, N.},
     title = {New Features to Identify Computer Generated Images},
     booktitle = {Proc. IEEE International Conference on Image Processing ICIP 2007},
     year = {2007},
     volume = {4},
     pages = {IV--433--IV--436}}
    
  15. A.E. Dirik, H.T. Sencar & N. Memon
    Source Camera Identification Based on Sensor Dust Characteristics
    Proc. IEEE Workshop on Signal Processing Applications for Public Security and Forensics SAFE ´07
    2007, pp. 1-6
    BibTeX
    @inproceedings{Dirik2007,
     author = {Dirik, A. Emir and Sencar, Husrev T. and Memon, Nasir},
     title = {Source Camera Identification Based on Sensor Dust Characteristics},
     booktitle = {Proc. IEEE Workshop on Signal Processing Applications for Public Security and Forensics SAFE ´07},
     year = {2007},
     pages = {1--6}}
    
  16. B. Dybala, B. Jennings & D. Letscher
    Detecting filtered cloning in digital images
    MM&Sec ´07: Proceedings of the 9th workshop on Multimedia & security
    ACM, 2007, pp. 43-50
    BibTeX
    @inproceedings{Dybala2007,
     author = {Dybala, Brandon and Jennings, Brian and Letscher, David},
     title = {Detecting filtered cloning in digital images},
     booktitle = {MM&Sec ´07: Proceedings of the 9th workshop on Multimedia & security},
     publisher = {ACM},
     year = {2007},
     pages = {43--50}}
    
  17. H. Farid & M.J. Bravo
    Photorealistic Rendering: How Realistic Is It?
    Vision Sciences
    2007
    BibTeX
    @inproceedings{Farid2007a,
     author = {Farid, Hany and Bravo, Mary J.},
     title = {Photorealistic Rendering: How Realistic Is It?},
     booktitle = {Vision Sciences},
     year = {2007}}
    
  18. H. Farid & J.B. Woodward
    Video Stabilization and Enhancement
    Department of Computer Science, Dartmouth College, 2007(TR2007-605)
    BibTeX
    @techreport{Farid2007,
     author = {Farid, Hany and Woodward, Jeffrey B.},
     title = {Video Stabilization and Enhancement},
     year = {2007},
     number = {TR2007-605}}
    
  19. R. Fattal
    Image upsampling via imposed edge statistics
    ACM Trans. Graph., ACM, 2007, Vol. 26(3), pp. 95
    BibTeX
    @article{Fattal2007,
     author = {Fattal, Raanan},
     title = {Image upsampling via imposed edge statistics},
     journal = {ACM Trans. Graph.},
     publisher = {ACM},
     year = {2007},
     volume = {26},
     number = {3},
     pages = {95}}
    
  20. T. Florin
    Simulation of an image acquisition system
    Proc. th Int Electronics Technology Spring Seminar
    2007, pp. 357-360
    BibTeX
    @inproceedings{Florin2007,
     author = {Florin, T. },
     title = {Simulation of an image acquisition system},
     booktitle = {Proc. th Int Electronics Technology Spring Seminar},
     year = {2007},
     pages = {357--360}}
    
  21. T. Florin
    Simulation of a Digital Camera Pipeline
    Proc. Int. Symp. Signals, Circuits and Systems ISSCS 2007
    2007, Vol. 2, pp. 1-4
    BibTeX
    @inproceedings{Florin2007a,
     author = {Florin, T. },
     title = {Simulation of a Digital Camera Pipeline},
     booktitle = {Proc. Int. Symp. Signals, Circuits and Systems ISSCS 2007},
     year = {2007},
     volume = {2},
     pages = {1--4}}
    
  22. J. Franz
    Das Bild im digitalen Zeitalter - Die Frage nach der Authentizität der Fotografie
    2007
    BibTeX
    @misc{Franz2007,
     author = {Franz, Janina},
     title = {Das Bild im digitalen Zeitalter - Die Frage nach der Authentizität der Fotografie},
     year = {2007}}
    
  23. J. Fridrich, M. Chen & M. Goljan
    Imaging Sensor Noise as Digital X-ray for Revealing Forgeries
    International Workshop on Information Hiding
    2007, pp. 342-358
    BibTeX
    @inproceedings{Fridrich2007,
     author = {Fridrich, Jessica and Chen, Mo and Goljan, Miroslav},
     title = {Imaging Sensor Noise as Digital X-ray for Revealing Forgeries},
     booktitle = {International Workshop on Information Hiding},
     year = {2007},
     pages = {342-358}}
    
  24. D. Fu & Y.Q. Shi
    A generalized Benford´s law for JPEG coefficients and its applications in image forensics
    Proc. SPIE
    2007, Vol. 6505
    BibTeX
    @inproceedings{Fu2007,
     author = {Dongdong Fu and Yun Q. Shi},
     title = {A generalized Benford´s law for JPEG coefficients and its applications in image forensics},
     booktitle = {Proc. SPIE},
     year = {2007},
     volume = {6505}}
    
  25. T. Gloe, E. Franz & A. Winkler
    Forensics for Flatbed Scanners
    Delp, E. J. & Wong, P. W. (ed.)
    SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents
    2007, Vol. 6505
    BibTeX
    @inproceedings{Gloe2007b,
     author = {Gloe, Thomas and Franz, Elke and Winkler, Antje},
     title = {Forensics for Flatbed Scanners},
     booktitle = {SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents},
     year = {2007},
     volume = {6505}}
    
  26. T. Gloe, M. Kirchner, A. Winkler & R. Böhme
    Can we trust digital image forensics?
    MULTIMEDIA ´07: Proceedings of the 15th international conference on Multimedia
    ACM, 2007, pp. 78-86
    BibTeX
    @inproceedings{Gloe2007,
     author = {Gloe, Thomas and Kirchner, Matthias and Winkler, Antje and Böhme, Rainer},
     title = {Can we trust digital image forensics?},
     booktitle = {MULTIMEDIA ´07: Proceedings of the 15th international conference on Multimedia},
     publisher = {ACM},
     year = {2007},
     pages = {78--86}}
    
  27. M. Goljan, M. Chen & J. Fridrich
    Identifying Common Source Digital Camera from Image Pairs
    IEEE International Conference on Image Processing
    2007
    BibTeX
    @inproceedings{Goljan2007,
     author = {Goljan, Miroslav and Chen, Mo and Fridrich, Jessica},
     title = {Identifying Common Source Digital Camera from Image Pairs},
     booktitle = {IEEE International Conference on Image Processing},
     year = {2007}}
    
  28. E.S. Gopi
    Digital Image Forgery Detection Using Artificial Neural Network and Independent Component Analysis
    Applied Mathematics and Computation, 2007, Vol. 194(2), pp. 540-543
    BibTeX
    @article{Gopi2007,
     author = {Gopi, E. S.},
     title = {Digital Image Forgery Detection Using Artificial Neural Network and Independent Component Analysis},
     journal = {Applied Mathematics and Computation},
     year = {2007},
     volume = {194},
     number = {2},
     pages = {540-543}}
    
  29. H. Gou, A. Swaminathan & M. Wu
    Noise Features for Image Tampering Detection and Steganalysis
    Proc. IEEE Int. Conf. Image Processing ICIP 2007
    2007, Vol. 6
    BibTeX
    @inproceedings{Gou2007,
     author = {Hongmei Gou and Swaminathan, A. and Min Wu},
     title = {Noise Features for Image Tampering Detection and Steganalysis},
     booktitle = {Proc. IEEE Int. Conf. Image Processing ICIP 2007},
     year = {2007},
     volume = {6}}
    
  30. H. Gou, A. Swaminathan & M. Wu
    Robust scanner identification based on noise features
    Proceedings of SPIE
    2007, Vol. Volume 6505
    BibTeX
    @inproceedings{Gou2007a,
     author = {Gou, Hongmei and Swaminathan, Ashwin and Wu, Min},
     title = {Robust scanner identification based on noise features},
     booktitle = {Proceedings of SPIE},
     year = {2007},
     volume = {Volume 6505}}
    
  31. C. Grigoras
    Applications of ENF Criterion in Forensic Audio, Video, Computer and Telecommunication Analysis
    Forensic Science International, 2007, Vol. 167(2-3), pp. 136-145
    BibTeX
    @article{Grigoras2007,
     author = {Grigoras, Catalin},
     title = {Applications of ENF Criterion in Forensic Audio, Video, Computer and Telecommunication Analysis},
     journal = {Forensic Science International},
     year = {2007},
     volume = {167},
     number = {2-3},
     pages = {136-145}}
    
  32. C. Grigoras
    Applications of ENF Analysis Method in Forensic Authentication of Digital Audio and Video Recordings
    123rd AES Convention
    2007
    BibTeX
    @inproceedings{Grigoras2007a,
     author = {Grigoras, Catalin},
     title = {Applications of ENF Analysis Method in Forensic Authentication of Digital Audio and Video Recordings},
     booktitle = {123rd AES Convention},
     year = {2007}}
    
  33. G. Gül & I. Avcibas
    SVD Based Source Cell-Phone Identification
    Proc. IEEE 15th Signal Processing and Communications Applications SIU 2007
    2007, pp. 1-4
    BibTeX
    @inproceedings{Gul2007,
     author = {Gül, Gökhan and Avcibas, Ismail},
     title = {SVD Based Source Cell-Phone Identification},
     booktitle = {Proc. IEEE 15th Signal Processing and Communications Applications SIU 2007},
     year = {2007},
     pages = {1--4}}
    
  34. G. Gupta, S.K. Saha, S. Chakraborty & C. Mazumdar
    Document Frauds: Identification and Linking Fake Document to Scanners and Printers
    International Conference on Theory and Applications
    2007, pp. 497-501
    BibTeX
    @inproceedings{Gupta2007,
     author = {Gupta, Gaurav and Saha, Sanjoy Kumar and Chakraborty, Shayok and Mazumdar, Chandan},
     title = {Document Frauds: Identification and Linking Fake Document to Scanners and Printers},
     booktitle = {International Conference on Theory and Applications},
     year = {2007},
     pages = {497-501}}
    
  35. Y.M.Y. Hasan & A.M. Hassan
    Tamper Detection with Self-Correction Hybrid Spatial-DCT Domains Image Authentication Technique
    Proc. IEEE Int Signal Processing and Information Technology Symp
    2007, pp. 369-374
    BibTeX
    @inproceedings{Hasan2007,
     author = {Hasan, Y. M. Y. and Hassan, A. M. },
     title = {Tamper Detection with Self-Correction Hybrid Spatial-DCT Domains Image Authentication Technique},
     booktitle = {Proc. IEEE Int Signal Processing and Information Technology Symp},
     year = {2007},
     pages = {369--374}}
    
  36. Y.-F. Hsu & S.-F. Chang
    Image Splicing Detection using Camera Response Function Consistency and Automatic Segmentation
    Proc. IEEE Int Multimedia and Expo Conf
    2007, pp. 28-31
    BibTeX
    @inproceedings{Hsu2007,
     author = {Yu-Feng Hsu and Shih-Fu Chang},
     title = {Image Splicing Detection using Camera Response Function Consistency and Automatic Segmentation},
     booktitle = {Proc. IEEE Int Multimedia and Expo Conf},
     year = {2007},
     pages = {28--31}}
    
  37. A. Ibenthal
    Image Sensor Noise Estimation and Reduction
    2007
    BibTeX
    @misc{Ibenthal2007,
     author = {Achim Ibenthal},
     title = {Image Sensor Noise Estimation and Reduction},
     year = {2007}}
    
  38. M.K. Johnson
    Lighting and Optical Tools for Image Forensics
    Department of Computer Science, Dartmouth College, 2007
    BibTeX
    @phdthesis{Johnson2007c,
     author = {Johnson, Micah Kimo},
     title = {Lighting and Optical Tools for Image Forensics},
     school = {Department of Computer Science, Dartmouth College},
     year = {2007}}
    
  39. M.K. Johnson & H. Farid
    Exposing Digital Forgeries in Complex Lighting Environments
    IEEE Transactions on Information Forensics and Security, 2007, Vol. 3(2), pp. 450-461
    BibTeX
    @article{Johnson2007,
     author = {Johnson, Micah Kimo and Farid, Hany},
     title = {Exposing Digital Forgeries in Complex Lighting Environments},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2007},
     volume = {3},
     number = {2},
     pages = {450-461}}
    
  40. M.K. Johnson & H. Farid
    Exposing Digital Forgeries Through Specular Highlights on the Eye
    International Workshop on Information Hiding
    2007, pp. 311-325
    BibTeX
    @inproceedings{Johnson2007a,
     author = {Johnson, Micah Kimo and Farid, Hany},
     title = {Exposing Digital Forgeries Through Specular Highlights on the Eye},
     booktitle = {International Workshop on Information Hiding},
     year = {2007},
     pages = {311-325}}
    
  41. S. Ju, J. Zhou & K. He
    An Authentication Method for Copy Areas of Images
    Proc. Fourth Int. Conf. Image and Graphics ICIG 2007
    2007, pp. 303-306
    BibTeX
    @inproceedings{Ju2007,
     author = {Shenggen Ju and Jiliu Zhou and Kun He},
     title = {An Authentication Method for Copy Areas of Images},
     booktitle = {Proc. Fourth Int. Conf. Image and Graphics ICIG 2007},
     year = {2007},
     pages = {303--306}}
    
  42. S.B. Kang
    Automatic Removal of Chromatic Aberration from a Single Image
    Proc. IEEE Conference on Computer Vision and Pattern Recognition CVPR ´07
    2007, pp. 1-8
    BibTeX
    @inproceedings{Kang2007,
     author = {Sing Bing Kang},
     title = {Automatic Removal of Chromatic Aberration from a Single Image},
     booktitle = {Proc. IEEE Conference on Computer Vision and Pattern Recognition CVPR ´07},
     year = {2007},
     pages = {1--8}}
    
  43. N. Khanna, A.K. Mikkilineni, P.-J. Chiang, M.V. Ortiz, V. Shah, S. Suh, G.T.-C. Chiu, J.P. Allebach & E.J. Delp
    Printer and Sensor Forensics
    Proc. IEEE Workshop Signal Processing Applications for Public Security and Forensics SAFE ´07
    2007, pp. 1-8
    BibTeX
    @inproceedings{Khanna2007b,
     author = {Khanna, Nitin and Mikkilineni, Aravind K. and Chiang, Pei-Ju and Ortiz, Maria V. and Shah, Vivek and Suh, Sungjoo and Chiu, George T.-C. and Allebach, Jan P. and Delp, Edward J.},
     title = {Printer and Sensor Forensics},
     booktitle = {Proc. IEEE Workshop Signal Processing Applications for Public Security and Forensics SAFE ´07},
     year = {2007},
     pages = {1--8}}
    
  44. N. Khanna, A.K. Mikkilineni, P.-J. Chiang, M.V. Ortiz, S. Suh, G.T.-C. Chiu, J.P. Allebach & E.J. Delp
    Sensor Forensics: Printers, Cameras and Scanners, They Never Lie
    Proc. IEEE Int Multimedia and Expo Conf
    2007, pp. 20-23
    BibTeX
    @inproceedings{Khanna2007c,
     author = {Khanna, N. and Mikkilineni, A. K. and Pei-Ju Chiang and Ortiz, M. V. and Sungjoo Suh and Chiu, G. T.-C. and Allebach, J. P. and Delp, E. J.},
     title = {Sensor Forensics: Printers, Cameras and Scanners, They Never Lie},
     booktitle = {Proc. IEEE Int Multimedia and Expo Conf},
     year = {2007},
     pages = {20--23}}
    
  45. N. Khanna, A.K. Mikkilineni, G.T.C. Chiu, J.P. Allebach & E.J. Delp
    Scanner Identification Using Sensor Pattern Noise
    Proceedings of SPIE
    School of Electrical and Computer Engineering School of Mechanical Engineering Purdue University, West Lafayette, Indiana USA, 2007
    BibTeX
    @inproceedings{Khanna2007,
     author = {Khanna, Nitin and Mikkilineni, Aravind K. and Chiu, George T. C. and Allebach, Jan P. and Delp, Edward J.},
     title = {Scanner Identification Using Sensor Pattern Noise},
     booktitle = {Proceedings of SPIE},
     year = {2007}}
    
  46. N. Khanna, A.K. Mikkilineni, G.T.C. Chiu, J.P. Allebach & E.J. Delp
    Forensic classification of imaging sensor types
    Proceedings of SPIE
    2007
    BibTeX
    @inproceedings{Khanna2007a,
     author = {Khanna, Nitin and Mikkilineni, Aravind K. and Chiu, George T. C. and Allebach, Jan P. and Delp, Edward J.},
     title = {Forensic classification of imaging sensor types},
     booktitle = {Proceedings of SPIE},
     year = {2007}}
    
  47. M. Kihara, M. Fujiyoshi, Q.T. Wan & H. Kiya
    Image Tamper Detection using Mathematical Morphology
    Proc. IEEE Int. Conf. Image Processing ICIP 2007
    2007, Vol. 6
    BibTeX
    @inproceedings{Kihara2007,
     author = {Kihara, M. and Fujiyoshi, M. and Qing Tao Wan and Kiya, H. },
     title = {Image Tamper Detection using Mathematical Morphology},
     booktitle = {Proc. IEEE Int. Conf. Image Processing ICIP 2007},
     year = {2007},
     volume = {6}}
    
  48. M. Kirchner & R. Böhme
    Tamper Hiding: Defeating Image Forensics
    Furon, T., Cayre, F., Doerr, G. & Bas, P. (ed.)
    International Workshop on Information Hiding
    2007, pp. 326-341
    BibTeX
    @inproceedings{Kirchner2007,
     author = {Kirchner, Matthias and Böhme, Rainer},
     title = {Tamper Hiding: Defeating Image Forensics},
     booktitle = {International Workshop on Information Hiding},
     year = {2007},
     pages = {326-341}}
    
  49. T.V. Lanh, K.-S. Chong, S. Emmanuel & M.S. Kankanhalli
    A Survey on Digital Camera Image Forensic Methods
    Proc. IEEE Int Multimedia and Expo Conf
    2007, pp. 16-19
    BibTeX
    @inproceedings{Lanh2007,
     author = {Tran Van Lanh and Kai-Sen Chong and Emmanuel, S. and Kankanhalli, M. S. },
     title = {A Survey on Digital Camera Image Forensic Methods},
     booktitle = {Proc. IEEE Int Multimedia and Expo Conf},
     year = {2007},
     pages = {16--19}}
    
  50. G. Li, Q. Wu, D. Tu & S. Sun
    A Sorted Neighborhood Approach for Detecting Duplicated Regions in Image Forgeries Based on DWT and SVD
    Proc. IEEE Int Multimedia and Expo Conf
    2007, pp. 1750-1753
    BibTeX
    @inproceedings{Li2007,
     author = {Guohui Li and Qiong Wu and Dan Tu and Shaojie Sun},
     title = {A Sorted Neighborhood Approach for Detecting Duplicated Regions in Image Forgeries Based on DWT and SVD},
     booktitle = {Proc. IEEE Int Multimedia and Expo Conf},
     year = {2007},
     pages = {1750--1753}}
    
  51. W.A. Liebert
    Mit Bildern lügen
    Metten, T. (ed.)
    Herbert von Halem Verlag, 2007
    BibTeX
    @book{Liebert2007,
     author = {Wolf A. Liebert},
     title = {Mit Bildern lügen},
     publisher = {Herbert von Halem Verlag},
     year = {2007},
     edition = {1. Aufl.}}
    
  52. W.S. Lin, S. Tjoa, H.V. Zhao & K.J.R. Liu
    Image Source Coding Forensics via Intrinsic Fingerprints
    Proc. IEEE Int Multimedia and Expo Conf
    2007, pp. 1127-1130
    BibTeX
    @inproceedings{Lin2007,
     author = {Lin, W. S. and Tjoa, S. and Zhao, H. V. and Liu, K. J. R.},
     title = {Image Source Coding Forensics via Intrinsic Fingerprints},
     booktitle = {Proc. IEEE Int Multimedia and Expo Conf},
     year = {2007},
     pages = {1127--1130}}
    
  53. R. López-Valcarce & C. Mosquera
    Sixth-Order Statistics-Based Non-Data-Aided SNR Estimation
    IEEE Communications Letters, 2007, Vol. 11(4), pp. 351-353
    BibTeX
    @article{Lopez-Valcarce2007,
     author = {López-Valcarce, R. and Mosquera, C.},
     title = {Sixth-Order Statistics-Based Non-Data-Aided SNR Estimation},
     journal = {IEEE Communications Letters},
     year = {2007},
     volume = {11},
     number = {4},
     pages = {351--353}}
    
  54. W. Luo, Z. Qu, J. Huang & G. Qiu
    A Novel Method for Detecting Cropped and Recompressed Image Block
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2007
    2007, Vol. 2
    BibTeX
    @inproceedings{Luo2007,
     author = {Weiqi Luo and Zhenhua Qu and Jiwu Huang and Guoping Qiu},
     title = {A Novel Method for Detecting Cropped and Recompressed Image Block},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2007},
     year = {2007},
     volume = {2}}
    
  55. W. Luo, Z. Qu, F. Pan & J. Huang
    A survey of passive technology for digital image forensics
    Frontiers of Computer Science in China, Higher Education Press, co-published with Springer-Verlag GmbH, 2007, Vol. 1, pp. 166-179
    BibTeX
    @article{Luo2007a,
     author = {Luo, Weiqi and Qu, Zhenhua and Pan, Feng and Huang, Jiwu},
     title = {A survey of passive technology for digital image forensics},
     journal = {Frontiers of Computer Science in China},
     publisher = {Higher Education Press, co-published with Springer-Verlag GmbH},
     year = {2007},
     volume = {1},
     pages = {166-179}}
    
  56. B. Mahdian & S. Saic
    Detection of copy-move forgery using a method based on blur moment invariants.
    Forensic Sci Int, Institute of Information Theory and Automation, Academy of Sciences of the Czech Republic, Prague, Czech Republic. mahdian@utia.cas.cz, 2007, Vol. 171(2-3), pp. 180-189
    BibTeX
    @article{Mahdian2007,
     author = {Babak Mahdian and Stanislav Saic},
     title = {Detection of copy-move forgery using a method based on blur moment invariants.},
     journal = {Forensic Sci Int},
     year = {2007},
     volume = {171},
     number = {2-3},
     pages = {180--189}}
    
  57. B. Mahdian & S. Saic
    On Periodic Properties of Interpolation and Their Application To Image Authentication
    Proc. Third Int. Symp. Information Assurance and Security IAS 2007
    2007, pp. 439-446
    BibTeX
    @inproceedings{Mahdian2007a,
     author = {Mahdian, B. and Saic, S.},
     title = {On Periodic Properties of Interpolation and Their Application To Image Authentication},
     booktitle = {Proc. Third Int. Symp. Information Assurance and Security IAS 2007},
     year = {2007},
     pages = {439--446}}
    
  58. B. Mahdian & S. Saic
    Detection of Copy Move Forgery Using a Method Based on Blur Moment Invariants
    Forensic Science International, 2007, Vol. 171, pp. 180-189
    BibTeX
    @article{Mahdian2007c,
     author = {Mahdian, Babak and Saic, Stanislav},
     title = {Detection of Copy Move Forgery Using a Method Based on Blur Moment Invariants},
     journal = {Forensic Science International},
     year = {2007},
     volume = {171},
     pages = {180-189}}
    
  59. J. Mallon & P.F. Whelan
    Calibration and removal of lateral chromatic aberration in images
    Pattern Recognition Letters, 2007, Vol. 28(1), pp. 125 - 135
    BibTeX
    @article{Mallon2007,
     author = {John Mallon and Paul F. Whelan},
     title = {Calibration and removal of lateral chromatic aberration in images},
     journal = {Pattern Recognition Letters},
     year = {2007},
     volume = {28},
     number = {1},
     pages = {125 - 135}}
    
  60. N. Mondaini, R. Caldelli, A. Piva, M. Barni & V. Cappellini
    Detection of Malevolent Changes in Digital Video for Forensic Applications
    Delp, E. J. & Wong, P. W. (ed.)
    SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents
    2007, Vol. 6505
    BibTeX
    @inproceedings{Mondaini2007,
     author = {Mondaini, N. and Caldelli, Roberto and Piva, Alessandro and Barni, Mauro and Cappellini, Vito},
     title = {Detection of Malevolent Changes in Digital Video for Forensic Applications},
     booktitle = {SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents},
     year = {2007},
     volume = {6505}}
    
  61. A. Myna, M. Venkateshmurthy & C. Patil
    Detection of Region Duplication Forgery in Digital Images Using Wavelets and Log-Polar Mapping
    Computational Intelligence and Multimedia Applications, International Conference on, IEEE Computer Society, 2007, Vol. 3, pp. 371-377
    BibTeX
    @article{Myna2007,
     author = {A.N. Myna and M.G. Venkateshmurthy and C.G Patil},
     title = {Detection of Region Duplication Forgery in Digital Images Using Wavelets and Log-Polar Mapping},
     journal = {Computational Intelligence and Multimedia Applications, International Conference on},
     publisher = {IEEE Computer Society},
     year = {2007},
     volume = {3},
     pages = {371-377}}
    
  62. A.N. Myrna, M.G. Venkateshmurthy & C.G. Patil
    Detection of Region Duplication Forgery in Digital Images Using Wavelets and Log-Polar Mapping
    Proc. Int Conf. Computational Intelligence and Multimedia Applications Conf
    2007, Vol. 3, pp. 371-377
    BibTeX
    @inproceedings{Myrna2007,
     author = {Myrna, A. N. and Venkateshmurthy, M. G. and Patil, C. G. },
     title = {Detection of Region Duplication Forgery in Digital Images Using Wavelets and Log-Polar Mapping},
     booktitle = {Proc. Int Conf. Computational Intelligence and Multimedia Applications Conf},
     year = {2007},
     volume = {3},
     pages = {371--377}}
    
  63. T.-t. Ng & S.-f. Chang
    Lessons Learned from Online Classification of Photo-Realistic Computer Graphics and Photographs
    Department of Electrical Engineering Columbia University New York, NY 10027, 2007
    BibTeX
    @techreport{Ng2007a,
     author = {Ng, Tian-tsong and Chang, Shih-fu},
     title = {Lessons Learned from Online Classification of Photo-Realistic Computer Graphics and Photographs},
     year = {2007}}
    
  64. T.-T. Ng, S.-F. Chang & M.-P. Tsui
    Using Geometry Invariants for Camera Response Function Estimation
    Proc. IEEE Conference on Computer Vision and Pattern Recognition CVPR ´07
    2007, pp. 1-8
    BibTeX
    @inproceedings{Ng2007,
     author = {Ng, Tian-Tsong and Chang, Shih-Fu and Tsui, Mao-Pei},
     title = {Using Geometry Invariants for Camera Response Function Estimation},
     booktitle = {Proc. IEEE Conference on Computer Vision and Pattern Recognition CVPR ´07},
     year = {2007},
     pages = {1--8}}
    
  65. A. Oermann, C. Vielhauer & J. Dittmann
    Sensometrics: Identifying Pen Digitizers by Statistical Multimedia Signal Processing
    SPIE Conference on Multimedia on Mobile Devices III
    2007
    BibTeX
    @inproceedings{Oermann2007,
     author = {Oermann, Andrea and Vielhauer, Claus and Dittmann, Jana},
     title = {Sensometrics: Identifying Pen Digitizers by Statistical Multimedia Signal Processing},
     booktitle = {SPIE Conference on Multimedia on Mobile Devices III},
     year = {2007}}
    
  66. W.K. Pratt
    Digital Image Processing
    Wiley-Interscience, 2007
    BibTeX
    @book{Pratt2007,
     author = {Pratt, William K.},
     title = {Digital Image Processing},
     publisher = {Wiley-Interscience},
     year = {2007}}
    
  67. S. Roy & Q. Sun
    Robust Hash for Detecting and Localizing Image Tampering
    Proc. IEEE Int. Conf. Image Processing ICIP 2007
    2007, Vol. 6
    BibTeX
    @inproceedings{Roy2007,
     author = {Sujoy Roy and Qibin Sun},
     title = {Robust Hash for Detecting and Localizing Image Tampering},
     booktitle = {Proc. IEEE Int. Conf. Image Processing ICIP 2007},
     year = {2007},
     volume = {6}}
    
  68. D.L.M. Sacchi, F. Agnoli & E.F. Loftus
    Changing History: Doctored Photographs Affect Memory for Past Public Events
    Applied Cognitive Psychology, 2007, Vol. Volume 21 Issue 8(21), pp. 1005-1022
    BibTeX
    @article{Sacchi2007,
     author = {Sacchi, Dario L. M. and Agnoli, Franca and Loftus, Elizabeth F.},
     title = {Changing History: Doctored Photographs Affect Memory for Past Public Events},
     journal = {Applied Cognitive Psychology},
     year = {2007},
     volume = {Volume 21 Issue 8},
     number = {21},
     pages = {1005-1022}}
    
  69. D. Schlesinger
    The use of Photoshop
    2007
    BibTeX
    @electronic{Schlesinger2007,
     author = {David Schlesinger},
     title = {The use of Photoshop},
     year = {2007}}
    
  70. H.T. Sencar & N. Memon
    Overview of State-of-Art in Digital Image Forensics
    Proc. of WSPC
    2007
    BibTeX
    @inproceedings{Sencar2007,
     author = {H. T. Sencar and N. Memon},
     title = {Overview of State-of-Art in Digital Image Forensics},
     booktitle = {Proc. of WSPC},
     year = {2007}}
    
  71. Y.Q. Shi, C. Chen & W. Chen
    A natural image model approach to splicing detection
    MM&Sec ´07: Proceedings of the 9th workshop on Multimedia & security
    ACM, 2007, pp. 51-62
    BibTeX
    @inproceedings{Shi2007,
     author = {Shi, Yun Q. and Chen, Chunhua and Chen, Wen},
     title = {A natural image model approach to splicing detection},
     booktitle = {MM&Sec ´07: Proceedings of the 9th workshop on Multimedia & security},
     publisher = {ACM},
     year = {2007},
     pages = {51--62}}
    
  72. S. Singh, V. Kumar & H. Verma
    Reduction of blocking artifacts in JPEG compressed images
    Digital Signal Processing, 2007, Vol. 17(1), pp. 225 - 243
    BibTeX
    @article{Singh2007,
     author = {Sukhwinder Singh and Vinod Kumar and H.K. Verma},
     title = {Reduction of blocking artifacts in JPEG compressed images},
     journal = {Digital Signal Processing},
     year = {2007},
     volume = {17},
     number = {1},
     pages = {225 - 243}}
    
  73. C. Staelin & H. Nachlieli
    Image noise estimation using color information
    HP Laboratories Israel HPL-2005-2(R.1), 2007
    BibTeX
    @techreport{Staelin2007,
     author = {Carl Staelin and Hila Nachlieli},
     title = {Image noise estimation using color information},
     year = {2007}}
    
  74. Y. Sutcu, S. Bayram, H.T. Sencar & N. Memon
    Improvements on Sensor Noise Based Source Camera Identification
    Proc. IEEE International Conference on Multimedia and Expo
    2007, pp. 24-27
    BibTeX
    @inproceedings{Sutcu2007a,
     author = {Sutcu, Y. and Bayram, S. and Sencar, H. T. and Memon, N.},
     title = {Improvements on Sensor Noise Based Source Camera Identification},
     booktitle = {Proc. IEEE International Conference on Multimedia and Expo},
     year = {2007},
     pages = {24--27}}
    
  75. Y. Sutcu, B. Coskun, H.T. Sencar & N. Memon
    Tamper Detection Based on Regularity of Wavelet Transform Coefficients
    IEEE International Conference on Image Processing
    2007
    BibTeX
    @inproceedings{Sutcu2007,
     author = {Sutcu, Yagiz and Coskun, Baris and Sencar, Husrev T. and Memon, Nasir},
     title = {Tamper Detection Based on Regularity of Wavelet Transform Coefficients},
     booktitle = {IEEE International Conference on Image Processing},
     year = {2007}}
    
  76. A. Swaminathan, M. Wu & K.J.R. Liu
    A Component Estimation Framework for Information Forensics
    Proc. IEEE 9th Workshop Multimedia Signal Processing MMSP 2007
    2007, pp. 397-400
    BibTeX
    @inproceedings{Swaminathan2007,
     author = {Swaminathan, Ashwin and Min Wu and Liu, K. J. R.},
     title = {A Component Estimation Framework for Information Forensics},
     booktitle = {Proc. IEEE 9th Workshop Multimedia Signal Processing MMSP 2007},
     year = {2007},
     pages = {397--400}}
    
  77. A. Swaminathan, M. Wu & K.J.R. Liu
    Nonintrusive Component Forensics of Visual Sensors Using Output Images
    IEEE Transactions on Information Forensics and Security, 2007, Vol. 2(1), pp. 91-106
    BibTeX
    @article{Swaminathan2007b,
     author = {Swaminathan, Ashwin and Min Wu and K. J. Ray Liu},
     title = {Nonintrusive Component Forensics of Visual Sensors Using Output Images},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2007},
     volume = {2},
     number = {1},
     pages = {91--106}}
    
  78. A. Swaminathan, M. Wu & K.J.R. Liu
    Intrinsic Fingerprints for Image Authentication and Steganalysis
    SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents
    2007
    BibTeX
    @inproceedings{Swaminathan2007d,
     author = {Swaminathan, Ashwin and Wu, Min and Liu, K. J. Ray},
     title = {Intrinsic Fingerprints for Image Authentication and Steganalysis},
     booktitle = {SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents},
     year = {2007}}
    
  79. A. Swaminathan, M. Wu & K.J.R. Liu
    Optimization of Input Pattern for Semi Non-Intrusive Component Forensics of Digital Cameras
    IEEE International Conference on Acoustics, Speech and Signal Processing
    2007, pp. 225-228
    BibTeX
    @inproceedings{Swaminathan2007e,
     author = {Swaminathan, Ashwin and Wu, Min and Liu, K. J. Ray},
     title = {Optimization of Input Pattern for Semi Non-Intrusive Component Forensics of Digital Cameras},
     booktitle = {IEEE International Conference on Acoustics, Speech and Signal Processing},
     year = {2007},
     pages = {225-228}}
    
  80. S. Tjoa, W.S. Lin & K.J.R. Liu
    Transform Coder Classification for Digital Image Forensics
    Proc. IEEE Int. Conf. Image Processing ICIP 2007
    2007, Vol. 6
    BibTeX
    @inproceedings{Tjoa2007a,
     author = {Tjoa, S. and Lin, W. S. and Liu, K. J. R.},
     title = {Transform Coder Classification for Digital Image Forensics},
     booktitle = {Proc. IEEE Int. Conf. Image Processing ICIP 2007},
     year = {2007},
     volume = {6}}
    
  81. S. Tjoa, W.S. Lin, H.V. Zhao & K.J.R. Liu
    Block Size Forensic Analysis in Digital Images
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2007
    2007, Vol. 1
    BibTeX
    @inproceedings{Tjoa2007,
     author = {Tjoa, S. and Lin, W. S. and Zhao, H. V. and Liu, K. J. R.},
     title = {Block Size Forensic Analysis in Digital Images},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2007},
     year = {2007},
     volume = {1}}
    
  82. M.-J. Tsai, C.-L. Lai & J. Liu
    Camera/Mobile Phone Source Identification for Digital Forensics
    IEEE International Confernece on Acoustics, Speech, and Signal Processing
    2007, Vol. 2, pp. II-221-II-224
    BibTeX
    @inproceedings{Tsai2007,
     author = {Tsai, Min-Jen and Lai, Cheng-Liang and Liu, Jung},
     title = {Camera/Mobile Phone Source Identification for Digital Forensics},
     booktitle = {IEEE International Confernece on Acoustics, Speech, and Signal Processing},
     year = {2007},
     volume = {2},
     pages = {II-221-II-224}}
    
  83. C. Upright, D. Cobzas & M. Jagersand
    Wavelet-based Light Reconstruction from a Single Image
    CRV ´07: Proceedings of the Fourth Canadian Conference on Computer and Robot Vision
    IEEE Computer Society, 2007, pp. 305-312
    BibTeX
    @inproceedings{Upright2007,
     author = {Upright, Cameron and Cobzas, Dana and Jagersand, Martin},
     title = {Wavelet-based Light Reconstruction from a Single Image},
     booktitle = {CRV ´07: Proceedings of the Fourth Canadian Conference on Computer and Robot Vision},
     publisher = {IEEE Computer Society},
     year = {2007},
     pages = {305--312}}
    
  84. L.T. Van, S. Emmanuel & M.S. Kankanhalli
    Identifying Source Cell Phone using Chromatic Aberration
    Sampat, N., DiCarlo, J. M. & Martin, R. A. (ed.)
    Proc. IEEE International Conference on Multimedia and Expo
    Digital Photography II, SPIE, 2007, Vol. 6069(1), pp. 883-886
    BibTeX
    @inproceedings{Van2007,
     author = {Lanh Tran Van and Emmanuel, S. and Kankanhalli, M. S.},
     title = {Identifying Source Cell Phone using Chromatic Aberration},
     booktitle = {Proc. IEEE International Conference on Multimedia and Expo},
     journal = {Digital Photography II},
     publisher = {SPIE},
     year = {2007},
     volume = {6069},
     number = {1},
     pages = {883--886}}
    
  85. W. Wang & H. Farid
    Exposing Digital Forgeries in Interlaced and Deinterlaced Video
    IEEE Transactions on Information Forensics and Security, 2007, Vol. 2(3), pp. 438-449
    BibTeX
    @article{Wang2007,
     author = {Weihong Wang and Farid, H.},
     title = {Exposing Digital Forgeries in Interlaced and Deinterlaced Video},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2007},
     volume = {2},
     number = {3},
     pages = {438--449}}
    
  86. W. Wang & H. Farid
    Exposing Digital Forgeries in Video by Detecting Duplication
    ACM Multimedia and Security Workshop
    2007, pp. 35-42
    BibTeX
    @inproceedings{Wang2007b,
     author = {Wang, Weihong and Farid, Hany},
     title = {Exposing Digital Forgeries in Video by Detecting Duplication},
     booktitle = {ACM Multimedia and Security Workshop},
     year = {2007},
     pages = {35-42}}
    
  87. S. Ye, Q. Sun & E.-C. Chang
    Detecting Digital Image Forgeries by Measuring Inconsistencies of Blocking Artifact
    Proc. IEEE International Conference on Multimedia and Expo
    2007, Vol. EUPISCO, pp. 12-15
    BibTeX
    @inproceedings{Ye2007,
     author = {Ye, Shuiming and Sun, Qibin and Chang, Ee-Chien},
     title = {Detecting Digital Image Forgeries by Measuring Inconsistencies of Blocking Artifact},
     booktitle = {Proc. IEEE International Conference on Multimedia and Expo},
     year = {2007},
     volume = {EUPISCO},
     pages = {12--15}}
    
  88. C. Zhang & H. Zhang
    Detecting Digital Image Forgeries Through Weighted Local Entropy
    Proc. IEEE International Symposium on Signal Processing and Information Technology
    2007, pp. 62-67
    BibTeX
    @inproceedings{Zhang2007,
     author = {Zhang, Chi and Zhang, Hongbin},
     title = {Detecting Digital Image Forgeries Through Weighted Local Entropy},
     booktitle = {Proc. IEEE International Symposium on Signal Processing and Information Technology},
     year = {2007},
     pages = {62--67}}
    
  89. L. Zhou, D. Wang, Y. Guo & J. Zhang
    Blur Detection of Digital Forgery Using Mathematical Morphology
    Nguyen, N., Grzech, A., Howlett, R. & Jain, L. (ed.)
    Agent and Multi-Agent Systems: Technologies and Applications
    Springer Berlin Heidelberg, 2007, Vol. 4496, pp. 990-998
    BibTeX
    @incollection{Zhou2007a,
     author = {Zhou, Linna and Wang, Dongming and Guo, Yunbiao and Zhang, Jingfei},
     title = {Blur Detection of Digital Forgery Using Mathematical Morphology},
     booktitle = {Agent and Multi-Agent Systems: Technologies and Applications},
     publisher = {Springer Berlin Heidelberg},
     year = {2007},
     volume = {4496},
     pages = {990-998}}
    
  90. L. Zhou, D. Wang, Y. Guo & J. Zhang
    Blur Detection of Digital Forgery Using Mathematical Morphology
    KES-AMSTA ´07: Proceedings of the 1st KES International Symposium on Agent and Multi-Agent Systems
    Springer-Verlag, 2007, pp. 990-998
    BibTeX
    @inproceedings{Zhou2007,
     author = {Zhou, Linna and Wang, Dongming and Guo, Yunbiao and Zhang, Jingfei},
     title = {Blur Detection of Digital Forgery Using Mathematical Morphology},
     booktitle = {KES-AMSTA ´07: Proceedings of the 1st KES International Symposium on Agent and Multi-Agent Systems},
     publisher = {Springer-Verlag},
     year = {2007},
     pages = {990--998}}
    


2006

  1. R.E. Alley
    Algorithm Theoretical Basis Document for Decorrelation Stretch
    Jet Propulsion Laboratory 4800 Oak Grove Drive Pasadena, CA 91109, 2006
    BibTeX
    @techreport{Alley2006,
     author = {Ronald E. Alley},
     title = {Algorithm Theoretical Basis Document for Decorrelation Stretch},
     year = {2006}}
    
  2. S. Bayram, İ. Avcıbaş, B. Sankur & N. Memon
    Image manipulation detection
    Journal of Electronic Imaging, SPIE, 2006, Vol. 15(4), pp. 041102
    BibTeX
    @article{Bayram2006a,
     author = {Bayram, Sevinc and Avcıbaş, İsmail and Sankur, Bülent and Memon, Nasir},
     title = {Image manipulation detection},
     journal = {Journal of Electronic Imaging},
     publisher = {SPIE},
     year = {2006},
     volume = {15},
     number = {4},
     pages = {041102}}
    
  3. S. Bayram, H.T. Sencar & N.D. Memon
    Improvements on source camera-model identification based on CFA interpolation
    Proc. of the WG 11.9 Intl. Conf. on Digital Forensics
    Proc. of the WG 11.9 Intl. Conf. on Digital Forensics, 2006
    BibTeX
    @inproceedings{Bayram2006,
     author = {Sevinç Bayram and Husrev T. Sencar and Nasir D. Memon},
     title = {Improvements on source camera-model identification based on CFA interpolation},
     booktitle = {Proc. of the WG 11.9 Intl. Conf. on Digital Forensics},
     journal = {Proc. of the WG 11.9 Intl. Conf. on Digital Forensics},
     year = {2006}}
    
  4. A. Castiglione, G. Cattaneo, M. Cembalo & U. Ferraro Petrillo
    Experimentations with source camera identification and Online Social Networks
    Journal of Ambient Intelligence and Humanized Computing, Springer Berlin / Heidelberg, 2006, Vol. -, pp. 1-10
    BibTeX
    @article{Castiglione,
     author = {Castiglione, Aniello and Cattaneo, Giuseppe and Cembalo, Maurizio and Ferraro Petrillo, Umberto},
     title = {Experimentations with source camera identification and Online Social Networks},
     journal = {Journal of Ambient Intelligence and Humanized Computing},
     publisher = {Springer Berlin / Heidelberg},
     year = {2006},
     volume = {-},
     pages = {1-10}}
    
  5. O. Celiktutan, I. Avcibas, B. Sankur, N.P. Ayerden & C. Capar
    Source Cell-phone Identification
    Proc. IEEE 14th Signal Processing and Communications Applications
    2006, pp. 1-3
    BibTeX
    @inproceedings{Celiktutan2006,
     author = {Celiktutan, O. and Avcibas, I. and Sankur, B. and Ayerden, N. P. and Capar, C. },
     title = {Source Cell-phone Identification},
     booktitle = {Proc. IEEE 14th Signal Processing and Communications Applications},
     year = {2006},
     pages = {1--3}}
    
  6. K.S. Choi, E.Y. Lam & K.K.Y. Wong
    Source camera identification using footprints from lens aberration
    Sampat, N., DiCarlo, J. M. & Martin, R. A. (ed.)
    Proc. SPIE
    Digital Photography II, SPIE, 2006, Vol. 6069(1), pp. 60690J
    BibTeX
    @inproceedings{Choi2006,
     author = {Kai San Choi and Edmund Y. Lam and Kenneth K. Y. Wong},
     title = {Source camera identification using footprints from lens aberration},
     booktitle = {Proc. SPIE},
     journal = {Digital Photography II},
     publisher = {SPIE},
     year = {2006},
     volume = {6069},
     number = {1},
     pages = {60690J}}
    
  7. K.S. Choi, E.Y. Lam & K.K.Y. Wong
    Source Camera Identification by JPEG Compression Statistics for Image Forensics
    IEEE Region 10 Conference (TENCON 2006)
    2006
    BibTeX
    @inproceedings{Choi2006a,
     author = {Choi, Kai San and Lam, Edmund Y. and Wong, Kenneth K. Y.},
     title = {Source Camera Identification by JPEG Compression Statistics for Image Forensics},
     booktitle = {IEEE Region 10 Conference (TENCON 2006)},
     year = {2006}}
    
  8. K.S. Choi, E.Y. Lam & K.K.Y. Wong
    Automatic Source Camera Identification using Intrinsic Lens Radial Distortion
    Optics Express, 2006, Vol. 14(24), pp. 11551-11565
    BibTeX
    @article{Choi2006c,
     author = {Choi, Kai San and Lam, Edmund Y. and Wong, Kenneth K. Y.},
     title = {Automatic Source Camera Identification using Intrinsic Lens Radial Distortion},
     journal = {Optics Express},
     year = {2006},
     volume = {14},
     number = {24},
     pages = {11551-11565}}
    
  9. K.S. Choi, E.Y. Lam & K.K.Y. Wong
    Feature Selection in Source Camera Identification
    IEEE International Conference on Systems, Man and Cybernetics
    2006, pp. 3176-3180
    BibTeX
    @inproceedings{Choi2006d,
     author = {Choi, Kai San and Lam, Edmund Y. and Wong, Kenneth K. Y.},
     title = {Feature Selection in Source Camera Identification},
     booktitle = {IEEE International Conference on Systems, Man and Cybernetics},
     year = {2006},
     pages = {3176-3180}}
    
  10. A. De, H. Chadha & S. Gupta
    Detection of forgery in digital video
    The 10th World MultiConference on Systemics Cybernetics and Informatics
    2006, Vol. V, pp. 229-233
    BibTeX
    @inproceedings{De2006,
     author = {De, A. and Chadha, H. and Gupta, S.},
     title = {Detection of forgery in digital video},
     booktitle = {The 10th World MultiConference on Systemics Cybernetics and Informatics},
     year = {2006},
     volume = {V},
     pages = {229--233}}
    
  11. S. Dehnie, T. Sencar & N. Memon
    Digital Image Forensics for Identifying Computer Generated and Digital Camera Images
    Proc. IEEE Int Image Processing Conf
    2006, pp. 2313-2316
    BibTeX
    @inproceedings{Dehnie2006,
     author = {Dehnie, S. and Sencar, T. and Memon, N. },
     title = {Digital Image Forensics for Identifying Computer Generated and Digital Camera Images},
     booktitle = {Proc. IEEE Int Image Processing Conf},
     year = {2006},
     pages = {2313--2316}}
    
  12. H. Farid
    Exposing digital forgeries in scientific images
    MM&Sec ´06: Proceedings of the 8th workshop on Multimedia and security
    ACM, 2006, pp. 29-36
    BibTeX
    @inproceedings{Farid2006,
     author = {Farid, Hany},
     title = {Exposing digital forgeries in scientific images},
     booktitle = {MM&Sec ´06: Proceedings of the 8th workshop on Multimedia and security},
     publisher = {ACM},
     year = {2006},
     pages = {29--36}}
    
  13. H. Farid
    Digital Image Ballistics from JPEG Quantization
    Department of Computer Science, Dartmouth College, 2006(TR2006-583)
    BibTeX
    @techreport{Farid2006a,
     author = {Farid, Hany},
     title = {Digital Image Ballistics from JPEG Quantization},
     year = {2006},
     number = {TR2006-583}}
    
  14. H. Farid
    Digital Doctoring: How to tell the real from the fake
    Significance, 2006, Vol. 3(4), pp. 162-166
    BibTeX
    @article{Farid2006b,
     author = {Farid, Hany},
     title = {Digital Doctoring: How to tell the real from the fake},
     journal = {Significance},
     year = {2006},
     volume = {3},
     number = {4},
     pages = {162-166}}
    
  15. R. Fergus, B. Singh, A. Hertzmann, S.T. Roweis & W.T. Freeman
    Removing camera shake from a single photograph
    SIGGRAPH ´06: ACM SIGGRAPH 2006 Papers
    ACM, 2006, pp. 787-794
    BibTeX
    @inproceedings{Fergus2006,
     author = {Fergus, Rob and Singh, Barun and Hertzmann, Aaron and Roweis, Sam T. and Freeman, William T.},
     title = {Removing camera shake from a single photograph},
     booktitle = {SIGGRAPH ´06: ACM SIGGRAPH 2006 Papers},
     publisher = {ACM},
     year = {2006},
     pages = {787--794}}
    
  16. D. Fu, Y.Q. Shi & W. Su
    Detection of Image Splicing Based on Hilbert-Huang Transform and Moments of Characteristic Functions with Wavelet Decomposition
    Jeon, B. (ed.)
    International Workshop on Digital Watermarking
    2006, pp. 177-187
    BibTeX
    @inproceedings{Fu2006,
     author = {Fu, Dongdong and Shi, Yun Qing and Su, Wei},
     title = {Detection of Image Splicing Based on Hilbert-Huang Transform and Moments of Characteristic Functions with Wavelet Decomposition},
     booktitle = {International Workshop on Digital Watermarking},
     year = {2006},
     pages = {177-187}}
    
  17. T. Georgiev
    Covariant Derivatives and Vision
    Leonardis, A., Bischof, H. & Pinz, A. (ed.)
    Computer Vision -- ECCV 2006
    Springer Berlin Heidelberg, 2006, Vol. 3954, pp. 56-69
    BibTeX
    @incollection{Georgiev2006,
     author = {Georgiev, Todor},
     title = {Covariant Derivatives and Vision},
     booktitle = {Computer Vision -- ECCV 2006},
     publisher = {Springer Berlin Heidelberg},
     year = {2006},
     volume = {3954},
     pages = {56-69}}
    
  18. E.S. Gopi, N. Lakshmanan, T. Gokul, S. KumaraGanesh & P.R. Shah
    Digital Image Forgery Detection using Artificial Neural Network and Auto Regressive Coefficients
    Proc. Canadian Conference on Electrical and Computer Engineering CCECE ´06
    2006, pp. 194-197
    BibTeX
    @inproceedings{Gopi2006,
     author = {Gopi, E. S. and Lakshmanan, N. and Gokul, T. and KumaraGanesh, S. and Shah, P. R.},
     title = {Digital Image Forgery Detection using Artificial Neural Network and Auto Regressive Coefficients},
     booktitle = {Proc. Canadian Conference on Electrical and Computer Engineering CCECE ´06},
     year = {2006},
     pages = {194--197}}
    
  19. L. Grady
    Random Walks for Image Segmentation
    IEEE Trans. on Pattern Analysis and Machine Intelligence, 2006, Vol. 28(11), pp. 1768-1783
    BibTeX
    @article{Grady2006,
     author = {Leo Grady},
     title = {Random Walks for Image Segmentation},
     journal = {IEEE Trans. on Pattern Analysis and Machine Intelligence},
     year = {2006},
     volume = {28},
     number = {11},
     pages = {1768--1783}}
    
  20. D. Hoiem, A.A. Efros & M. Hebert
    Putting Objects in Perspective
    Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition
    2006, Vol. 2, pp. 2137-2144
    BibTeX
    @inproceedings{Hoiem2006,
     author = {Hoiem, D. and Efros, A. A. and Hebert, M.},
     title = {Putting Objects in Perspective},
     booktitle = {Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition},
     year = {2006},
     volume = {2},
     pages = {2137--2144}}
    
  21. Y.-F. Hsu & S.-F. Chang
    Detecting Image Splicing using Geometry Invariants and Camera Characteristics Consistency
    Proc. IEEE Int Multimedia and Expo Conf
    2006, pp. 549-552
    BibTeX
    @inproceedings{Hsu2006,
     author = {Hsu, Y.-F. and Chang, S.-F. },
     title = {Detecting Image Splicing using Geometry Invariants and Camera Characteristics Consistency},
     booktitle = {Proc. IEEE Int Multimedia and Expo Conf},
     year = {2006},
     pages = {549--552}}
    
  22. H.T. Hytti
    Characterization of digital image noise properties based on RAW data
    Proc. SPIE 6059, Image Quality and System Performance III, 2006, Vol. 6059, pp. 60590A-60590A-12
    BibTeX
    @article{Hytti2006,
     author = {Hytti, Heli T.},
     title = {Characterization of digital image noise properties based on RAW data},
     journal = {Proc. SPIE 6059, Image Quality and System Performance III},
     year = {2006},
     volume = {6059},
     pages = {60590A-60590A-12}}
    
  23. W. Jing & Z. Hongbin
    Exposing Digital Forgeries by Detecting Traces of Image Splicing
    Proc. 8th Int Signal Processing Conf
    2006, Vol. 2
    BibTeX
    @inproceedings{Jing2006,
     author = {Jing, W. and Hongbin, Z. },
     title = {Exposing Digital Forgeries by Detecting Traces of Image Splicing},
     booktitle = {Proc. 8th Int Signal Processing Conf},
     year = {2006},
     volume = {2}}
    
  24. M.K. Johnson & H. Farid
    Exposing digital forgeries through chromatic aberration
    MM&Sec ´06: Proceedings of the 8th workshop on Multimedia and security
    ACM, 2006, pp. 48-55
    BibTeX
    @inproceedings{Johnson2006,
     author = {Johnson, Micah Kimo and Farid, Hany},
     title = {Exposing digital forgeries through chromatic aberration},
     booktitle = {MM&Sec ´06: Proceedings of the 8th workshop on Multimedia and security},
     publisher = {ACM},
     year = {2006},
     pages = {48--55}}
    
  25. M.K. Johnson & H. Farid
    Metric Measurements on a Plane from a Single Image
    Department of Computer Science, Dartmouth College, 2006(TR2006-579)
    BibTeX
    @techreport{Johnson2006a,
     author = {Johnson, Micah Kimo and Farid, Hany},
     title = {Metric Measurements on a Plane from a Single Image},
     year = {2006},
     number = {TR2006-579}}
    
  26. M.K. Johnson & H. Farid
    Exposing Digital Forgeries Through Chromatic Aberration
    ACM Multimedia and Security Workshop
    2006, pp. 48-55
    BibTeX
    @inproceedings{Johnson2006b,
     author = {Johnson, Micah Kimo and Farid, Hany},
     title = {Exposing Digital Forgeries Through Chromatic Aberration},
     booktitle = {ACM Multimedia and Security Workshop},
     year = {2006},
     pages = {48-55}}
    
  27. L.W. Junfeng He, Zhouchen Lin & X. Tang
    Detecting Doctored JPEG Images Via DCT Coefficient Analysis
    Lecture Notes in Computer Science, 2006, Vol. 3953/2006, pp. 423-435
    BibTeX
    @article{JunfengHe2006,
     author = {Junfeng He, Zhouchen Lin, Lifeng Wang and Xiaoou Tang},
     title = {Detecting Doctored JPEG Images Via DCT Coefficient Analysis},
     journal = {Lecture Notes in Computer Science},
     year = {2006},
     volume = {3953/2006},
     pages = {423-435}}
    
  28. N. Khanna, A.K. Mikkilineni, A.F. Martone, G.N. Ali, G.T.-C. Chiu, J.P. Allebach & E.J. Delp
    A survey of forensic characterization methods for physical devices
    Digital Investigation, 2006, Vol. 3(Supplement 1), pp. 17 - 28
    BibTeX
    @article{Khanna2006,
     author = {Nitin Khanna and Aravind K. Mikkilineni and Anthony F. Martone and Gazi N. Ali and George T.-C. Chiu and Jan P. Allebach and Edward J. Delp},
     title = {A survey of forensic characterization methods for physical devices},
     journal = {Digital Investigation},
     year = {2006},
     volume = {3},
     number = {Supplement 1},
     pages = {17 - 28}}
    
  29. A. Langille & M. Gong
    An Efficient Match-based Duplication Detection Algorithm
    Canadian Conference on Computer and Robot Vision
    2006
    BibTeX
    @inproceedings{Langille2006,
     author = {Langille, Aaron and Gong, Minglun},
     title = {An Efficient Match-based Duplication Detection Algorithm},
     booktitle = {Canadian Conference on Computer and Robot Vision},
     year = {2006}}
    
  30. S. Lee, D.A. Shamma & B. Gooch
    Detecting False Captioning Using Common Sense Reasoning
    Digital Investigation, 2006, Vol. 3(Supplement 1), pp. 65-70
    BibTeX
    @article{Lee2006,
     author = {Lee, Sangwon and Shamma, David A. and Gooch, Bruce},
     title = {Detecting False Captioning Using Common Sense Reasoning},
     journal = {Digital Investigation},
     year = {2006},
     volume = {3},
     number = {Supplement 1},
     pages = {65-70}}
    
  31. C. Liu, W.T. Freeman, R. Szeliski & S.B. Kang
    Noise Estimation from a Single Image
    Proc. IEEE Computer Society Conference on Computer Vision and Pattern Recognition
    2006, Vol. 1, pp. 901-908
    BibTeX
    @inproceedings{Liu2006,
     author = {Liu, Ce and Freeman, W. T. and Szeliski, R. and Kang, Sing Bing},
     title = {Noise Estimation from a Single Image},
     booktitle = {Proc. IEEE Computer Society Conference on Computer Vision and Pattern Recognition},
     year = {2006},
     volume = {1},
     pages = {901--908}}
    
  32. Y. Long & Y. Huang
    Image Based Source Camera Identification using Demosaicking
    Proc. IEEE 8th Workshop on Multimedia Signal Processing
    2006, pp. 419-424
    BibTeX
    @inproceedings{Long2006,
     author = {Yangjing Long and Yizhen Huang},
     title = {Image Based Source Camera Identification using Demosaicking},
     booktitle = {Proc. IEEE 8th Workshop on Multimedia Signal Processing},
     year = {2006},
     pages = {419--424}}
    
  33. W. Lu, F.-L. Chung & H. Lu
    Blind Fake Image Detection Scheme Using SVD
    IEICE Transactions on Communications (Institute of Electronics, Information and Communication Engineers), 2006, Vol. E89-B, pp. 1726-1728
    BibTeX
    @article{Lu2006,
     author = {Lu, Wei and Chung, Fu-Lai and Lu, Hongtao},
     title = {Blind Fake Image Detection Scheme Using SVD},
     journal = {IEICE Transactions on Communications (Institute of Electronics, Information and Communication Engineers)},
     year = {2006},
     volume = {E89-B},
     pages = {1726-1728}}
    
  34. W. Lu, F.-l. Chung & H. Lu
    Blind fake image detection scheme using SVD
    IEICE TRANS. COMMUN, 2006, Vol. E89-B(5), pp. 1726-1728
    BibTeX
    @article{Lu2006a,
     author = {Lu, Wei and Chung, Fu-lai and Lu, Hongtao},
     title = {Blind fake image detection scheme using SVD},
     journal = {IEICE TRANS. COMMUN},
     year = {2006},
     volume = {E89-B},
     number = {5},
     pages = {1726-1728}}
    
  35. J. Lukáš, J. Fridrich & M. Goljan
    Detecting Digital Image Forgeries Using Sensor Pattern Noise
    Delp, E. J. & Wong, P. W. (ed.)
    SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents
    2006, Vol. 6072
    BibTeX
    @inproceedings{Lukas2006b,
     author = {Lukáš, Jan and Fridrich, Jessica and Goljan, Miroslav},
     title = {Detecting Digital Image Forgeries Using Sensor Pattern Noise},
     booktitle = {SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents},
     year = {2006},
     volume = {6072}}
    
  36. J. Lukáš, J. Fridrich & M. Goljan
    Digital camera identification from sensor pattern noise
    IEEE Transactions on Information Forensics and Security, 2006, Vol. 1(2), pp. 205-214
    BibTeX
    @article{Lukas2006,
     author = {Lukáš, J. and Fridrich, J. and Goljan, M.},
     title = {Digital camera identification from sensor pattern noise},
     journal = {IEEE Transactions on Information Forensics and Security},
     year = {2006},
     volume = {1},
     number = {2},
     pages = {205--214}}
    
  37. G. Luo
    Fast Wavelet Image Denoising Based on Local Variance and Edge Analysis
    International Journal of Intelligent Technology, 2006, Vol. 1(2), pp. 165-175
    BibTeX
    @article{Luo2006a,
     author = {Gaoyong Luo},
     title = {Fast Wavelet Image Denoising Based on Local Variance and Edge Analysis},
     journal = {International Journal of Intelligent Technology},
     year = {2006},
     volume = {1},
     number = {2},
     pages = {165--175}}
    
  38. W. Luo, J. Huang & G. Qiu
    Robust Detection of Region-Duplication Forgery in Digital Image
    Pattern Recognition, International Conference on, IEEE Computer Society, 2006, Vol. 4, pp. 746-749
    BibTeX
    @article{Luo2006,
     author = {Weiqi Luo and Jiwu Huang and Guoping Qiu},
     title = {Robust Detection of Region-Duplication Forgery in Digital Image},
     journal = {Pattern Recognition, International Conference on},
     publisher = {IEEE Computer Society},
     year = {2006},
     volume = {4},
     pages = {746-749}}
    
  39. A.F. Martone, A.K. Mikkilineni & E.J. Delp
    Forensics of Things
    IEEE Southwest Symposium on Image Analysis and Interpretation
    2006, pp. 149-152
    BibTeX
    @inproceedings{Martone2006,
     author = {Martone, Anthony F. and Mikkilineni, Aravind K. and Delp, Edward J.},
     title = {Forensics of Things},
     booktitle = {IEEE Southwest Symposium on Image Analysis and Interpretation},
     year = {2006},
     pages = {149-152}}
    
  40. R. Neelamani, R. de Queiroz, Z. Fan, S. Dash & R.G. Baraniuk
    JPEG compression history estimation for color images
    IEEE Transactions on Image Processing, 2006, Vol. 15(6), pp. 1365-1378
    BibTeX
    @article{Neelamani2006,
     author = {Neelamani, R. and de Queiroz, R. and Fan, Zhigang and Dash, S. and Baraniuk, R. G.},
     title = {JPEG compression history estimation for color images},
     journal = {IEEE Transactions on Image Processing},
     year = {2006},
     volume = {15},
     number = {6},
     pages = {1365--1378}}
    
  41. T.-T. Ng & S.-F. Chang
    An Online System for Classifying Computer Graphics Images from Natural Photographs
    SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents
    2006
    BibTeX
    @inproceedings{Ng2006a,
     author = {Ng, Tian-Tsong and Chang, Shih-Fu},
     title = {An Online System for Classifying Computer Graphics Images from Natural Photographs},
     booktitle = {SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents},
     year = {2006}}
    
  42. T.-t. Ng, S.-f. Chang, C.-y. Lin & Q. Sun
    Passive-blind Image Forensics
    In Multimedia Security Technologies for Digital Rights
    2006
    BibTeX
    @inproceedings{Ng2006,
     author = {Ng, Tian-tsong and Chang, Shih-fu and Lin, Ching-yung and Sun, Qibin},
     title = {Passive-blind Image Forensics},
     booktitle = {In Multimedia Security Technologies for Digital Rights},
     year = {2006}}
    
  43. T.-T. Ng, S.-F. Chang, C.-Y. Lin & Q. Sun
    Multimedia Security Technologies for Digital Rights
    Chapter Passive-Blind Image Forensics
    Elsevier, 2006, pp. 383-412
    BibTeX
    @inbook{Ng2006b,
     author = {Ng, Tian-Tsong and Chang, Shih-Fu and Lin, Ching-Yung and Sun, Qibin},
     title = {Multimedia Security Technologies for Digital Rights},
     publisher = {Elsevier},
     year = {2006},
     pages = {383-412}}
    
  44. S. Prasad & K.R. Ramakrishnan
    On Resampling Detection and its Application to Detect Image Tampering
    Proc. IEEE International Conference on Multimedia and Expo
    2006, pp. 1325-1328
    BibTeX
    @inproceedings{Prasad2006,
     author = {Prasad, S. and Ramakrishnan, K. R.},
     title = {On Resampling Detection and its Application to Detect Image Tampering},
     booktitle = {Proc. IEEE International Conference on Multimedia and Expo},
     year = {2006},
     pages = {1325--1328}}
    
  45. A. Rocha & S. Goldenstein
    Is it Fake or Real?
    Brazilian Symposium of Computer Graphics and Image Processing
    2006
    BibTeX
    @inproceedings{Rocha2006,
     author = {Rocha, Anderson and Goldenstein, Siome},
     title = {Is it Fake or Real?},
     booktitle = {Brazilian Symposium of Computer Graphics and Image Processing},
     year = {2006}}
    
  46. C.K. San, E.Y. Lam & K.K.Y. Wong
    Automatic source camera identification using the intrinsic lens radial distortion
    Optics Express, 2006, Vol. 14(14), pp. 11551-11565
    BibTeX
    @article{San2006,
     author = {Choi Kai San and Lam, Edmund Y. and Wong, Kenneth K. Y.},
     title = {Automatic source camera identification using the intrinsic lens radial distortion},
     journal = {Optics Express},
     year = {2006},
     volume = {14},
     number = {14},
     pages = {11551-11565}}
    
  47. A. Swaminathan, M. Wu & K.J.R. Liu
    Image Tampering Identification using Blind Deconvolution
    Proc. IEEE Int Image Processing Conf
    2006, pp. 2309-2312
    BibTeX
    @inproceedings{Swaminathan2006,
     author = {Swaminathan, Ashwin and Min Wu and Liu, K. J. R.},
     title = {Image Tampering Identification using Blind Deconvolution},
     booktitle = {Proc. IEEE Int Image Processing Conf},
     year = {2006},
     pages = {2309--2312}}
    
  48. A. Swaminathan, M. Wu & K.J.R. Liu
    Non-Intrusive Forensic Analysis of Visual Sensors Using Output Images
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2008
    2006, Vol. 5
    BibTeX
    @inproceedings{Swaminathan2006a,
     author = {Swaminathan, Ashwin and Min Wu and Liu, K. J. R.},
     title = {Non-Intrusive Forensic Analysis of Visual Sensors Using Output Images},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2008},
     year = {2006},
     volume = {5}}
    
  49. A. Swaminathan, M. Wu & K.J.R. Liu
    Component Forensics of Digital Cameras: A Non-Intrusive Approach
    Proc. 40th Annual Conf. Information Sciences and Systems
    2006, pp. 1194-1199
    BibTeX
    @inproceedings{Swaminathan2006c,
     author = {Swaminathan, Ashwin and Wu, M. and Liu, K. J. R.},
     title = {Component Forensics of Digital Cameras: A Non-Intrusive Approach},
     booktitle = {Proc. 40th Annual Conf. Information Sciences and Systems},
     year = {2006},
     pages = {1194--1199}}
    
  50. M.-J. Tsai & G.-H. Wu
    Using Image Features to Identify Camera Sources
    IEEE International Conference on Acoustics, Speech, and Signal Processing
    2006, Vol. 2
    BibTeX
    @inproceedings{Tsai2006,
     author = {Tsai, Min-Jen and Wu, Guan-Hui},
     title = {Using Image Features to Identify Camera Sources},
     booktitle = {IEEE International Conference on Acoustics, Speech, and Signal Processing},
     year = {2006},
     volume = {2}}
    
  51. G. Wang, S. Wang, X. Gao & Y. Li
    Three dimensional reconstruction of structured scenes based on vanishing points
    Proceedings of the 7th Pacific Rim conference on Advances in Multimedia Information Processing
    Springer-Verlag, 2006, pp. 935-942
    BibTeX
    @inproceedings{Wang2006a,
     author = {Wang, Guanghui and Wang, Shewei and Gao, Xiang and Li, Yubing},
     title = {Three dimensional reconstruction of structured scenes based on vanishing points},
     booktitle = {Proceedings of the 7th Pacific Rim conference on Advances in Multimedia Information Processing},
     publisher = {Springer-Verlag},
     year = {2006},
     pages = {935--942}}
    
  52. W. Wang & H. Farid
    Exposing Digital Forgeries in Video by Detecting Double MPEG Compression
    ACM Multimedia and Security Workshop
    2006, pp. 37-47
    BibTeX
    @inproceedings{Wang2006d,
     author = {Wang, Weihong and Farid, Hany},
     title = {Exposing Digital Forgeries in Video by Detecting Double MPEG Compression},
     booktitle = {ACM Multimedia and Security Workshop},
     year = {2006},
     pages = {37-47}}
    
  53. Y. Wang & P. Moulin
    On Discrimination between Photorealistic and Photographic Images
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2006
    2006, Vol. 2, pp. II
    BibTeX
    @inproceedings{Wang2006,
     author = {Wang, Ying and Moulin, P.},
     title = {On Discrimination between Photorealistic and Photographic Images},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2006},
     year = {2006},
     volume = {2},
     pages = {II}}
    
  54. J. Wu, M.V. Kamath & S. Poehlman
    Detecting Differences Between Photographs and Computer Generated Images
    International Conference on Signal Processing, Pattern Recognition, and Applications
    2006, pp. 268-273
    BibTeX
    @inproceedings{Wu2006,
     author = {Wu, Jie and Kamath, Markad V. and Poehlman, Skip},
     title = {Detecting Differences Between Photographs and Computer Generated Images},
     booktitle = {International Conference on Signal Processing, Pattern Recognition, and Applications},
     year = {2006},
     pages = {268-273}}
    
  55. X.M. Zhu, G.R. Xuan, Q.M. Yao, X.F. Tong & Y.Q. Shi
    Resampling Detection in Information Forensics
    Journal of Computer Applications, 2006, Vol. 26(11), pp. 2596-2597
    BibTeX
    @article{Zhu2006,
     author = {Zhu, Xiu Ming and Xuan, Guo Rong and Yao, Qiu Ming and Tong, Xue Feng and Shi, Yun Qing},
     title = {Resampling Detection in Information Forensics},
     journal = {Journal of Computer Applications},
     year = {2006},
     volume = {26},
     number = {11},
     pages = {2596-2597}}
    


2005

  1. T. Acharya & A.K. Ray
    Image Processing
    Wiley-Interscience, 2005
    BibTeX
    @book{Acharya2005,
     author = {Acharya, Tinku and Ray, Ajoy K},
     title = {Image Processing},
     publisher = {Wiley-Interscience},
     year = {2005}}
    
  2. D. Aguilera, J. Lahoz & J. Codes
    A new method for vanishing points detection in 3d reconstruction from a single view
    Proceedings of the ISPRS Commission V, Citeseer, 2005, pp. 197-210
    BibTeX
    @article{Aguilera2005,
     author = {Aguilera, DG and Lahoz, J.G. and Codes, J.F.},
     title = {A new method for vanishing points detection in 3d reconstruction from a single view},
     journal = {Proceedings of the ISPRS Commission V},
     publisher = {Citeseer},
     year = {2005},
     pages = {197--210}}
    
  3. O. Arslan, R.M. Kumontoy, P.-J. Chiang, A.K. Mikkilineni, J.P. Allebach, G.T.-C. Chiu & E.J. Delp
    Identification of Inkjet Printers for Forensic Applications
    International Conference on Digital Printing Technologies
    2005, pp. 235-238
    BibTeX
    @inproceedings{Arslan2005,
     author = {Arslan, Osman and Kumontoy, Roy M. and Chiang, Pei-Ju and Mikkilineni, Aravind K. and Allebach, Jan P. and Chiu, George T.-C. and Delp, Edward J.},
     title = {Identification of Inkjet Printers for Forensic Applications},
     booktitle = {International Conference on Digital Printing Technologies},
     year = {2005},
     pages = {235-238}}
    
  4. S. Bayram, İ. Avcıbaş, B. Sankur & N. Memon
    Image manipulation detection with binary similarity measures
    Proc. European Signal Processing
    2005
    BibTeX
    @inproceedings{Bayram2005a,
     author = {Bayram, Sevinc and Avcıbaş, İsmail and Sankur, Bülent and Memon, Nasir},
     title = {Image manipulation detection with binary similarity measures},
     booktitle = {Proc. European Signal Processing},
     year = {2005}}
    
  5. S. Bayram, H. Sencar, N. Memon & I. Avcibas
    Source camera identification based on CFA interpolation
    Proc. IEEE International Conference on Image Processing ICIP 2005
    2005, Vol. 3, pp. III-69-72
    BibTeX
    @inproceedings{Bayram2005,
     author = {Bayram, S. and Sencar, H. and Memon, N. and Avcibas, I.},
     title = {Source camera identification based on CFA interpolation},
     booktitle = {Proc. IEEE International Conference on Image Processing ICIP 2005},
     year = {2005},
     volume = {3},
     pages = {III--69-72}}
    
  6. A. Buades, B. Coll & J.-M. Morel
    A non-local algorithm for image denoising
    Proc. IEEE Computer Society Conference on Computer Vision and Pattern Recognition CVPR 2005
    2005, Vol. 2, pp. 60-65 vol. 2
    BibTeX
    @inproceedings{Buades2005,
     author = {Buades, A. and Coll, B. and Morel, J.-M. },
     title = {A non-local algorithm for image denoising},
     booktitle = {Proc. IEEE Computer Society Conference on Computer Vision and Pattern Recognition CVPR 2005},
     year = {2005},
     volume = {2},
     pages = {60--65 vol. 2}}
    
  7. X. Cao & M. Shah
    Creating Realistic Shadows of Composited Objects
    Proc. Seventh IEEE Workshops Application of Computer Vision WACV/MOTIONS ´05 Volume 1
    2005, Vol. 1, pp. 294-299
    BibTeX
    @inproceedings{Cao2005,
     author = {Xiaochun Cao and Shah, M. },
     title = {Creating Realistic Shadows of Composited Objects},
     booktitle = {Proc. Seventh IEEE Workshops Application of Computer Vision WACV/MOTIONS ´05 Volume 1},
     year = {2005},
     volume = {1},
     pages = {294--299}}
    
  8. X. Cao & M. Shah
    Camera calibration and light source estimation from images with shadows
    Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition CVPR 2005
    2005, Vol. 2, pp. 918-923
    BibTeX
    @inproceedings{Cao2005a,
     author = {Xiaochun Cao and Shah, M.},
     title = {Camera calibration and light source estimation from images with shadows},
     booktitle = {Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition CVPR 2005},
     year = {2005},
     volume = {2},
     pages = {918--923}}
    
  9. F. Cutzu, R. Hammoud & A. Leykin
    Distinguishing paintings from photographs
    Computer Vision and Image Understanding, 2005, Vol. 100(3), pp. 249 - 273
    BibTeX
    @article{Cutzu2005,
     author = {Florin Cutzu and Riad Hammoud and Alex Leykin},
     title = {Distinguishing paintings from photographs},
     journal = {Computer Vision and Image Understanding},
     year = {2005},
     volume = {100},
     number = {3},
     pages = {249 - 273}}
    
  10. A.C. Gallagher
    Detection of linear and cubic interpolation in JPEG compressed images
    Proc. 2nd Canadian Conference on Computer and Robot Vision
    2005, pp. 65-72
    BibTeX
    @inproceedings{Gallagher2005,
     author = {Gallagher, A. C.},
     title = {Detection of linear and cubic interpolation in JPEG compressed images},
     booktitle = {Proc. 2nd Canadian Conference on Computer and Robot Vision},
     year = {2005},
     pages = {65--72}}
    
  11. R. Garnett, T. Huegerich, C. Chui & W. He
    A universal noise removal algorithm with an impulse detector
    IEEE Transactions on Image Processing, 2005, Vol. 14(11), pp. 1747-1754
    BibTeX
    @article{Garnett2005,
     author = {R. Garnett and Huegerich, T. and Chui, C. and Wenjie He},
     title = {A universal noise removal algorithm with an impulse detector},
     journal = {IEEE Transactions on Image Processing},
     year = {2005},
     volume = {14},
     number = {11},
     pages = {1747--1754}}
    
  12. T. Georgiev
    Image reconstruction invariant to relighting
    Eurographics 2005
    2005, pp. 61-64
    BibTeX
    @inproceedings{Georgiev2005,
     author = {Georgiev, Todor},
     title = {Image reconstruction invariant to relighting},
     booktitle = {Eurographics 2005},
     year = {2005},
     pages = {61--64}}
    
  13. T. Georgiev
    Vision, healing brush, and fiber bundles
    Proc. SPIE 5666, Human Vision and Electronic Imaging X
    2005, Vol. 293
    BibTeX
    @inproceedings{Georgiev2005a,
     author = {Todor Georgiev},
     title = {Vision, healing brush, and fiber bundles},
     booktitle = {Proc. SPIE 5666, Human Vision and Electronic Imaging X},
     year = {2005},
     volume = {293}}
    
  14. P.F. Gorder
    Digital detectives reveal art forgeries
    Computing in Science & Engineering, 2005, Vol. 7(2), pp. 5-8
    BibTeX
    @article{Gorder2005,
     author = {Gorder, P. F.},
     title = {Digital detectives reveal art forgeries},
     journal = {Computing in Science & Engineering},
     year = {2005},
     volume = {7},
     number = {2},
     pages = {5--8}}
    
  15. L. Grady, T. Schiwietz, S. Aharon, Imaging & R. Westermann
    Random walks for interactive alpha-matting
    IASTED International Conference on Visualization, Imaging and Image Processing - VIIP
    CiteSeerX - Scientific Literature Digital Library and Search Engine [http://citeseerx.ist.psu.edu/oai2] (United States), ACTA Press, 2005
    BibTeX
    @conference{Grady2005,
     author = {Leo Grady and Thomas Schiwietz and Shmuel Aharon and Imaging and Rüdiger Westermann},
     title = {Random walks for interactive alpha-matting},
     booktitle = {IASTED International Conference on Visualization, Imaging and Image Processing - VIIP},
     publisher = {ACTA Press},
     year = {2005}}
    
  16. D. Hoiem, A.A. Efros & M. Hebert
    Automatic photo pop-up
    ACM SIGGRAPH 2005 Papers
    ACM, 2005, pp. 577-584
    BibTeX
    @inproceedings{Hoiem2005,
     author = {Hoiem, Derek and Efros, Alexei A. and Hebert, Martial},
     title = {Automatic photo pop-up},
     booktitle = {ACM SIGGRAPH 2005 Papers},
     publisher = {ACM},
     year = {2005},
     pages = {577--584}}
    
  17. D.-Y. Hsiao
    Digital Image Tampering Synthesis and Identification
    -, 2005
    BibTeX
    @phdthesis{Hsiao2005,
     author = {Dun-Yu Hsiao},
     title = {Digital Image Tampering Synthesis and Identification},
     school = {-},
     year = {2005}}
    
  18. D.-Y. Hsiao & S.-C. Pei
    Detecting Digital Tampering by Blur Estimation
    International Workshop on Systematic Approaches to Digital Forensic Engineering
    2005, pp. 264-278
    BibTeX
    @inproceedings{Hsiao2005a,
     author = {Hsiao, Dun-Yu and Pei, Soo-Chang},
     title = {Detecting Digital Tampering by Blur Estimation},
     booktitle = {International Workshop on Systematic Approaches to Digital Forensic Engineering},
     year = {2005},
     pages = {264-278}}
    
  19. Y. Huang
    Can Digital Image Forgery Detection be Unevadable? A Case Study: Color Filter Array Interpolation Statistical Feature Recovery
    Li, S., Pereira, F., Shum, H.-Y. & Tescher, A. G. (ed.)
    SPIE Conference on Visual Communications and Image Processing
    2005, Vol. 5960
    BibTeX
    @inproceedings{Huang2005,
     author = {Huang, Yizhen},
     title = {Can Digital Image Forgery Detection be Unevadable? A Case Study: Color Filter Array Interpolation Statistical Feature Recovery},
     booktitle = {SPIE Conference on Visual Communications and Image Processing},
     year = {2005},
     volume = {5960}}
    
  20. M.K. Johnson & H. Farid
    Exposing Digital Forgeries by Detecting Inconsistencies in Lighting
    ACM Multimedia and Security Workshop
    2005, pp. 1-10
    BibTeX
    @inproceedings{Johnson2005,
     author = {Johnson, Micah Kimo and Farid, Hany},
     title = {Exposing Digital Forgeries by Detecting Inconsistencies in Lighting},
     booktitle = {ACM Multimedia and Security Workshop},
     year = {2005},
     pages = {1-10}}
    
  21. V. Kaufmann & R. Ladstädter
    Elimination of color fringes in digital photographs caused by lateral chromatic aberration
    Proceedings of the XX International Symposium CIPA
    2005, Vol. 26, pp. 403-408
    BibTeX
    @inproceedings{Kaufmann2005,
     author = {Kaufmann, Viktor and Ladstädter, Richard},
     title = {Elimination of color fringes in digital photographs caused by lateral chromatic aberration},
     booktitle = {Proceedings of the XX International Symposium CIPA},
     year = {2005},
     volume = {26},
     pages = {403--408}}
    
  22. P. Kellman & E.R. McVeigh
    Image reconstruction in SNR units: a general method for SNR measurement.
    Magn Reson Med, Laboratory of Cardiac Energetics, National Heart, Lung and Blood Institute, National Institutes of Health, DHHS, Bethesda, Maryland 20892-1061, USA. kellman@nih.gov, 2005, Vol. 54(6), pp. 1439-1447
    BibTeX
    @article{Kellman2005,
     author = {Peter Kellman and Elliot R McVeigh},
     title = {Image reconstruction in SNR units: a general method for SNR measurement.},
     journal = {Magn Reson Med},
     year = {2005},
     volume = {54},
     number = {6},
     pages = {1439--1447}}
    
  23. T. Kim & K.-S. Hong
    A practical single image based approach for estimating illumination distribution from shadows
    Proc. Tenth IEEE Int. Conf. Computer Vision ICCV 2005
    2005, Vol. 1, pp. 266-271
    BibTeX
    @inproceedings{Kim2005,
     author = {Taeone Kim and Ki-Sang Hong},
     title = {A practical single image based approach for estimating illumination distribution from shadows},
     booktitle = {Proc. Tenth IEEE Int. Conf. Computer Vision ICCV 2005},
     year = {2005},
     volume = {1},
     pages = {266--271}}
    
  24. S. Lin & L. Zhang
    Determining the radiometric response function from a single grayscale image
    Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition CVPR 2005
    2005, Vol. 2, pp. 66-73
    BibTeX
    @inproceedings{Lin2005a,
     author = {Lin, S. and Zhang, L.},
     title = {Determining the radiometric response function from a single grayscale image},
     booktitle = {Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition CVPR 2005},
     year = {2005},
     volume = {2},
     pages = {66--73}}
    
  25. Z. Lin, R. Wang, X. Tang & H.-Y. Shum
    Detecting Doctored Images Using Camera Response Normality and Consistency
    CVPR ´05: Proceedings of the 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR´05) - Volume 1
    IEEE Computer Society, 2005, pp. 1087-1092
    BibTeX
    @inproceedings{Lin2005,
     author = {Lin, Zhouchen and Wang, Rongrong and Tang, Xiaoou and Shum, Heung-Yeung},
     title = {Detecting Doctored Images Using Camera Response Normality and Consistency},
     booktitle = {CVPR ´05: Proceedings of the 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR´05) - Volume 1},
     publisher = {IEEE Computer Society},
     year = {2005},
     pages = {1087--1092}}
    
  26. R. Lukac, K.N. Plataniotis, D. Hatzinakos & M. Aleksic
    A new CFA interpolation framework
    Signal Processing, 2005, Vol. 86, pp. 1559-1579
    BibTeX
    @article{Lukac2005,
     author = {Lukac, Rastislav and Plataniotis, Konstantinos N. and Hatzinakos, Dimitrios and Aleksic, Marko},
     title = {A new CFA interpolation framework},
     journal = {Signal Processing},
     year = {2005},
     volume = {86},
     pages = {1559-1579}}
    
  27. J. Lukáš, J. Fridrich & M. Goljan
    Determining digital image origin using sensor imperfections
    Said, A. & Apostolopoulos, J. G. (ed.)
    Proceedings of the SPIE
    Image and Video Communications and Processing 2005, SPIE, 2005, Vol. 5685(1), pp. 249-260
    BibTeX
    @conference{Lukas2005a,
     author = {Jan Lukáš and Jessica Fridrich and Miroslav Goljan},
     title = {Determining digital image origin using sensor imperfections},
     booktitle = {Proceedings of the SPIE},
     journal = {Image and Video Communications and Processing 2005},
     publisher = {SPIE},
     year = {2005},
     volume = {5685},
     number = {1},
     pages = {249-260}}
    
  28. J. Lukáš, J. Fridrich & M. Goljan
    Digital "bullet scratches" for images
    Proc. IEEE International Conference on Image Processing ICIP 2005
    2005, Vol. 3, pp. III-65-8
    BibTeX
    @inproceedings{Lukas2005,
     author = {Jan Lukáš and Fridrich, J. and Goljan, M.},
     title = {Digital "bullet scratches" for images},
     booktitle = {Proc. IEEE International Conference on Image Processing ICIP 2005},
     year = {2005},
     volume = {3},
     pages = {III--65-8}}
    
  29. S. Lyu
    Natural Image Statistics for Digital Image Forensics
    Department of Computer Science, Dartmouth College, 2005
    BibTeX
    @phdthesis{Lyu2005a,
     author = {Lyu, Siwei},
     title = {Natural Image Statistics for Digital Image Forensics},
     school = {Department of Computer Science, Dartmouth College},
     year = {2005}}
    
  30. S. Lyu & H. Farid
    How Realistic is Photorealistic?
    IEEE Transactions on Signal Processing, 2005, Vol. 53(2), pp. 845-850
    BibTeX
    @article{Lyu2005,
     author = {Lyu, Siwei and Farid, Hany},
     title = {How Realistic is Photorealistic?},
     journal = {IEEE Transactions on Signal Processing},
     year = {2005},
     volume = {53},
     number = {2},
     pages = {845-850}}
    
  31. A.K. Mikkilineni, O. Arslan, P.-J. Chiang, R.M. Kumontoy, J.P. Allebach, G.T.-C. Chiu & E.J. Delp
    Printer Forensics Using SVM Techniques
    International Conference on Digital Printing Technologies
    2005, pp. 223-226
    BibTeX
    @inproceedings{Mikkilineni2005a,
     author = {Mikkilineni, Aravind K. and Arslan, Osman and Chiang, Pei-Ju and Kumontoy, Roy M. and Allebach, Jan P. and Chiu, George T.-C. and Delp, Edward J.},
     title = {Printer Forensics Using SVM Techniques},
     booktitle = {International Conference on Digital Printing Technologies},
     year = {2005},
     pages = {223-226}}
    
  32. A.K. Mikkilineni, P.-J. Chiang, G.N. Ali, G.T.C. Chiu, J.P. Allebach & E.J.D. III
    Printer identification based on graylevel co-occurrence features for security and forensic applications
    III, E. J. D. & Wong, P. W. (ed.)
    Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII
    Security, Steganography, and Watermarking of Multimedia Contents VII, SPIE, 2005, Vol. 5681(1), pp. 430-440
    BibTeX
    @conference{Mikkilineni2005,
     author = {Aravind K. Mikkilineni and Pei-Ju Chiang and Gazi N. Ali and George T. C. Chiu and Jan P. Allebach and Edward J. Delp III},
     title = {Printer identification based on graylevel co-occurrence features for security and forensic applications},
     booktitle = {Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII},
     journal = {Security, Steganography, and Watermarking of Multimedia Contents VII},
     publisher = {SPIE},
     year = {2005},
     volume = {5681},
     number = {1},
     pages = {430-440}}
    
  33. T.-T. Ng, S.-F. Chang, Y.-F. Hsu & M. Pepeljugoski
    Columbia Photographic Images and Photorealistic Computer Graphics Dataset
    ADVENT Technical Report, 203-2004-3, Columbia University, 2005
    BibTeX
    @techreport{Ng2005,
     author = {Ng, Tian-Tsong and Chang, Shih-Fu and Hsu, Yu-Feng and Pepeljugoski, Martin},
     title = {Columbia Photographic Images and Photorealistic Computer Graphics Dataset},
     year = {2005}}
    
  34. T.-T. Ng, S.-F. Chang, Y.-F. Hsu, L. Xie & M.-P. Tsui
    Physics-motivated Features for Distinguishing Photographic Images and Computer Graphics
    ACM Multimedia
    2005
    BibTeX
    @inproceedings{Ng2005a,
     author = {Ng, Tian-Tsong and Chang, Shih-Fu and Hsu, Yu-Feng and Xie, Lexing and Tsui, Mao-Pei},
     title = {Physics-motivated Features for Distinguishing Photographic Images and Computer Graphics},
     booktitle = {ACM Multimedia},
     year = {2005}}
    
  35. G. Peterson
    Forensic Analysis of Digital Image Tampering
    Advances in Digital Forensics, 2005, Vol. 194, pp. 259-270
    BibTeX
    @article{Peterson2005,
     author = {Peterson, Gilbert},
     title = {Forensic Analysis of Digital Image Tampering},
     journal = {Advances in Digital Forensics},
     year = {2005},
     volume = {194},
     pages = {259--270}}
    
  36. A.C. Popescu & H. Farid
    Statistical Tools for Digital Forensics
    Lecture Notes in Computer Science, 2005, Vol. 3200/2005, pp. 128-147
    BibTeX
    @article{Popescu2004a,
     author = {Popescu, Alin C. and Farid, Hany},
     title = {Statistical Tools for Digital Forensics},
     journal = {Lecture Notes in Computer Science},
     year = {2005},
     volume = {3200/2005},
     pages = {128-147}}
    
  37. A.C. Popescu & H. Farid
    Exposing digital forgeries in color filter array interpolated images
    IEEE Transactions on Signal Processing, 2005, Vol. 53(10), pp. 3948-3959
    BibTeX
    @article{Popescu2005,
     author = {Popescu, Alin C. and Farid, Hany},
     title = {Exposing digital forgeries in color filter array interpolated images},
     journal = {IEEE Transactions on Signal Processing},
     year = {2005},
     volume = {53},
     number = {10},
     pages = {3948--3959}}
    
  38. A.C. Popescu & H. Farid
    Exposing digital forgeries by detecting traces of resampling
    IEEE Transactions on Signal Processing, 2005, Vol. 53(2), pp. 758-767
    BibTeX
    @article{Popescu2005b,
     author = {Popescu, Alin C. and Farid, Hany},
     title = {Exposing digital forgeries by detecting traces of resampling},
     journal = {IEEE Transactions on Signal Processing},
     year = {2005},
     volume = {53},
     number = {2},
     pages = {758--767}}
    
  39. R. Puetter, T. Gosnell & A. Yahil
    Digital image reconstruction: Deblurring and denoising
    Annu. Rev. Astron. Astrophys., 2005, Vol. 43, pp. 139-94
    BibTeX
    @article{Puettner2005,
     author = {R.C. Puetter and T.R. Gosnell and Amos Yahil},
     title = {Digital image reconstruction: Deblurring and denoising},
     journal = {Annu. Rev. Astron. Astrophys.},
     year = {2005},
     volume = {43},
     pages = {139--94}}
    
  40. T. Rabie
    Robust estimation approach for blind denoising
    IEEE Transactions on Image Processing, 2005, Vol. 14(11), pp. 1755-1765
    BibTeX
    @article{Rabie2005,
     author = {Rabie, T.},
     title = {Robust estimation approach for blind denoising},
     journal = {IEEE Transactions on Image Processing},
     year = {2005},
     volume = {14},
     number = {11},
     pages = {1755--1765}}
    
  41. R. Samadani
    Characterizing and Estimating Block DCT Image Compression Quantization Parameters
    Proc. Conf Signals, Systems and Computers Record of the Thirty-Ninth Asilomar Conf
    2005, pp. 1230-1234
    BibTeX
    @inproceedings{Samadani2005,
     author = {Samadani, R.},
     title = {Characterizing and Estimating Block DCT Image Compression Quantization Parameters},
     booktitle = {Proc. Conf Signals, Systems and Computers Record of the Thirty-Ninth Asilomar Conf},
     year = {2005},
     pages = {1230--1234}}
    
  42. A.K.R. Voruganti
    Digital image tamper detection tools
    Forschungszentrum Karlsruhe, Germany, 2005
    BibTeX
    @mastersthesis{Voruganti2005,
     author = {Voruganti, Arun Kumar Raj},
     title = {Digital image tamper detection tools},
     school = {Forschungszentrum Karlsruhe, Germany},
     year = {2005}}
    
  43. G. Wang, Z. Hu, F. Wu & H.-T. Tsui
    Single view metrology from scene constraints
    Image Vision Comput., Butterworth-Heinemann, 2005, Vol. 23(9), pp. 831-840
    BibTeX
    @article{Wang2005,
     author = {Wang, Guanghui and Hu, Zhanyi and Wu, Fuchao and Tsui, Hung-Tat},
     title = {Single view metrology from scene constraints},
     journal = {Image Vision Comput.},
     publisher = {Butterworth-Heinemann},
     year = {2005},
     volume = {23},
     number = {9},
     pages = {831--840}}
    


2004

  1. G.N. Ali, P.-J. Chiang, A.K. Mikkilineni, G.T.-C. Chiu, E.J. Delp & J.P. Allebach
    Application of principal components analysis and gaussian mixture models to printer identification
    International Conference on Digital Printing Technologies
    2004, pp. 301-305
    BibTeX
    @inproceedings{Ali2004,
     author = {Ali, Gazi N. and Chiang, Pei-Ju and Mikkilineni, Aravind K. and Chiu, George T.-C. and Delp, Edward J. and Allebach, Jan P.},
     title = {Application of principal components analysis and gaussian mixture models to printer identification},
     booktitle = {International Conference on Digital Printing Technologies},
     year = {2004},
     pages = {301-305}}
    
  2. P. Alvarez
    Using Extended File Information (EXIF) File Headers in Digital Evidence Analysis
    International Journal of Digital Evidence, 2004, Vol. 2(3), pp. 1-5
    BibTeX
    @article{Alvarez2004,
     author = {Alvarez, Paul},
     title = {Using Extended File Information (EXIF) File Headers in Digital Evidence Analysis},
     journal = {International Journal of Digital Evidence},
     year = {2004},
     volume = {2},
     number = {3},
     pages = {1-5}}
    
  3. J.M.M. Antoni Buades, Bartomeu Coll
    On image denoising methods
    Technical Note, CMLA (Centre de Mathematiques et de Leurs Applications, 2004
    BibTeX
    @techreport{AntoniBuades2004,
     author = {Antoni Buades, Bartomeu Coll, Jean Michel Morel},
     title = {On image denoising methods},
     year = {2004}}
    
  4. I. Avcibas, S. Bayram, N. Memon, M. Ramkumar & B. Sankur
    A classifier design for detecting image manipulations
    Proc. International Conference on Image Processing ICIP ´04
    2004, Vol. 4, pp. 2645-2648 Vol. 4
    BibTeX
    @inproceedings{Avcibas2004,
     author = {Avcibas, I. and Bayram, S. and Memon, N. and Ramkumar, M. and Sankur, B.},
     title = {A classifier design for detecting image manipulations},
     booktitle = {Proc. International Conference on Image Processing ICIP ´04},
     year = {2004},
     volume = {4},
     pages = {2645--2648 Vol. 4}}
    
  5. Z. Bijhold, J.and Geradts & L. Klasen
    Forensic Imaging
    Proceedings of the 14 th International Forensic Science Symposium, Lyon
    2004
    BibTeX
    @inproceedings{Bijhold2004,
     author = {Bijhold, J.and Geradts,Z. and Klasen, L.},
     title = {Forensic Imaging},
     booktitle = {Proceedings of the 14 th International Forensic Science Symposium, Lyon},
     year = {2004}}
    
  6. H. Farid
    Creating and Detecting Doctored and Virtual Images: Implications to The Child Pornography Prevention Act
    Department of Computer Science, Dartmouth College, 2004(TR2004-518)
    BibTeX
    @techreport{Farid2004,
     author = {Farid, Hany},
     title = {Creating and Detecting Doctored and Virtual Images: Implications to The Child Pornography Prevention Act},
     year = {2004},
     number = {TR2004-518}}
    
  7. T. Georgiev
    Photoshop healing brush: a tool for seamless cloning
    2004
    BibTeX
    @misc{Georgiev2004,
     author = {Georgiev, Todor},
     title = {Photoshop healing brush: a tool for seamless cloning},
     year = {2004}}
    
  8. R.C. Gonzalez, R.E. Woods & S.L. Eddins
    Digital Image Processing Using MATLAB®
    Prentice Hall, 2004
    BibTeX
    @book{Gonzalez2004,
     author = {Gonzalez, Rafael C. and Woods, Richard E. and Eddins, Steven L.},
     title = {Digital Image Processing Using MATLAB®},
     publisher = {Prentice Hall},
     year = {2004}}
    
  9. M.D. Grossberg & S.K. Nayar
    Modeling the space of camera response functions
    IEEE Transactions on Pattern Analysis and Machine Intelligence, 2004, Vol. 26(10), pp. 1272-1282
    BibTeX
    @article{Grossberg2004a,
     author = {Grossberg, M. D. and Nayar, S. K.},
     title = {Modeling the space of camera response functions},
     journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence},
     year = {2004},
     volume = {26},
     number = {10},
     pages = {1272--1282}}
    
  10. Y. Ke, R. Sukthankar & L. Huston
    Efficient Near-Duplicate Detection and Sub-image Retrieval
    ACM International Conference on Multimedia
    2004, pp. 869-876
    BibTeX
    @inproceedings{Ke2004,
     author = {Ke, Yan and Sukthankar, Rahul and Huston, Larry},
     title = {Efficient Near-Duplicate Detection and Sub-image Retrieval},
     booktitle = {ACM International Conference on Multimedia},
     year = {2004},
     pages = {869-876}}
    
  11. Y. Ke, R. Sukthankar & L. Huston
    An efficient parts-based near-duplicate and sub-image retrieval system
    MULTIMEDIA ´04: Proceedings of the 12th annual ACM international conference on Multimedia
    ACM, 2004, pp. 869-876
    BibTeX
    @inproceedings{Ke2004a,
     author = {Ke, Yan and Sukthankar, Rahul and Huston, Larry},
     title = {An efficient parts-based near-duplicate and sub-image retrieval system},
     booktitle = {MULTIMEDIA ´04: Proceedings of the 12th annual ACM international conference on Multimedia},
     publisher = {ACM},
     year = {2004},
     pages = {869--876}}
    
  12. M. Kharrazi, H.T. Sencar & N. Memon
    Blind source camera identification
    Proc. International Conference on Image Processing ICIP ´04
    2004, Vol. 1, pp. 709-712
    BibTeX
    @inproceedings{Kharrazi2004,
     author = {Mehdi Kharrazi and Sencar, H. T. and Memon, N.},
     title = {Blind source camera identification},
     booktitle = {Proc. International Conference on Image Processing ICIP ´04},
     year = {2004},
     volume = {1},
     pages = {709--712}}
    
  13. D.G. Lowe
    Distinctive image features from scale-invariant keypoints
    International journal of computer vision, Springer, 2004, Vol. 60(2), pp. 91-110
    BibTeX
    @article{Lowe2004,
     author = {Lowe, David G},
     title = {Distinctive image features from scale-invariant keypoints},
     journal = {International journal of computer vision},
     publisher = {Springer},
     year = {2004},
     volume = {60},
     number = {2},
     pages = {91--110}}
    
  14. A.K. Mikkilineni, P.-J. Chiang, G.N. Ali, G.T.-C. Chiu, J.P. Allebach & E.J. Delp
    Printer Identification Based on Textural Features
    International Conference on Digital Printing Technologies
    2004, pp. 306-311
    BibTeX
    @inproceedings{Mikkilineni2004,
     author = {Mikkilineni, Aravind K. and Chiang, Pei-Ju and Ali, Gazi N. and Chiu, George T.-C. and Allebach, Jan P. and Delp, Edward J.},
     title = {Printer Identification Based on Textural Features},
     booktitle = {International Conference on Digital Printing Technologies},
     year = {2004},
     pages = {306-311}}
    
  15. T.-T. Ng & S.-F. Chang
    A model for image splicing
    Proc. International Conference on Image Processing ICIP ´04
    2004, Vol. 2, pp. 1169-1172
    BibTeX
    @inproceedings{Ng2004a,
     author = {Ng, T.-T. and Chang, S.-F.},
     title = {A model for image splicing},
     booktitle = {Proc. International Conference on Image Processing ICIP ´04},
     year = {2004},
     volume = {2},
     pages = {1169--1172}}
    
  16. T.-T. Ng & S.-F. Chang
    Blind Detection of Digital Photomontage using Higher Order Statistics
    Columbia University, 2004(201-2004-1)
    BibTeX
    @techreport{Ng2004b,
     author = {Tian-Tsong Ng and Shih-Fu Chang},
     title = {Blind Detection of Digital Photomontage using Higher Order Statistics},
     year = {2004},
     number = {201-2004-1}}
    
  17. T.-T. Ng & S.-F. Chang
    Classifying Photographic and Photorealistic Computer Graphic Images using Natural Image Statistics
    ADVENT Technical Report, 220-2006-6, Columbia University, 2004
    BibTeX
    @techreport{Ng2004c,
     author = {Ng, Tian-Tsong and Chang, Shih-Fu},
     title = {Classifying Photographic and Photorealistic Computer Graphic Images using Natural Image Statistics},
     year = {2004}}
    
  18. T.-T. Ng & S.-F. Chang
    A Data Set of Authentic and Spliced Image Blocks
    ADVENT Technical Report, 203-2004-3, Columbia University, 2004
    BibTeX
    @techreport{Ng2004d,
     author = {Ng, Tian-Tsong and Chang, Shih-Fu},
     title = {A Data Set of Authentic and Spliced Image Blocks},
     year = {2004}}
    
  19. T.-T. Ng, S.-F. Chang & Q. Sun
    Blind detection of photomontage using higher order statistics
    Proc. International Symposium on Circuits and Systems ISCAS ´04
    2004, Vol. 5, pp. V-688 - V-691
    BibTeX
    @inproceedings{Ng2004,
     author = {Tian-Tsong Ng and Shih-Fu Chang and Qibin Sun},
     title = {Blind detection of photomontage using higher order statistics},
     booktitle = {Proc. International Symposium on Circuits and Systems ISCAS ´04},
     year = {2004},
     volume = {5},
     pages = {V-688 -- V-691}}
    
  20. T.-T. Ng, S.-F. Chang & Q. Sun
    Blind Detection of Photomontage Using Higher Order Statistics
    International Symposium on Circuits and Systems
    2004, pp. 688 - 691
    BibTeX
    @inproceedings{Ng2004e,
     author = {Ng, Tian-Tsong and Chang, Shih-Fu and Sun, Qibin},
     title = {Blind Detection of Photomontage Using Higher Order Statistics},
     booktitle = {International Symposium on Circuits and Systems},
     year = {2004},
     pages = {688 -- 691}}
    
  21. K. Nishino & S.K. Nayar
    Eyes for relighting
    SIGGRAPH ´04: ACM SIGGRAPH 2004 Papers
    ACM, 2004, pp. 704-711
    BibTeX
    @inproceedings{Nishino2004,
     author = {Nishino, Ko and Nayar, Shree K.},
     title = {Eyes for relighting},
     booktitle = {SIGGRAPH ´04: ACM SIGGRAPH 2004 Papers},
     publisher = {ACM},
     year = {2004},
     pages = {704--711}}
    
  22. A.C. Popescu
    Statistical Tools for Digital Image Forensics
    Dartmouth College, 2004
    BibTeX
    @phdthesis{Popescu2004,
     author = {Popescu, Alin C.},
     title = {Statistical Tools for Digital Image Forensics},
     school = {Dartmouth College},
     year = {2004}}
    
  23. A.C. Popescu & H. Farid
    Exposing digital forgeries by detecting duplicated image regions
    Department of Computer Science Dartmouth College Hanover NH 03755, 2004(TR2004-515)
    BibTeX
    @techreport{Popescu2004b,
     author = {Popescu, Alin C. and Farid, Hany},
     title = {Exposing digital forgeries by detecting duplicated image regions},
     year = {2004},
     number = {TR2004-515}}
    
  24. J. Portilla
    Full blind denoising through noise covariance estimation using Gaussian scale mixtures in the wavelet domain
    Proc. International Conference on Image Processing ICIP ´04
    2004, Vol. 2, pp. 1217-1220 Vol.2
    BibTeX
    @inproceedings{Portilla2004,
     author = {Portilla, J.},
     title = {Full blind denoising through noise covariance estimation using Gaussian scale mixtures in the wavelet domain},
     booktitle = {Proc. International Conference on Image Processing ICIP ´04},
     year = {2004},
     volume = {2},
     pages = {1217--1220 Vol.2}}
    
  25. E. Rosendahl
    Von der Retusche zum Fake: Entwicklung, Methoden und Aspekte der Bildbearbeitung in der Pressefotografie
    Hochschule für Angewandte Wissenschaften Hamburg, GRIN Verlag, 2004
    BibTeX
    @mastersthesis{Rosendahl2004,
     author = {Rosendahl, E.},
     title = {Von der Retusche zum Fake: Entwicklung, Methoden und Aspekte der Bildbearbeitung in der Pressefotografie},
     publisher = {GRIN Verlag},
     school = {Hochschule für Angewandte Wissenschaften Hamburg},
     year = {2004}}
    
  26. M. Rossner & K.M. Yamada
    What´s in a picture? The temptation of image manipulation
    The Journal of Cell Biology, 2004, Vol. 166(1), pp. 11-15
    BibTeX
    @article{Rossner2004,
     author = {Rossner, Mike and Yamada, Kenneth M.},
     title = {What´s in a picture? The temptation of image manipulation},
     journal = {The Journal of Cell Biology},
     year = {2004},
     volume = {166},
     number = {1},
     pages = {11-15}}
    
  27. T. Soong
    Fundamentals of Probability and Statistics for Engineers
    Wiley-Interscience, 2004
    BibTeX
    @book{Soong2004,
     author = {Soong, T.T.},
     title = {Fundamentals of Probability and Statistics for Engineers},
     publisher = {Wiley-Interscience},
     year = {2004}}
    
  28. J. Sturak
    Forensic Analysis of Digital Image Tampering
    AIR FORCE INSTITUTE OF TECHNOLOGY, 2004
    BibTeX
    @mastersthesis{Sturak2004,
     author = {Sturak, JonathanR},
     title = {Forensic Analysis of Digital Image Tampering},
     school = {AIR FORCE INSTITUTE OF TECHNOLOGY},
     year = {2004}}
    
  29. J. Sun, J. Jia, C.-K. Tang & H.-Y. Shum
    Poisson matting
    SIGGRAPH ´04: ACM SIGGRAPH 2004 Papers
    ACM, 2004, pp. 315-321
    BibTeX
    @inproceedings{Sun2004,
     author = {Sun, Jian and Jia, Jiaya and Tang, Chi-Keung and Shum, Heung-Yeung},
     title = {Poisson matting},
     booktitle = {SIGGRAPH ´04: ACM SIGGRAPH 2004 Papers},
     publisher = {ACM},
     year = {2004},
     pages = {315--321}}
    
  30. A. Swaminathan, Y. Mao & M. Wu
    Image hashing resilient to geometric and filtering operations
    Proc. IEEE 6th Workshop Multimedia Signal Processing
    2004, pp. 355-358
    BibTeX
    @inproceedings{Swaminathan2004,
     author = {Swaminathan, Ashwin and Yinian Mao and Min Wu},
     title = {Image hashing resilient to geometric and filtering operations},
     booktitle = {Proc. IEEE 6th Workshop Multimedia Signal Processing},
     year = {2004},
     pages = {355--358}}
    
  31. G.-H. Wang, Z.-Y. Hu & F.-C. Wu
    Single view based measurement on space planes
    Journal of Computer Science and Technology, Science Press, 2004, Vol. 19, pp. 374-382
    BibTeX
    @article{Wang2004,
     author = {Wang, Guang-Hui and Hu, Zhan-Yi and Wu, Fu-Chao},
     title = {Single view based measurement on space planes},
     journal = {Journal of Computer Science and Technology},
     publisher = {Science Press},
     year = {2004},
     volume = {19},
     pages = {374-382}}
    


2003

  1. E.M. Brey, Z. Lalani, C. Johnston, M. Wong, L.V. McIntire, P.J. Duke & C.W. Patrick
    Automated selection of DAB-labeled tissue for immunohistochemical quantification.
    J Histochem Cytochem, Laboratory of Reparative Biology and Bioengineering, Department of Plastic Surgery, University of Texas M. D. Anderson Cancer Center and University of Texas Center for Biomedical Engineering, Houston 77030, USA., 2003, Vol. 51(5), pp. 575-584
    BibTeX
    @article{Brey2003,
     author = {Eric M Brey and Zahid Lalani and Carol Johnston and Mark Wong and Larry V McIntire and Pauline J Duke and Charles W Patrick},
     title = {Automated selection of DAB-labeled tissue for immunohistochemical quantification.},
     journal = {J Histochem Cytochem},
     year = {2003},
     volume = {51},
     number = {5},
     pages = {575--584}}
    
  2. Z. Fan & R. de Queiroz
    Identification of Bitmap Compression History: JPEG Detection and Quantizer Estimation
    IEEE Transactions on Image Processing, 2003, Vol. 12(2), pp. 230-235
    BibTeX
    @article{Fan2003,
     author = {Fan, Zhigang and de Queiroz, Ricardo},
     title = {Identification of Bitmap Compression History: JPEG Detection and Quantizer Estimation},
     journal = {IEEE Transactions on Image Processing},
     year = {2003},
     volume = {12},
     number = {2},
     pages = {230-235}}
    
  3. H. Farid & S. Lyu
    Higher-order Wavelet Statistics and their Application to Digital Forensics
    Proc. Conference on Computer Vision and Pattern Recognition Workshop CVPRW ´03
    2003, Vol. 8, pp. 94
    BibTeX
    @inproceedings{Farid2003,
     author = {Farid, Hany and Lyu, Siwei},
     title = {Higher-order Wavelet Statistics and their Application to Digital Forensics},
     booktitle = {Proc. Conference on Computer Vision and Pattern Recognition Workshop CVPRW ´03},
     year = {2003},
     volume = {8},
     pages = {94}}
    
  4. J. Fridrich, D. Soukal & J. Lukáš
    Detection of Copy Move Forgery in Digital Images
    Digital Forensic Research Workshop
    2003
    BibTeX
    @inproceedings{Fridrich2003,
     author = {Fridrich, Jessica and Soukal, David and Lukáš, Jan},
     title = {Detection of Copy Move Forgery in Digital Images},
     booktitle = {Digital Forensic Research Workshop},
     year = {2003}}
    
  5. M.D. Grossberg & S.K. Nayar
    What is the space of camera response functions?
    Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition
    2003, Vol. 2
    BibTeX
    @inproceedings{Grossberg2003,
     author = {Grossberg, M. D. and Nayar, S. K.},
     title = {What is the space of camera response functions?},
     booktitle = {Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition},
     year = {2003},
     volume = {2}}
    
  6. M.D. Grossberg & S.K. Nayar
    Determining the camera response from images: what is knowable?
    IEEE Transactions on Pattern Analysis and Machine Intelligence, 2003, Vol. 25(11), pp. 1455-1467
    BibTeX
    @article{Grossberg2003a,
     author = {Grossberg, M. D. and Nayar, S. K.},
     title = {Determining the camera response from images: what is knowable?},
     journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence},
     year = {2003},
     volume = {25},
     number = {11},
     pages = {1455--1467}}
    
  7. H.W. Hüttler & P. Rösgen
    Bilder, die lügen
    der Geschichte der Bundesrepublik Deutschland, S. H. (ed.)
    Bouvier Verlag Bonn, 2003
    BibTeX
    @book{Huettler2003,
     author = {Hüttler, Hans Walter and Rösgen, Petra},
     title = {Bilder, die lügen},
     publisher = {Bouvier Verlag Bonn},
     year = {2003}}
    
  8. K. Kurosawa & N. Saitoh
    Fundamental study on identification of CMOS cameras
    ur Rahman, Z., Schowengerdt, R. A. & Reichenbach, S. E. (ed.)
    Visual Information Processing XII
    Visual Information Processing XII, SPIE, 2003, Vol. 5108(1), pp. 202-209
    BibTeX
    @conference{Kurosawa2003,
     author = {Kenji Kurosawa and Naoki Saitoh},
     title = {Fundamental study on identification of CMOS cameras},
     booktitle = {Visual Information Processing XII},
     journal = {Visual Information Processing XII},
     publisher = {SPIE},
     year = {2003},
     volume = {5108},
     number = {1},
     pages = {202-209}}
    
  9. A. Leykin & F. Cutzu
    Differences of edge properties in photographs and paintings
    Proc. Int. Conf. Image Processing ICIP 2003
    2003, Vol. 3
    BibTeX
    @inproceedings{Leykin2003,
     author = {Leykin, A. and Cutzu, F. },
     title = {Differences of edge properties in photographs and paintings},
     booktitle = {Proc. Int. Conf. Image Processing ICIP 2003},
     year = {2003},
     volume = {3}}
    
  10. J. Lukáš & J. Fridrich
    Estimation of primary quantization matrix in double compressed jpeg images
    Proc. of DFRWS
    2003
    BibTeX
    @inproceedings{Lukas2003,
     author = {Jan Lukáš and Jessica Fridrich},
     title = {Estimation of primary quantization matrix in double compressed jpeg images},
     booktitle = {Proc. of DFRWS},
     year = {2003}}
    
  11. R. Neelamani, R. de Queiroz, Z. Fan & R. Baraniuk
    JPEG compression history estimation for color images
    Proc. International Conference on Image Processing ICIP 2003
    2003, Vol. 3, pp. III-245-8 vol.2
    BibTeX
    @inproceedings{Neelamani2003,
     author = {Neelamani, R. and de Queiroz, R. and Fan, Zhigang and Baraniuk, R.},
     title = {JPEG compression history estimation for color images},
     booktitle = {Proc. International Conference on Image Processing ICIP 2003},
     year = {2003},
     volume = {3},
     pages = {III--245-8 vol.2}}
    
  12. F. Sroubek & J. Flusser
    Multichannel blind iterative image restoration
    IEEE Transactions on Image Processing, 2003, Vol. 12(9), pp. 1094-1106
    BibTeX
    @article{Sroubek2003,
     author = {Sroubek, F. and Flusser, J.},
     title = {Multichannel blind iterative image restoration},
     journal = {IEEE Transactions on Image Processing},
     year = {2003},
     volume = {12},
     number = {9},
     pages = {1094--1106}}
    
  13. N. Tsumura, M.N. Dang, T. Makino & Y. Miyake
    Estimating the directions to light sources using images of eye for reconstructing 3D human face
    Department of Information and Image Sciences, Chiba University, 2003
    BibTeX
    @techreport{Tsumara2003,
     author = {Tsumura, Norimichi and Dang, Minh Nguyet and Makino, Takao and Miyake, Yoichi},
     title = {Estimating the directions to light sources using images of eye for reconstructing 3D human face},
     year = {2003}}
    


2002

  1. Y. Akao, K. Kobayashi, S. Sugawara & Y. Seki
    Discrimination of inkjet-printed counterfeits by spur marks and feature extraction by spatial frequency analysis
    SPIE Conference on Optical Security and Counterfeit Deterrence Techniques IV
    2002, pp. 129-137
    BibTeX
    @inproceedings{Akao2002,
     author = {Akao, Yoshinori and Kobayashi, Kazuhiko and Sugawara, Shigeru and Seki, Yoko},
     title = {Discrimination of inkjet-printed counterfeits by spur marks and feature extraction by spatial frequency analysis},
     booktitle = {SPIE Conference on Optical Security and Counterfeit Deterrence Techniques IV},
     year = {2002},
     pages = {129-137}}
    
  2. A. Cichocki & S. ichi Amari
    Adaptive Blind Signal and Image Processing
    Wiley-Interscience, 2002
    BibTeX
    @book{Cichocki2002,
     author = {Andrzej Cichocki and Shun-ichi Amari},
     title = {Adaptive Blind Signal and Image Processing},
     publisher = {Wiley-Interscience},
     year = {2002}}
    
  3. Z.J. Geradts, J. Bijhold, M. Kieft, K. Kurosawa, K. Kuroki & N. Saitoh
    Digital Camera Identification
    Journal of Forensic Identification, 2002, Vol. 52(5), pp. 621-631
    BibTeX
    @article{Geradts2002,
     author = {Geradts, Zeno J. and Bijhold, Jurrien and Kieft, Martijn and Kurosawa, Kenji and Kuroki, Kenro and Saitoh, Naoki},
     title = {Digital Camera Identification},
     journal = {Journal of Forensic Identification},
     year = {2002},
     volume = {52},
     number = {5},
     pages = {621-631}}
    
  4. B. Jähne
    Digital Image Processing
    Springer, 2002
    BibTeX
    @book{Jaehne2002,
     author = {Jähne, Bernd},
     title = {Digital Image Processing},
     publisher = {Springer},
     year = {2002},
     edition = {5}}
    
  5. K. Kuroki, K. Kurosawa & N. Saitoh
    An Approach to Individual Video Camera Identification
    Journal of Forensic Sciences, 2002, Vol. 47(1), pp. 97-102
    BibTeX
    @article{Kuroki2002,
     author = {Kuroki, Kenro and Kurosawa, Kenji and Saitoh, Naoki},
     title = {An Approach to Individual Video Camera Identification},
     journal = {Journal of Forensic Sciences},
     year = {2002},
     volume = {47},
     number = {1},
     pages = {97-102}}
    
  6. R. Ramanath, W. Snyder, G. Bilbro & W. Sander
    Demosaicking methods for Bayer color arrays
    Journal of Electronic imaging, International Society for Optics and Photonics, 2002, Vol. 11(3), pp. 306-315
    BibTeX
    @article{Ramanath2002,
     author = {Ramanath, R. and Snyder, W.E. and Bilbro, G.L. and Sander, W.A.},
     title = {Demosaicking methods for Bayer color arrays},
     journal = {Journal of Electronic imaging},
     publisher = {International Society for Optics and Photonics},
     year = {2002},
     volume = {11},
     number = {3},
     pages = {306--315}}
    
  7. N. Saitoh, K. Kurosawa, K. Kuroki, N. Akiba, Z.J. Geradts & J. Bijhold
    CCD Fingerprint Method for Digital Still Cameras
    SPIE Conference on Investigative Image Processing II
    2002, pp. 37-48
    BibTeX
    @inproceedings{Saitoh2002,
     author = {Saitoh, Naoki and Kurosawa, Kenji and Kuroki, Kenro and Akiba, Norimitsu and Geradts, Zeno J. and Bijhold, Jurrien},
     title = {CCD Fingerprint Method for Digital Still Cameras},
     booktitle = {SPIE Conference on Investigative Image Processing II},
     year = {2002},
     pages = {37-48}}
    
  8. R.R. Schultz
    Super-resolution enhancement of native digital video versus digitized NTSC sequences
    Proc. Fifth IEEE Southwest Symp. Image Analysis and Interpretation
    2002, pp. 193-197
    BibTeX
    @inproceedings{Schultz2002,
     author = {Schultz, R. R. },
     title = {Super-resolution enhancement of native digital video versus digitized NTSC sequences},
     booktitle = {Proc. Fifth IEEE Southwest Symp. Image Analysis and Interpretation},
     year = {2002},
     pages = {193--197}}
    
  9. D. Wolin
    Document Verification and Traceability Through Image Quality Analysis
    International Conference on Digital Printing Technologies
    2002, pp. 214-217
    BibTeX
    @inproceedings{Wolin2002,
     author = {Wolin, Dave},
     title = {Document Verification and Traceability Through Image Quality Analysis},
     booktitle = {International Conference on Digital Printing Technologies},
     year = {2002},
     pages = {214-217}}
    
  10. H.-C. Wu & C.-C. Chang
    Detection and restoration of tampered JPEG compressed images
    J. Syst. Softw., Elsevier Science Inc., 2002, Vol. 64(2), pp. 151-161
    BibTeX
    @article{Wu2002,
     author = {Wu, Hsien-Chu and Chang, Chin-Chen},
     title = {Detection and restoration of tampered JPEG compressed images},
     journal = {J. Syst. Softw.},
     publisher = {Elsevier Science Inc.},
     year = {2002},
     volume = {64},
     number = {2},
     pages = {151--161}}
    


2001

  1. D. Eastlake & P. Jones
    US Secure Hash Algorithm 1 (SHA1)
    Network Working Group, 2001(Request for Comments: 3174)
    BibTeX
    @standard{Eastlake2001,
     author = {D. Eastlake and P. Jones},
     title = {US Secure Hash Algorithm 1 (SHA1)},
     year = {2001},
     number = {Request for Comments: 3174}}
    
  2. H. Farid
    Blind inverse gamma correction
    IEEE Transactions on Image Processing, 2001, Vol. 10(10), pp. 1428-1433
    BibTeX
    @article{Farid2001,
     author = {Farid, H.},
     title = {Blind inverse gamma correction},
     journal = {IEEE Transactions on Image Processing},
     year = {2001},
     volume = {10},
     number = {10},
     pages = {1428--1433}}
    
  3. H. Farid & A.C. Popescu
    Blind removal of image non-linearities
    Proc. Eighth IEEE Int. Conf. Computer Vision ICCV 2001
    2001, Vol. 1, pp. 76-81
    BibTeX
    @inproceedings{Farid2001a,
     author = {Farid, Hany and Popescu, Alin C.},
     title = {Blind removal of image non-linearities},
     booktitle = {Proc. Eighth IEEE Int. Conf. Computer Vision ICCV 2001},
     year = {2001},
     volume = {1},
     pages = {76--81}}
    
  4. Z.J. Geradts, J. Bijhold, M. Kieft, K. Kurosawa, K. Kuroki & N. Saitoh
    Methods for Identification of Images Acquired with Digital Cameras
    Bramble, S. K., Carapezza, E. M. & Rudin, L. I. (ed.)
    SPIE Conference on Enabling Technologies for Law Enforcement and Security
    2001, Vol. 4232, pp. 505-512
    BibTeX
    @inproceedings{Geradts2001,
     author = {Geradts, Zeno J. and Bijhold, Jurrien and Kieft, Martijn and Kurosawa, Kenji and Kuroki, Kenro and Saitoh, Naoki},
     title = {Methods for Identification of Images Acquired with Digital Cameras},
     booktitle = {SPIE Conference on Enabling Technologies for Law Enforcement and Security},
     year = {2001},
     volume = {4232},
     pages = {505-512}}
    
  5. T. Kieu & D.T. Nguyen
    Surface fitting approach for reducing blocking artifacts in low bit-rate DCT decoded images
    Proc. IEEE Region 10 Int. Conf. TENCON Electrical and Electronic Technology
    2001, Vol. 1, pp. 23-27
    BibTeX
    @inproceedings{Kieu2001,
     author = {Kieu, T. and Nguyen, D. T. },
     title = {Surface fitting approach for reducing blocking artifacts in low bit-rate DCT decoded images},
     booktitle = {Proc. IEEE Region 10 Int. Conf. TENCON Electrical and Electronic Technology},
     year = {2001},
     volume = {1},
     pages = {23--27}}
    
  6. R. Kumar, H. Sawhney, S. Samarasekera, S. Hsu, H. Tao, Y. Guo, K. Hanna, A. Pope, R. Wildes, D. Hirvonen, M. Hansen & P. Burt
    Aerial video surveillance and exploitation
    Proceedings of the IEEE, 2001, Vol. 89(10), pp. 1518-1539
    BibTeX
    @article{Kumar2001,
     author = {Kumar, R. and Sawhney, H. and Samarasekera, S. and Hsu, S. and Hai Tao and Yanlin Guo and Hanna, K. and Pope, A. and Wildes, R. and Hirvonen, D. and Hansen, M. and Burt, P.},
     title = {Aerial video surveillance and exploitation},
     journal = {Proceedings of the IEEE},
     year = {2001},
     volume = {89},
     number = {10},
     pages = {1518--1539}}
    
  7. S. Mann & R. Mann
    Quantigraphic Imaging: Estimating the camera response and exposures from differently exposed images
    Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition CVPR 2001
    2001, Vol. 1
    BibTeX
    @inproceedings{Mann2001,
     author = {Mann, S. and Mann, R.},
     title = {Quantigraphic Imaging: Estimating the camera response and exposures from differently exposed images},
     booktitle = {Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition CVPR 2001},
     year = {2001},
     volume = {1}}
    
  8. E.H. Meijering, W.J. Niessen, M.A. Viergever & others
    Quantitative evaluation of convolution-based methods for medical image interpolation
    Medical Image Analysis, Elsevier Science, 2001, Vol. 5(2), pp. 111-126
    BibTeX
    @article{Meijering2001,
     author = {Meijering, Erik HW and Niessen, Wiro J and Viergever, Max A and others},
     title = {Quantitative evaluation of convolution-based methods for medical image interpolation},
     journal = {Medical Image Analysis},
     publisher = {Elsevier Science},
     year = {2001},
     volume = {5},
     number = {2},
     pages = {111--126}}
    
  9. P. Nillius & J.O. Eklundh
    Automatic estimation of the projected light source direction
    Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition CVPR 2001
    2001, Vol. 1
    BibTeX
    @inproceedings{Nillius2001,
     author = {Nillius, P. and Eklundh, J. O. },
     title = {Automatic estimation of the projected light source direction},
     booktitle = {Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition CVPR 2001},
     year = {2001},
     volume = {1}}
    
  10. C.-H. Tzeng & W.-H. Tsai
    A New Technique for Authentication of Image/Video for Multimedia Applications
    International Multimedia Conference on Multimedia and Security: New Challenges
    2001, pp. 23-26
    BibTeX
    @inproceedings{Tzeng2001,
     author = {Tzeng, Chih-Hsuan and Tsai, Wen-Hsiang},
     title = {A New Technique for Authentication of Image/Video for Multimedia Applications},
     booktitle = {International Multimedia Conference on Multimedia and Security: New Challenges},
     year = {2001},
     pages = {23-26}}
    


2000

  1. E.H. Adelson
    The New Cognitive Neurosciences
    Gazzaniga, M. S. (ed.)
    Chapter 24 Lightness Perception and Lightness Illusions
    The new cognitive neurosciences, MIT Press, 2000, pp. 339-351
    BibTeX
    @inbook{Adelson2000,
     author = {Adelson, Edward H.},
     title = {The New Cognitive Neurosciences},
     journal = {The new cognitive neurosciences},
     publisher = {MIT Press},
     year = {2000},
     pages = {339--351},
     edition = {2nd}}
    
  2. M. Desbrun, M. Meyer, P. Schröder & A.H. Barr
    Anisotropic feature-preserving denoising of height fields and bivariate data
    Graphics interface
    2000, Vol. 11(10), pp. 145-152
    BibTeX
    @inproceedings{Desbrun2000,
     author = {Desbrun, Mathieu and Meyer, Mark and Schröder, Peter and Barr, Alan H},
     title = {Anisotropic feature-preserving denoising of height fields and bivariate data},
     booktitle = {Graphics interface},
     year = {2000},
     volume = {11},
     number = {10},
     pages = {145--152}}
    
  3. Z. Fan & R. de Queiroz
    Maximum likelihood estimation of JPEG quantization table in the identification of bitmap compression history
    Proc. Int Image Processing Conf
    2000, Vol. 1, pp. 948-951
    BibTeX
    @inproceedings{Fan2000,
     author = {Zhigang Fan and de Queiroz, R.},
     title = {Maximum likelihood estimation of JPEG quantization table in the identification of bitmap compression history},
     booktitle = {Proc. Int Image Processing Conf},
     year = {2000},
     volume = {1},
     pages = {948--951}}
    
  4. E. Guillou, D. Meneveaux, E. Maisel & K. Bouatouch
    Using vanishing points for camera calibration and coarse 3D reconstruction from a single image
    The Visual Computer, Springer-Verlag, 2000, Vol. 16, pp. 396-410
    BibTeX
    @article{Guillou2000,
     author = {Guillou, E and Meneveaux, D. and Maisel, E. and Bouatouch, K.},
     title = {Using vanishing points for camera calibration and coarse 3D reconstruction from a single image},
     journal = {The Visual Computer},
     publisher = {Springer-Verlag},
     year = {2000},
     volume = {16},
     pages = {396-410}}
    
  5. R. Hartley & A. Zisserman
    Multiple view geometry in computer vision
    Cambridge Univ Press, 2000, Vol. 2
    BibTeX
    @book{Hartley2000,
     author = {Hartley, Richard. and Zisserman, Andrew},
     title = {Multiple view geometry in computer vision},
     publisher = {Cambridge Univ Press},
     year = {2000},
     volume = {2}}
    
  6. A. Hyvärinen & E. Oja
    Independent component analysis: algorithms and applications
    Neural Networks, 2000, Vol. 13(4-5), pp. 411 - 430
    BibTeX
    @article{Hyvaerinen2000,
     author = {A. Hyvärinen and E. Oja},
     title = {Independent component analysis: algorithms and applications},
     journal = {Neural Networks},
     year = {2000},
     volume = {13},
     number = {4-5},
     pages = {411 - 430}}
    
  7. ITU-T & ISO/IEC
    Information technology --JPEG 2000 image coding system: Core coding system Recommendation T.800
    ITU (International Telecommunication Union), 2000
    BibTeX
    @standard{ITUT2000,
     author = {ITU-T and ISO/IEC},
     title = {Information technology --JPEG 2000 image coding system: Core coding system Recommendation T.800},
     year = {2000}}
    
  8. J. Lukáš
    Digital Image Authentication Using Image Filtering Techniques
    Conference on Scientific Computing
    2000
    BibTeX
    @inproceedings{Lukas2000,
     author = {Lukáš, Jan},
     title = {Digital Image Authentication Using Image Filtering Techniques},
     booktitle = {Conference on Scientific Computing},
     year = {2000}}
    
  9. D.R. Pauluzzi & N.C. Beaulieu
    A comparison of SNR estimation techniques for the AWGN channel
    IEEE Transactions on Communications, 2000, Vol. 48(10), pp. 1681-1691
    BibTeX
    @article{Pauluzzi2000,
     author = {Pauluzzi, D. R. and Beaulieu, N. C.},
     title = {A comparison of SNR estimation techniques for the AWGN channel},
     journal = {IEEE Transactions on Communications},
     year = {2000},
     volume = {48},
     number = {10},
     pages = {1681--1691}}
    


1999

  1. D.A. Brugioni
    Photo Fakery: The History and Techniques of Photographic Deception and Manipulation
    Brassey´s, 1999
    BibTeX
    @book{Brugioni1999,
     author = {Brugioni, Dino A.},
     title = {Photo Fakery: The History and Techniques of Photographic Deception and Manipulation},
     publisher = {Brassey´s},
     year = {1999}}
    
  2. S. Chandra & C.S. Elli
    JPEG Compression Metric as a Quality Aware Image Transcoding
    Proceedings of USITS' 99: The 2nd USENIX Symposium on Internet Technologies & Systems
    1999
    BibTeX
    @inproceedings{Chandra1999,
     author = {Surendar Chandra and Carla Schlatter Elli},
     title = {JPEG Compression Metric as a Quality Aware Image Transcoding},
     booktitle = {Proceedings of USITS' 99: The 2nd USENIX Symposium on Internet Technologies & Systems},
     year = {1999}}
    
  3. A. Criminisi, I. Reid & A. Zisserman
    Single view metrology
    Proc. Seventh IEEE Int Computer Vision Conf. The
    1999, Vol. 1, pp. 434-441
    BibTeX
    @inproceedings{Criminisi1999,
     author = {Criminisi, A. and Reid, I. and Zisserman, A.},
     title = {Single view metrology},
     booktitle = {Proc. Seventh IEEE Int Computer Vision Conf. The},
     year = {1999},
     volume = {1},
     pages = {434--441}}
    
  4. H. Farid
    Detecting Digital Forgeries Using Bispectral Analysis
    AI Lab, Massachusetts Institute of Technology, 1999(AIM-1657)
    BibTeX
    @techreport{Farid1999,
     author = {Farid, Hany},
     title = {Detecting Digital Forgeries Using Bispectral Analysis},
     year = {1999},
     number = {AIM-1657}}
    
  5. M. Kivanc Mihcak, I. Kozintsev & K. Ramchandran
    Spatially adaptive statistical modeling of wavelet image coefficients and its application to denoising
    Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 1999
    1999, Vol. 6, pp. 3253-3256 vol.6
    BibTeX
    @inproceedings{KivancMihcak1999,
     author = {Kivanc Mihcak, M. and Kozintsev, I. and Ramchandran, K.},
     title = {Spatially adaptive statistical modeling of wavelet image coefficients and its application to denoising},
     booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 1999},
     year = {1999},
     volume = {6},
     pages = {3253--3256 vol.6}}
    
  6. M. Kivanc Mihcak, I. Kozintsev, K. Ramchandran & P. Moulin
    Low-complexity image denoising based on statistical modeling of wavelet coefficients
    IEEE Signal Processing Letters, 1999, Vol. 6(12), pp. 300-303
    BibTeX
    @article{KivancMihcak1999a,
     author = {Kivanc Mihcak, M. and Kozintsev, I. and Ramchandran, K. and Moulin, P.},
     title = {Low-complexity image denoising based on statistical modeling of wavelet coefficients},
     journal = {IEEE Signal Processing Letters},
     year = {1999},
     volume = {6},
     number = {12},
     pages = {300--303}}
    
  7. K. Kurosawa, K. Kuroki & N. Saitoh
    CCD fingerprint method-identification of a video camera from videotaped images
    Proc. Int. Conf. Image Processing ICIP 99
    1999, Vol. 3, pp. 537-540
    BibTeX
    @inproceedings{Kurosawa1999,
     author = {Kurosawa, K. and Kuroki, K. and Saitoh, N. },
     title = {CCD fingerprint method-identification of a video camera from videotaped images},
     booktitle = {Proc. Int. Conf. Image Processing ICIP 99},
     year = {1999},
     volume = {3},
     pages = {537--540}}
    
  8. K. Rank, M. Lendl & R. Unbehauen
    Estimation of image noise variance
    IEE Proceedings -Vision, Image and Signal Processing, 1999, Vol. 146(2), pp. 80-84
    BibTeX
    @article{Rank1999,
     author = {Rank, K. and Lendl, M. and Unbehauen, R. },
     title = {Estimation of image noise variance},
     journal = {IEE Proceedings -Vision, Image and Signal Processing},
     year = {1999},
     volume = {146},
     number = {2},
     pages = {80--84}}
    
  9. D.-G. Sim, O.-K. Kwon & R.-H. Park
    Object matching algorithms using robust Hausdorff distance measures
    IEEE Transactions on Image Processing, 1999, Vol. 8(3), pp. 425-429
    BibTeX
    @article{Sim1999,
     author = {Sim, Dong-Gyu and Kwon, Oh-Kyu and Park, Rae-Hong},
     title = {Object matching algorithms using robust Hausdorff distance measures},
     journal = {IEEE Transactions on Image Processing},
     year = {1999},
     volume = {8},
     number = {3},
     pages = {425--429}}
    


1998

  1. J. Adams, J.E.
    Design of practical color filter array interpolation algorithms for digital cameras .2
    Proc. International Conference on Image Processing ICIP 98
    1998, Vol. 1, pp. 488-492
    BibTeX
    @inproceedings{Adams1998,
     author = {Adams, J. E. , Jr.},
     title = {Design of practical color filter array interpolation algorithms for digital cameras .2},
     booktitle = {Proc. International Conference on Image Processing ICIP 98},
     year = {1998},
     volume = {1},
     pages = {488--492}}
    
  2. ITU-T & ISO/IEC
    Information Technology -- Digital Compression and Coding of Continuous-tone Still Images -- Requirements and Guidelines Recommendation T.87
    ITU (International Telecommunication Union), 1998
    BibTeX
    @standard{ITUT1998,
     author = {ITU-T and ISO/IEC},
     title = {Information Technology -- Digital Compression and Coding of Continuous-tone Still Images -- Requirements and Guidelines Recommendation T.87},
     year = {1998}}
    
  3. P. Thevenaz, U.E. Ruttimann & M. Unser
    A pyramid approach to subpixel registration based on intensity
    IEEE Transactions on Image Processing, 1998, Vol. 7(1), pp. 27-41
    BibTeX
    @article{Thevenaz1998,
     author = {Thevenaz, P. and Ruttimann, Urs E. and Unser, M.},
     title = {A pyramid approach to subpixel registration based on intensity},
     journal = {IEEE Transactions on Image Processing},
     year = {1998},
     volume = {7},
     number = {1},
     pages = {27--41}}
    


1997

  1. A. Jaubert
    Fotos, die lügen. Politik mit gefälschten Bildern (German Edition)
    Jaubert, A. (ed.)
    Hain Verlag, Bodenheim, 1997
    BibTeX
    @book{Jaubert1992,
     author = {Jaubert, Alain},
     title = {Fotos, die lügen. Politik mit gefälschten Bildern (German Edition)},
     publisher = {Hain Verlag, Bodenheim},
     year = {1997}}
    
  2. L. Kurz & M.H. Benteftifa
    Analysis of Variance in Statistical Image Processing
    Cambridge University Press, 1997
    BibTeX
    @book{Kurz1997,
     author = {Ludwik Kurz and M. Hafed Benteftifa},
     title = {Analysis of Variance in Statistical Image Processing},
     publisher = {Cambridge University Press},
     year = {1997}}
    


1996

  1. J. Immerkær
    Fast Noise Variance Estimation
    Computer Vision and Image Understanding, 1996, Vol. 64(2), pp. 300 - 302
    BibTeX
    @article{Immerkaer1996,
     author = {Immerkær, John},
     title = {Fast Noise Variance Estimation},
     journal = {Computer Vision and Image Understanding},
     year = {1996},
     volume = {64},
     number = {2},
     pages = {300 - 302}}
    
  2. E.P. Simoncelli & E.H. Adelson
    Noise removal via Bayesian wavelet coring
    Proc. Conf. Int Image Processing
    1996, Vol. 1, pp. 379-382
    BibTeX
    @inproceedings{Simoncelli1996,
     author = {Simoncelli, E. P. and Adelson, E. H.},
     title = {Noise removal via Bayesian wavelet coring},
     booktitle = {Proc. Conf. Int Image Processing},
     year = {1996},
     volume = {1},
     pages = {379--382}}
    
  3. E.P. Simoncelli & H. Farid
    Steerable wedge filters for local orientation analysis
    IEEE Trans. Image Processing, 1996, Vol. 5(9), pp. 1377-1382
    BibTeX
    @article{Simoncelli1996a,
     author = {Simoncelli, E. P. and Farid, Hany},
     title = {Steerable wedge filters for local orientation analysis},
     journal = {IEEE Trans. Image Processing},
     year = {1996},
     volume = {5},
     number = {9},
     pages = {1377--1382}}
    


1995

  1. C.A. Glasbey & G.W. Horgan
    Image Analysis for the Biological Sciences
    John Wiley & Sons, 1995
    BibTeX
    @book{Glasbey1995,
     author = {Glasbey, C. A. and Horgan, G. W.},
     title = {Image Analysis for the Biological Sciences},
     publisher = {John Wiley & Sons},
     year = {1995}}
    


1993

  1. D.P. Huttenlocher, G.A. Klanderman & W.J. Rucklidge
    Comparing images using the Hausdorff distance
    IEEE Transactions on Pattern Analysis and Machine Intelligence, 1993, Vol. 15(9), pp. 850-863
    BibTeX
    @article{Huttenlocher1993,
     author = {Huttenlocher, D. P. and Klanderman, G. A. and Rucklidge, W. J.},
     title = {Comparing images using the Hausdorff distance},
     journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence},
     year = {1993},
     volume = {15},
     number = {9},
     pages = {850--863}}
    
  2. D.P. Huttenlocher & W.J. Rucklidge
    A multi-resolution technique for comparing images using the Hausdorff distance
    Proc. CVPR ´93. IEEE Computer Society Conference on Computer Vision and Pattern Recognition
    1993, pp. 705-706
    BibTeX
    @inproceedings{Huttenlocher1993b,
     author = {Huttenlocher, D. P. and Rucklidge, W. J. },
     title = {A multi-resolution technique for comparing images using the Hausdorff distance},
     booktitle = {Proc. CVPR ´93. IEEE Computer Society Conference on Computer Vision and Pattern Recognition},
     year = {1993},
     pages = {705--706}}
    


1992

  1. Adobe Systems Incorporated
    TIFF
    Adobe Developers Association, 1992(6)
    BibTeX
    @standard{Adobe1992,
     author = {Adobe Systems Incorporated},
     title = {TIFF},
     year = {1992},
     number = {6}}
    
  2. T.E. Boult & G. Wolberg
    Correcting chromatic aberrations using image warping
    Proc. CVPR ´92. IEEE Computer Society Conf Computer Vision and Pattern Recognition
    1992, pp. 684-687
    BibTeX
    @inproceedings{Boult1992,
     author = {Boult, T. E. and Wolberg, G. },
     title = {Correcting chromatic aberrations using image warping},
     booktitle = {Proc. CVPR ´92. IEEE Computer Society Conf Computer Vision and Pattern Recognition},
     year = {1992},
     pages = {684--687}}
    
  3. E. Hamilton
    JPEG File Interchange Format
    C-Cube Microsystems, 1992(1)
    BibTeX
    @standard{Hamilton1992,
     author = {Eric Hamilton},
     title = {JPEG File Interchange Format},
     year = {1992},
     number = {1}}
    
  4. ITU-T & ISO/IEC
    Information Technology -- Digital Compression and Coding of Continuous-tone Still Images -- Requirements and Guidelines Recommendation T.81
    ITU (International Telecommunication Union), 1992
    BibTeX
    @standard{ITUT1992,
     author = {ITU-T and ISO/IEC},
     title = {Information Technology -- Digital Compression and Coding of Continuous-tone Still Images -- Requirements and Guidelines Recommendation T.81},
     year = {1992}}
    
  5. L.I. Rudin, S. Osher & E. Fatemi
    Nonlinear total variation based noise removal algorithms
    Physica D: Nonlinear Phenomena, 1992, Vol. 60(1-4), pp. 259 - 268
    BibTeX
    @article{Rudin1992,
     author = {Leonid I. Rudin and Stanley Osher and Emad Fatemi},
     title = {Nonlinear total variation based noise removal algorithms},
     journal = {Physica D: Nonlinear Phenomena},
     year = {1992},
     volume = {60},
     number = {1-4},
     pages = {259 - 268}}
    


1990

  1. P. Meer, J. Jolion & A. Rosenfeld
    A Fast Parallel Algorithm for Blind Estimation of Noise Variance
    IEEE Transactions on Pattern Analysis and Machine Intelligence, IEEE Computer Society, 1990, Vol. 12, pp. 216-223
    BibTeX
    @article{Meer1990,
     author = {P. Meer and J.M. Jolion and A. Rosenfeld},
     title = {A Fast Parallel Algorithm for Blind Estimation of Noise Variance},
     journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence},
     publisher = {IEEE Computer Society},
     year = {1990},
     volume = {12},
     pages = {216-223}}
    


1989

  1. A.K. Jain
    Fundamentals of Digital Image Processing
    Prentice Hall, 1989
    BibTeX
    @book{Jain1989,
     author = {Jain, Anil K.},
     title = {Fundamentals of Digital Image Processing},
     publisher = {Prentice Hall},
     year = {1989}}
    


1988

  1. A.K. Jain & R.C. Dubes
    Algorithms for Clustering Data
    Prentice Hall, 1988
    BibTeX
    @book{Jain1988,
     author = {Jain, Anil K. and Dubes, Richard C.},
     title = {Algorithms for Clustering Data},
     publisher = {Prentice Hall},
     year = {1988}}
    
  2. L.J. Van Vliet, I.T. Young & G.L. Beckers
    An edge detection model based on non-linear laplacefiltering
    Gelsema, E. & Kanal, L. (ed.)
    Pattern Recognition and Artificial Intelligence
    Pattern Recognition and Artificial Intelligence, Elsevier Science Publishers B.V. (North-Holland), 1988, pp. 63-73
    BibTeX
    @inproceedings{VanVliet1988,
     author = {Van Vliet, Lucas J. and Young, Ian T. and Beckers, Guus L.},
     title = {An edge detection model based on non-linear laplacefiltering},
     booktitle = {Pattern Recognition and Artificial Intelligence},
     journal = {Pattern Recognition and Artificial Intelligence},
     publisher = {Elsevier Science Publishers B.V. (North-Holland)},
     year = {1988},
     pages = {63-73}}
    


1976

  1. B.E. Bayer
    Color imaging array
    1976(3,971,065)
    BibTeX
    @patent{Bayer1976,
     author = {Bryce E. Bayer},
     title = {Color imaging array},
     year = {1976},
     number = {3,971,065}}