Literatur zur Digitalen Bildforensik
2019
-
Splicing Localization in Tampered Blurred Images
Proc. 4th Int. Conf. Pattern Recognition and Image Analysis (IPRIA)
2019, pp. 46-51
DOI: 10.1109/PRIA.2019.8785965
BibTeX@inproceedings{Abdosalehi2019, author = {Abdosalehi, S. and Mahmoodi-Aznaveh, A.}, title = {Splicing Localization in Tampered Blurred Images}, booktitle = {Proc. 4th Int. Conf. Pattern Recognition and Image Analysis (IPRIA)}, year = {2019}, pages = {46--51}}
-
Improved Blurred Image Splicing Localization with KNN Matting
Integrated Intelligent Computing, Communication and Security
Springer, 2019
DOI: 10.1007/978-981-10-8797-4_62
BibTeX@incollection{Abhijith2019, author = {Abhijith, P. S. and Simon, Philomina}, title = {Improved Blurred Image Splicing Localization with KNN Matting}, booktitle = {Integrated Intelligent Computing, Communication and Security}, publisher = {Springer}, year = {2019}}
-
Comparative Analysis of a Deep Convolutional Neural Network for Source Camera Identification
Proc. Safety and Sustainability (ICGS3) 2019 IEEE 12th Int. Conf. Global Security
2019, pp. 1-6
DOI: 10.1109/ICGS3.2019.8688260
BibTeX@inproceedings{Ahmed2019a, author = {Ahmed, F. and Khelifi, F. and Lawgalv, A. and Bouridane, A.}, title = {Comparative Analysis of a Deep Convolutional Neural Network for Source Camera Identification}, booktitle = {Proc. Safety and Sustainability (ICGS3) 2019 IEEE 12th Int. Conf. Global Security}, year = {2019}, pages = {1--6}}
-
Camera Model Identification using Deep CNN and Transfer Learning Approach
Proc. Int. Conf. Robotics,Electrical and Signal Processing Techniques (ICREST)
2019, pp. 626-630
DOI: 10.1109/ICREST.2019.8644194
BibTeX@inproceedings{AlBanna2019, author = {Al Banna, M. H. and Ali Haider, M. and Al Nahian, M. J. and Islam, M. M. and Taher, K. A. and Kaiser, M. S.}, title = {Camera Model Identification using Deep CNN and Transfer Learning Approach}, booktitle = {Proc. Int. Conf. Robotics,Electrical and Signal Processing Techniques (ICREST)}, year = {2019}, pages = {626--630}}
-
Face Verification and Recognition for Digital Forensics and Information Security
Proc. 7th Int. Symp. Digital Forensics and Security (ISDFS)
2019, pp. 1-6
DOI: 10.1109/ISDFS.2019.8757511
BibTeX@inproceedings{Amato2019, author = {Amato, G. and Falchi, F. and Gennaro, C. and Massoli, F. V. and Passalis, N. and Tefas, A. and Trivilini, A. and Vairo, C.}, title = {Face Verification and Recognition for Digital Forensics and Information Security}, booktitle = {Proc. 7th Int. Symp. Digital Forensics and Security (ISDFS)}, year = {2019}, pages = {1--6}}
-
Social Network Identification Through Image Classification With CNN
IEEE Access, 2019, Vol. 7, pp. 35264-35273
DOI: 10.1109/ACCESS.2019.2903876
BibTeX@article{Amerini2019, author = {Amerini, I. and Li, C. and Caldelli, R.}, title = {Social Network Identification Through Image Classification With CNN}, journal = {IEEE Access}, year = {2019}, volume = {7}, pages = {35264--35273}}
-
Leveraging Heterogeneous Data for Fake News Detection
Linking and Mining Heterogeneous and Multi-view Data
Springer, 2019
DOI: 10.1007/978-3-030-01872-6_10
BibTeX@incollection{Anoop2019, author = {Anoop, K. and Gangan, Manjary P. and Deepak, P. and Lajish, V. L.}, title = {Leveraging Heterogeneous Data for Fake News Detection}, booktitle = {Linking and Mining Heterogeneous and Multi-view Data}, publisher = {Springer}, year = {2019}}
-
Frauds in Online Social Networks: A Review
Social Networks and Surveillance for Society
Springer, 2019
DOI: 10.1007/978-3-319-78256-0_1
BibTeX@incollection{Apte2019, author = {Apte, Manoj and Palshikar, Girish Keshav and Baskaran, Sriram}, title = {Frauds in Online Social Networks: A Review}, booktitle = {Social Networks and Surveillance for Society}, publisher = {Springer}, year = {2019}}
-
Edge–texture feature-based image forgery detection with cross-dataset evaluation
Machine Vision and Applications, Springer, 2019, pp. 1
DOI: 10.1007/s00138-019-01048-2
BibTeX@article{Asghar2019, author = {Asghar, Khurshid and Sun, Xianfang and Rosin, Paul L. and Saddique, Mubbashar and Hussain, Muhammad and Habib, Zulfiqar}, title = {Edge–texture feature-based image forgery detection with cross-dataset evaluation}, journal = {Machine Vision and Applications}, publisher = {Springer}, year = {2019}, pages = {1}}
-
Hybrid LSTM and Encoder–Decoder Architecture for Detection of Image Forgeries
IEEE Transactions on Image Processing, 2019, Vol. 28(7), pp. 3286-3300
DOI: 10.1109/TIP.2019.2895466
BibTeX@article{Bappy2019, author = {Bappy, J. H. and Simons, C. and Nataraj, L. and Manjunath, B. S. and Roy-Chowdhury, A. K.}, title = {Hybrid LSTM and Encoder–Decoder Architecture for Detection of Image Forgeries}, journal = {IEEE Transactions on Image Processing}, year = {2019}, volume = {28}, number = {7}, pages = {3286--3300}}
-
On the Transferability of Adversarial Examples against CNN-based Image Forensics
Proc. Speech and Signal Processing (ICASSP) ICASSP 2019 - 2019 IEEE Int. Conf. Acoustics
2019, pp. 8286-8290
DOI: 10.1109/ICASSP.2019.8683772
BibTeX@inproceedings{Barni2019, author = {Barni, M. and Kallas, K. and Nowroozi, E. and Tondi, B.}, title = {On the Transferability of Adversarial Examples against CNN-based Image Forensics}, booktitle = {Proc. Speech and Signal Processing (ICASSP) ICASSP 2019 - 2019 IEEE Int. Conf. Acoustics}, year = {2019}, pages = {8286--8290}}
-
Splicing Detection and Localization In Satellite Imagery Using Conditional GANs
Proc. IEEE Conf. Multimedia Information Processing and Retrieval (MIPR)
2019, pp. 91-96
DOI: 10.1109/MIPR.2019.00024
BibTeX@inproceedings{Bartusiak2019, author = {Bartusiak, E. R. and Yarlagadda, S. K. and Güera, D. and Bestagini, P. and Tubaro, S. and Zhu, F. M. and Delp, E. J.}, title = {Splicing Detection and Localization In Satellite Imagery Using Conditional GANs}, booktitle = {Proc. IEEE Conf. Multimedia Information Processing and Retrieval (MIPR)}, year = {2019}, pages = {91--96}}
-
Source Camera Identification using Photo Response Noise Uniformity
Proc. Communication and Aerospace Technology (ICECA) 2019 3rd Int. conference Electronics
2019, pp. 731-734
DOI: 10.1109/ICECA.2019.8822212
BibTeX@inproceedings{Behare2019, author = {Behare, M. S. and Bhalchandra, A. S. and Kumar, R.}, title = {Source Camera Identification using Photo Response Noise Uniformity}, booktitle = {Proc. Communication and Aerospace Technology (ICECA) 2019 3rd Int. conference Electronics}, year = {2019}, pages = {731--734}}
-
Internet of Things Camera Identification Algorithm Based on Sensor Pattern Noise Using Color Filter Array and Wavelet Transform
Handbook of Big Data and IoT Security
Springer, 2019
DOI: 10.1007/978-3-030-10543-3_9
BibTeX@incollection{Bolouri2019, author = {Bolouri, Kimia and Azmoodeh, Amin and Dehghantanha, Ali and Firouzmand, Mohammad}, title = {Internet of Things Camera Identification Algorithm Based on Sensor Pattern Noise Using Color Filter Array and Wavelet Transform}, booktitle = {Handbook of Big Data and IoT Security}, publisher = {Springer}, year = {2019}}
-
Improving PRNU Compression Through Preprocessing, Quantization, and Coding
IEEE Transactions on Information Forensics and Security, 2019, Vol. 14(3), pp. 608-620
DOI: 10.1109/TIFS.2018.2859587
BibTeX@article{Bondi2019, author = {Bondi, L. and Bestagini, P. and Pérez-González, F. and Tubaro, S.}, title = {Improving PRNU Compression Through Preprocessing, Quantization, and Coding}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2019}, volume = {14}, number = {3}, pages = {608--620}}
-
Joint Correlation Measurements for PRNU-Based Source Identification
Computer Analysis of Images and Patterns, Springer, 2019
DOI: 10.1007/978-3-030-29891-3_22
BibTeX@article{Bruni2019, author = {Bruni, Vittoria and Salvi, Alessandra and Vitulano, Domenico}, title = {Joint Correlation Measurements for PRNU-Based Source Identification}, journal = {Computer Analysis of Images and Patterns}, publisher = {Springer}, year = {2019}}
-
Achieving efficient source camera identification on Hadoop
Multimedia Tools and Applications, Springer, 2019, pp. 1
DOI: 10.1007/s11042-019-7561-0
BibTeX@article{Cattaneo2019, author = {Cattaneo, Giuseppe and Ferraro Petrillo, Umberto and Abate, Andrea F. and Narducci, Fabio and Barra, Silvio}, title = {Achieving efficient source camera identification on Hadoop}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2019}, pages = {1}}
-
Analyzing Modern Camera Response Functions
Proc. IEEE Winter Conf. Applications of Computer Vision (WACV)
2019, pp. 1961-1969
DOI: 10.1109/WACV.2019.00213
BibTeX@inproceedings{Chen2019a, author = {Chen, C. and Mccloskey, S. and Yu, J.}, title = {Analyzing Modern Camera Response Functions}, booktitle = {Proc. IEEE Winter Conf. Applications of Computer Vision (WACV)}, year = {2019}, pages = {1961--1969}}
-
A Fast and Efficient Method for Image Splicing Localization Using BM3D Noise Estimation
Integrated Intelligent Computing, Communication and Security
Springer, 2019
DOI: 10.1007/978-981-10-8797-4_65
BibTeX@incollection{Das2019, author = {Das, Aswathy M. and Aji, S.}, title = {A Fast and Efficient Method for Image Splicing Localization Using BM3D Noise Estimation}, booktitle = {Integrated Intelligent Computing, Communication and Security}, publisher = {Springer}, year = {2019}}
-
On the Detection of GAN-Based Face Morphs Using Established Morph Detectors
Image Analysis and Processing – ICIAP 2019, Springer, 2019
DOI: 10.1007/978-3-030-30645-8_32
BibTeX@article{Debiasi2019a, author = {Debiasi, Luca and Damer, Naser and Saladié, Alexandra Moseguí and Rathgeb, Christian and Scherhag, Ulrich and Busch, Christoph and Kirchbuchner, Florian and Uhl, Andreas}, title = {On the Detection of GAN-Based Face Morphs Using Established Morph Detectors}, journal = {Image Analysis and Processing – ICIAP 2019}, publisher = {Springer}, year = {2019}}
-
Blind Source Camera Clustering of Criminal Case Data
Proc. 7th Int. Workshop Biometrics and Forensics (IWBF)
2019, pp. 1-6
DOI: 10.1109/IWBF.2019.8739171
BibTeX@inproceedings{Debiasi2019, author = {Debiasi, L. and Leitet, E. and Norell, K. and Tachos, T. and Uhl, A.}, title = {Blind Source Camera Clustering of Criminal Case Data}, booktitle = {Proc. 7th Int. Workshop Biometrics and Forensics (IWBF)}, year = {2019}, pages = {1--6}}
-
Improving Robustness of Image Tampering Detection for Compression
MultiMedia Modeling, Springer, 2019
DOI: 10.1007/978-3-030-05710-7_32
BibTeX@article{Diallo2019, author = {Diallo, Boubacar and Urruty, Thierry and Bourdon, Pascal and Fernandez-Maloigne, Christine}, title = {Improving Robustness of Image Tampering Detection for Compression}, journal = {MultiMedia Modeling}, publisher = {Springer}, year = {2019}}
-
Real-time estimation for the parameters of Gaussian filtering via deep learning
Journal of Real-Time Image Processing, Springer, 2019, pp. 1
DOI: 10.1007/s11554-019-00907-5
BibTeX@article{Ding2019a, author = {Ding, Feng and Shi, Yuxi and Zhu, Guopu and Shi, Yun-qing}, title = {Real-time estimation for the parameters of Gaussian filtering via deep learning}, journal = {Journal of Real-Time Image Processing}, publisher = {Springer}, year = {2019}, pages = {1}}
-
Camera Identification Based on Domain Knowledge-Driven Deep Multi-Task Learning
#IEEE_O_ACC#, 2019, Vol. 7, pp. 25878-25890
DOI: 10.1109/ACCESS.2019.2897360
BibTeX@article{Ding2019, author = {Ding, X. and Chen, Y. and Tang, Z. and Huang, Y.}, title = {Camera Identification Based on Domain Knowledge-Driven Deep Multi-Task Learning}, journal = {#IEEE_O_ACC#}, year = {2019}, volume = {7}, pages = {25878--25890}}
-
A Review of Passive Image Cloning Detection Approaches
Proceedings of 2nd International Conference on Communication, Computing and Networking
Springer, 2019
DOI: 10.1007/978-981-13-1217-5_46
BibTeX@incollection{Doegar2019, author = {Doegar, Amit and Dutta, Maitreyee and Kumar, Gaurav}, title = {A Review of Passive Image Cloning Detection Approaches}, booktitle = {Proceedings of 2nd International Conference on Communication, Computing and Networking}, publisher = {Springer}, year = {2019}}
-
A probabilistic framework for copy-move forgery detection based on Markov Random Field
Multimedia Tools and Applications, Springer, 2019, Vol. 78(18), pp. 25591
DOI: 10.1007/s11042-019-7713-2
BibTeX@article{Elhaminia2019, author = {Elhaminia, Behnaz and Harati, Ahad and Taherinia, Amirhossein}, title = {A probabilistic framework for copy-move forgery detection based on Markov Random Field}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2019}, volume = {78}, number = {18}, pages = {25591}}
-
New and efficient blind detection algorithm for digital image forgery using homomorphic image processing
Multimedia Tools and Applications, Springer, 2019, Vol. 78(15), pp. 21585
DOI: 10.1007/s11042-019-7206-3
BibTeX@article{Elsharkawy2019, author = {Elsharkawy, Zeinab F. and Abdelwahab, Safey A. S. and Abd El-Samie, Fathi E. and Dessouky, Moawad and Elaraby, Sayed}, title = {New and efficient blind detection algorithm for digital image forgery using homomorphic image processing}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2019}, volume = {78}, number = {15}, pages = {21585}}
-
Robust detection of median filtering based on combined features of difference image
Signal Processing: Image Communication, Elsevier BV, 2019, Vol. 72, pp. 126-133
DOI: 10.1016/j.image.2018.12.014
BibTeX@article{Gao2019, author = {Gao, Hang and Hu, Mengting and Gao, Tiegang and Cheng, Renhong}, title = {Robust detection of median filtering based on combined features of difference image}, journal = {Signal Processing: Image Communication}, publisher = {Elsevier BV}, year = {2019}, volume = {72}, pages = {126--133}}
-
MFC Datasets: Large-Scale Benchmark Datasets for Media Forensic Challenge Evaluation
Proc. IEEE Winter Applications of Computer Vision Workshops (WACVW)
2019, pp. 63-72
DOI: 10.1109/WACVW.2019.00018
BibTeX@inproceedings{Guan2019, author = {Guan, H. and Kozak, M. and Robertson, E. and Lee, Y. and Yates, A. N. and Delgado, A. and Zhou, D. and Kheyrkhah, T. and Smith, J. and Fiscus, J.}, title = {MFC Datasets: Large-Scale Benchmark Datasets for Media Forensic Challenge Evaluation}, booktitle = {Proc. IEEE Winter Applications of Computer Vision Workshops (WACVW)}, year = {2019}, pages = {63--72}}
-
Detecting Image Forgery in Single-Sensor Multispectral Images
Soft Computing for Problem Solving
Springer, 2019
DOI: 10.1007/978-981-13-1592-3_67
BibTeX@incollection{Gupta2019, author = {Gupta, Mridul and Goyal, Puneet}, title = {Detecting Image Forgery in Single-Sensor Multispectral Images}, booktitle = {Soft Computing for Problem Solving}, publisher = {Springer}, year = {2019}}
-
Towards Learned Color Representations for Image Splicing Detection
Proc. Speech and Signal Processing (ICASSP) ICASSP 2019 - 2019 IEEE Int. Conf. Acoustics
2019, pp. 8281-8285
DOI: 10.1109/ICASSP.2019.8682246
BibTeX@inproceedings{Hadwiger2019, author = {Hadwiger, B. and Baracchi, D. and Piva, A. and Riess, C.}, title = {Towards Learned Color Representations for Image Splicing Detection}, booktitle = {Proc. Speech and Signal Processing (ICASSP) ICASSP 2019 - 2019 IEEE Int. Conf. Acoustics}, year = {2019}, pages = {8281--8285}}
-
Detection of Fake Images Via The Ensemble of Deep Representations from Multi Color Spaces
Proc. IEEE Int. Conf. Image Processing (ICIP)
2019, pp. 2299-2303
DOI: 10.1109/ICIP.2019.8803740
BibTeX@inproceedings{He2019, author = {He, P. and Li, H. and Wang, H.}, title = {Detection of Fake Images Via The Ensemble of Deep Representations from Multi Color Spaces}, booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)}, year = {2019}, pages = {2299--2303}}
-
A Video Camera Model Identification System Using Deep Learning and Fusion
Proc. Speech and Signal Processing (ICASSP) ICASSP 2019 - 2019 IEEE Int. Conf. Acoustics
2019, pp. 8271-8275
DOI: 10.1109/ICASSP.2019.8682608
BibTeX@inproceedings{Hosler2019, author = {Hosler, B. and Mayer, O. and Bayar, B. and Zhao, X. and Chen, C. and Shackleford, J. A. and Stamm, M. C.}, title = {A Video Camera Model Identification System Using Deep Learning and Fusion}, booktitle = {Proc. Speech and Signal Processing (ICASSP) ICASSP 2019 - 2019 IEEE Int. Conf. Acoustics}, year = {2019}, pages = {8271--8275}}
-
The Video Authentication and Camera Identification Database: A New Database for Video Forensics
IEEE Access, 2019, Vol. 7, pp. 76937-76948
DOI: 10.1109/ACCESS.2019.2922145
BibTeX@article{Hosler2019a, author = {Hosler, B. C. and Zhao, X. and Mayer, O. and Chen, C. and Shackleford, J. A. and Stamm, M. C.}, title = {The Video Authentication and Camera Identification Database: A New Database for Video Forensics}, journal = {IEEE Access}, year = {2019}, volume = {7}, pages = {76937--76948}}
-
Unsupervised Image Manipulation Localization With Non-Binary Label Attribution
IEEE Signal Processing Letters, 2019, Vol. 26(7), pp. 976-980
DOI: 10.1109/LSP.2019.2913530
BibTeX@article{Hosseini2019, author = {Hosseini, M. D. M. and Kirchner, M.}, title = {Unsupervised Image Manipulation Localization With Non-Binary Label Attribution}, journal = {IEEE Signal Processing Letters}, year = {2019}, volume = {26}, number = {7}, pages = {976--980}}
-
Copy-Move Forgery Detection Using Shift-Invariant SWT and Block Division Mean Features
Recent Trends in Communication, Computing, and Electronics
Springer, 2019
DOI: 10.1007/978-981-13-2685-1_28
BibTeX@incollection{Jaiswal2019, author = {Jaiswal, Ankit Kumar and Srivastava, Rajeev}, title = {Copy-Move Forgery Detection Using Shift-Invariant SWT and Block Division Mean Features}, booktitle = {Recent Trends in Communication, Computing, and Electronics}, publisher = {Springer}, year = {2019}}
-
A Prnu-Based Method to Expose Video Device Compositions in Open-Set Setups
Proc. IEEE Int. Conf. Image Processing (ICIP)
2019, pp. 96-100
DOI: 10.1109/ICIP.2019.8802981
BibTeX@inproceedings{Junior2019, author = {Júnior, P. R. M. and Bondi, L. and Bestagini, P. and Rocha, A. and Tubaro, S.}, title = {A Prnu-Based Method to Expose Video Device Compositions in Open-Set Setups}, booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)}, year = {2019}, pages = {96--100}}
-
An In-Depth Study on Open-Set Camera Model Identification
IEEE Access, 2019, pp. 1
DOI: 10.1109/ACCESS.2019.2921436
BibTeX@article{Junior2019b, author = {Júnior, P. R. M. and Bondi, L. and Bestagini, P. and Tubaro, S. and Rocha, A.}, title = {An In-Depth Study on Open-Set Camera Model Identification}, journal = {IEEE Access}, year = {2019}, pages = {1}}
-
Detection of Digital Image Forgery using Fast Fourier Transform and Local Features
Proc. Computational and Technology Management (ICACTM) 2019 Int. Conf. Automation
2019, pp. 262-267
DOI: 10.1109/ICACTM.2019.8776709
BibTeX@inproceedings{Kanwal2019, author = {Kanwal, N. and Girdhar, A. and Kaur, L. and Bhullar, J. S.}, title = {Detection of Digital Image Forgery using Fast Fourier Transform and Local Features}, booktitle = {Proc. Computational and Technology Management (ICACTM) 2019 Int. Conf. Automation}, year = {2019}, pages = {262--267}}
-
Digital Forensics: Focusing on Image Forensics
Proc. 7th Int. Symp. Digital Forensics and Security (ISDFS)
2019, pp. 1-5
DOI: 10.1109/ISDFS.2019.8757557
BibTeX@inproceedings{Khalaf2019, author = {Khalaf, R. S. and Varol, A.}, title = {Digital Forensics: Focusing on Image Forensics}, booktitle = {Proc. 7th Int. Symp. Digital Forensics and Security (ISDFS)}, year = {2019}, pages = {1--5}}
-
Method of Forensic Research on Image for Finding Touch up on the Basis of Noise Entropy
Proc. 3rd Int. Conf. Advanced Information and Communications Technologies (AICT)
2019, pp. 76-79
DOI: 10.1109/AIACT.2019.8847760
BibTeX@inproceedings{Kliuiev2019, author = {Kliuiev, O. and Mozhaiev, M. and Uhrovetskyi, O. and Mozhaiev, O. and Simakova-Yefremian, E.}, title = {Method of Forensic Research on Image for Finding Touch up on the Basis of Noise Entropy}, booktitle = {Proc. 3rd Int. Conf. Advanced Information and Communications Technologies (AICT)}, year = {2019}, pages = {76--79}}
-
Markov Feature Extraction Using Enhanced Threshold Method for Image Splicing Forgery Detection
Smart Innovations in Communication and Computational Sciences
Springer, 2019
DOI: 10.1007/978-981-10-8971-8_2
BibTeX@incollection{Kumar2019, author = {Kumar, Avinash and Prakash, Choudhary Shyam and Maheshkar, Sushila and Maheshkar, Vikas}, title = {Markov Feature Extraction Using Enhanced Threshold Method for Image Splicing Forgery Detection}, booktitle = {Smart Innovations in Communication and Computational Sciences}, publisher = {Springer}, year = {2019}}
-
Region duplication detection based on hybrid feature and evaluative clustering
Multimedia Tools and Applications, Springer, 2019, Vol. 78(15), pp. 20739
DOI: 10.1007/s11042-019-7342-9
BibTeX@article{Lin2019, author = {Lin, Cong and Lu, Wei and Huang, Xinchao and Liu, Ke and Sun, Wei and Lin, Hanhui}, title = {Region duplication detection based on hybrid feature and evaluative clustering}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2019}, volume = {78}, number = {15}, pages = {20739}}
-
Copy move forgery detection based on keypoint and patch match
Multimedia Tools and Applications, Springer, 2019, pp. 1
DOI: 10.1007/s11042-019-07930-5
BibTeX@article{Liu2019e, author = {Liu, Ke and Lu, Wei and Lin, Cong and Huang, Xinchao and Liu, Xianjin and Yeung, Yuileong and Xue, Yingjie}, title = {Copy move forgery detection based on keypoint and patch match}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2019}, pages = {1}}
-
Downscaling Factor Estimation on Pre-JPEG Compressed Images
IEEE Transactions on Circuits and Systems for Video Technology, 2019, pp. 1
DOI: 10.1109/TCSVT.2019.2893353
BibTeX@article{Liu2019, author = {Liu, X. and Lu, W. and Zhang, Q. and Huang, J. and Shi, Y.}, title = {Downscaling Factor Estimation on Pre-JPEG Compressed Images}, journal = {IEEE Transactions on Circuits and Systems for Video Technology}, year = {2019}, pages = {1}}
-
A passive forensic scheme for copy-move forgery based on superpixel segmentation and K-means clustering
Multimedia Tools and Applications, Springer, 2019, pp. 1
DOI: 10.1007/s11042-019-08044-8
BibTeX@article{Liu2019c, author = {Liu, Yong and Wang, Hongxia and Chen, Yi and Wu, Hanzhou and Wang, Huan}, title = {A passive forensic scheme for copy-move forgery based on superpixel segmentation and K-means clustering}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2019}, pages = {1}}
-
Adversarial Learning for Constrained Image Splicing Detection and Localization Based on Atrous Convolution
IEEE Transactions on Information Forensics and Security, 2019, Vol. 14(10), pp. 2551-2566
DOI: 10.1109/TIFS.2019.2902826
BibTeX@article{Liu2019a, author = {Liu, Y. and Zhu, X. and Zhao, X. and Cao, Y.}, title = {Adversarial Learning for Constrained Image Splicing Detection and Localization Based on Atrous Convolution}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2019}, volume = {14}, number = {10}, pages = {2551--2566}}
-
Deep Residual Learning Using Data Augmentation for Median Filtering Forensics of Digital Images
IEEE Access, 2019, Vol. 7, pp. 80614-80621
DOI: 10.1109/ACCESS.2019.2923000
BibTeX@article{Luo2019, author = {Luo, S. and Peng, A. and Zeng, H. and Kang, X. and Liu, L.}, title = {Deep Residual Learning Using Data Augmentation for Median Filtering Forensics of Digital Images}, journal = {IEEE Access}, year = {2019}, volume = {7}, pages = {80614--80621}}
-
Analysis of Image Inconsistency Based on Discrete Cosine Transform (DCT)
Information and Communication Technology for Intelligent Systems
Springer, 2019
DOI: 10.1007/978-981-13-1742-2_56
BibTeX@incollection{Mahale2019, author = {Mahale, Vivek and Ali, Mouad M. H. and Yannawar, Pravin L. and Gaikwad, Ashok}, title = {Analysis of Image Inconsistency Based on Discrete Cosine Transform (DCT)}, booktitle = {Information and Communication Technology for Intelligent Systems}, publisher = {Springer}, year = {2019}}
-
Do GANs Leave Artificial Fingerprints?
Proc. IEEE Conf. Multimedia Information Processing and Retrieval (MIPR)
2019, pp. 506-511
DOI: 10.1109/MIPR.2019.00103
BibTeX@inproceedings{Marra2019, author = {Marra, F. and Gragnaniello, D. and Verdoliva, L. and Poggi, G.}, title = {Do GANs Leave Artificial Fingerprints?}, booktitle = {Proc. IEEE Conf. Multimedia Information Processing and Retrieval (MIPR)}, year = {2019}, pages = {506--511}}
-
Gradient-Based Illumination Description for Image Forgery Detection
IEEE Transactions on Information Forensics and Security, 2019, pp. 1
DOI: 10.1109/TIFS.2019.2935913
BibTeX@article{Matern2019, author = {Matern, F. and Riess, C. and Stamminger, M.}, title = {Gradient-Based Illumination Description for Image Forgery Detection}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2019}, pages = {1}}
-
Determining Image Sensor Temperature Using Dark Current
arXiv, 2019
arXiv: http://arxiv.org/abs/1901.02113v1
BibTeX@article{Matthews2019, author = {Matthews, Richard and Sorrel, Matthew and Falkner, Nickolas}, title = {Determining Image Sensor Temperature Using Dark Current}, journal = {arXiv}, year = {2019}}
-
Forensic Similarity for Digital Images
IEEE Transactions on Information Forensics and Security, 2019, pp. 1
DOI: 10.1109/TIFS.2019.2924552
BibTeX@article{Mayer2019, author = {Mayer, O. and Stamm, M. C.}, title = {Forensic Similarity for Digital Images}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2019}, pages = {1}}
-
Deep Learning-Based Classification of Illumination Maps for Exposing Face Splicing Forgeries in Images
Proc. IEEE Int. Conf. Image Processing (ICIP)
2019, pp. 116-120
DOI: 10.1109/ICIP.2019.8802969
BibTeX@inproceedings{Mazumdar2019, author = {Mazumdar, A. and Bora, P. K.}, title = {Deep Learning-Based Classification of Illumination Maps for Exposing Face Splicing Forgeries in Images}, booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)}, year = {2019}, pages = {116--120}}
-
Methods to Distinguish Photorealistic Computer Generated Images from Photographic Images: A Review
Advances in Computing and Data Sciences
Springer, 2019
DOI: 10.1007/978-981-13-9939-8_7
BibTeX@incollection{Meena2019, author = {Meena, Kunj Bihari and Tyagi, Vipin}, title = {Methods to Distinguish Photorealistic Computer Generated Images from Photographic Images: A Review}, booktitle = {Advances in Computing and Data Sciences}, publisher = {Springer}, year = {2019}}
-
A copy-move image forgery detection technique based on Gaussian-Hermite moments
Multimedia Tools and Applications, Springer, 2019, pp. 1
DOI: 10.1007/s11042-019-08082-2
BibTeX@article{Meena2019a, author = {Meena, Kunj Bihari and Tyagi, Vipin}, title = {A copy-move image forgery detection technique based on Gaussian-Hermite moments}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2019}, pages = {1}}
-
CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning
ArXiv, 2019
arXiv: http://arxiv.org/abs/1901.03597v3
BibTeX@article{Mirsky2019, author = {Mirsky, Yisroel and Mahler, Tom and Shelef, Ilan and Elovici, Yuval}, title = {CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning}, journal = {ArXiv}, year = {2019}}
-
e-PRNU: Encrypted Domain PRNU-Based Camera Attribution for Preserving Privacy
#IEEE_J_DSC#, 2019, pp. 1
DOI: 10.1109/TDSC.2019.2892448
BibTeX@article{Mohanty2019, author = {Mohanty, M. and Zhang, M. and Asghar, M. R. and Russello, G.}, title = {e-PRNU: Encrypted Domain PRNU-Based Camera Attribution for Preserving Privacy}, journal = {#IEEE_J_DSC#}, year = {2019}, pages = {1}}
-
A Photo Forensics-Based Prototype to Combat Revenge Porn
Proc. IEEE Conf. Multimedia Information Processing and Retrieval (MIPR)
2019, pp. 5-8
DOI: 10.1109/MIPR.2019.00009
BibTeX@inproceedings{Mohanty2019a, author = {Mohanty, M. and Zhang, M. and Russello, G.}, title = {A Photo Forensics-Based Prototype to Combat Revenge Porn}, booktitle = {Proc. IEEE Conf. Multimedia Information Processing and Retrieval (MIPR)}, year = {2019}, pages = {5--8}}
-
A New Method to Copy-Move Forgery Detection in Digital Images Using Gabor Filter
Fundamental Research in Electrical Engineering
Springer, 2019
DOI: 10.1007/978-981-10-8672-4_9
BibTeX@incollection{MokhtariArdakan2019, author = {Mokhtari Ardakan, Mostafa and Yerokh, Masoud and Akhavan Saffar, Mostafa}, title = {A New Method to Copy-Move Forgery Detection in Digital Images Using Gabor Filter}, booktitle = {Fundamental Research in Electrical Engineering}, publisher = {Springer}, year = {2019}}
-
Content-Aware Image Resizing Detection Using Deep Neural Network
Proc. IEEE Int. Conf. Image Processing (ICIP)
2019, pp. 106-110
DOI: 10.1109/ICIP.2019.8802946
BibTeX@inproceedings{Nam2019, author = {Nam, S. and Ahn, W. and Mun, S. and Park, J. and Kim, D. and Yu, I. and Lee, H.}, title = {Content-Aware Image Resizing Detection Using Deep Neural Network}, booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)}, year = {2019}, pages = {106--110}}
-
A Modern Approach for Image Forgery Detection using BRICH Clustering based on Normalised Mean and Standard Deviation
Proc. Int. Conf. Communication and Signal Processing (ICCSP)
2019, pp. 0441-0444
DOI: 10.1109/ICCSP.2019.8697951
BibTeX@inproceedings{Nirmala2019, author = {Nirmala, G. and Thyagharajan, K. K.}, title = {A Modern Approach for Image Forgery Detection using BRICH Clustering based on Normalised Mean and Standard Deviation}, booktitle = {Proc. Int. Conf. Communication and Signal Processing (ICCSP)}, year = {2019}, pages = {0441--0444}}
-
Copy-move forgery detection based on multifractals
Multimedia Tools and Applications, Springer, 2019, Vol. 78(15), pp. 20655
DOI: 10.1007/s11042-019-7277-1
BibTeX@article{Pavlovic2019, author = {Pavlović, Aleksandra and Glišović, Natasa and Gavrovska, Ana and Reljin, Irini}, title = {Copy-move forgery detection based on multifractals}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2019}, volume = {78}, number = {15}, pages = {20655}}
-
Tracking Multiple Image Sharing on Social Networks
Proc. Speech and Signal Processing (ICASSP) ICASSP 2019 - 2019 IEEE Int. Conf. Acoustics
2019, pp. 8266-8270
DOI: 10.1109/ICASSP.2019.8683144
BibTeX@inproceedings{Phan2019, author = {Phan, Q. and Boato, G. and Caldelli, R. and Amerini, I.}, title = {Tracking Multiple Image Sharing on Social Networks}, booktitle = {Proc. Speech and Signal Processing (ICASSP) ICASSP 2019 - 2019 IEEE Int. Conf. Acoustics}, year = {2019}, pages = {8266--8270}}
-
Detection of copy-move forgery using AKAZE and SIFT keypoint extraction
Multimedia Tools and Applications, Springer, 2019, Vol. 78(16), pp. 23535
DOI: 10.1007/s11042-019-7629-x
BibTeX@article{Prakash2019, author = {Prakash, Choudhary Shyam and Panzade, Prajwal Pralhad and Om, Hari and Maheshkar, Sushila}, title = {Detection of copy-move forgery using AKAZE and SIFT keypoint extraction}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2019}, volume = {78}, number = {16}, pages = {23535}}
-
Image tamper detection and self-recovery using multiple median watermarking
Multimedia Tools and Applications, Springer, 2019, pp. 1
DOI: 10.1007/s11042-019-07971-w
BibTeX@article{Rajput2019, author = {Rajput, Vishal and Ansari, Irshad Ahmad}, title = {Image tamper detection and self-recovery using multiple median watermarking}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2019}, pages = {1}}
-
Improvement Feature Vector: Autoregressive Model of Median Filter Residual
IEEE Access, 2019, Vol. 7, pp. 77524-77540
DOI: 10.1109/ACCESS.2019.2921573
BibTeX@article{Rhee2019a, author = {Rhee, K. H.}, title = {Improvement Feature Vector: Autoregressive Model of Median Filter Residual}, journal = {IEEE Access}, year = {2019}, volume = {7}, pages = {77524--77540}}
-
Hybrid Clustering of Shared Images on Social Networks for Digital Forensics
IEEE Access, 2019, Vol. 7, pp. 87288-87302
DOI: 10.1109/ACCESS.2019.2925102
BibTeX@article{Rouhi2019, author = {Rouhi, R. and Bertini, F. and Montesi, D. and Lin, X. and Quan, Y. and Li, C.}, title = {Hybrid Clustering of Shared Images on Social Networks for Digital Forensics}, journal = {IEEE Access}, year = {2019}, volume = {7}, pages = {87288--87302}}
-
Forensic Performance on Handwriting to Identify Forgery Owing to Word Alteration
Proc. and Behavior Analysis (ISBA) 2019 IEEE 5th Int. Conf. Identity, Security
2019, pp. 1-9
DOI: 10.1109/ISBA.2019.8778490
BibTeX@inproceedings{Roy2019, author = {Roy, P. and Bag, S.}, title = {Forensic Performance on Handwriting to Identify Forgery Owing to Word Alteration}, booktitle = {Proc. and Behavior Analysis (ISBA) 2019 IEEE 5th Int. Conf. Identity, Security}, year = {2019}, pages = {1--9}}
-
Robust Median Filtering Forensics Using Image Deblocking and Filtered Residual Fusion
#IEEE_O_ACC#, 2019, Vol. 7, pp. 17174-17183
DOI: 10.1109/ACCESS.2019.2894981
BibTeX@article{Shan2019, author = {Shan, W. and Yi, Y. and Qiu, J. and Yin, A.}, title = {Robust Median Filtering Forensics Using Image Deblocking and Filtered Residual Fusion}, journal = {#IEEE_O_ACC#}, year = {2019}, volume = {7}, pages = {17174--17183}}
-
FARIP: Framework for Artifact Removal for Image Processing Using JPEG
Artificial Intelligence and Algorithms in Intelligent Systems
Springer, 2019
DOI: 10.1007/978-3-319-91189-2_2
BibTeX@incollection{Shashidhar2019, author = {Shashidhar, T. M. and Ramesh, K. B.}, title = {FARIP: Framework for Artifact Removal for Image Processing Using JPEG}, booktitle = {Artificial Intelligence and Algorithms in Intelligent Systems}, publisher = {Springer}, year = {2019}}
-
Analysis of Denoising Filters for Source Identification Using PRNU Features
Soft Computing and Signal Processing
Springer, 2019
DOI: 10.1007/978-981-13-3600-3_62
BibTeX@incollection{Siddiqui2019, author = {Siddiqui, Nadia and Moin, Syeda Shira and Islam, Saiful}, title = {Analysis of Denoising Filters for Source Identification Using PRNU Features}, booktitle = {Soft Computing and Signal Processing}, publisher = {Springer}, year = {2019}}
-
An improved median filtering anti-forensics with better image quality and forensic undetectability
Multidimensional Systems and Signal Processing, Springer, 2019, Vol. 30(4), pp. 1951
DOI: 10.1007/s11045-019-00637-8
BibTeX@article{Singh2019, author = {Singh, Kulbir and Kansal, Ankush and Singh, Gurinder}, title = {An improved median filtering anti-forensics with better image quality and forensic undetectability}, journal = {Multidimensional Systems and Signal Processing}, publisher = {Springer}, year = {2019}, volume = {30}, number = {4}, pages = {1951}}
-
Geometric transformation invariant block based copy-move forgery detection using fast and efficient hybrid local features
Journal of Information Security and Applications, Elsevier BV, 2019, Vol. 45, pp. 44-51
DOI: 10.1016/j.jisa.2019.01.007
BibTeX@article{Soni2019, author = {Soni, Badal and Das, Pradip K. and Thounaojam, Dalton Meitei}, title = {Geometric transformation invariant block based copy-move forgery detection using fast and efficient hybrid local features}, journal = {Journal of Information Security and Applications}, publisher = {Elsevier BV}, year = {2019}, volume = {45}, pages = {44--51}}
-
Parallel Image Forgery Detection Using FREAK Descriptor
Information and Communication Technology for Intelligent Systems
Springer, 2019
DOI: 10.1007/978-981-13-1747-7_61
BibTeX@incollection{Sridevi2019, author = {Sridevi, M. and Aishwarya, S. and Nidheesha, Amedapu and Bokadia, Divyansh}, title = {Parallel Image Forgery Detection Using FREAK Descriptor}, booktitle = {Information and Communication Technology for Intelligent Systems}, publisher = {Springer}, year = {2019}}
-
Low-and Semantic-Level Cues for Forensic Splice Detection
Proc. IEEE Winter Conf. Applications of Computer Vision (WACV)
2019, pp. 1664-1672
DOI: 10.1109/WACV.2019.00182
BibTeX@inproceedings{Tambo2019, author = {Tambo, A. and Albright, M. and Mccloskey, S.}, title = {Low-and Semantic-Level Cues for Forensic Splice Detection}, booktitle = {Proc. IEEE Winter Conf. Applications of Computer Vision (WACV)}, year = {2019}, pages = {1664--1672}}
-
Low-and Semantic-Level Cues for Forensic Splice Detection
Proc. IEEE Winter Conf. Applications of Computer Vision (WACV)
2019, pp. 1664-1672
DOI: 10.1109/WACV.2019.00182
BibTeX@inproceedings{Tambo2019a, author = {Tambo, A. and Albright, M. and Mccloskey, S.}, title = {Low-and Semantic-Level Cues for Forensic Splice Detection}, booktitle = {Proc. IEEE Winter Conf. Applications of Computer Vision (WACV)}, year = {2019}, pages = {1664--1672}}
-
A Robust Residual Dense Neural Network For Countering Antiforensic Attack on Median Filtered Images
#IEEE_J_SPL#, 2019, Vol. 26(8), pp. 1132-1136
DOI: 10.1109/LSP.2019.2922498
BibTeX@article{Tariang2019, author = {Tariang, D. B. and Chakraborty, R. S. and Naskar, R.}, title = {A Robust Residual Dense Neural Network For Countering Antiforensic Attack on Median Filtered Images}, journal = {#IEEE_J_SPL#}, year = {2019}, volume = {26}, number = {8}, pages = {1132--1136}}
-
Enhancing Source Camera Identification Using Weighted Nuclear Norm Minimization De-Noising Filter
Advances in Computer Communication and Computational Sciences
Springer, 2019
DOI: 10.1007/978-981-13-0344-9_24
BibTeX@incollection{Tiwari2019, author = {Tiwari, Mayank and Gupta, Bhupendra}, title = {Enhancing Source Camera Identification Using Weighted Nuclear Norm Minimization De-Noising Filter}, booktitle = {Advances in Computer Communication and Computational Sciences}, publisher = {Springer}, year = {2019}}
-
Machine learning applied to speaker verification of fake voice recordings
Proc. Signal Processing and Artificial Vision (STSIVA) 2019 XXII Symp. Image
2019, pp. 1-4
DOI: 10.1109/STSIVA.2019.8730273
BibTeX@inproceedings{Vasquez2019, author = {Vasquez, A. N. and María Ballesteros, D. and Renza, D.}, title = {Machine learning applied to speaker verification of fake voice recordings}, booktitle = {Proc. Signal Processing and Artificial Vision (STSIVA) 2019 XXII Symp. Image}, year = {2019}, pages = {1--4}}
-
A new method estimating linear gaussian filter kernel by image PRNU noise
Journal of Information Security and Applications, Elsevier BV, 2019, Vol. 44, pp. 1-11
DOI: 10.1016/j.jisa.2018.11.002
BibTeX@article{Wang2019, author = {Wang, Jinwei and Wu, Guojing and Li, Jian and Jha, Sunil Kr.}, title = {A new method estimating linear gaussian filter kernel by image PRNU noise}, journal = {Journal of Information Security and Applications}, publisher = {Elsevier BV}, year = {2019}, volume = {44}, pages = {1--11}}
-
CMF-iteMS: An automatic threshold selection for detection of copy-move forgery
Forensic Science International, Elsevier BV, 2019, Vol. 295, pp. 83-99
DOI: 10.1016/j.forsciint.2018.12.004
BibTeX@article{Warif2019, author = {Warif, Nor Bakiah Abd. and Idris, Mohd. Yamani Idna and Wahab, Ainuddin Wahid Abdul and Salleh, Rosli and Ismail, Ahsiah}, title = {CMF-iteMS: An automatic threshold selection for detection of copy-move forgery}, journal = {Forensic Science International}, publisher = {Elsevier BV}, year = {2019}, volume = {295}, pages = {83--99}}
-
Video tamper detection based on multi-scale mutual information
Multimedia Tools and Applications, Springer, 2019, Vol. 78(19), pp. 27109
DOI: 10.1007/s11042-017-5083-1
BibTeX@article{Wei2019, author = {Wei, Wei and Fan, Xunli and Song, Houbing and Wang, Huihui}, title = {Video tamper detection based on multi-scale mutual information}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2019}, volume = {78}, number = {19}, pages = {27109}}
-
Defocus blur detection based on multiscale SVD fusion in gradient domain
Journal of Visual Communication and Image Representation, Elsevier BV, 2019, Vol. 59, pp. 52-61
DOI: 10.1016/j.jvcir.2018.12.048
BibTeX@article{Xiao2019, author = {Xiao, Huimei and Lu, Wei and Li, Ruipeng and Zhong, Nan and Yeung, Yuileong and Chen, Junjia and Xue, Fei and Sun, Wei}, title = {Defocus blur detection based on multiscale SVD fusion in gradient domain}, journal = {Journal of Visual Communication and Image Representation}, publisher = {Elsevier BV}, year = {2019}, volume = {59}, pages = {52--61}}
-
Copy-move forgery detection based on adaptive keypoints extraction and matching
Multimedia Tools and Applications, Springer, 2019, pp. 1
DOI: 10.1007/s11042-019-08169-w
BibTeX@article{Yang2019a, author = {Yang, Hong-Ying and Qi, Shu-Ren and Niu, Ying and Niu, Pan-Pan and Wang, Xiang-Yang}, title = {Copy-move forgery detection based on adaptive keypoints extraction and matching}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2019}, pages = {1}}
-
Exposing Deep Fakes Using Inconsistent Head Poses
Proc. Speech and Signal Processing (ICASSP) ICASSP 2019 - 2019 IEEE Int. Conf. Acoustics
2019, pp. 8261-8265
DOI: 10.1109/ICASSP.2019.8683164
BibTeX@inproceedings{Yang2019, author = {Yang, X. and Li, Y. and Lyu, S.}, title = {Exposing Deep Fakes Using Inconsistent Head Poses}, booktitle = {Proc. Speech and Signal Processing (ICASSP) ICASSP 2019 - 2019 IEEE Int. Conf. Acoustics}, year = {2019}, pages = {8261--8265}}
-
Robust Median Filtering Forensics by CNN-Based Multiple Residuals Learning
#IEEE_O_ACC#, 2019, Vol. 7, pp. 120594-120602
DOI: 10.1109/ACCESS.2019.2932810
BibTeX@article{Yu2019, author = {Yu, L. and Zhang, Y. and Han, H. and Zhang, L. and Wu, F.}, title = {Robust Median Filtering Forensics by CNN-Based Multiple Residuals Learning}, journal = {#IEEE_O_ACC#}, year = {2019}, volume = {7}, pages = {120594--120602}}
-
Image splicing localization using noise distribution characteristic
Multimedia Tools and Applications, Springer, 2019, Vol. 78(16), pp. 22223
DOI: 10.1007/s11042-019-7408-8
BibTeX@article{Zhang2019, author = {Zhang, Depeng and Wang, Xiaofeng and Zhang, Meng and Hu, Jiaojiao}, title = {Image splicing localization using noise distribution characteristic}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2019}, volume = {78}, number = {16}, pages = {22223}}
-
Multi-scale segmentation strategies in PRNU-based image tampering localization
Multimedia Tools and Applications, Springer, 2019, Vol. 78(14), pp. 20113
DOI: 10.1007/s11042-019-7288-y
BibTeX@article{Zhang2019a, author = {Zhang, Weiwei and Tang, Xinhua and Yang, Zhenghong and Niu, Shaozhang}, title = {Multi-scale segmentation strategies in PRNU-based image tampering localization}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2019}, volume = {78}, number = {14}, pages = {20113}}
-
Copy-move forgery detection using adaptive keypoint filtering and iterative region merging
Multimedia Tools and Applications, Springer, 2019, Vol. 78(18), pp. 26313
DOI: 10.1007/s11042-019-07817-5
BibTeX@article{Zhong2019a, author = {Zhong, Jun-Liu and Pun, Chi-Man}, title = {Copy-move forgery detection using adaptive keypoint filtering and iterative region merging}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2019}, volume = {78}, number = {18}, pages = {26313}}
-
CamStyle: A Novel Data Augmentation Method for Person Re-Identification
IEEE Transactions on Image Processing, 2019, Vol. 28(3), pp. 1176-1190
DOI: 10.1109/TIP.2018.2874313
BibTeX@article{Zhong2019, author = {Zhong, Z. and Zheng, L. and Zheng, Z. and Li, S. and Yang, Y.}, title = {CamStyle: A Novel Data Augmentation Method for Person Re-Identification}, journal = {IEEE Transactions on Image Processing}, year = {2019}, volume = {28}, number = {3}, pages = {1176--1190}}
-
Detecting Generated Image Based on a Coupled Network with Two-Step Pairwise Learning
Proc. IEEE Int. Conf. Image Processing (ICIP)
2019, pp. 3212-3216
DOI: 10.1109/ICIP.2019.8803464
BibTeX@inproceedings{Zhuang2019, author = {Zhuang, Y. and Hsu, C.}, title = {Detecting Generated Image Based on a Coupled Network with Two-Step Pairwise Learning}, booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)}, year = {2019}, pages = {3212--3216}}
2018
-
2-Levels of clustering strategy to detect and locate copy-move forgery in digital images
Multimedia Tools and Applications, Springer, 2018, pp. 1
DOI: 10.1007/s11042-018-6266-0
BibTeX@article{Abdel-Basset2018, author = {Abdel-Basset, Mohamed and Manogaran, Gunasekaran and Fakhry, Ahmed E. and El-Henawy, Ibrahim}, title = {2-Levels of clustering strategy to detect and locate copy-move forgery in digital images}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2018}, pages = {1}}
-
Histogram of Orientated Gradient (HOG) Approach in Image Forgery : Image Distorted by Brightness
UTM Computing Proceedings Innovations in Computing Technology and Applications, 2018, Vol. 3
BibTeX@article{Abidin2018, author = {Abidin, Arfa Zainal and Shah, Zuraini Ali and Hasan, Haswadi and Samah, Azurah A. and Majid, Hairudin Abdul}, title = {Histogram of Orientated Gradient (HOG) Approach in Image Forgery : Image Distorted by Brightness}, journal = {UTM Computing Proceedings Innovations in Computing Technology and Applications}, year = {2018}, volume = {3}}
-
Splicing image forgery identification based on artificial neural network approach and texture features
Cluster Computing, Springer, 2018, pp. 1
DOI: 10.1007/s10586-017-1668-8
BibTeX@article{Abrahim2018, author = {Abrahim, Araz Rajab and Rahim, Mohd Shafry Mohd and Sulong, Ghazali Bin}, title = {Splicing image forgery identification based on artificial neural network approach and texture features}, journal = {Cluster Computing}, publisher = {Springer}, year = {2018}, pages = {1}}
-
Iris Sensor Identification in Multi-camera Environment
Information Fusion, Elsevier BV, 2018
DOI: 10.1016/j.inffus.2017.11.004
BibTeX@article{Agarwal2018a, author = {Agarwal, Akshay and Keshari, Rohit and Wadhwa, Manya and Vijh, Mansi and Parmar, Chandani and Singh, Richa and Vatsa, Mayank}, title = {Iris Sensor Identification in Multi-camera Environment}, journal = {Information Fusion}, publisher = {Elsevier BV}, year = {2018}}
-
Image Forgery Detection Using Co-occurrence-Based Texture Operator in Frequency Domain
Progress in Intelligent Computing Techniques: Theory, Practice, and Applications
Springer, 2018
DOI: 10.1007/978-981-10-3373-5_10
BibTeX@incollection{Agarwal2018, author = {Agarwal, Saurabh and Chand, Satish}, title = {Image Forgery Detection Using Co-occurrence-Based Texture Operator in Frequency Domain}, booktitle = {Progress in Intelligent Computing Techniques: Theory, Practice, and Applications}, publisher = {Springer}, year = {2018}}
-
A Fast SIFT Based Method for Copy Move Forgery Detection
Future Computing and Informatics Journal, Elsevier BV, 2018
DOI: 10.1016/j.fcij.2018.03.001
BibTeX@article{Alberry2018, author = {Alberry, Hesham Ahmed and Hegazy, Abdelfatah and i Salama, Gouda}, title = {A Fast SIFT Based Method for Copy Move Forgery Detection}, journal = {Future Computing and Informatics Journal}, publisher = {Elsevier BV}, year = {2018}}
-
The War of Images in the Age of Trump
Trump's Media War
Springer International Publishing, 2018, pp. 69-84
DOI: 10.1007/978-3-319-94069-4_5
BibTeX@incollection{Allbeson2018, author = {Allbeson, Tom and Allan, Stuart}, title = {The War of Images in the Age of Trump}, booktitle = {Trump's Media War}, publisher = {Springer International Publishing}, year = {2018}, pages = {69--84}}
-
Multiple image copy detection and evolution visualisation using tree graphs
Multimedia Tools and Applications, Springer, 2018, pp. 1
DOI: 10.1007/s11042-018-6350-5
BibTeX@article{Allili2018, author = {Allili, Mohand Said and Casemajor, Nathalie and Talbi, Aymen}, title = {Multiple image copy detection and evolution visualisation using tree graphs}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2018}, pages = {1}}
-
Evaluation of copy-move forgery detection: datasets and evaluation metrics
Multimedia Tools and Applications, Springer, 2018, pp. 1
DOI: 10.1007/s11042-018-6201-4
BibTeX@article{Al-Qershi2018, author = {Al-Qershi, Osamah M. and Khoo, Bee Ee}, title = {Evaluation of copy-move forgery detection: datasets and evaluation metrics}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2018}, pages = {1}}
-
Enhanced block-based copy-move forgery detection using k-means clustering
Multidimensional Systems and Signal Processing, Springer, 2018, pp. 1
DOI: 10.1007/s11045-018-0624-y
BibTeX@article{Al-Qershi2018a, author = {Al-Qershi, Osamah M. and Khoo, Bee Ee}, title = {Enhanced block-based copy-move forgery detection using k-means clustering}, journal = {Multidimensional Systems and Signal Processing}, publisher = {Springer}, year = {2018}, pages = {1}}
-
Detection clone an object movement using an optical flow approach
Proc. IEEE Symp. Computer Applications Industrial Electronics (ISCAIE)
2018, pp. 388-394
DOI: 10.1109/ISCAIE.2018.8405504
BibTeX@inproceedings{Al-Sanjary2018a, author = {Al-Sanjary, O. I. and Ahmed, A. A. and Jaharadak, A. A. B. and Ali, M. A. M. and Zangana, H. M.}, title = {Detection clone an object movement using an optical flow approach}, booktitle = {Proc. IEEE Symp. Computer Applications Industrial Electronics (ISCAIE)}, year = {2018}, pages = {388--394}}
-
Semi-automatic Methods in Video Forgery Detection Based on Multi-view Dimension
Recent Trends in Information and Communication Technology
Springer, 2018
DOI: 10.1007/978-3-319-59427-9_41
BibTeX@incollection{Al-Sanjary2018, author = {Al-Sanjary, Omar Ismael and Ghazali, Nurulhuda and Ahmed, Ahmed Abdullah and Sulong, Ghazali}, title = {Semi-automatic Methods in Video Forgery Detection Based on Multi-view Dimension}, booktitle = {Recent Trends in Information and Communication Technology}, publisher = {Springer}, year = {2018}}
-
Extracting Prnu Noise from H.264 Coded Videos
Proc. 26th European Signal Processing Conf. (EUSIPCO)
2018, pp. 1367-1371
DOI: 10.23919/EUSIPCO.2018.8553173
BibTeX@inproceedings{Altinisik2018, author = {Altinisik, E. and Tasdemir, K. and Sencar, H. T.}, title = {Extracting Prnu Noise from H.264 Coded Videos}, booktitle = {Proc. 26th European Signal Processing Conf. (EUSIPCO)}, year = {2018}, pages = {1367--1371}}
-
Augment and Adapt: A Simple Approach to Image Tampering Detection
Proc. 24th Int. Conf. Pattern Recognition (ICPR)
2018, pp. 2983-2988
DOI: 10.1109/ICPR.2018.8545614
BibTeX@inproceedings{Annadani2018, author = {Annadani, Y. and Jawahar, C. V.}, title = {Augment and Adapt: A Simple Approach to Image Tampering Detection}, booktitle = {Proc. 24th Int. Conf. Pattern Recognition (ICPR)}, year = {2018}, pages = {2983--2988}}
-
Polyscale gradients residual demosaicking
Journal of King Saud University - Computer and Information Sciences, Elsevier BV, 2018
DOI: 10.1016/j.jksuci.2018.02.014
BibTeX@article{Asiq2018, author = {Asiq, M. S. Safna and Emmanuel, W. R. Sam}, title = {Polyscale gradients residual demosaicking}, journal = {Journal of King Saud University - Computer and Information Sciences}, publisher = {Elsevier BV}, year = {2018}}
-
Detection of copy move forgery technique based on SIFT and SURF
Proc. 26th Signal Processing and Communications Applications Conf. (SIU)
2018, pp. 1-4
DOI: 10.1109/SIU.2018.8404609
BibTeX@inproceedings{Aydin2018, author = {Aydin, Y. and Muzaffer, G. and Ulutaç, G.}, title = {Detection of copy move forgery technique based on SIFT and SURF}, booktitle = {Proc. 26th Signal Processing and Communications Applications Conf. (SIU)}, year = {2018}, pages = {1--4}}
-
Modeling and Estimation of Signal-Dependent and Correlated Noise
Denoising of Photographic Images and Video
Springer, 2018
DOI: 10.1007/978-3-319-96029-6_1
BibTeX@incollection{Azzari2018, author = {Azzari, Lucio and Borges, Lucas Rodrigues and Foi, Alessandro}, title = {Modeling and Estimation of Signal-Dependent and Correlated Noise}, booktitle = {Denoising of Photographic Images and Video}, publisher = {Springer}, year = {2018}}
-
Rotation Invariant on Harris Interest Points for Exposing Image Region Duplication Forgery
Evolving BCI Therapy - Engaging Brain State Dynamics
InTech, 2018
DOI: 10.5772/intechopen.76332
BibTeX@incollection{Badi2018, author = {Badi, Haitham Hasan and Sabbri, Bassam and Ajeel, Fitian}, title = {Rotation Invariant on Harris Interest Points for Exposing Image Region Duplication Forgery}, booktitle = {Evolving BCI Therapy - Engaging Brain State Dynamics}, publisher = {InTech}, year = {2018}}
-
Impact of photometric transformations on PRNU estimation schemes: A case study using near infrared ocular images
Proc. Int. Workshop Biometrics and Forensics (IWBF)
2018, pp. 1-8
DOI: 10.1109/IWBF.2018.8401560
BibTeX@inproceedings{Banerjee2018, author = {Banerjee, S. and Ross, A.}, title = {Impact of photometric transformations on PRNU estimation schemes: A case study using near infrared ocular images}, booktitle = {Proc. Int. Workshop Biometrics and Forensics (IWBF)}, year = {2018}, pages = {1--8}}
-
An Improved Statistic for the Pooled Triangle Test against PRNU-Copy Attack
ArXiv, 2018
arXiv: 1805.02899v1
BibTeX@article{Barni2018, author = {Barni, Mauro and Garcia, Hector Santoyo and Tondi, Benedetta}, title = {An Improved Statistic for the Pooled Triangle Test against PRNU-Copy Attack}, journal = {ArXiv}, year = {2018}}
-
On the Transferability of Adversarial Examples Against CNN-Based Image Forensics
arXiv, 2018
arXiv: http://arxiv.org/abs/1811.01629v1
BibTeX@article{Barni2018b, author = {Barni, Mauro and Kallas, Kassem and Nowroozi, Ehsan and Tondi, Benedetta}, title = {On the Transferability of Adversarial Examples Against CNN-Based Image Forensics}, journal = {arXiv}, year = {2018}}
-
An Improved Statistic for the Pooled Triangle Test Against PRNU-Copy Attack
#IEEE_J_SPL#, 2018, Vol. 25(10), pp. 1435-1439
DOI: 10.1109/LSP.2018.2863045
BibTeX@article{Barni2018a, author = {Barni, M. and Santoyo-García, H. and Tondi, B.}, title = {An Improved Statistic for the Pooled Triangle Test Against PRNU-Copy Attack}, journal = {#IEEE_J_SPL#}, year = {2018}, volume = {25}, number = {10}, pages = {1435--1439}}
-
Local Phase Quantization (LPQ) Descriptor Approach in Copy-Move Image Forgery: A Study Case of Blurring
UTM Computing Proceedings Innovations in Computing Technology and Applications, 2018, Vol. 3
BibTeX@article{Basid2018, author = {Basid, Atikah Abd and Majid, Hairudin Abdul and Samah, Azurah A.}, title = {Local Phase Quantization (LPQ) Descriptor Approach in Copy-Move Image Forgery: A Study Case of Blurring}, journal = {UTM Computing Proceedings Innovations in Computing Technology and Applications}, year = {2018}, volume = {3}}
-
Chrominance based Splicing Image Forgery Localization with Relevance Vector Machine
Proc. Electronics and Computer Science (SCEECS) 2018 IEEE Int. Students' Conf. Electrical
2018, pp. 1-6
DOI: 10.1109/SCEECS.2018.8546959
BibTeX@inproceedings{Basker2018, author = {Basker, V. R. and Chapaneri, S.}, title = {Chrominance based Splicing Image Forgery Localization with Relevance Vector Machine}, booktitle = {Proc. Electronics and Computer Science (SCEECS) 2018 IEEE Int. Students' Conf. Electrical}, year = {2018}, pages = {1--6}}
-
Constrained Convolutional Neural Networks: A New Approach Towards General Purpose Image Manipulation Detection
IEEE Transactions on Information Forensics and Security, 2018, Vol. 13(11), pp. 2691-2706
DOI: 10.1109/TIFS.2018.2825953
BibTeX@article{Bayar2018, author = {Bayar, B. and Stamm, M. C.}, title = {Constrained Convolutional Neural Networks: A New Approach Towards General Purpose Image Manipulation Detection}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2018}, volume = {13}, number = {11}, pages = {2691--2706}}
-
Towards Open Set Camera Model Identification Using a Deep Learning Framework
Proc. Speech and Signal Processing (ICASSP) 2018 IEEE Int. Conf. Acoustics
2018, pp. 2007-2011
DOI: 10.1109/ICASSP.2018.8462383
BibTeX@inproceedings{Bayar2018a, author = {Bayar, B. and Stamm, M. C.}, title = {Towards Open Set Camera Model Identification Using a Deep Learning Framework}, booktitle = {Proc. Speech and Signal Processing (ICASSP) 2018 IEEE Int. Conf. Acoustics}, year = {2018}, pages = {2007--2011}}
-
Scanner Model Identification of Official Documents Using Noise Parameters Estimation in the Wavelet Domain
Advanced Concepts for Intelligent Vision Systems, Springer, 2018
DOI: 10.1007/978-3-030-01449-0_50
BibTeX@article{BenRabah2018, author = {Ben Rabah, Chaima and Coatrieux, Gouenou and Abdelfattah, Riadh}, title = {Scanner Model Identification of Official Documents Using Noise Parameters Estimation in the Wavelet Domain}, journal = {Advanced Concepts for Intelligent Vision Systems}, publisher = {Springer}, year = {2018}}
-
A Method for Detecting JPEG Anti-forensics
Computer Vision, Pattern Recognition, Image Processing, and Graphics
Springer, 2018
DOI: 10.1007/978-981-13-0020-2_17
BibTeX@incollection{Bhardwaj2018, author = {Bhardwaj, Dinesh and Kumawat, Chothmal and Pankajakshan, Vinod}, title = {A Method for Detecting JPEG Anti-forensics}, booktitle = {Computer Vision, Pattern Recognition, Image Processing, and Graphics}, publisher = {Springer}, year = {2018}}
-
Face Verification and Forgery Detection for Ophthalmic Surgery Images
arXiv, 2018
arXiv: http://arxiv.org/abs/1811.06194v1
BibTeX@article{Bhogale2018, author = {Bhogale, Kaushal and Shankar, Nishant and Juvekar, Adheesh and Padhi, Asutosh}, title = {Face Verification and Forgery Detection for Ophthalmic Surgery Images}, journal = {arXiv}, year = {2018}}
-
Fast copy-move forgery detection using local bidirectional coherency error refinement
Pattern Recognition, Elsevier BV, 2018, Vol. 81, pp. 161-175
DOI: 10.1016/j.patcog.2018.03.028
BibTeX@article{Bi2018, author = {Bi, Xiuli and Pun, Chi-Man}, title = {Fast copy-move forgery detection using local bidirectional coherency error refinement}, journal = {Pattern Recognition}, publisher = {Elsevier BV}, year = {2018}, volume = {81}, pages = {161--175}}
-
Fooling PRNU-based detectors through convolutional neural networks
2018
BibTeX@article{Bonettini2018, author = {Bonettini, Nicolo and Bondi, Luca and Mandelli, ` Sara and Bestagini, Paolo and Tubaro, Stefano and Guera, David and Delp, Edward J.}, title = {Fooling PRNU-based detectors through convolutional neural networks}, year = {2018}}
-
Fooling PRNU-Based Detectors Through Convolutional Neural Networks
Proc. 26th European Signal Processing Conf. (EUSIPCO)
2018, pp. 957-961
DOI: 10.23919/EUSIPCO.2018.8553596
BibTeX@inproceedings{Bonettini2018a, author = {Bonettini, N. and Bondi, L. and Mandelli, S. and Bestagini, P. and Tubaro, S. and Güera, D.}, title = {Fooling PRNU-Based Detectors Through Convolutional Neural Networks}, booktitle = {Proc. 26th European Signal Processing Conf. (EUSIPCO)}, year = {2018}, pages = {957--961}}
-
Effects of H.265 encoding on PNU and source camera identification
Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems - RACS '18
ACM Press, 2018
DOI: 10.1145/3264746.3264770
BibTeX@inproceedings{Bruno2018, author = {Bruno, Andrea and Cattaneo, Giuseppe}, title = {Effects of H.265 encoding on PNU and source camera identification}, booktitle = {Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems - RACS '18}, publisher = {ACM Press}, year = {2018}}
-
Semantic object removal with convolutional neural network feature-based inpainting approach
Multimedia Systems, Springer, 2018, pp. 1
DOI: 10.1007/s00530-018-0585-x
BibTeX@article{Cai2018, author = {Cai, Xiuxia and Song, Bin}, title = {Semantic object removal with convolutional neural network feature-based inpainting approach}, journal = {Multimedia Systems}, publisher = {Springer}, year = {2018}, pages = {1}}
-
PRNU-based Image Classification of Origin Social Network with CNN
Proc. 26th European Signal Processing Conf. (EUSIPCO)
2018, pp. 1357-1361
DOI: 10.23919/EUSIPCO.2018.8553160
BibTeX@inproceedings{Caldelli2018, author = {Caldelli, R. and Amerini, I. and Li, C. T.}, title = {PRNU-based Image Classification of Origin Social Network with CNN}, booktitle = {Proc. 26th European Signal Processing Conf. (EUSIPCO)}, year = {2018}, pages = {1357--1361}}
-
Adversarial image detection in deep neural networks
Multimedia Tools and Applications, Springer, 2018, pp. 1
DOI: 10.1007/s11042-018-5853-4
BibTeX@article{Carrara2018, author = {Carrara, Fabio and Falchi, Fabrizio and Caldelli, Roberto and Amato, Giuseppe and Becarelli, Rudy}, title = {Adversarial image detection in deep neural networks}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2018}, pages = {1}}
-
Mapping location of a suspect by using forensic images taken with their own mobile phone
Proc of the International Conference on Engineering Technologies (ICENTE'18)
2018
BibTeX@conference{Cevik2018, author = {Çevik, Kerim Kürşat and Berber, Faruk Süleyman and Kucuksille, Ecir Ugur}, title = {Mapping location of a suspect by using forensic images taken with their own mobile phone}, booktitle = {Proc of the International Conference on Engineering Technologies (ICENTE'18)}, year = {2018}}
-
An Improved Splicing Localization Method by Fully Convolutional Networks
2018
BibTeX@misc{Chen2018d, author = {Chen, B. and Qi, X. and Wang, Y. and Shim, Hjae}, title = {An Improved Splicing Localization Method by Fully Convolutional Networks}, year = {2018}}
-
An Improved Splicing Localization Method by Fully Convolutional Networks
#IEEE_O_ACC#, 2018, Vol. 6, pp. 69472-69480
DOI: 10.1109/ACCESS.2018.2880433
BibTeX@article{Chen2018g, author = {Chen, B. and Qi, X. and Wang, Y. and Zheng, Y. and Shim, H. J. and Shi, Y.}, title = {An Improved Splicing Localization Method by Fully Convolutional Networks}, journal = {#IEEE_O_ACC#}, year = {2018}, volume = {6}, pages = {69472--69480}}
-
Fractional Quaternion Zernike Moments for Robust Color Image Copy-Move Forgery Detection
#IEEE_O_ACC#, 2018, Vol. 6, pp. 56637-56646
DOI: 10.1109/ACCESS.2018.2871952
BibTeX@article{Chen2018c, author = {Chen, B. and Yu, M. and Su, Q. and Shim, H. J. and Shi, Y.}, title = {Fractional Quaternion Zernike Moments for Robust Color Image Copy-Move Forgery Detection}, journal = {#IEEE_O_ACC#}, year = {2018}, volume = {6}, pages = {56637--56646}}
-
Focus manipulation detection via photometric histogram analysis
Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW) 2018
2018
BibTeX@inproceedings{Chen2018a, author = {Chen, Can and McCloskey, Scott and Yu, Jingyi}, title = {Focus manipulation detection via photometric histogram analysis}, booktitle = {Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW) 2018}, year = {2018}}
-
Mislgan: An Anti-Forensic Camera Model Falsification Framework Using A Generative Adversarial Network
Proc. 25th IEEE Int. Conf. Image Processing (ICIP)
2018, pp. 535-539
DOI: 10.1109/ICIP.2018.8451503
BibTeX@inproceedings{Chen2018b, author = {Chen, C. and Zhao, X. and Stamm, M. C.}, title = {Mislgan: An Anti-Forensic Camera Model Falsification Framework Using A Generative Adversarial Network}, booktitle = {Proc. 25th IEEE Int. Conf. Image Processing (ICIP)}, year = {2018}, pages = {535--539}}
-
An Image Splicing Localization Algorithm Based on SLIC and Image Features
Advances in Multimedia Information Processing – PCM 2018, Springer, 2018
DOI: 10.1007/978-3-030-00764-5_56
BibTeX@article{Chen2018f, author = {Chen, Haipeng and Zhao, Chaoran and Shi, Zenan and Zhu, Fuxiang}, title = {An Image Splicing Localization Algorithm Based on SLIC and Image Features}, journal = {Advances in Multimedia Information Processing – PCM 2018}, publisher = {Springer}, year = {2018}}
-
Person Re-Identification by Camera Correlation Aware Feature Augmentation
#IEEE_J_PAMI#, 2018, Vol. 40(2), pp. 392-408
DOI: 10.1109/TPAMI.2017.2666805
BibTeX@article{Chen2018e, author = {Chen, Y. and Zhu, X. and Zheng, W. and Lai, J.}, title = {Person Re-Identification by Camera Correlation Aware Feature Augmentation}, journal = {#IEEE_J_PAMI#}, year = {2018}, volume = {40}, number = {2}, pages = {392--408}}
-
Secure Detection of Image Manipulation by means of Random Feature Selection
ArXiv, 2018
arXiv: 1802.00573v1
BibTeX@article{Chen2018, author = {Chen, Zhipeng and Tondi, Benedetta and Li, Xiaolong and Ni, Rongrong and Zhao, Yao and Barni, Mauro}, title = {Secure Detection of Image Manipulation by means of Random Feature Selection}, journal = {ArXiv}, year = {2018}}
-
Detecting Seam-Carved Image by Extreme Learning Machines Using Patch Analysis Method, Jury Voting, and Combinatorial Fusion
and Cybernetics: Systems IEEE Transactions on Systems, Man, 2018, pp. 1-15
DOI: 10.1109/TSMC.2018.2789460
BibTeX@article{Cheng2018a, author = {Cheng, H. and Wei, J. and Lin, C. and Ye, J.}, title = {Detecting Seam-Carved Image by Extreme Learning Machines Using Patch Analysis Method, Jury Voting, and Combinatorial Fusion}, journal = {and Cybernetics: Systems IEEE Transactions on Systems, Man}, year = {2018}, pages = {1--15}}
-
Image-to-GPS Verification Through A Bottom-Up Pattern Matching Network
arXiv, 2018
arXiv: http://arxiv.org/abs/1811.07288v1
BibTeX@article{Cheng2018, author = {Cheng, Jiaxin and Wu, Yue and Abd-Almageed, Wael and Natarajan, Prem}, title = {Image-to-GPS Verification Through A Bottom-Up Pattern Matching Network}, journal = {arXiv}, year = {2018}}
-
Copy-Move Forgery Detection Based on Local Gabor Wavelets Patterns
Security with Intelligent Computing and Big-data Services
Springer, 2018
DOI: 10.1007/978-3-319-76451-1_5
BibTeX@incollection{Chou2018, author = {Chou, Chao-Lung and Lee, Jen-Chun}, title = {Copy-Move Forgery Detection Based on Local Gabor Wavelets Patterns}, booktitle = {Security with Intelligent Computing and Big-data Services}, publisher = {Springer}, year = {2018}}
-
Image Forensics: Detecting duplication of scientific images with manipulation-invariant image similarity
ArXiv, 2018
arXiv: 1802.06515v1
BibTeX@article{Cicconet2018, author = {Cicconet, M. and Elliott, H. and Richmond, D. L. and Wainstock, D. and Walsh, M.}, title = {Image Forensics: Detecting duplication of scientific images with manipulation-invariant image similarity}, journal = {ArXiv}, year = {2018}}
-
Seam Carving Detection Using Convolutional Neural Networks
Proc. IEEE 12th Int. Symp. Applied Computational Intelligence and Informatics (SACI)
2018, pp. 000195-000200
DOI: 10.1109/SACI.2018.8441016
BibTeX@inproceedings{Cieslak2018, author = {Cieslak, L. Fernandoda Silva and da Costa, K. AugustoPontara and PauloPapa, J.}, title = {Seam Carving Detection Using Convolutional Neural Networks}, booktitle = {Proc. IEEE 12th Int. Symp. Applied Computational Intelligence and Informatics (SACI)}, year = {2018}, pages = {000195--000200}}
-
Determining JPEG Image Standard Quality Factor from the Quantization Tables
ArXiv, 2018
arXiv: 1802.00992v1
BibTeX@article{Cogranne2018, author = {Cogranne, Rémi}, title = {Determining JPEG Image Standard Quality Factor from the Quantization Tables}, journal = {ArXiv}, year = {2018}}
-
ForensicTransfer: Weakly-supervised Domain Adaptation for Forgery Detection
arXiv, 2018
arXiv: http://arxiv.org/abs/1812.02510v1
BibTeX@article{Cozzolino2018b, author = {Cozzolino, Davide and Thies, Justus and Rössler, Andreas and Riess, Christian and Nießner, Matthias and Verdoliva, Luisa}, title = {ForensicTransfer: Weakly-supervised Domain Adaptation for Forgery Detection}, journal = {arXiv}, year = {2018}}
-
Noiseprint: A CNN-based camera model fingerprint
arXiv, 2018
arXiv: http://arxiv.org/abs/1808.08396v1
BibTeX@article{Cozzolino2018, author = {Cozzolino, Davide and Verdoliva, Luisa}, title = {Noiseprint: A CNN-based camera model fingerprint}, journal = {arXiv}, year = {2018}}
-
Camera-based Image Forgery Localization using Convolutional Neural Networks
Proc. 26th European Signal Processing Conf. (EUSIPCO)
2018, pp. 1372-1376
DOI: 10.23919/EUSIPCO.2018.8553581
BibTeX@inproceedings{Cozzolino2018a, author = {Cozzolino, D. and Verdoliva, L.}, title = {Camera-based Image Forgery Localization using Convolutional Neural Networks}, booktitle = {Proc. 26th European Signal Processing Conf. (EUSIPCO)}, year = {2018}, pages = {1372--1376}}
-
Robust first quantization matrix estimation based on filtering of recompression artifacts for non-aligned double compressed JPEG images
Signal Processing: Image Communication, Elsevier BV, 2018, Vol. 61, pp. 9-20
DOI: 10.1016/j.image.2017.10.011
BibTeX@article{Dalmia2018, author = {Dalmia, Nandita and Okade, Manish}, title = {Robust first quantization matrix estimation based on filtering of recompression artifacts for non-aligned double compressed JPEG images}, journal = {Signal Processing: Image Communication}, publisher = {Elsevier BV}, year = {2018}, volume = {61}, pages = {9--20}}
-
A PatchMatch-based Dense-field Algorithm for Video Copy-Move Detection and Localization
#IEEE_J_CASVT#, 2018, pp. 1
DOI: 10.1109/TCSVT.2018.2804768
BibTeX@article{DextquoterightAmiano2018, author = {D’Amiano, L. and Cozzolino, D. and Poggi, G. and Verdoliva, L.}, title = {A PatchMatch-based Dense-field Algorithm for Video Copy-Move Detection and Localization}, journal = {#IEEE_J_CASVT#}, year = {2018}, pages = {1}}
-
A Robust Method for Detecting Copy-Move Image Forgery Using Stationary Wavelet Transform and Scale Invariant Feature Transform
Proc. Material and Electronic Engineering (IC4ME2) 2018 Int. Conf. Computer, Communication, Chemical
2018, pp. 1-4
DOI: 10.1109/IC4ME2.2018.8465668
BibTeX@inproceedings{Das2018c, author = {Das, T. and Hasan, R. and Azam, M. R. and Uddin, J.}, title = {A Robust Method for Detecting Copy-Move Image Forgery Using Stationary Wavelet Transform and Scale Invariant Feature Transform}, booktitle = {Proc. Material and Electronic Engineering (IC4ME2) 2018 Int. Conf. Computer, Communication, Chemical}, year = {2018}, pages = {1--4}}
-
Anti-forensics of JPEG compression detection schemes using approximation of DCT coefficients
Multimedia Tools and Applications, Springer, 2018, pp. 1
DOI: 10.1007/s11042-018-6170-7
BibTeX@article{Das2018a, author = {Das, Tanmoy Kanti}, title = {Anti-forensics of JPEG compression detection schemes using approximation of DCT coefficients}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2018}, pages = {1}}
-
Anti-forensics of JPEG compression detection schemes using approximation of DCT coefficients
Multimedia Tools and Applications, Springer, 2018, pp. 1
DOI: 10.1007/s11042-018-6170-7
BibTeX@article{Das2018b, author = {Das, Tanmoy Kanti}, title = {Anti-forensics of JPEG compression detection schemes using approximation of DCT coefficients}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2018}, pages = {1}}
-
Digital Forensic Enabled Image Authentication Using Least Significant Bit (LSB) with Tamper Localization Based Hash Function
Intelligent Communication and Computational Technologies
Springer, 2018
DOI: 10.1007/978-981-10-5523-2_14
BibTeX@incollection{Das2018, author = {Das, Ujjal Kumar and Samaddar, Shefalika Ghosh and Keserwani, Pankaj Kumar}, title = {Digital Forensic Enabled Image Authentication Using Least Significant Bit (LSB) with Tamper Localization Based Hash Function}, booktitle = {Intelligent Communication and Computational Technologies}, publisher = {Springer}, year = {2018}}
-
PRNU Variance Analysis for Morphed Face Image Detection
2018
BibTeX@misc{Debiasi2018a, author = {Debiasi, Luca and Rathgeb, Christian and Scherhag, Ulrich and Uhl, Andreas and Busch, Christoph}, title = {PRNU Variance Analysis for Morphed Face Image Detection}, year = {2018}}
-
PRNU-based detection of morphed face images
Proc. Int. Workshop Biometrics and Forensics (IWBF)
2018, pp. 1-7
DOI: 10.1109/IWBF.2018.8401555
BibTeX@inproceedings{Debiasi2018, author = {Debiasi, L. and Scherhag, U. and Rathgeb, C. and Uhl, A. and Busch, C.}, title = {PRNU-based detection of morphed face images}, booktitle = {Proc. Int. Workshop Biometrics and Forensics (IWBF)}, year = {2018}, pages = {1--7}}
-
Color Noise-Based Feature for Splicing Detection and Localization
Proc. IEEE 20th Int. Workshop Multimedia Signal Processing (MMSP)
2018, pp. 1-6
DOI: 10.1109/MMSP.2018.8547093
BibTeX@inproceedings{Destruel2018, author = {Destruel, C. and Itier, V. and Strauss, O. and Puech, W.}, title = {Color Noise-Based Feature for Splicing Detection and Localization}, booktitle = {Proc. IEEE 20th Int. Workshop Multimedia Signal Processing (MMSP)}, year = {2018}, pages = {1--6}}
-
Smoothing identification for digital image forensics
Multimedia Tools and Applications, Springer, 2018, pp. 1
DOI: 10.1007/s11042-018-6807-6
BibTeX@article{Ding2018b, author = {Ding, Feng and Shi, Yuxi and Zhu, Guopu and Shi, Yun-Qing}, title = {Smoothing identification for digital image forensics}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2018}, pages = {1}}
-
An efficient weak sharpening detection method for image forensics
Journal of Visual Communication and Image Representation, Elsevier BV, 2018, Vol. 50, pp. 93-99
DOI: 10.1016/j.jvcir.2017.11.009
BibTeX@article{Ding2018, author = {Ding, Feng and Zhu, Guopu and Dong, Weiqiang and Shi, Yun-Qing}, title = {An efficient weak sharpening detection method for image forensics}, journal = {Journal of Visual Communication and Image Representation}, publisher = {Elsevier BV}, year = {2018}, volume = {50}, pages = {93--99}}
-
Image authentication and tamper localization based on relative difference between DCT coefficient and its estimated value
Multimedia Tools and Applications, Springer Nature, 2018
DOI: 10.1007/s11042-018-5732-z
BibTeX@article{Ding2018a, author = {Ding, Wenjia and Xie, Yi and Wang, Yulin}, title = {Image authentication and tamper localization based on relative difference between DCT coefficient and its estimated value}, journal = {Multimedia Tools and Applications}, publisher = {Springer Nature}, year = {2018}}
-
Region duplication detection in digital images based on Centroid Linkage Clustering of key–points and graph similarity matching
Multimedia Tools and Applications, Springer Nature America, Inc, 2018
DOI: 10.1007/s11042-018-6666-1
BibTeX@article{Dixit2018, author = {Dixit, Rahul and Naskar, Ruchira}, title = {Region duplication detection in digital images based on Centroid Linkage Clustering of key–points and graph similarity matching}, journal = {Multimedia Tools and Applications}, publisher = {Springer Nature America, Inc}, year = {2018}}
-
Two stages object recognition based copy-move forgery detection algorithm
Multimedia Tools and Applications, Springer, 2018, pp. 1
DOI: 10.1007/s11042-018-6891-7
BibTeX@article{Elaskily2018, author = {Elaskily, Mohamed A. and Elnemr, Heba A. and Dessouky, Mohamed M. and Faragallah, Osama S.}, title = {Two stages object recognition based copy-move forgery detection algorithm}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2018}, pages = {1}}
-
A Generic Approach CNN-Based Camera Identification for Manipulated Images
Proc. IEEE Int. Conf. Electro/Information Technology (EIT)
2018, pp. 0165-0169
DOI: 10.1109/EIT.2018.8500312
BibTeX@inproceedings{El-Yamany2018, author = {El-Yamany, A. and Fouad, H. and Raffat, Y.}, title = {A Generic Approach CNN-Based Camera Identification for Manipulated Images}, booktitle = {Proc. IEEE Int. Conf. Electro/Information Technology (EIT)}, year = {2018}, pages = {0165--0169}}
-
Detecting forgery in image time series based on anomaly detection
Proc. of the IV International Conference on "Information Technology and Nanotechnology" (ITNT-2018)
2018
BibTeX@inproceedings{Evdokimova2018, author = {Evdokimova, N. I. and Myasnikov, V. V.}, title = {Detecting forgery in image time series based on anomaly detection}, booktitle = {Proc. of the IV International Conference on "Information Technology and Nanotechnology" (ITNT-2018)}, year = {2018}}
-
Measurement of Copy-Move Forensic Image Similarity Using Distance Function
Advanced Science Letters, American Scientific Publishers, 2018, Vol. 24(12), pp. 9157-9162
DOI: 10.1166/asl.2018.12116
BibTeX@article{Fadlil2018, author = {Fadlil, Abdul and Riadi, Imam and Sari, Titi}, title = {Measurement of Copy-Move Forensic Image Similarity Using Distance Function}, journal = {Advanced Science Letters}, publisher = {American Scientific Publishers}, year = {2018}, volume = {24}, number = {12}, pages = {9157--9162}}
-
Photographer trajectory detection from images
Personal and Ubiquitous Computing, Springer, 2018, pp. 1
DOI: 10.1007/s00779-018-1150-5
BibTeX@article{Fan2018, author = {Fan, Linwei and Li, Huiyu and Li, Mengjun and Zhang, Yan and Li, Jinjiang and Zhang, Caiming}, title = {Photographer trajectory detection from images}, journal = {Personal and Ubiquitous Computing}, publisher = {Springer}, year = {2018}, pages = {1}}
-
Fine-grained detection of inverse tone mapping in HDR images
Signal Processing, Elsevier BV, 2018, Vol. 152, pp. 178-188
DOI: 10.1016/j.sigpro.2018.05.028
BibTeX@article{Fan2018a, author = {Fan, Wei and Valenzise, Giuseppe and Banterle, Francesco and Dufaux, Frédéric}, title = {Fine-grained detection of inverse tone mapping in HDR images}, journal = {Signal Processing}, publisher = {Elsevier BV}, year = {2018}, volume = {152}, pages = {178--188}}
-
Digital Image Tamper Detection Technique Based on Spectrum Analysis of CFA Artifacts
Sensors, MDPI AG, 2018, Vol. 18(9), pp. 2804
DOI: 10.3390/s18092804
BibTeX@article{Fernandez2018, author = {Fernández, Edgar González and Orozco, Ana Sandoval and Villalba, Luis Garc\ia and Hernandez-Castro, Julio}, title = {Digital Image Tamper Detection Technique Based on Spectrum Analysis of CFA Artifacts}, journal = {Sensors}, publisher = {MDPI AG}, year = {2018}, volume = {18}, number = {9}, pages = {2804}}
-
Face Demorphing
IEEE Transactions on Information Forensics and Security, 2018, Vol. 13(4), pp. 1008-1017
DOI: 10.1109/TIFS.2017.2777340
BibTeX@article{Ferrara2018, author = {Ferrara, M. and Franco, A. and Maltoni, D.}, title = {Face Demorphing}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2018}, volume = {13}, number = {4}, pages = {1008--1017}}
-
Face demorphing in the presence of facial appearance variations
Proc. 26th European Signal Processing Conf. (EUSIPCO)
2018, pp. 2365-2369
DOI: 10.23919/EUSIPCO.2018.8553430
BibTeX@inproceedings{Ferrara2018b, author = {Ferrara, M. and Franco, A. and Maltoni, D.}, title = {Face demorphing in the presence of facial appearance variations}, booktitle = {Proc. 26th European Signal Processing Conf. (EUSIPCO)}, year = {2018}, pages = {2365--2369}}
-
Counteracting the contemporaneous proliferation of digital forgeries and fake news
2018
BibTeX@misc{Ferreira2018, author = {Ferreira, Alexandre}, title = {Counteracting the contemporaneous proliferation of digital forgeries and fake news}, year = {2018}}
-
Improved Matching Technique in Digital Image Region Duplication
Proc. Communication and Aerospace Technology (ICECA) 2018 Second Int. Conf. Electronics
2018, pp. 427-430
DOI: 10.1109/ICECA.2018.8474683
BibTeX@inproceedings{Fule2018, author = {Fule, N. and Mane, V.}, title = {Improved Matching Technique in Digital Image Region Duplication}, booktitle = {Proc. Communication and Aerospace Technology (ICECA) 2018 Second Int. Conf. Electronics}, year = {2018}, pages = {427--430}}
-
An Effective Image Detection Algorithm for USM Sharpening Based on Pixel-Pair Histogram
Advances in Multimedia Information Processing – PCM 2018, Springer, 2018
DOI: 10.1007/978-3-030-00767-6_37
BibTeX@article{Gao2018, author = {Gao, Hang and Hu, Mengting and Gao, Tiegang and Cheng, Renhong}, title = {An Effective Image Detection Algorithm for USM Sharpening Based on Pixel-Pair Histogram}, journal = {Advances in Multimedia Information Processing – PCM 2018}, publisher = {Springer}, year = {2018}}
-
Passive Blind Forensic Scheme for Copy-Move Temporal Tampering Detection
Proc. Int. Conf. On Advances in Communication and Computing Technology (ICACCT)
2018, pp. 155-160
DOI: 10.1109/ICACCT.2018.8529536
BibTeX@inproceedings{Gavade2018, author = {Gavade, J. D. and Chougule, S. R.}, title = {Passive Blind Forensic Scheme for Copy-Move Temporal Tampering Detection}, booktitle = {Proc. Int. Conf. On Advances in Communication and Computing Technology (ICACCT)}, year = {2018}, pages = {155--160}}
-
2018 IEEE Signal Processing Cup: Forensic Camera Model Identification Challenge Honors Theses
Union College, Union College, 2018
BibTeX@mastersthesis{Geiger2018, author = {Geiger, Michael}, title = {2018 IEEE Signal Processing Cup: Forensic Camera Model Identification Challenge Honors Theses}, school = {Union College}, year = {2018}}
-
Medical Image Forgery Detection for Smart Healthcare
IEEE Communications Magazine, Institute of Electrical and Electronics Engineers (IEEE), 2018, Vol. 56(4), pp. 33-37
DOI: 10.1109/mcom.2018.1700817
BibTeX@article{Ghoneim2018, author = {Ghoneim, Ahmed and Muhammad, Ghulam and Amin, Syed Umar and Gupta, Brij}, title = {Medical Image Forgery Detection for Smart Healthcare}, journal = {IEEE Communications Magazine}, publisher = {Institute of Electrical and Electronics Engineers (IEEE)}, year = {2018}, volume = {56}, number = {4}, pages = {33--37}}
-
Reliability Map Estimation For CNN-Based Camera Model Attribution
Purdue University West Lafayette, Indiana, Purdue University West Lafayette, Indiana, 2018
BibTeX@techreport{Gueera2018, author = {Güera, David and Wang, Yu and Bondi, Luca and Bestagini, Paolo and Tubaro, Stefano and Delp, Edward. J.}, title = {Reliability Map Estimation For CNN-Based Camera Model Attribution}, school = {Purdue University West Lafayette, Indiana}, year = {2018}}
-
Reliability Map Estimation for CNN-Based Camera Model Attribution
Proc. IEEE Winter Conf. Applications of Computer Vision (WACV)
2018, pp. 964-973
DOI: 10.1109/WACV.2018.00111
BibTeX@inproceedings{Guera2018, author = {Guera, D. and Zhu, F. and Yarlagadda, S. K. and Tubaro, S. and Bestagini, P. and Delp, E. J.}, title = {Reliability Map Estimation for CNN-Based Camera Model Attribution}, booktitle = {Proc. IEEE Winter Conf. Applications of Computer Vision (WACV)}, year = {2018}, pages = {964--973}}
-
Reliability Map Estimation for CNN-Based Camera Model Attribution
Proc. IEEE Winter Conf. Applications of Computer Vision (WACV)
2018, pp. 964-973
DOI: 10.1109/WACV.2018.00111
BibTeX@inproceedings{Gueera2018a, author = {Güera, D. and Zhu, F. and Yarlagadda, S. K. and Tubaro, S. and Bestagini, P. and Delp, E. J.}, title = {Reliability Map Estimation for CNN-Based Camera Model Attribution}, booktitle = {Proc. IEEE Winter Conf. Applications of Computer Vision (WACV)}, year = {2018}, pages = {964--973}}
-
Fake Colorized Image Detection
ArXiv, 2018
arXiv: 1801.02768v2
BibTeX@article{Guo2018, author = {Guo, Yuanfang and Cao, Xiaochun and Zhang, Wei and Wang, Rui}, title = {Fake Colorized Image Detection}, journal = {ArXiv}, year = {2018}}
-
Fake Colorized Image Detection
#IEEE_J_IFS#, 2018, Vol. 13(8), pp. 1932-1944
DOI: 10.1109/TIFS.2018.2806926
BibTeX@article{Guo2018a, author = {Guo, Y. and Cao, X. and Zhang, W. and Wang, R.}, title = {Fake Colorized Image Detection}, journal = {#IEEE_J_IFS#}, year = {2018}, volume = {13}, number = {8}, pages = {1932--1944}}
-
A New Copy Move Forgery Detection Technique using Adaptive over-Segementation and Feature Point Matching
Bulletin of Eletrical Engineering and Informatics, 2018
BibTeX@article{Gupta2018, author = {Gupta, Anil}, title = {A New Copy Move Forgery Detection Technique using Adaptive over-Segementation and Feature Point Matching}, journal = {Bulletin of Eletrical Engineering and Informatics}, year = {2018}}
-
Improving Performance of Source-Camera Identification By Suppressing Peaks and Eliminating Low-Frequency Defects of Reference SPN
IEEE Signal Processing Letters, 2018, Vol. 25(9), pp. 1340-1343
DOI: 10.1109/LSP.2018.2857223
BibTeX@article{Gupta2018b, author = {Gupta, B. and Tiwari, M.}, title = {Improving Performance of Source-Camera Identification By Suppressing Peaks and Eliminating Low-Frequency Defects of Reference SPN}, journal = {IEEE Signal Processing Letters}, year = {2018}, volume = {25}, number = {9}, pages = {1340--1343}}
-
An empirical cross-validation of denoising filters for PRNU extraction
Forensic Science International, Elsevier BV, 2018, Vol. 292, pp. 110-114
DOI: 10.1016/j.forsciint.2018.09.017
BibTeX@article{Gupta2018c, author = {Gupta, Bhupendra and Tiwari, Mayank}, title = {An empirical cross-validation of denoising filters for PRNU extraction}, journal = {Forensic Science International}, publisher = {Elsevier BV}, year = {2018}, volume = {292}, pages = {110--114}}
-
Improving source camera identification performance using DCT based image frequency components dependent sensor pattern noise extraction method
Digital Investigation, Elsevier BV, 2018, Vol. 24, pp. 121-127
DOI: 10.1016/j.diin.2018.02.003
BibTeX@article{Gupta2018d, author = {Gupta, Bhupendra and Tiwari, Mayank}, title = {Improving source camera identification performance using DCT based image frequency components dependent sensor pattern noise extraction method}, journal = {Digital Investigation}, publisher = {Elsevier BV}, year = {2018}, volume = {24}, pages = {121--127}}
-
Color Channel Characteristics (CCC) for Efficient Digital Image Forensics
Engineering, Technology & Applied Science Research, 2018, Vol. 8(1)
BibTeX@article{Gupta2018a, author = {Gupta, S. and Mohan, N.}, title = {Color Channel Characteristics (CCC) for Efficient Digital Image Forensics}, journal = {Engineering, Technology & Applied Science Research}, year = {2018}, volume = {8}, number = {1}}
-
Energy deviation measure: a technique for digital image forensics
International Journal of Electronic Security and Digital Forensics, Inderscience Publishers, 2018, Vol. 10(4), pp. 401
DOI: 10.1504/ijesdf.2018.10015333
BibTeX@article{Gupta2018e, author = {Gupta, Surbhi and Mohan, Neeraj and Sandhu, Parvinder Singh}, title = {Energy deviation measure: a technique for digital image forensics}, journal = {International Journal of Electronic Security and Digital Forensics}, publisher = {Inderscience Publishers}, year = {2018}, volume = {10}, number = {4}, pages = {401}}
-
A Survey on Photo Forgery Detection Methods
Cattani, C., Atangana, A., Bulut, H., Hammouch, Z., Baskonus, H. M., Mekkaoui, T. & Agoujil, S. (ed.)
ITM Web of Conferences, EDP Sciences, 2018, Vol. 22, pp. 01055
DOI: 10.1051/itmconf/20182201055
BibTeX@article{Gurunlu2018, author = {Gurunlu, Bilgehan and Ozturk, Serkan}, title = {A Survey on Photo Forgery Detection Methods}, journal = {ITM Web of Conferences}, publisher = {EDP Sciences}, year = {2018}, volume = {22}, pages = {01055}}
-
A Fast, Block Based, Copy-Move Forgery Detection Approach Using Image Gradient and Modified K-Means
Intelligent Systems Technologies and Applications
Springer, 2018
DOI: 10.1007/978-3-319-68385-0_25
BibTeX@incollection{Hajihashemi2018, author = {Hajihashemi, V. and Gharahbagh, A. Alavi}, title = {A Fast, Block Based, Copy-Move Forgery Detection Approach Using Image Gradient and Modified K-Means}, booktitle = {Intelligent Systems Technologies and Applications}, publisher = {Springer}, year = {2018}}
-
Quantization-based Markov feature extraction method for image splicing detection
Machine Vision and Applications, Springer, 2018, pp. 1
DOI: 10.1007/s00138-018-0911-5
BibTeX@article{Han2018a, author = {Han, Jong Goo and Park, Tae Hee and Moon, Yong Ho and Eom, Il Kyu}, title = {Quantization-based Markov feature extraction method for image splicing detection}, journal = {Machine Vision and Applications}, publisher = {Springer}, year = {2018}, pages = {1}}
-
Exploring the location of object deleted by seam-carving
Expert Systems with Applications, Elsevier BV, 2018, Vol. 95, pp. 162-171
DOI: 10.1016/j.eswa.2017.11.023
BibTeX@article{Han2018, author = {Han, Rong and Ke, Yongzhen and Du, Ling and Qin, Fan and Guo, Jing}, title = {Exploring the location of object deleted by seam-carving}, journal = {Expert Systems with Applications}, publisher = {Elsevier BV}, year = {2018}, volume = {95}, pages = {162--171}}
-
Distinguish computer generated and digital images: A CNN solution
Concurrency and Computation: Practice and Experience, Wiley, 2018, pp. e4788
DOI: 10.1002/cpe.4788
BibTeX@article{He2018, author = {He, Ming}, title = {Distinguish computer generated and digital images: A CNN solution}, journal = {Concurrency and Computation: Practice and Experience}, publisher = {Wiley}, year = {2018}, pages = {e4788}}
-
The PS-Battles Dataset - an Image Collection for Image Manipulation Detection
arXiv, 2018
arXiv: 1804.04866v1
BibTeX@article{Heller2018, author = {Heller, Silvan and Rossetto, Luca and Schuldt, Heiko}, title = {The PS-Battles Dataset - an Image Collection for Image Manipulation Detection}, journal = {arXiv}, year = {2018}}
-
Uncovering copy–move traces using principal component analysis, discrete cosine transform and Gabor filter
Analog Integrated Circuits and Signal Processing, Springer, 2018, pp. 1
DOI: 10.1007/s10470-018-1139-z
BibTeX@article{Hilal2018, author = {Hilal, Alaa and Chantaf, Samer}, title = {Uncovering copy–move traces using principal component analysis, discrete cosine transform and Gabor filter}, journal = {Analog Integrated Circuits and Signal Processing}, publisher = {Springer}, year = {2018}, pages = {1}}
-
Verifying the Images Authenticity in Cognitive Internet of Things (CIoT)-Oriented Cyber Physical System
Mobile Networks and Applications, Springer, 2018, Vol. 23(2), pp. 239
DOI: 10.1007/s11036-017-0928-4
BibTeX@article{Hossain2018, author = {Hossain, M. Shamim and Muhammad, Ghulam and AL Qurishi, Muhammad}, title = {Verifying the Images Authenticity in Cognitive Internet of Things (CIoT)-Oriented Cyber Physical System}, journal = {Mobile Networks and Applications}, publisher = {Springer}, year = {2018}, volume = {23}, number = {2}, pages = {239}}
-
Exposing Digital Forgeries by Detecting a Contextual Violation Using Deep Neural Networks
Information Security Applications, Springer, 2018
DOI: 10.1007/978-3-319-93563-8_2
BibTeX@article{Hou2018, author = {Hou, Jong-Uk and Jang, Han-Ul and Park, Jin-Seok and Lee, Heung-Kyu}, title = {Exposing Digital Forgeries by Detecting a Contextual Violation Using Deep Neural Networks}, journal = {Information Security Applications}, publisher = {Springer}, year = {2018}}
-
Learning to Detect Fake Face Images in the Wild
arXiv, 2018
arXiv: http://arxiv.org/abs/1809.08754v3
BibTeX@article{Hsu2018, author = {Hsu, Chih-Chung and Lee, Chia-Yen and Zhuang, Yi-Xiu}, title = {Learning to Detect Fake Face Images in the Wild}, journal = {arXiv}, year = {2018}}
-
Person Re-Identification with Hybrid Loss and Hard Triplets Mining
Proc. IEEE Fourth Int. Conf. Multimedia Big Data (BigMM)
2018, pp. 1-5
DOI: 10.1109/BigMM.2018.8499463
BibTeX@inproceedings{Hu2018, author = {Hu, Z. and Wu, H. and Liao, S. and Hu, H. and Liu, S. and Li, B.}, title = {Person Re-Identification with Hybrid Loss and Hard Triplets Mining}, booktitle = {Proc. IEEE Fourth Int. Conf. Multimedia Big Data (BigMM)}, year = {2018}, pages = {1--5}}
-
A Novel Method for Detecting Image Forgery Based on Convolutional Neural Network
Proc. Security And Privacy In Computing And Communications/ 12th IEEE Int 2018 17th IEEE Int. Conf. On Trust Conf. On Big Data Science And Engineering (TrustCom/BigDataSE)
2018, pp. 1702-1705
DOI: 10.1109/TrustCom/BigDataSE.2018.00255
BibTeX@inproceedings{Huang2018a, author = {Huang, N. and He, J. and Zhu, N.}, title = {A Novel Method for Detecting Image Forgery Based on Convolutional Neural Network}, booktitle = {Proc. Security And Privacy In Computing And Communications/ 12th IEEE Int 2018 17th IEEE Int. Conf. On Trust Conf. On Big Data Science And Engineering (TrustCom/BigDataSE)}, year = {2018}, pages = {1702--1705}}
-
Identification of the source camera of images based on convolutional neural network
Digital Investigation, Elsevier BV, 2018, Vol. 26, pp. 72-80
DOI: 10.1016/j.diin.2018.08.001
BibTeX@article{Huang2018b, author = {Huang, Na and He, Jingsha and Zhu, Nafei and Xuan, Xinggang and Liu, Gongzheng and Chang, Chengyue}, title = {Identification of the source camera of images based on convolutional neural network}, journal = {Digital Investigation}, publisher = {Elsevier BV}, year = {2018}, volume = {26}, pages = {72--80}}
-
Exploring feature coupling and model coupling for image source identification
IEEE Transactions on Information Forensics and Security, 2018, Vol. 13(12), pp. 3108-3121
DOI: 10.1109/TIFS.2018.2838079
BibTeX@article{Huang2018, author = {Huang, Y. and Cao, L. and Zhang, J. and Pan, L. and Liu, Y.}, title = {Exploring feature coupling and model coupling for image source identification}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2018}, volume = {13}, number = {12}, pages = {3108--3121}}
-
Fighting Fake News: Image Splice Detection via Learned Self-Consistency
ArXiv, 2018
arXiv: 1805.04096v1
BibTeX@article{Huh2018, author = {Huh, Minyoung and Liu, Andrew and Owens, Andrew and Efros, Alexei A.}, title = {Fighting Fake News: Image Splice Detection via Learned Self-Consistency}, journal = {ArXiv}, year = {2018}}
-
Content-aware detection of JPEG grid inconsistencies for intuitive image forensics
Journal of Visual Communication and Image Representation, Elsevier BV, 2018, Vol. 54, pp. 155-170
DOI: 10.1016/j.jvcir.2018.05.011
BibTeX@article{Iakovidou2018, author = {Iakovidou, Chryssanthi and Zampoglou, Markos and Papadopoulos, Symeon and Kompatsiaris, Yiannis}, title = {Content-aware detection of JPEG grid inconsistencies for intuitive image forensics}, journal = {Journal of Visual Communication and Image Representation}, publisher = {Elsevier BV}, year = {2018}, volume = {54}, pages = {155--170}}
-
Passive Detection of Splicing and Copy-Move Attacks in Image Forgery
Neural Information Processing, Springer, 2018
DOI: 10.1007/978-3-030-04212-7_49
BibTeX@article{Islam2018, author = {Islam, Mohammad Manzurul and Kamruzzaman, Joarder and Karmakar, Gour and Murshed, Manzur and Kahandawa, Gayan}, title = {Passive Detection of Splicing and Copy-Move Attacks in Image Forgery}, journal = {Neural Information Processing}, publisher = {Springer}, year = {2018}}
-
Moment Invariant-Based Approach On Distorted Copy-Move Image Forgery By Colored Reduction
UTM Computing Proceedings Innovations in Computing Technology and Applications, 2018, Vol. 3
BibTeX@article{Izham2018, author = {Izham, Nur Shafiqah Ahmad and Samah, Azurah Binti A. and Majid, H. B. A.}, title = {Moment Invariant-Based Approach On Distorted Copy-Move Image Forgery By Colored Reduction}, journal = {UTM Computing Proceedings Innovations in Computing Technology and Applications}, year = {2018}, volume = {3}}
-
An Efficient Image Forgery Detection Using Biorthogonal Wavelet Transform and Improved Relevance Vector Machine
Wireless Personal Communications, Springer, 2018, pp. 1
DOI: 10.1007/s11277-018-5802-6
BibTeX@article{Jain2018, author = {Jain, Neelesh Kumar and Rathore, Neeraj Kumar and Mishra, Amit}, title = {An Efficient Image Forgery Detection Using Biorthogonal Wavelet Transform and Improved Relevance Vector Machine}, journal = {Wireless Personal Communications}, publisher = {Springer}, year = {2018}, pages = {1}}
-
Image Splicing Detection Using Electromagnetism-Like Based Descriptor
Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016
Springer, 2018
DOI: 10.1007/978-3-319-56991-8_6
BibTeX@incollection{Jalab2018, author = {Jalab, Hamid A. and Hasan, Ali M. and Moghaddasi, Zahra and Wakaf, Zouhir}, title = {Image Splicing Detection Using Electromagnetism-Like Based Descriptor}, booktitle = {Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016}, publisher = {Springer}, year = {2018}}
-
Estimation of Spliced Images in Photographs
Proc. 2nd Int. Conf. Trends in Electronics and Informatics (ICOEI)
2018, pp. 248-252
DOI: 10.1109/ICOEI.2018.8553823
BibTeX@inproceedings{Jayan2018, author = {Jayan, T. J. and Sethu, P. Sajith}, title = {Estimation of Spliced Images in Photographs}, booktitle = {Proc. 2nd Int. Conf. Trends in Electronics and Informatics (ICOEI)}, year = {2018}, pages = {248--252}}
-
Wavelet-based color modification detection based on variance ratio
EURASIP Journal on Image and Video Processing, Springer, 2018, Vol. 2018(1), pp. 1
DOI: 10.1186/s13640-018-0286-6
BibTeX@article{Jeon2018, author = {Jeon, Jong Ju and Eom, Il Kyu}, title = {Wavelet-based color modification detection based on variance ratio}, journal = {EURASIP Journal on Image and Video Processing}, publisher = {Springer}, year = {2018}, volume = {2018}, number = {1}, pages = {1}}
-
Source Camera Identification using Image Features
International Journal of Applied Engineering Research, 2018, Vol. 13(1), pp. 490-504
BibTeX@article{Jeyalakshmi12018, author = {Jeyalakshmi, A. and Chitra, Dr. D. Ramya}, title = {Source Camera Identification using Image Features}, journal = {International Journal of Applied Engineering Research}, year = {2018}, volume = {13}, number = {1}, pages = {490--504}}
-
Comparative study of feature extraction using several wavelet transforms for source camera identification
Proc. 2nd Int. Conf. Inventive Systems and Control (ICISC)
2018, pp. 1407-1414
DOI: 10.1109/ICISC.2018.8398923
BibTeX@inproceedings{Jeyalakshmi2018, author = {Jeyalakshmi, A. and Chitra, D. R.}, title = {Comparative study of feature extraction using several wavelet transforms for source camera identification}, booktitle = {Proc. 2nd Int. Conf. Inventive Systems and Control (ICISC)}, year = {2018}, pages = {1407--1414}}
-
Coarse-to-Fine Copy-Move Forgery Detection for Video Forensics
#IEEE_O_ACC#, 2018, Vol. 6, pp. 25323-25335
DOI: 10.1109/ACCESS.2018.2819624
BibTeX@article{Jia2018, author = {Jia, S. and Xu, Z. and Wang, H. and Feng, C. and Wang, T.}, title = {Coarse-to-Fine Copy-Move Forgery Detection for Video Forensics}, journal = {#IEEE_O_ACC#}, year = {2018}, volume = {6}, pages = {25323--25335}}
-
Video logo removal detection based on sparse representation
Multimedia Tools and Applications, Springer, 2018, pp. 1
DOI: 10.1007/s11042-018-5959-8
BibTeX@article{Jin2018, author = {Jin, Xiao and Su, Yuting and Zou, Liang and Zhang, Chengqian and Jing, Peiguang and Song, Xuemeng}, title = {Video logo removal detection based on sparse representation}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2018}, pages = {1}}
-
Source Classification Using Document Images from Smartphones and Flatbed Scanners
Communications in Computer and Information Science
Springer Singapore, 2018, pp. 281-292
DOI: 10.1007/978-981-13-0020-2_25
BibTeX@incollection{Joshi2018, author = {Joshi, Sharad and Gupta, Gaurav and Khanna, Nitin}, title = {Source Classification Using Document Images from Smartphones and Flatbed Scanners}, booktitle = {Communications in Computer and Information Science}, publisher = {Springer Singapore}, year = {2018}, pages = {281--292}}
-
Purple Fringing Aberration Detection Based on Content-Adaptable Thresholds
Proceedings of First International Conference on Smart System, Innovations and Computing
Springer, 2018
DOI: 10.1007/978-981-10-5828-8_7
BibTeX@incollection{Karthik2018, author = {Karthik, Kannan and Malik, Parveen}, title = {Purple Fringing Aberration Detection Based on Content-Adaptable Thresholds}, booktitle = {Proceedings of First International Conference on Smart System, Innovations and Computing}, publisher = {Springer}, year = {2018}}
-
Comparative Analysis of Different Keypoint Based Copy-Move Forgery Detection Methods
Proc. Eleventh Int. Conf. Contemporary Computing (IC3)
2018, pp. 1-5
DOI: 10.1109/IC3.2018.8530489
BibTeX@inproceedings{Kaur2018, author = {Kaur, A. and Walia, S. and Kumar, K.}, title = {Comparative Analysis of Different Keypoint Based Copy-Move Forgery Detection Methods}, booktitle = {Proc. Eleventh Int. Conf. Contemporary Computing (IC3)}, year = {2018}, pages = {1--5}}
-
Forensic Video Analysis: Passive Tracking System for Automated Person of Interest (POI) Localization
#IEEE_O_ACC#, 2018, Vol. 6, pp. 43392-43403
DOI: 10.1109/ACCESS.2018.2856936
BibTeX@article{Khan2018d, author = {Khan, A. and Rehman, S. and Waleed, M. and Khan, A. and Khan, U. and Kamal, T. and Afridi, S. K. and Marwat, S. N. K.}, title = {Forensic Video Analysis: Passive Tracking System for Automated Person of Interest (POI) Localization}, journal = {#IEEE_O_ACC#}, year = {2018}, volume = {6}, pages = {43392--43403}}
-
Automated Forgery Detection in Multispectral Document Images Using Fuzzy Clustering
Proc. 13th IAPR Int. Workshop Document Analysis Systems (DAS)
2018, pp. 393-398
DOI: 10.1109/DAS.2018.26
BibTeX@inproceedings{Khan2018b, author = {Khan, M. J. and Yousaf, A. and Khurshid, K. and Abbas, A. and Shafait, F.}, title = {Automated Forgery Detection in Multispectral Document Images Using Fuzzy Clustering}, booktitle = {Proc. 13th IAPR Int. Workshop Document Analysis Systems (DAS)}, year = {2018}, pages = {393--398}}
-
Forensic investigation to detect forgeries in ASF files of contemporary IP cameras
The Journal of Supercomputing, Springer, 2018, pp. 1
DOI: 10.1007/s11227-018-2377-7
BibTeX@article{Khan2018, author = {Khan, Rashid Masood and Iqbal, Waseem and Amjad, Muhammad Faisal and Abbas, Haider and Afzal, Hammad and Rauf, Abdul and Pasha, Maruf}, title = {Forensic investigation to detect forgeries in ASF files of contemporary IP cameras}, journal = {The Journal of Supercomputing}, publisher = {Springer}, year = {2018}, pages = {1}}
-
A Hybrid Technique for Copy-Move Image Forgery Detection
Proc. 3rd Int. Conf. Computer and Communication Systems (ICCCS)
2018, pp. 212-216
DOI: 10.1109/CCOMS.2018.8463337
BibTeX@inproceedings{Khan2018a, author = {Khan, U. A. and Kaloi, M. A. and Shaikh, Z. A. and Arain, A. A.}, title = {A Hybrid Technique for Copy-Move Image Forgery Detection}, booktitle = {Proc. 3rd Int. Conf. Computer and Communication Systems (ICCCS)}, year = {2018}, pages = {212--216}}
-
Median Filtered Image Restoration and Anti-Forensics Using Adversarial Networks
IEEE Signal Processing Letters, 2018, Vol. 25(2), pp. 278-282
DOI: 10.1109/LSP.2017.2782363
BibTeX@article{Kim2018, author = {Kim, D. and Jang, H. U. and Mun, S. M. and Choi, S. and Lee, H. K.}, title = {Median Filtered Image Restoration and Anti-Forensics Using Adversarial Networks}, journal = {IEEE Signal Processing Letters}, year = {2018}, volume = {25}, number = {2}, pages = {278--282}}
-
Large-Scale and Fine-Grained Evaluation of Popular JPEG Forgery Localization Schemes
arXiv, 2018
arXiv: http://arxiv.org/abs/1811.12915v1
BibTeX@article{Korus2018a, author = {Korus, Pawel}, title = {Large-Scale and Fine-Grained Evaluation of Popular JPEG Forgery Localization Schemes}, journal = {arXiv}, year = {2018}}
-
Content Authentication for Neural Imaging Pipelines: End-to-end Optimization of Photo Provenance in Complex Distribution Channels
arXiv, 2018
arXiv: http://arxiv.org/abs/1812.01516v1
BibTeX@article{Korus2018, author = {Korus, Pawel and Memon, Nasir}, title = {Content Authentication for Neural Imaging Pipelines: End-to-end Optimization of Photo Provenance in Complex Distribution Channels}, journal = {arXiv}, year = {2018}}
-
Image Tampering Detection Based on Inherent Lighting Fingerprints
Computational Vision and Bio Inspired Computing
Springer, 2018
DOI: 10.1007/978-3-319-71767-8_97
BibTeX@incollection{Kumar2018, author = {Kumar, Manoj and Srivastava, Sangeet}, title = {Image Tampering Detection Based on Inherent Lighting Fingerprints}, booktitle = {Computational Vision and Bio Inspired Computing}, publisher = {Springer}, year = {2018}}
-
Image authentication by assessing manipulations using illumination
Multimedia Tools and Applications, Springer, 2018, pp. 1
DOI: 10.1007/s11042-018-6775-x
BibTeX@article{Kumar2018a, author = {Kumar, Manoj and Srivastava, Sangeet}, title = {Image authentication by assessing manipulations using illumination}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2018}, pages = {1}}
-
Camera Model Identification Using Convolutional Neural Networks
arXiv, 2018
arXiv: http://arxiv.org/abs/1810.02981v2
BibTeX@article{Kuzin2018, author = {Kuzin, Artur and Fattakhov, Artur and Kibardin, Ilya and Iglovikov, Vladimir and Dautov, Ruslan}, title = {Camera Model Identification Using Convolutional Neural Networks}, journal = {arXiv}, year = {2018}}
-
Satellite Image Forgery Detection Based on Buildings Shadows Analysis
Analysis of Images, Social Networks and Texts, Springer, 2018
DOI: 10.1007/978-3-319-73013-4_21
BibTeX@article{Kuznetsov2018, author = {Kuznetsov, Andrey and Myasnikov, Vladislav}, title = {Satellite Image Forgery Detection Based on Buildings Shadows Analysis}, journal = {Analysis of Images, Social Networks and Texts}, publisher = {Springer}, year = {2018}}
-
Optimizing the Detection Performance of Smart Camera Networks Through a Probabilistic Image-Based Model
#IEEE_J_CASVT#, 2018, Vol. 28(5), pp. 1197-1211
DOI: 10.1109/TCSVT.2017.2651362
BibTeX@article{Kyrkou2018, author = {Kyrkou, C. and Christoforou, E. G. and Timotheou, S. and Theocharides, T. and Panayiotou, C. and Polycarpou, M.}, title = {Optimizing the Detection Performance of Smart Camera Networks Through a Probabilistic Image-Based Model}, journal = {#IEEE_J_CASVT#}, year = {2018}, volume = {28}, number = {5}, pages = {1197--1211}}
-
PRNU-based source identification for network video surveillance system
Proc. IEEE Int. Conf. Consumer Electronics (ICCE)
2018, pp. 1-2
DOI: 10.1109/ICCE.2018.8326094
BibTeX@inproceedings{Law2018, author = {Law, S. and Law, N.}, title = {PRNU-based source identification for network video surveillance system}, booktitle = {Proc. IEEE Int. Conf. Consumer Electronics (ICCE)}, year = {2018}, pages = {1--2}}
-
Double JPEG compression detection based on block statistics
Multimedia Tools and Applications, Springer, 2018, pp. 1
DOI: 10.1007/s11042-018-6175-2
BibTeX@article{Li2018b, author = {Li, Jixian and Lu, Wei and Weng, Jian and Mao, Yijun and Li, Guoqiang}, title = {Double JPEG compression detection based on block statistics}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2018}, pages = {1}}
-
Inference of a compact representation of sensor fingerprint for source camera identification
Pattern Recognition, Elsevier BV, 2018, Vol. 74, pp. 556-567
DOI: 10.1016/j.patcog.2017.09.027
BibTeX@article{Li2018, author = {Li, Ruizhe and Li, Chang-Tsun and Guan, Yu}, title = {Inference of a compact representation of sensor fingerprint for source camera identification}, journal = {Pattern Recognition}, publisher = {Elsevier BV}, year = {2018}, volume = {74}, pages = {556--567}}
-
Robust median filtering detection based on the difference of frequency residuals
Multimedia Tools and Applications, Springer, 2018, pp. 1
DOI: 10.1007/s11042-018-6831-6
BibTeX@article{Li2018f, author = {Li, Wenjie and Ni, Rongrong and Li, Xiaolong and Zhao, Yao}, title = {Robust median filtering detection based on the difference of frequency residuals}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2018}, pages = {1}}
-
Validating the Contextual Information of Outdoor Images for Photo Misuse Detection
arXiv, 2018
arXiv: http://arxiv.org/abs/1811.08951v1
BibTeX@article{Li2018d, author = {Li, Xiaopeng and Qu, Xianshan and Xu, Wenyuan and Wang, Song and Tong, Yan and Luo, Lannan}, title = {Validating the Contextual Information of Outdoor Images for Photo Misuse Detection}, journal = {arXiv}, year = {2018}}
-
Complexity Based Sample Selection for Camera Source Identification
Machine Learning and Intelligent Communications, Springer, 2018
DOI: 10.1007/978-3-319-73564-1_17
BibTeX@article{Li2018a, author = {Li, Yabin and Wang, Bo and Chong, Kun and Guo, Yanqing}, title = {Complexity Based Sample Selection for Camera Source Identification}, journal = {Machine Learning and Intelligent Communications}, publisher = {Springer}, year = {2018}}
-
Fast and Effective Image Copy-Move Forgery Detection via Hierarchical Feature Point Matching
#IEEE_J_IFS#, 2018, pp. 1
DOI: 10.1109/TIFS.2018.2876837
BibTeX@article{Li2018c, author = {Li, Y. and Zhou, J.}, title = {Fast and Effective Image Copy-Move Forgery Detection via Hierarchical Feature Point Matching}, journal = {#IEEE_J_IFS#}, year = {2018}, pages = {1}}
-
Copy-move forgery detection using combined features and transitive matching
Multimedia Tools and Applications, Springer, 2018, pp. 1
DOI: 10.1007/s11042-018-6922-4
BibTeX@article{Lin2018c, author = {Lin, Cong and Lu, Wei and Huang, Xinchao and Liu, Ke and Sun, Wei and Lin, Hanhui and Tan, Zhiyuan}, title = {Copy-move forgery detection using combined features and transitive matching}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2018}, pages = {1}}
-
The Impact of Exposure Settings in Digital Image Forensics
Proc. 25th IEEE Int. Conf. Image Processing (ICIP)
2018, pp. 540-544
DOI: 10.1109/ICIP.2018.8451688
BibTeX@inproceedings{Lin2018b, author = {Lin, L. and Chen, W. and Wang, Y. and Reinder, S. and Guan, Y. and Newman, J. and Wu, M.}, title = {The Impact of Exposure Settings in Digital Image Forensics}, booktitle = {Proc. 25th IEEE Int. Conf. Image Processing (ICIP)}, year = {2018}, pages = {540--544}}
-
Image Forgery Detection
Introductory Computer Forensics
Springer, 2018
DOI: 10.1007/978-3-030-00581-8_20
BibTeX@incollection{Lin2018d, author = {Lin, Xiaodong}, title = {Image Forgery Detection}, booktitle = {Introductory Computer Forensics}, publisher = {Springer}, year = {2018}}
-
Robust Electric Network Frequency Estimation with Rank Reduction and Linear Prediction
ACM Trans. Multimedia Comput. Commun. Appl., ACM, 2018, Vol. 14(4), pp. 84:1-84:13
DOI: 10.1145/3241058
BibTeX@article{Lin2018a, author = {Lin, Xiaodan and Kang, Xiangui}, title = {Robust Electric Network Frequency Estimation with Rank Reduction and Linear Prediction}, journal = {ACM Trans. Multimedia Comput. Commun. Appl.}, publisher = {ACM}, year = {2018}, volume = {14}, number = {4}, pages = {84:1--84:13}}
-
Recent Advances in Passive Digital Image Security Forensics: A Brief Review
Engineering, Elsevier BV, 2018
DOI: 10.1016/j.eng.2018.02.008
BibTeX@article{Lin2018, author = {Lin, Xiang and Li, Jian-Hua and Wang, Shi-Lin and Liew, Alan-Wee-Chung and Cheng, Feng and Huang, Xiao-Sa}, title = {Recent Advances in Passive Digital Image Security Forensics: A Brief Review}, journal = {Engineering}, publisher = {Elsevier BV}, year = {2018}}
-
Locating splicing forgery by fully convolutional networks and conditional random field
Signal Processing: Image Communication, Elsevier BV, 2018
DOI: 10.1016/j.image.2018.04.011
BibTeX@article{Liu2018, author = {Liu, Bo and Pun, Chi-Man}, title = {Locating splicing forgery by fully convolutional networks and conditional random field}, journal = {Signal Processing: Image Communication}, publisher = {Elsevier BV}, year = {2018}}
-
An Improved Approach to Exposing JPEG Seam Carving under Recompression
#IEEE_J_CASVT#, 2018, pp. 1
DOI: 10.1109/TCSVT.2018.2859633
BibTeX@article{Liu2018b, author = {Liu, Q.}, title = {An Improved Approach to Exposing JPEG Seam Carving under Recompression}, journal = {#IEEE_J_CASVT#}, year = {2018}, pages = {1}}
-
Scaling factor estimation on JPEG compressed images by cyclostationarity analysis
Multimedia Tools and Applications, Springer, 2018, pp. 1
DOI: 10.1007/s11042-018-6411-9
BibTeX@article{Liu2018a, author = {Liu, Xianjin and Lu, Wei and Huang, Tao and Liu, Hongmei and Xue, Yingjie and Yeung, Yuileong}, title = {Scaling factor estimation on JPEG compressed images by cyclostationarity analysis}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2018}, pages = {1}}
-
A Coarse-to-fine Deep Convolutional Neural Network Framework for Frame Duplication Detection and Localization in Video Forgery
arXiv, 2018
arXiv: http://arxiv.org/abs/1811.10762v1
BibTeX@article{Long2018, author = {Long, Chengjiang and Basharat, Arslan and Hoogs, Anthony}, title = {A Coarse-to-fine Deep Convolutional Neural Network Framework for Frame Duplication Detection and Localization in Video Forgery}, journal = {arXiv}, year = {2018}}
-
Detecting Image Brush Editing Using the Discarded Coefficients and Intentions
International Journal of Interactive Multimedia and Artificial Intelligence, IMAI Software - International Journal of Interactive Multimedia and Artificial Intelligence, 2018, Vol. {InPress}({InPress}), pp. 1
DOI: 10.9781/ijimai.2018.08.003
BibTeX@article{Lopez2018, author = {Lopez, Fernando and Valent\in, Luis and Mendivil, Ínigo Sarr\ia Mart\inez}, title = { Detecting Image Brush Editing Using the Discarded Coefficients and Intentions }, journal = {International Journal of Interactive Multimedia and Artificial Intelligence}, publisher = {IMAI Software - International Journal of Interactive Multimedia and Artificial Intelligence}, year = {2018}, volume = {InPress}, number = {InPress}, pages = {1}}
-
A robust technique for copy-move forgery detection and localization in digital images via stationary wavelet and discrete cosine transform
Journal of Visual Communication and Image Representation, Elsevier BV, 2018, Vol. 53, pp. 202-214
DOI: 10.1016/j.jvcir.2018.03.015
BibTeX@article{Mahmood2018, author = {Mahmood, Toqeer and Mehmood, Zahid and Shah, Mohsin and Saba, Tanzila}, title = {A robust technique for copy-move forgery detection and localization in digital images via stationary wavelet and discrete cosine transform}, journal = {Journal of Visual Communication and Image Representation}, publisher = {Elsevier BV}, year = {2018}, volume = {53}, pages = {202--214}}
-
Fusion-based multimodal detection of hoaxes in social networks
WI 2018 - Web Intelligence Chile IEEE/WIC/ACM International Conference on Web Intelligence, Dec 2018, Santiago, Chile.
WI 2018 - Web Intelligence Chile IEEE/WIC/ACM International Conference on Web Intelligence, Dec 2018, Santiago, Chile., 2018
BibTeX@conference{Maigrot2018, author = {Maigrot, Cédric and Claveau, Vincent and Kijak, Ewa}, title = {Fusion-based multimodal detection of hoaxes in social networks}, booktitle = {WI 2018 - Web Intelligence Chile IEEE/WIC/ACM International Conference on Web Intelligence, Dec 2018, Santiago, Chile.}, journal = {WI 2018 - Web Intelligence Chile IEEE/WIC/ACM International Conference on Web Intelligence, Dec 2018, Santiago, Chile.}, year = {2018}}
-
Context-Aware Forgery Localization in Social-Media Images: A Feature-Based Approach Evaluation
Proc. 25th IEEE Int. Conf. Image Processing (ICIP)
2018, pp. 545-549
DOI: 10.1109/ICIP.2018.8451726
BibTeX@inproceedings{Maigrot2018a, author = {Maigrot, C. and Kijak, E. and Claveau, V.}, title = {Context-Aware Forgery Localization in Social-Media Images: A Feature-Based Approach Evaluation}, booktitle = {Proc. 25th IEEE Int. Conf. Image Processing (ICIP)}, year = {2018}, pages = {545--549}}
-
Blind Detection and Localization of Video Temporal Splicing Exploiting Sensor-Based Footprints
Proc. 26th European Signal Processing Conf. (EUSIPCO)
2018, pp. 1362-1366
DOI: 10.23919/EUSIPCO.2018.8553511
BibTeX@inproceedings{Mandelli2018a, author = {Mandelli, S. and Bestagini, P. and Tubaro, S. and Cozzolino, D. and Verdoliva, L.}, title = {Blind Detection and Localization of Video Temporal Splicing Exploiting Sensor-Based Footprints}, booktitle = {Proc. 26th European Signal Processing Conf. (EUSIPCO)}, year = {2018}, pages = {1362--1366}}
-
Facing Device Attribution Problem for Stabilized Video Sequences
arXiv, 2018
arXiv: http://arxiv.org/abs/1811.01820v1
BibTeX@article{Mandelli2018b, author = {Mandelli, Sara and Bestagini, Paolo and Verdoliva, Luisa and Tubaro, Stefano}, title = {Facing Device Attribution Problem for Stabilized Video Sequences}, journal = {arXiv}, year = {2018}}
-
Multiple JPEG Compression Detection Through Task-Driven Non-Negative Matrix Factorization
Proc. Speech and Signal Processing (ICASSP) 2018 IEEE Int. Conf. Acoustics
2018, pp. 2106-2110
DOI: 10.1109/ICASSP.2018.8461904
BibTeX@inproceedings{Mandelli2018, author = {Mandelli, S. and Bonettini, N. and Bestagini, P. and Lipari, V. and Tubaro, S.}, title = {Multiple JPEG Compression Detection Through Task-Driven Non-Negative Matrix Factorization}, booktitle = {Proc. Speech and Signal Processing (ICASSP) 2018 IEEE Int. Conf. Acoustics}, year = {2018}, pages = {2106--2110}}
-
Tamper Detection of Social Media Images using Quality Artifacts and Texture Features
Forensic Science International, Elsevier BV, 2018
DOI: 10.1016/j.forsciint.2018.11.025
BibTeX@article{Manu2018, author = {Manu, V. T. and Mehtre, B. M.}, title = {Tamper Detection of Social Media Images using Quality Artifacts and Texture Features}, journal = {Forensic Science International}, publisher = {Elsevier BV}, year = {2018}}
-
On the vulnerability of deep learning to adversarial attacks for camera model identification
Signal Processing: Image Communication, Elsevier BV, 2018, Vol. 65, pp. 240-248
DOI: 10.1016/j.image.2018.04.007
BibTeX@article{Marra2018, author = {Marra, F. and Gragnaniello, D. and Verdoliva, L.}, title = {On the vulnerability of deep learning to adversarial attacks for camera model identification}, journal = {Signal Processing: Image Communication}, publisher = {Elsevier BV}, year = {2018}, volume = {65}, pages = {240--248}}
-
Putting the PRNU Model in Reverse Gear: Findings with Synthetic Signals
Proc. 26th European Signal Processing Conf. (EUSIPCO)
2018, pp. 1352-1356
DOI: 10.23919/EUSIPCO.2018.8553232
BibTeX@inproceedings{Mascicpinto2018, author = {Mascicpinto, M. and Perez-Gonzalez, F.}, title = {Putting the PRNU Model in Reverse Gear: Findings with Synthetic Signals}, booktitle = {Proc. 26th European Signal Processing Conf. (EUSIPCO)}, year = {2018}, pages = {1352--1356}}
-
Putting the PRNU Model in Reverse Gear: Findings with Synthetic Signals
-, 2018
BibTeX@article{Masciopinto2018, author = {Masciopinto, Miguel and Perez-González, Fernando}, title = {Putting the PRNU Model in Reverse Gear: Findings with Synthetic Signals}, journal = {-}, year = {2018}}
-
Learning Unified Deep-Features for Multiple Forensic Tasks
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security - IHMMSec '18, 2018
BibTeX@article{Mayer2018b, author = {Mayer, Owen and Bayar, Belhassen and Stamm, Matthew C.}, title = {Learning Unified Deep-Features for Multiple Forensic Tasks}, journal = {Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security - IHMMSec '18}, year = {2018}}
-
Accurate and Efficient Image Forgery Detection Using Lateral Chromatic Aberration
IEEE Transactions on Information Forensics and Security, 2018, Vol. PP(99), pp. 1
DOI: 10.1109/TIFS.2018.2799421
BibTeX@article{Mayer2018, author = {Mayer, O. and Stamm, M. C.}, title = {Accurate and Efficient Image Forgery Detection Using Lateral Chromatic Aberration}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2018}, volume = {PP}, number = {99}, pages = {1}}
-
Learned Forensic Source Similarity for Unknown Camera Models
Proc of the SIGPORT 2018
2018
BibTeX@inproceedings{Mayer2018a, author = {Mayer, Owen and Stamm, Mathew C.}, title = {Learned Forensic Source Similarity for Unknown Camera Models}, booktitle = {Proc of the SIGPORT 2018}, year = {2018}}
-
Learned Forensic Source Similarity for Unknown Camera Models
Proc. Speech and Signal Processing (ICASSP) 2018 IEEE Int. Conf. Acoustics
2018, pp. 2012-2016
DOI: 10.1109/ICASSP.2018.8462585
BibTeX@inproceedings{Mayer2018c, author = {Mayer, O. and Stamm, M. C.}, title = {Learned Forensic Source Similarity for Unknown Camera Models}, booktitle = {Proc. Speech and Signal Processing (ICASSP) 2018 IEEE Int. Conf. Acoustics}, year = {2018}, pages = {2012--2016}}
-
Universal Image Manipulation Detection using Deep Siamese Convolutional Neural Network
arXiv, 2018
arXiv: http://arxiv.org/abs/1808.06323v2
BibTeX@article{Mazumdar2018, author = {Mazumdar, Aniruddha and Singh, Jaya and Tomar, Yosha Singh and Bora, Prabin Kumar}, title = {Universal Image Manipulation Detection using Deep Siamese Convolutional Neural Network}, journal = {arXiv}, year = {2018}}
-
Fingerprinting JPEGs With Optimised Huffman Tables
The Journal of Digital Forensics, Security and Law, Embry-Riddle Aeronautical University/Hunt Library, 2018
DOI: 10.15394/jdfsl.2018.1451
BibTeX@article{McKeown2018, author = {McKeown, Sean and Russell, Gordon and Leimich, Petra}, title = {Fingerprinting JPEGs With Optimised Huffman Tables}, journal = {The Journal of Digital Forensics, Security and Law}, publisher = {Embry-Riddle Aeronautical University/Hunt Library}, year = {2018}}
-
Robust PRNU estimation from probabilistic raw measurements
Signal Processing: Image Communication, Elsevier BV, 2018, Vol. 66, pp. 30-41
DOI: 10.1016/j.image.2018.04.013
BibTeX@article{Mehrish2018, author = {Mehrish, Ambuj and Subramanyam, A. V. and Emmanuel, Sabu}, title = {Robust PRNU estimation from probabilistic raw measurements}, journal = {Signal Processing: Image Communication}, publisher = {Elsevier BV}, year = {2018}, volume = {66}, pages = {30--41}}
-
Splicing Detection for Combined DCT, DWT and Spatial Markov-Features Using Ensemble Classifier
Procedia Computer Science, Elsevier BV, 2018, Vol. 132, pp. 1695-1705
DOI: 10.1016/j.procs.2018.05.143
BibTeX@article{Mehta2018, author = {Mehta, Rachna and Agarwal, Navneet}, title = {Splicing Detection for Combined DCT, DWT and Spatial Markov-Features Using Ensemble Classifier}, journal = {Procedia Computer Science}, publisher = {Elsevier BV}, year = {2018}, volume = {132}, pages = {1695--1705}}
-
Social Computing for Verifying Social Media Content in Breaking News
IEEE Internet Computing, Institute of Electrical and Electronics Engineers (IEEE), 2018, Vol. 22(2), pp. 83-89
DOI: 10.1109/mic.2018.112102235
BibTeX@article{Middleton2018, author = {Middleton, Stuart E. and Papadopoulos, Symeon and Kompatsiaris, Yiannis}, title = {Social Computing for Verifying Social Media Content in Breaking News}, journal = {IEEE Internet Computing}, publisher = {Institute of Electrical and Electronics Engineers (IEEE)}, year = {2018}, volume = {22}, number = {2}, pages = {83--89}}
-
Automated approach for splicing detection using first digit probability distribution features
EURASIP Journal on Image and Video Processing, Springer, 2018, Vol. 2018(1), pp. 1
DOI: 10.1186/s13640-018-0257-y
BibTeX@article{Mire2018, author = {Mire, Archana V. and Dhok, Sanjay B. and Mistry, N. J. and Porey, Prakash D.}, title = {Automated approach for splicing detection using first digit probability distribution features}, journal = {EURASIP Journal on Image and Video Processing}, publisher = {Springer}, year = {2018}, volume = {2018}, number = {1}, pages = {1}}
-
Image splicing forgery detection based on low-dimensional singular value decomposition of discrete cosine transform coefficients
Neural Computing and Applications, Springer, 2018, pp. 1
DOI: 10.1007/s00521-018-3586-y
BibTeX@article{Moghaddasi2018, author = {Moghaddasi, Zahra and Jalab, Hamid A. and Noor, Rafidah Md.}, title = {Image splicing forgery detection based on low-dimensional singular value decomposition of discrete cosine transform coefficients}, journal = {Neural Computing and Applications}, publisher = {Springer}, year = {2018}, pages = {1}}
-
Boosting Image Forgery Detection using Resampling Detection and Copy-move analysis
ArXiv, 2018
arXiv: 1802.03154v1
BibTeX@article{Mohammed2018, author = {Mohammed, Tajuddin Manhar and Bunk, Jason and Nataraj, Lakshmanan and Bappy, Jawadul H. and Flenner, Arjuna and Manjunath, B. S. and Chandrasekaran, Shivkumar and Roy-Chowdhury, Amit K. and Peterson, Lawrence}, title = {Boosting Image Forgery Detection using Resampling Detection and Copy-move analysis}, journal = {ArXiv}, year = {2018}}
-
PANDORA: Preserving Privacy in PRNU-Based Source Camera Attribution
Proc. Security And Privacy In Computing And Communications/ 12th IEEE Int 2018 17th IEEE Int. Conf. On Trust Conf. On Big Data Science And Engineering (TrustCom/BigDataSE)
2018, pp. 1202-1207
DOI: 10.1109/TrustCom/BigDataSE.2018.00166
BibTeX@inproceedings{Mohanty2018, author = {Mohanty, M. and Zhang, M. and Asghar, M. R. and Russello, G.}, title = {PANDORA: Preserving Privacy in PRNU-Based Source Camera Attribution}, booktitle = {Proc. Security And Privacy In Computing And Communications/ 12th IEEE Int 2018 17th IEEE Int. Conf. On Trust Conf. On Big Data Science And Engineering (TrustCom/BigDataSE)}, year = {2018}, pages = {1202--1207}}
-
Image Provenance Analysis at Scale
ArXiv, 2018
arXiv: 1801.06510v2
BibTeX@article{Moreira2018, author = {Moreira, Daniel and Bharati, Aparna and Brogan, Joel and Pinto, Allan and Parowski, Michael and Bowyer, Kevin W. and Flynn, Patrick J. and Rocha, Anderson and Scheirer, Walter J.}, title = {Image Provenance Analysis at Scale}, journal = {ArXiv}, year = {2018}}
-
A Machine Learning-based Forensic Discriminator of Pornographic and Bikini Images
Proc. Int. Joint Conf. Neural Networks (IJCNN)
2018, pp. 1-8
DOI: 10.1109/IJCNN.2018.8489100
BibTeX@inproceedings{Moreira2018a, author = {Moreira, D. C. and Fechine, J. M.}, title = {A Machine Learning-based Forensic Discriminator of Pornographic and Bikini Images}, booktitle = {Proc. Int. Joint Conf. Neural Networks (IJCNN)}, year = {2018}, pages = {1--8}}
-
Classification between natural and graphics images based on generalized Gaussian distributions
Information Processing Letters, Elsevier BV, 2018, Vol. 138, pp. 31-34
DOI: 10.1016/j.ipl.2018.05.010
BibTeX@article{Morinaga2018, author = {Morinaga, Atsushi and Hara, Kenji and Inoue, Kohei and Urahama, Kiichi}, title = {Classification between natural and graphics images based on generalized Gaussian distributions}, journal = {Information Processing Letters}, publisher = {Elsevier BV}, year = {2018}, volume = {138}, pages = {31--34}}
-
Copy move forgery detection with using FAST key points and SIFT description vectors
Proc. 26th Signal Processing and Communications Applications Conf. (SIU)
2018, pp. 1-4
DOI: 10.1109/SIU.2018.8404363
BibTeX@inproceedings{Mumcu2018, author = {Mumcu, A. and Savran, I.}, title = {Copy move forgery detection with using FAST key points and SIFT description vectors}, booktitle = {Proc. 26th Signal Processing and Communications Applications Conf. (SIU)}, year = {2018}, pages = {1--4}}
-
Copy-Move Detection Using Gray Level Run Length Matrix Features
Optical and Wireless Technologies, Springer, 2018
DOI: 10.1007/978-981-10-7395-3_46
BibTeX@article{Mushtaq2018, author = {Mushtaq, Saba and Mir, Ajaz Hussain}, title = {Copy-Move Detection Using Gray Level Run Length Matrix Features}, journal = {Optical and Wireless Technologies}, publisher = {Springer}, year = {2018}}
-
A copy-move forgery detection approach based on local intensity order pattern and patchmatch
Proc. 26th Signal Processing and Communications Applications Conf. (SIU)
2018, pp. 1-4
DOI: 10.1109/SIU.2018.8404602
BibTeX@inproceedings{Muzaffer2018, author = {Muzaffer, G. and Erdöl, E. S. and Ulutaş, G.}, title = {A copy-move forgery detection approach based on local intensity order pattern and patchmatch}, booktitle = {Proc. 26th Signal Processing and Communications Applications Conf. (SIU)}, year = {2018}, pages = {1--4}}
-
Exposing forgeries in soccer images using geometric clues
Multimedia Tools and Applications, Springer, 2018, pp. 1
DOI: 10.1007/s11042-018-6225-9
BibTeX@article{Nasiri2018, author = {Nasiri, Morteza and Behrad, Alireza}, title = {Exposing forgeries in soccer images using geometric clues}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2018}, pages = {1}}
-
Using Expectation-Maximization for Exposing Image Forgeries by Revealing Inconsistencies in Shadow Geometry
Journal of Visual Communication and Image Representation, Elsevier BV, 2018
DOI: 10.1016/j.jvcir.2018.12.007
BibTeX@article{Nasiri2018a, author = {Nasiri, Morteza and Behrad, Alireza}, title = {Using Expectation-Maximization for Exposing Image Forgeries by Revealing Inconsistencies in Shadow Geometry}, journal = {Journal of Visual Communication and Image Representation}, publisher = {Elsevier BV}, year = {2018}}
-
Automatic JPEG Grid Detection with Controlled False Alarms, and Its Image Forensic Applications
Proc. IEEE Conf. Multimedia Information Processing and Retrieval (MIPR)
2018, pp. 378-383
DOI: 10.1109/MIPR.2018.00083
BibTeX@inproceedings{Nikoukhah2018a, author = {Nikoukhah, T. and von Gioi, R. Grompone and Colom, M. and Morel, J.}, title = {Automatic JPEG Grid Detection with Controlled False Alarms, and Its Image Forensic Applications}, booktitle = {Proc. IEEE Conf. Multimedia Information Processing and Retrieval (MIPR)}, year = {2018}, pages = {378--383}}
-
Automatic JPEG grid detection with controlled false alarms, and its image forensic applications
2018
BibTeX@electronic{Nikoukhah2018, author = {Nikoukhah, Tina and von Gioi, Rafael Grompone and Colom, Miguel and Morel, Jean-Michel}, title = {Automatic JPEG grid detection with controlled false alarms, and its image forensic applications}, year = {2018}}
-
SPN dash
Proceedings of the International Conference on Computer-Aided Design - ICCAD '18
ACM Press, 2018
DOI: 10.1145/3240765.3240851
BibTeX@inproceedings{Nixon2018, author = {Nixon, Kent W. and Mao, Jiachen and Shen, Juncheng and Yang, Huanrui and Li, Hai (Helen) and Chen, Yiran}, title = {SPN dash}, booktitle = {Proceedings of the International Conference on Computer-Aided Design - ICCAD '18}, publisher = {ACM Press}, year = {2018}}
-
Digital Image Forensics Technique for Copy-Move Forgery Detection Using DoG and ORB
Computer Vision and Graphics, Springer, 2018
DOI: 10.1007/978-3-030-00692-1_41
BibTeX@article{Niyishaka2018, author = {Niyishaka, Patrick and Bhagvati, Chakravarthy}, title = {Digital Image Forensics Technique for Copy-Move Forgery Detection Using DoG and ORB}, journal = {Computer Vision and Graphics}, publisher = {Springer}, year = {2018}}
-
Detection of copy-move image modification using JPEG compression model
Forensic Science International, Elsevier BV, 2018, Vol. 283, pp. 47-57
DOI: 10.1016/j.forsciint.2017.11.031
BibTeX@article{Novozamsky2018, author = {Novozámský, Adam and Šorel, Michal}, title = {Detection of copy-move image modification using JPEG compression model}, journal = {Forensic Science International}, publisher = {Elsevier BV}, year = {2018}, volume = {283}, pages = {47--57}}
-
Hybridized Technique for Copy-Move Forgery Detection Using Discrete Cosine Transform and Speeded-Up Robust Feature Techniques
International Journal of Image, Graphics and Signal Processing, MECS Publisher, 2018, Vol. 10(4), pp. 22-30
DOI: 10.5815/ijigsp.2018.04.03
BibTeX@article{Ojeniyi2018, author = {Ojeniyi, Joseph A. and Adedayo, Bolaji O. and Ismaila, Idris and Shafi'i, Abdulhamid M.}, title = {Hybridized Technique for Copy-Move Forgery Detection Using Discrete Cosine Transform and Speeded-Up Robust Feature Techniques}, journal = {International Journal of Image, Graphics and Signal Processing}, publisher = {MECS Publisher}, year = {2018}, volume = {10}, number = {4}, pages = {22--30}}
-
An Improved DCT Block Based Technique for Copy-Move Forgery Detection in Medical Images
International Journal of Innovative Computing, 2018
BibTeX@article{Oyiza2018, author = {Oyiza, Abdulraheem Hassanat and Maarof, Mohd Aizaini}, title = {An Improved DCT Block Based Technique for Copy-Move Forgery Detection in Medical Images}, journal = {International Journal of Innovative Computing}, year = {2018}}
-
Passive Techniques of Digital Image Forgery Detection: Developments and Challenges
Advances in Electronics, Communication and Computing
Springer, 2018
DOI: 10.1007/978-981-10-4765-7_29
BibTeX@incollection{Panda2018, author = {Panda, Santoshini and Mishra, Minati}, title = {Passive Techniques of Digital Image Forgery Detection: Developments and Challenges}, booktitle = {Advances in Electronics, Communication and Computing}, publisher = {Springer}, year = {2018}}
-
An effectual classification approach to detect copy-move forgery using support vector machines
Multimedia Tools and Applications, Springer, 2018, pp. 1
DOI: 10.1007/s11042-018-6707-9
BibTeX@article{Parashar2018, author = {Parashar, Amrita and Upadhyay, Arvind Kumar and Gupta, Kamlesh}, title = {An effectual classification approach to detect copy-move forgery using support vector machines}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2018}, pages = {1}}
-
Copy-move Image Forgery Detection Based on Gabor Descriptors and K-Means Clustering
Proc. Int. Conf. Smart Computing and Electronic Enterprise (ICSCEE)
2018, pp. 1-6
DOI: 10.1109/ICSCEE.2018.8538432
BibTeX@inproceedings{Parvez2018, author = {Parvez, H. M. S. and Sadeghi, S. and Jalab, H. A. and Al-Shamasneh, A. R. and Uliyan, D. M.}, title = {Copy-move Image Forgery Detection Based on Gabor Descriptors and K-Means Clustering}, booktitle = {Proc. Int. Conf. Smart Computing and Electronic Enterprise (ICSCEE)}, year = {2018}, pages = {1--6}}
-
Image Forensics Based on Planar Contact Constraints of 3D Objects
IEEE Transactions on Information Forensics and Security, 2018, Vol. 13(2), pp. 377-392
DOI: 10.1109/TIFS.2017.2752728
BibTeX@article{Peng2018, author = {Peng, B. and Wang, W. and Dong, J. and Tan, T.}, title = {Image Forensics Based on Planar Contact Constraints of 3D Objects}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2018}, volume = {13}, number = {2}, pages = {377--392}}
-
FD-GAN: Face-demorphing generative adversarial network for restoring accomplice's facial image
arXiv, 2018
arXiv: http://arxiv.org/abs/1811.07665v1
BibTeX@article{Peng2018a, author = {Peng, Fei and Zhang, Le-bing and Long, Min}, title = {FD-GAN: Face-demorphing generative adversarial network for restoring accomplice's facial image}, journal = {arXiv}, year = {2018}}
-
Efficient image splicing detection algorithm based on markov features
Multimedia Tools and Applications, Springer, 2018, pp. 1
DOI: 10.1007/s11042-018-6792-9
BibTeX@article{Pham2018, author = {Pham, Nam Thanh and Lee, Jong-Weon and Kwon, Goo-Rak and Park, Chun-Su}, title = {Efficient image splicing detection algorithm based on markov features}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2018}, pages = {1}}
-
Accurate and Scalable Image Clustering Based On Sparse Representation of Camera Fingerprint
arXiv, 2018
arXiv: http://arxiv.org/abs/1810.07945v1
BibTeX@article{Phan2018, author = {Phan, Quoc-Tin and Boato, Giulia and Natale, Francesco G. B. De}, title = {Accurate and Scalable Image Clustering Based On Sparse Representation of Camera Fingerprint}, journal = {arXiv}, year = {2018}}
-
Image Splicing Detection Through Illumination Inconsistencies and Deep Learning
Proc. 25th IEEE Int. Conf. Image Processing (ICIP)
2018, pp. 3788-3792
DOI: 10.1109/ICIP.2018.8451227
BibTeX@inproceedings{Pomari2018, author = {Pomari, T. and Ruppert, G. and Rezende, E. and Rocha, A. and Carvalho, T.}, title = {Image Splicing Detection Through Illumination Inconsistencies and Deep Learning}, booktitle = {Proc. 25th IEEE Int. Conf. Image Processing (ICIP)}, year = {2018}, pages = {3788--3792}}
-
An integrated method of copy-move and splicing for image forgery detection
Multimedia Tools and Applications, Springer, 2018, pp. 1
DOI: 10.1007/s11042-018-5899-3
BibTeX@article{Prakash2018, author = {Prakash, Choudhary Shyam and Kumar, Avinash and Maheshkar, Sushila and Maheshkar, Vikas}, title = {An integrated method of copy-move and splicing for image forgery detection}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2018}, pages = {1}}
-
Keypoint-based passive method for image manipulation detection
Song, T. (ed.)
Cogent Engineering, Cogent OA, 2018, Vol. 5(1), pp. 1-19
DOI: 10.1080/23311916.2018.1523346
BibTeX@article{Prakash2018a, author = {Prakash, Choudhary Shyam and Om, Hari and Maheshkar, Sushila and Maheshkar, Vikas}, title = {Keypoint-based passive method for image manipulation detection}, journal = {Cogent Engineering}, publisher = {Cogent OA}, year = {2018}, volume = {5}, number = {1}, pages = {1--19}}
-
Forgery detection in 3D-sensor images
Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW) 2018
2018
BibTeX@inproceedings{Privman-Horesh2018, author = {Privman-Horesh, Noa and Haider, Azmi and Hel-Or, Hagit}, title = {Forgery detection in 3D-sensor images}, booktitle = {Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW) 2018}, year = {2018}}
-
Statistical Model-based Detector via Texture Weight Map: Application in Re-sampling Authentication
IEEE Transactions on Multimedia, 2018, pp. 1
DOI: 10.1109/TMM.2018.2872863
BibTeX@article{Qiao2018, author = {Qiao, T. and Shi, R. and Luo, X. and Xu, M. and Zheng, N. and Wu, Y.}, title = {Statistical Model-based Detector via Texture Weight Map: Application in Re-sampling Authentication}, journal = {IEEE Transactions on Multimedia}, year = {2018}, pages = {1}}
-
Distinguishing Between Natural and Computer-Generated Images Using Convolutional Neural Networks
#IEEE_J_IFS#, 2018, Vol. 13(11), pp. 2772-2787
DOI: 10.1109/TIFS.2018.2834147
BibTeX@article{Quan2018, author = {Quan, W. and Wang, K. and Yan, D. M. and Zhang, X.}, title = {Distinguishing Between Natural and Computer-Generated Images Using Convolutional Neural Networks}, journal = {#IEEE_J_IFS#}, year = {2018}, volume = {13}, number = {11}, pages = {2772--2787}}
-
A Prototype for Image Tamper Detection with Self-generated Verification Code Using Gödelization
Smart Computing and Informatics
Springer, 2018
DOI: 10.1007/978-981-10-5547-8_23
BibTeX@incollection{RajaMani2018, author = {Raja Mani, P. and Lalitha Bhaskari, D.}, title = {A Prototype for Image Tamper Detection with Self-generated Verification Code Using Gödelization}, booktitle = {Smart Computing and Informatics}, publisher = {Springer}, year = {2018}}
-
Copy-move forgery detection using binary discriminant features
Journal of King Saud University - Computer and Information Sciences, Elsevier BV, 2018
DOI: 10.1016/j.jksuci.2018.11.004
BibTeX@article{Raju2018, author = {Raju, Priya Mariam and Nair, Madhu S.}, title = {Copy-move forgery detection using binary discriminant features}, journal = {Journal of King Saud University - Computer and Information Sciences}, publisher = {Elsevier BV}, year = {2018}}
-
Two improved extension of local binary pattern descriptors using wavelet transform for texture classification
IET Image Proc, 2018, Vol. 12(11), pp. 2002-2010
DOI: 10.1049/iet-ipr.2018.5410
BibTeX@article{Ramakrishnan2018, author = {Ramakrishnan, S. and Nithya, S.}, title = {Two improved extension of local binary pattern descriptors using wavelet transform for texture classification}, journal = {IET Image Proc}, year = {2018}, volume = {12}, number = {11}, pages = {2002--2010}}
-
Image Processing based forensic investigation of morphed documents
Proc. Communication and Aerospace Technology (ICECA) 2018 Second Int. Conf. Electronics
2018, pp. 1384-1389
DOI: 10.1109/ICECA.2018.8474811
BibTeX@inproceedings{Ranjan2018, author = {Ranjan, S. and Garhwal, P. and Arora, M. and Mehra, A.}, title = {Image Processing based forensic investigation of morphed documents}, booktitle = {Proc. Communication and Aerospace Technology (ICECA) 2018 Second Int. Conf. Electronics}, year = {2018}, pages = {1384--1389}}
-
FaceForensics: A Large-scale Video Dataset for Forgery Detection in Human Faces
arXiv, 2018
arXiv: http://arxiv.org/abs/1803.09179v1
BibTeX@article{Roessler2018, author = {Rössler, Andreas and Cozzolino, Davide and Verdoliva, Luisa and Riess, Christian and Thies, Justus and Nießner, Matthias}, title = {FaceForensics: A Large-scale Video Dataset for Forgery Detection in Human Faces}, journal = {arXiv}, year = {2018}}
-
Discrete cosine transform residual feature based filtering forgery and splicing detection in JPEG images
Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW) 2018
2018
BibTeX@inproceedings{Roy2018, author = {Roy, Aniket and Tariang, Diangarti Bhalang and Chakraborty, Rajat Subhra and Naskar, Ruchira}, title = {Discrete cosine transform residual feature based filtering forgery and splicing detection in JPEG images}, booktitle = {Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW) 2018}, year = {2018}}
-
Examination of digitally manipulated documents using matlab 7.10.0 and adobe photoshop 7.0
Problems of Forensic Sciences, 2018
BibTeX@article{Saini2018, author = {Saini, Komal and Kaur, Shabman Preet}, title = {Examination of digitally manipulated documents using matlab 7.10.0 and adobe photoshop 7.0}, journal = {Problems of Forensic Sciences}, year = {2018}}
-
Solving Time Complexity Issue in Copy-Move Forgery Detection Thru Pre-processing Techniques
International Journal of Innovative Computing, Penerbit UTM Press, 2018, Vol. 8(3)
DOI: 10.11113/ijic.v8n3.213
BibTeX@article{Salleh2018, author = {Salleh, Siti Fadzlun Md and Rohani, Mohd Foad and Maarof, Mohd Aizaini Maarof}, title = {Solving Time Complexity Issue in Copy-Move Forgery Detection Thru Pre-processing Techniques}, journal = {International Journal of Innovative Computing}, publisher = {Penerbit UTM Press}, year = {2018}, volume = {8}, number = {3}}
-
Image Splicing Localization using a Multi-task Fully Convolutional Network (MFCN)
Journal of Visual Communication and Image Representation, Elsevier BV, 2018, Vol. 51, pp. 201-209
DOI: 10.1016/j.jvcir.2018.01.010
BibTeX@article{Salloum2018, author = {Salloum, Ronald and Ren, Yuzhuo and Kuo, C.-C. Jay}, title = {Image Splicing Localization using a Multi-task Fully Convolutional Network (MFCN)}, journal = {Journal of Visual Communication and Image Representation}, publisher = {Elsevier BV}, year = {2018}, volume = {51}, pages = {201--209}}
-
A Survey on Blind Digital Photographs Forensics Based on Image Analysis
Proc of the SIGNAL 2018 : The Third International Conference on Advances in Signal, Image and Video Processing
2018
BibTeX@inproceedings{Samcovic2018, author = {Samčović, Andreja}, title = {A Survey on Blind Digital Photographs Forensics Based on Image Analysis}, booktitle = {Proc of the SIGNAL 2018 : The Third International Conference on Advances in Signal, Image and Video Processing}, year = {2018}}
-
A Deep Learning Based Digital Forensic Solution to Blind Source Identification of Facebook Images
Information Systems Security, Springer, 2018
DOI: 10.1007/978-3-030-05171-6_15
BibTeX@article{Sameer2018a, author = {Sameer, Venkata Udaya and Dali, Ishaan and Naskar, Ruchira}, title = {A Deep Learning Based Digital Forensic Solution to Blind Source Identification of Facebook Images}, journal = {Information Systems Security}, publisher = {Springer}, year = {2018}}
-
Universal Wavelet Relative Distortion: A New Counter–Forensic Attack on Photo Response Non-Uniformity Based Source Camera Identification
Information Security Practice and Experience, Springer, 2018
DOI: 10.1007/978-3-319-99807-7_3
BibTeX@article{Sameer2018, author = {Sameer, Venkata Udaya and Naskar, Ruchira}, title = {Universal Wavelet Relative Distortion: A New Counter–Forensic Attack on Photo Response Non-Uniformity Based Source Camera Identification}, journal = {Information Security Practice and Experience}, publisher = {Springer}, year = {2018}}
-
UCID-RAW – A Colour Image Database in Raw Format
VipIMAGE 2017
Springer, 2018
DOI: 10.1007/978-3-319-68195-5_19
BibTeX@incollection{Schaefer2018, author = {Schaefer, Gerald}, title = {UCID-RAW – A Colour Image Database in Raw Format}, booktitle = {VipIMAGE 2017}, publisher = {Springer}, year = {2018}}
-
Detecting Morphed Face Images Using Facial Landmarks
Image and Signal Processing, Springer, 2018
DOI: 10.1007/978-3-319-94211-7_48
BibTeX@article{Scherhag2018, author = {Scherhag, Ulrich and Budhrani, Dhanesh and Gomez-Barrero, Marta and Busch, Christoph}, title = {Detecting Morphed Face Images Using Facial Landmarks}, journal = {Image and Signal Processing}, publisher = {Springer}, year = {2018}}
-
Beyond Digital, Images, and Forensics: Towards a Regulation of Trust in Multimedia Communication
Universidade Federal Do Rio Grande Do Sul Instituto De Informática Programa De Pós-graduação Em Computação, Universidade Federal Do Rio Grande Do Sul Instituto De Informática Programa De Pós-graduação Em Computação, 2018
BibTeX@phdthesis{Schetinger2018, author = {Schetinger, Victor Chitolina}, title = {Beyond Digital, Images, and Forensics: Towards a Regulation of Trust in Multimedia Communication}, school = {Universidade Federal Do Rio Grande Do Sul Instituto De Informática Programa De Pós-graduação Em Computação}, year = {2018}}
-
Detecting Adversarial Examples - A Lesson from Multimedia Forensics
arXiv, 2018
arXiv: http://arxiv.org/abs/1803.03613v1
BibTeX@article{Schoettle2018, author = {Schöttle, Pascal and Schlögl, Alexander and Pasquini, Cecilia and Böhme, Rainer}, title = {Detecting Adversarial Examples - A Lesson from Multimedia Forensics}, journal = {arXiv}, year = {2018}}
-
Difference of Gaussian Oriented Gradient Histogram for Face Sketch to Photo Matching
#IEEE_O_ACC#, 2018, Vol. 6, pp. 39344-39352
DOI: 10.1109/ACCESS.2018.2855208
BibTeX@article{Setumin2018, author = {Setumin, S. and Suandi, S. A.}, title = {Difference of Gaussian Oriented Gradient Histogram for Face Sketch to Photo Matching}, journal = {#IEEE_O_ACC#}, year = {2018}, volume = {6}, pages = {39344--39352}}
-
Image Splicing Forgery Detection Using DCT Coefficients with Multi-Scale LBP
Proc. Int. Conf. Computing Sciences and Engineering (ICCSE)
2018, pp. 1-6
DOI: 10.1109/ICCSE1.2018.8374214
BibTeX@inproceedings{Shah2018, author = {Shah, A. and El-Alfy, E.}, title = {Image Splicing Forgery Detection Using DCT Coefficients with Multi-Scale LBP}, booktitle = {Proc. Int. Conf. Computing Sciences and Engineering (ICCSE)}, year = {2018}, pages = {1--6}}
-
A New Dataset for Source Identification of High Dynamic Range Images
Sensors, MDPI AG, 2018, Vol. 18(11), pp. 3801
DOI: 10.3390/s18113801
BibTeX@article{Shaya2018, author = {Shaya, Omar and Yang, Pengpeng and Ni, Rongrong and Zhao, Yao and Piva, Alessandro}, title = {A New Dataset for Source Identification of High Dynamic Range Images}, journal = {Sensors}, publisher = {MDPI AG}, year = {2018}, volume = {18}, number = {11}, pages = {3801}}
-
Fake images: The effects of source, intermediary, and digital media literacy on contextual assessment of image credibility online
New Media & Society, SAGE Publications, 2018, pp. 146144481879952
DOI: 10.1177/1461444818799526
BibTeX@article{Shen2018, author = {Shen, Cuihua and Kasra, Mona and Pan, Wenjing and Bassett, Grace A. and Malloch, Yining and O'Brien, James F.}, title = {Fake images: The effects of source, intermediary, and digital media literacy on contextual assessment of image credibility online}, journal = {New Media & Society}, publisher = {SAGE Publications}, year = {2018}, pages = {146144481879952}}
-
Image Splicing Detection Based on the Q-Markov Features
Advances in Multimedia Information Processing – PCM 2018
Springer International Publishing, 2018, pp. 453-464
DOI: 10.1007/978-3-030-00767-6_42
BibTeX@incollection{Sheng2018, author = {Sheng, Hongda and Shen, Xuanjing and Shi, Zenan}, title = {Image Splicing Detection Based on the Q-Markov Features}, booktitle = {Advances in Multimedia Information Processing – PCM 2018}, publisher = {Springer International Publishing}, year = {2018}, pages = {453--464}}
-
Image Manipulation Detection and Localization Based on the Dual-Domain Convolutional Neural Networks
IEEE Access, 2018, pp. 1
DOI: 10.1109/ACCESS.2018.2883588
BibTeX@article{Shi2018, author = {Shi, Z. and Shen, X. and Kang, H. and Lv, Y.}, title = {Image Manipulation Detection and Localization Based on the Dual-Domain Convolutional Neural Networks}, journal = {IEEE Access}, year = {2018}, pages = {1}}
-
Image Manipulation Detection Using Harris Corner and ANMS
Advances in Machine Learning and Data Science
Springer, 2018
DOI: 10.1007/978-981-10-8569-7_9
BibTeX@incollection{ShyamPrakash2018, author = {Shyam Prakash, Choudhary and Maheshkar, Sushila and Maheshkar, Vikas}, title = {Image Manipulation Detection Using Harris Corner and ANMS}, booktitle = {Advances in Machine Learning and Data Science}, publisher = {Springer}, year = {2018}}
-
A Markov based image forgery detection approach by analyzing CFA artifacts
Multimedia Tools and Applications, Springer, 2018, pp. 1
DOI: 10.1007/s11042-018-6075-5
BibTeX@article{Singh2018a, author = {Singh, Amneet and Singh, Gurinder and Singh, Kulbir}, title = {A Markov based image forgery detection approach by analyzing CFA artifacts}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2018}, pages = {1}}
-
Counter JPEG anti-forensic approach based on the second-order statistical analysis
IEEE Transactions on Information Forensics and Security, 2018, pp. 1
DOI: 10.1109/TIFS.2018.2871751
BibTeX@article{Singh2018c, author = {Singh, G. and Singh, K.}, title = {Counter JPEG anti-forensic approach based on the second-order statistical analysis}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2018}, pages = {1}}
-
Adaptive Histogram Equalization Based Image Forensics Using Statistics of DC DCT Coefficients
Advances in Electrical and Electronic Engineering, VSB Technical University of Ostrava, Faculty of Electrical Engineering and Computer Sciences, 2018, Vol. 16(1)
DOI: 10.15598/aeee.v16i1.2647
BibTeX@article{Singh2018, author = {Singh, Neetu and Gupta, Abhinav and Jain, Roop Chand}, title = {Adaptive Histogram Equalization Based Image Forensics Using Statistics of DC DCT Coefficients}, journal = {Advances in Electrical and Electronic Engineering}, publisher = {VSB Technical University of Ostrava, Faculty of Electrical Engineering and Computer Sciences}, year = {2018}, volume = {16}, number = {1}}
-
Copy Move Forgery Detection through Graph Neighborhood Degree
International Journal of Applied Engineering Research, 2018
BibTeX@article{Singh2018d, author = {Singh, Prabhash Kumar and Jana, Biswapati and Jana, Sharmistha Halder}, title = {Copy Move Forgery Detection through Graph Neighborhood Degree}, journal = {International Journal of Applied Engineering Research}, year = {2018}}
-
Video content authentication techniques: a comprehensive survey
Multimedia Systems, Springer, 2018, Vol. 24(2), pp. 211
DOI: 10.1007/s00530-017-0538-9
BibTeX@article{Singh2018b, author = {Singh, Raahat Devender and Aggarwal, Naveen}, title = {Video content authentication techniques: a comprehensive survey}, journal = {Multimedia Systems}, publisher = {Springer}, year = {2018}, volume = {24}, number = {2}, pages = {211}}
-
Image Forensic using Block-based Copy-move Forgery Detection
Proc. 5th Int. Conf. Signal Processing and Integrated Networks (SPIN)
2018, pp. 888-893
DOI: 10.1109/SPIN.2018.8474287
BibTeX@inproceedings{Soni2018c, author = {Soni, B. and Biswas, D.}, title = {Image Forensic using Block-based Copy-move Forgery Detection}, booktitle = {Proc. 5th Int. Conf. Signal Processing and Integrated Networks (SPIN)}, year = {2018}, pages = {888--893}}
-
CMFD: a detailed review of block based and key feature based techniques in image copy-move forgery detection
IET Image Proc, 2018, Vol. 12(2), pp. 167-178
DOI: 10.1049/iet-ipr.2017.0441
BibTeX@article{Soni2018, author = {Soni, B. and Das, P. K. and Thounaojam, D. M.}, title = {CMFD: a detailed review of block based and key feature based techniques in image copy-move forgery detection}, journal = {IET Image Proc}, year = {2018}, volume = {12}, number = {2}, pages = {167--178}}
-
multiCMFD: : fast and efficient system for multiple copy-move forgeries detection in image
Proceedings of the 2018 International Conference on Image and Graphics Processing - ICIGP 2018
ACM Press, 2018
DOI: 10.1145/3191442.3191465
BibTeX@inproceedings{Soni2018a, author = {Soni, Badal and Das, Pradip K. and Thounaojam, Dalton Meitei}, title = {multiCMFD: : fast and efficient system for multiple copy-move forgeries detection in image}, booktitle = {Proceedings of the 2018 International Conference on Image and Graphics Processing - ICIGP 2018}, publisher = {ACM Press}, year = {2018}}
-
An Efficient Block Phase Correlation Approach for CMFD System
Progress in Computing, Analytics and Networking, Springer, 2018
DOI: 10.1007/978-981-10-7871-2_5
BibTeX@article{Soni2018b, author = {Soni, Badal and Das, Pradip K. and Thounaojam, Dalton Meitei}, title = {An Efficient Block Phase Correlation Approach for CMFD System}, journal = {Progress in Computing, Analytics and Networking}, publisher = {Springer}, year = {2018}}
-
Keypoints based enhanced multiple copy-move forgeries detection system using density-based spatial clustering of application with noise clustering algorithm
IET Image Proc, 2018, Vol. 12(11), pp. 2092-2099
DOI: 10.1049/iet-ipr.2018.5576
BibTeX@article{Soni2018e, author = {Soni, B. and Das, P. K. and Thounaojam, D. M.}, title = {Keypoints based enhanced multiple copy-move forgeries detection system using density-based spatial clustering of application with noise clustering algorithm}, journal = {IET Image Proc}, year = {2018}, volume = {12}, number = {11}, pages = {2092--2099}}
-
Improved Block-based Technique using SURF and FAST Keypoints Matching for Copy-Move Attack Detection
Proc. 5th Int. Conf. Signal Processing and Integrated Networks (SPIN)
2018, pp. 197-202
DOI: 10.1109/SPIN.2018.8474093
BibTeX@inproceedings{Soni2018f, author = {Soni, B. and Das, P. K. and Thounaojam, D. Meitei}, title = {Improved Block-based Technique using SURF and FAST Keypoints Matching for Copy-Move Attack Detection}, booktitle = {Proc. 5th Int. Conf. Signal Processing and Integrated Networks (SPIN)}, year = {2018}, pages = {197--202}}
-
A Novel Approach for Detection of Copy-Move Forgery Detection using Transform Domain
Proc. Second Int. Conf. Inventive Communication and Computational Technologies (ICICCT)
2018, pp. 1727-1731
DOI: 10.1109/ICICCT.2018.8473051
BibTeX@inproceedings{Sridevi2018, author = {Sridevi, T. and Krishna, B. R.}, title = {A Novel Approach for Detection of Copy-Move Forgery Detection using Transform Domain}, booktitle = {Proc. Second Int. Conf. Inventive Communication and Computational Technologies (ICICCT)}, year = {2018}, pages = {1727--1731}}
-
Forensic Camera Model Identification: Highlights from the IEEE Signal Processing Cup 2018 Student Competition [SP Competitions]
IEEE Signal Processing Magazine, 2018, Vol. 35(5), pp. 168-174
DOI: 10.1109/MSP.2018.2847326
BibTeX@article{Stamm2018, author = {Stamm, M. and Bestagini, P. and Marcenaro, L. and Campisi, P.}, title = {Forensic Camera Model Identification: Highlights from the IEEE Signal Processing Cup 2018 Student Competition [SP Competitions]}, journal = {IEEE Signal Processing Magazine}, year = {2018}, volume = {35}, number = {5}, pages = {168--174}}
-
Binary Discrete Cosine Transform Approach In Copy-Move Image Forgery: A Case Study Of Colour Contrast Adjustment
UTM Computing Proceedings Innovations in Computing Technology and Applications, 2018, Vol. 3
BibTeX@article{Stanislaus2018, author = {Stanislaus, Abner and Majid, Hairudin Abdul and Samah, Azurah A.}, title = {Binary Discrete Cosine Transform Approach In Copy-Move Image Forgery: A Case Study Of Colour Contrast Adjustment}, journal = {UTM Computing Proceedings Innovations in Computing Technology and Applications}, year = {2018}, volume = {3}}
-
A novel contrast enhancement forensics based on convolutional neural networks
Signal Processing: Image Communication, Elsevier BV, 2018
DOI: 10.1016/j.image.2018.02.001
BibTeX@article{Sun2018a, author = {Sun, Jee-Young and Kim, Seung-Wook and Lee, Sang-Won and Ko, Sung-Jea}, title = {A novel contrast enhancement forensics based on convolutional neural networks}, journal = {Signal Processing: Image Communication}, publisher = {Elsevier BV}, year = {2018}}
-
Exposing splicing forgery based on color temperature estimation
Forensic Science International, Elsevier BV, 2018, Vol. 289, pp. 1-11
DOI: 10.1016/j.forsciint.2018.04.049
BibTeX@article{Sun2018b, author = {Sun, Peng and Lang, Yubo and Fan, Shu and Shen, Zhe and Liu, Lei and Shan, Daguo and Peng, Silong}, title = {Exposing splicing forgery based on color temperature estimation}, journal = {Forensic Science International}, publisher = {Elsevier BV}, year = {2018}, volume = {289}, pages = {1--11}}
-
Nonoverlapping Blocks Based Copy-Move Forgery Detection
Security and Communication Networks, Hindawi Limited, 2018, Vol. 2018, pp. 1-11
DOI: 10.1155/2018/1301290
BibTeX@article{Sun2018, author = {Sun, Yu and Ni, Rongrong and Zhao, Yao}, title = {Nonoverlapping Blocks Based Copy-Move Forgery Detection}, journal = {Security and Communication Networks}, publisher = {Hindawi Limited}, year = {2018}, volume = {2018}, pages = {1--11}}
-
Forensic Discrimination between Traditional and Compressive Imaging Systems
arXiv, 2018
arXiv: http://arxiv.org/abs/1811.03157v1
BibTeX@article{Taimori2018, author = {Taimori, Ali and Marvasti, Farokh}, title = {Forensic Discrimination between Traditional and Compressive Imaging Systems}, journal = {arXiv}, year = {2018}}
-
Median Filtering Detection of Small-Size Image based on CNN
Journal of Visual Communication and Image Representation, Elsevier BV, 2018
DOI: 10.1016/j.jvcir.2018.01.011
BibTeX@article{Tang2018, author = {Tang, Hongshen and Ni, Rongrong and Zhao, Yao and Li, Xiaolong}, title = {Median Filtering Detection of Small-Size Image based on CNN}, journal = {Journal of Visual Communication and Image Representation}, publisher = {Elsevier BV}, year = {2018}}
-
A Novel Decision Fusion Method for Image Forgery Localization
Proc. 37th Chinese Control Conf. (CCC)
2018, pp. 9337-9342
DOI: 10.23919/ChiCC.2018.8482949
BibTeX@inproceedings{Tang2018a, author = {Tang, X. and Zhang, W.}, title = {A Novel Decision Fusion Method for Image Forgery Localization}, booktitle = {Proc. 37th Chinese Control Conf. (CCC)}, year = {2018}, pages = {9337--9342}}
-
Detecting Both Machine and Human Created Fake Face Images In the Wild
Proceedings of the 2nd International Workshop on Multimedia Privacy and Security - MPS '18
ACM Press, 2018
DOI: 10.1145/3267357.3267367
BibTeX@inproceedings{Tariq2018, author = {Tariq, Shahroz and Lee, Sangyup and Kim, Hoyoung and Shin, Youjin and Woo, Simon S.}, title = {Detecting Both Machine and Human Created Fake Face Images In the Wild}, booktitle = {Proceedings of the 2nd International Workshop on Multimedia Privacy and Security - MPS '18}, publisher = {ACM Press}, year = {2018}}
-
Copy-move Forgery Detection Using GLCM-Based Rotation-Invariant Feature: A Preliminary Research
Proc. IEEE 42nd Annual Computer Software and Applications Conf. (COMPSAC)
2018, Vol. 02, pp. 365-369
DOI: 10.1109/COMPSAC.2018.10259
BibTeX@inproceedings{Teerakanok2018, author = {Teerakanok, S. and Uehara, T.}, title = {Copy-move Forgery Detection Using GLCM-Based Rotation-Invariant Feature: A Preliminary Research}, booktitle = {Proc. IEEE 42nd Annual Computer Software and Applications Conf. (COMPSAC)}, year = {2018}, volume = {02}, pages = {365--369}}
-
Enhancement of Media Splicing Detection: A General Framework
The Journal of Digital Forensics, Security and Law, Embry-Riddle Aeronautical University/Hunt Library, 2018
DOI: 10.15394/jdfsl.2018.1481
BibTeX@article{Teerakanok2018a, author = {Teerakanok, Songpon and Uehara, Tetsutaro}, title = {Enhancement of Media Splicing Detection: A General Framework}, journal = {The Journal of Digital Forensics, Security and Law}, publisher = {Embry-Riddle Aeronautical University/Hunt Library}, year = {2018}}
-
Copy Move Forgery using Hus Invariant Moments and Log Polar Transformations
arXiv, 2018
arXiv: http://arxiv.org/abs/1806.02907v1
BibTeX@article{Tejas2018, author = {Tejas, K. and Swathi, C. and Rajesh Kumar, M.}, title = {Copy Move Forgery using Hus Invariant Moments and Log Polar Transformations}, journal = {arXiv}, year = {2018}}
-
Image forensics using color illumination, block and key point based approach
Multimedia Tools and Applications, Springer, 2018, pp. 1
DOI: 10.1007/s11042-018-5836-5
BibTeX@article{Thakur2018, author = {Thakur, Abhishek and Jindal, Neeru}, title = {Image forensics using color illumination, block and key point based approach}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2018}, pages = {1}}
-
A Model of Legal and Procedural Framework for Cybercrime Investigation in India Using Digital Image Forensics
International Conference on Intelligent Computing and Applications
Springer, 2018
DOI: 10.1007/978-981-10-5520-1_16
BibTeX@incollection{Thekkekoodathil2018, author = {Thekkekoodathil, Vijith T. K. and Vijayaragavan, Pramod K.}, title = {A Model of Legal and Procedural Framework for Cybercrime Investigation in India Using Digital Image Forensics}, booktitle = {International Conference on Intelligent Computing and Applications}, publisher = {Springer}, year = {2018}}
-
Image features dependant correlation-weighting function for efficient PRNU based source camera identification
Forensic Science International, Elsevier BV, 2018, Vol. 285, pp. 111-120
DOI: 10.1016/j.forsciint.2018.02.005
BibTeX@article{Tiwari2018, author = {Tiwari, Mayank and Gupta, Bhupendra}, title = {Image features dependant correlation-weighting function for efficient PRNU based source camera identification}, journal = {Forensic Science International}, publisher = {Elsevier BV}, year = {2018}, volume = {285}, pages = {111--120}}
-
Digital forensics of microscopic images for printed source identification
Multimedia Tools and Applications, Springer, 2018, Vol. 77(7), pp. 8729
DOI: 10.1007/s11042-017-4771-1
BibTeX@article{Tsai2018, author = {Tsai, Min-Jen and Yuadi, Imam}, title = {Digital forensics of microscopic images for printed source identification}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2018}, volume = {77}, number = {7}, pages = {8729}}
-
Adaptive SVD Domain Based White Gaussian Noise Level Estimation in Images
IEEE Access, 2018, pp. 1
DOI: 10.1109/ACCESS.2018.2882298
BibTeX@article{Turajlic2018, author = {Turajlic, E.}, title = {Adaptive SVD Domain Based White Gaussian Noise Level Estimation in Images}, journal = {IEEE Access}, year = {2018}, pages = {1}}
-
ToothPic: camera-based image retrieval on large scales
#IEEE_M_MM#, 2018, pp. 1
DOI: 10.1109/MMUL.2018.2873845
BibTeX@article{Valsesia2018, author = {Valsesia, D. and Coluccia, G. and Bianchi, T. and Magli, E.}, title = {ToothPic: camera-based image retrieval on large scales}, journal = {#IEEE_M_MM#}, year = {2018}, pages = {1}}
-
CFA Artifacts Analysis for Image Splicing Detection
Proc of the IV International Conference on "Information Technology and Nanotechnology" (ITNT-2018)
Proc of the IV International Conference on "Information Technology and Nanotechnology" (ITNT-2018), 2018
BibTeX@inproceedings{Varlamova2018, author = {Varlamova, A. A. and Kuznetsov, A. V.}, title = {CFA Artifacts Analysis for Image Splicing Detection}, booktitle = {Proc of the IV International Conference on "Information Technology and Nanotechnology" (ITNT-2018)}, journal = {Proc of the IV International Conference on "Information Technology and Nanotechnology" (ITNT-2018)}, year = {2018}}
-
Digital Images Authentication Technique Based on DWT, DCT and Local Binary Patterns
Sensors, MDPI AG, 2018, Vol. 18(10), pp. 3372
DOI: 10.3390/s18103372
BibTeX@article{Vega2018, author = {Vega, Esteban Armas and Orozco, Ana Sandoval and Villalba, Luis Garc\ia and Hernandez-Castro, Julio}, title = {Digital Images Authentication Technique Based on DWT, DCT and Local Binary Patterns}, journal = {Sensors}, publisher = {MDPI AG}, year = {2018}, volume = {18}, number = {10}, pages = {3372}}
-
Eliminating the effects of illumination condition in feature based camera model identification
Journal of Visual Communication and Image Representation, Elsevier BV, 2018, Vol. 52, pp. 24-32
DOI: 10.1016/j.jvcir.2018.01.015
BibTeX@article{Venkata2018, author = {Venkata, Udaya Sameer and Naskar, Ruchira}, title = {Eliminating the effects of illumination condition in feature based camera model identification}, journal = {Journal of Visual Communication and Image Representation}, publisher = {Elsevier BV}, year = {2018}, volume = {52}, pages = {24--32}}
-
Video Codec Forensics Based on Convolutional Neural Networks
Proc. 25th IEEE Int. Conf. Image Processing (ICIP)
2018, pp. 530-534
DOI: 10.1109/ICIP.2018.8451143
BibTeX@inproceedings{Verde2018, author = {Verde, S. and Bondi, L. and Bestagini, P. and Milani, S. and Calvagno, G. and Tubaro, S.}, title = {Video Codec Forensics Based on Convolutional Neural Networks}, booktitle = {Proc. 25th IEEE Int. Conf. Image Processing (ICIP)}, year = {2018}, pages = {530--534}}
-
Mathematical Models for Digital Imaging and their Applications in Digital Image Forensics
Ram, M. (ed.)
Chapter 4
Mathematics Applied in Information Systems, Bentham Science Publishers, 2018, Vol. 2, pp. 72-107
DOI: 10.2174/97816810871391180201
BibTeX@inbook{Verma2018, author = {Verma, Hemant K. and Verma, Vinay and Khanna, Nitin}, title = {Mathematical Models for Digital Imaging and their Applications in Digital Image Forensics}, journal = {Mathematics Applied in Information Systems}, publisher = {Bentham Science Publishers}, year = {2018}, volume = {2}, pages = {72--107}}
-
Illuminant Color Inconsistency as a Powerful Clue for Detecting Digital Image Forgery: A Survey
Intelligent Systems Technologies and Applications
Springer, 2018
DOI: 10.1007/978-3-319-68385-0_24
BibTeX@incollection{Vidyadharan2018, author = {Vidyadharan, Divya S. and Thampi, Sabu M.}, title = {Illuminant Color Inconsistency as a Powerful Clue for Detecting Digital Image Forgery: A Survey}, booktitle = {Intelligent Systems Technologies and Applications}, publisher = {Springer}, year = {2018}}
-
Evaluating color and texture features for forgery localization from illuminant maps
Multimedia Tools and Applications, Springer, 2018, pp. 1
DOI: 10.1007/s11042-017-5574-0
BibTeX@article{Vidyadharan2018a, author = {Vidyadharan, Divya S. and Thampi, Sabu M.}, title = {Evaluating color and texture features for forgery localization from illuminant maps}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2018}, pages = {1}}
-
On combining MD5 for image authentication using LSB substitution in selected pixels
2018 International Conference on Engineering and Emerging Technologies (ICEET)
IEEE, 2018
DOI: 10.1109/iceet1.2018.8338621
BibTeX@inproceedings{Wahid2018, author = {Wahid, Muneeza and Ahmad, Nasir and Zafar, Muhammad Haseeb and Khan, Sahib}, title = {On combining MD5 for image authentication using LSB substitution in selected pixels}, booktitle = {2018 International Conference on Engineering and Emerging Technologies (ICEET)}, publisher = {IEEE}, year = {2018}}
-
Comprehensive Display of Digital Image Copy-Move Forensics Techniques
Proc. Int. Conf. Engineering Technology and their Applications (IICETA)
2018, pp. 155-160
DOI: 10.1109/IICETA.2018.8458084
BibTeX@inproceedings{Waleed2018, author = {Waleed, J. and Abdullah, D. A. and Khudhur, M. H.}, title = {Comprehensive Display of Digital Image Copy-Move Forensics Techniques}, booktitle = {Proc. Int. Conf. Engineering Technology and their Applications (IICETA)}, year = {2018}, pages = {155--160}}
-
An Eagle-Eye View of Recent Digital Image Forgery Detection Methods
Smart and Innovative Trends in Next Generation Computing Technologies, Springer, 2018
DOI: 10.1007/978-981-10-8660-1_36
BibTeX@article{Walia2018, author = {Walia, Savita and Kumar, Krishan}, title = {An Eagle-Eye View of Recent Digital Image Forgery Detection Methods}, journal = {Smart and Innovative Trends in Next Generation Computing Technologies}, publisher = {Springer}, year = {2018}}
-
Source camera model identification based on convolutional neural networks with local binary patterns coding
Signal Processing: Image Communication, Elsevier BV, 2018, Vol. 68, pp. 162-168
DOI: 10.1016/j.image.2018.08.001
BibTeX@article{Wang2018i, author = {Wang, Bo and Yin, Jianfeng and Tan, Shunquan and Li, Yabin and Li, Ming}, title = {Source camera model identification based on convolutional neural networks with local binary patterns coding}, journal = {Signal Processing: Image Communication}, publisher = {Elsevier BV}, year = {2018}, volume = {68}, pages = {162--168}}
-
Ensemble classifier based source camera identification using fusion features
Multimedia Tools and Applications, Springer Nature America, Inc, 2018
DOI: 10.1007/s11042-018-6835-2
BibTeX@article{Wang2018h, author = {Wang, Bo and Zhong, Kun and Li, Ming}, title = {Ensemble classifier based source camera identification using fusion features}, journal = {Multimedia Tools and Applications}, publisher = {Springer Nature America, Inc}, year = {2018}}
-
An Image Copy-Move Forgery Detection Scheme Based on A-KAZE and SURF Features
sysmmetry, 2018
BibTeX@article{Wang2018g, author = {Wang, Chengyou and Zhang, Zhi and Zhou, Xiao}, title = {An Image Copy-Move Forgery Detection Scheme Based on A-KAZE and SURF Features}, journal = {sysmmetry}, year = {2018}}
-
A forensic algorithm against median filtering based on coefficients of image blocks in frequency domain
Multimedia Tools and Applications, Springer, 2018, pp. 1
DOI: 10.1007/s11042-018-5651-z
BibTeX@article{Wang2018, author = {Wang, Dong-ping and Gao, Tiegang and Yang, Fusheng}, title = {A forensic algorithm against median filtering based on coefficients of image blocks in frequency domain}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2018}, pages = {1}}
-
Blind forensics of image gamma transformation and its application in splicing detection
Journal of Visual Communication and Image Representation, Elsevier BV, 2018, Vol. 55, pp. 80-90
DOI: 10.1016/j.jvcir.2018.05.020
BibTeX@article{Wang2018d, author = {Wang, Ping and Liu, Fenlin and Yang, Chunfang and Luo, Xiangyang}, title = {Blind forensics of image gamma transformation and its application in splicing detection}, journal = {Journal of Visual Communication and Image Representation}, publisher = {Elsevier BV}, year = {2018}, volume = {55}, pages = {80--90}}
-
Photo-based vendor re-identification on darknet marketplaces using deep neural networks
Virginia Polytechnic Institute and State University, Virginia Polytechnic Institute and State University, 2018
BibTeX@mastersthesis{Wang2018b, author = {Wang, Xiangwen}, title = {Photo-based vendor re-identification on darknet marketplaces using deep neural networks}, school = {Virginia Polytechnic Institute and State University}, year = {2018}}
-
You Are Your Photographs: Detecting Multiple Identities of Vendors in the Darknet Marketplaces
Proceedings of The ACM Asia Conference on Computer and Communications Security (ASIACCS), 2018
BibTeX@article{Wang2018a, author = {Wang, Xiangwen and Peng, Peng and Wang, Chun and Wang, Gang}, title = {You Are Your Photographs: Detecting Multiple Identities of Vendors in the Darknet Marketplaces}, journal = {Proceedings of The ACM Asia Conference on Computer and Communications Security (ASIACCS)}, year = {2018}}
-
A new keypoint-based copy-move forgery detection for color image
Applied Intelligence, Springer, 2018, pp. 1
DOI: 10.1007/s10489-018-1168-4
BibTeX@article{Wang2018c, author = {Wang, Xiang-Yang and Jiao, Li-Xian and Wang, Xue-Bing and Yang, Hong-Ying and Niu, Pan-Pan}, title = {A new keypoint-based copy-move forgery detection for color image}, journal = {Applied Intelligence}, publisher = {Springer}, year = {2018}, pages = {1}}
-
Copy-move forgery detection based on compact color content descriptor and Delaunay triangle matching
Multimedia Tools and Applications, Springer, 2018, pp. 1
DOI: 10.1007/s11042-018-6354-1
BibTeX@article{Wang2018f, author = {Wang, Xiang-yang and Jiao, Li-xian and Wang, Xue-bing and Yang, Hong-ying and Niu, Pan-pan}, title = {Copy-move forgery detection based on compact color content descriptor and Delaunay triangle matching}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2018}, pages = {1}}
-
Copy Move Image Forgery Detection Based on Polar Fourier Representation
International Journal of Machine Learning and Computing, 2018, Vol. 8(2)
BibTeX@article{Wang2018e, author = {Wang, Yitian and Kamata, Sei-ichiro}, title = {Copy Move Image Forgery Detection Based on Polar Fourier Representation}, journal = {International Journal of Machine Learning and Computing}, year = {2018}, volume = {8}, number = {2}}
-
A review on robust video copy detection
International Journal of Multimedia Information Retrieval, Springer, 2018, pp. 1
DOI: 10.1007/s13735-018-0159-x
BibTeX@article{Wary2018, author = {Wary, Alongbar and Neelima, Arambam}, title = {A review on robust video copy detection}, journal = {International Journal of Multimedia Information Retrieval}, publisher = {Springer}, year = {2018}, pages = {1}}
-
Hopfield network-based approach to detect seam-carved images and identify tampered regions
Neural Computing and Applications, Springer, 2018, pp. 1
DOI: 10.1007/s00521-018-3463-8
BibTeX@article{Wei2018, author = {Wei, Jyh-Da and Cheng, Hui-Jun and Chang, Che-Wen}, title = {Hopfield network-based approach to detect seam-carved images and identify tampered regions}, journal = {Neural Computing and Applications}, publisher = {Springer}, year = {2018}, pages = {1}}
-
A Jungle Computing approach to common image source identification in large collections of images
Digital Investigation, Elsevier BV, 2018, Vol. 27, pp. 3-16
DOI: 10.1016/j.diin.2018.09.002
BibTeX@article{Werkhoven2018, author = {van Werkhoven, B. and Hijma, P. and Jacobs, C. J. H. and Maassen, J. and Geradts, Z. J. M. H. and Bal, H. E.}, title = {A Jungle Computing approach to common image source identification in large collections of images}, journal = {Digital Investigation}, publisher = {Elsevier BV}, year = {2018}, volume = {27}, pages = {3--16}}
-
Research on optimization of image fast feature point matching algorithm
EURASIP Journal on Image and Video Processing, Springer Nature America, Inc, 2018, Vol. 2018(1)
DOI: 10.1186/s13640-018-0354-y
BibTeX@article{Wu2018c, author = {Wu, Manyi}, title = {Research on optimization of image fast feature point matching algorithm}, journal = {EURASIP Journal on Image and Video Processing}, publisher = {Springer Nature America, Inc}, year = {2018}, volume = {2018}, number = {1}}
-
Geometry of Motion for Video Shakiness Detection
Journal of Computer Science and Technology, Springer, 2018, Vol. 33(3), pp. 475
DOI: 10.1007/s11390-018-1832-5
BibTeX@article{Wu2018, author = {Wu, Xiao-Qun and Li, Hai-Sheng and Cao, Jian and Cai, Qiang}, title = {Geometry of Motion for Video Shakiness Detection}, journal = {Journal of Computer Science and Technology}, publisher = {Springer}, year = {2018}, volume = {33}, number = {3}, pages = {475}}
-
Image Copy-Move Forgery Detection via an End-to-End Deep Neural Network
Proc. IEEE Winter Conf. Applications of Computer Vision (WACV)
2018, pp. 1907-1915
DOI: 10.1109/WACV.2018.00211
BibTeX@inproceedings{Wu2018a, author = {Wu, Y. and Abd-Almageed, W. and Natarajan, P.}, title = {Image Copy-Move Forgery Detection via an End-to-End Deep Neural Network}, booktitle = {Proc. IEEE Winter Conf. Applications of Computer Vision (WACV)}, year = {2018}, pages = {1907--1915}}
-
BusterNet: Detecting Copy-Move Image Forgery with Source/Target Localization
Computer Vision – ECCV 2018, Springer, 2018
DOI: 10.1007/978-3-030-01231-1_11
BibTeX@article{Wu2018b, author = {Wu, Yue and Abd-Almageed, Wael and Natarajan, Prem}, title = {BusterNet: Detecting Copy-Move Image Forgery with Source/Target Localization}, journal = {Computer Vision – ECCV 2018}, publisher = {Springer}, year = {2018}}
-
Image-based forgery detection using big data clustering
Multimedia Tools and Applications, Springer, 2018, pp. 1
DOI: 10.1007/s11042-017-5555-3
BibTeX@article{Xiong2018, author = {Xiong, Chao and Zhu, Ju and Li, Yuan and Xiang, Ruxi}, title = {Image-based forgery detection using big data clustering}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2018}, pages = {1}}
-
JPEG image tampering localization based on normalized gray level co-occurrence matrix
Multimedia Tools and Applications, Springer, 2018, pp. 1
DOI: 10.1007/s11042-018-6611-3
BibTeX@article{Xue2018, author = {Xue, Fei and Lu, Wei and Ye, Ziyi and Liu, Hongmei}, title = {JPEG image tampering localization based on normalized gray level co-occurrence matrix}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2018}, pages = {1}}
-
Recolored Image Detection via a Deep Discriminative Model
IEEE Transactions on Information Forensics and Security, 2018, pp. 1
DOI: 10.1109/TIFS.2018.2834155
BibTeX@article{Yan2018, author = {Yan, Y. and Ren, W. and Cao, X.}, title = {Recolored Image Detection via a Deep Discriminative Model}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2018}, pages = {1}}
-
Double JPEG Compression Detection Based on Fusion Features
Machine Learning and Intelligent Communications, Springer, 2018
DOI: 10.1007/978-3-319-73564-1_16
BibTeX@article{Yang2018, author = {Yang, Fulong and Li, Yabin and Chong, Kun and Wang, Bo}, title = {Double JPEG Compression Detection Based on Fusion Features}, journal = {Machine Learning and Intelligent Communications}, publisher = {Springer}, year = {2018}}
-
Double JPEG compression detection by exploring the correlations in DCT domain
ArXiv, 2018
arXiv: http://arxiv.org/abs/1806.01571v1
BibTeX@article{Yang2018a, author = {Yang, Pengpeng and Ni, Rongrong and Zhao, Yao}, title = {Double JPEG compression detection by exploring the correlations in DCT domain}, journal = {ArXiv}, year = {2018}}
-
Robust Contrast Enhancement Forensics Using Convolutional Neural Networks
ArXiv, 2018
arXiv: http://arxiv.org/abs/1803.04749v2
BibTeX@article{Yang2018b, author = {Yang, Pengpeng and Ni, Rongrong and Zhao, Yao and Cao, Gang and Wu, Haorui and Zhao, Wei}, title = {Robust Contrast Enhancement Forensics Using Convolutional Neural Networks}, journal = {ArXiv}, year = {2018}}
-
Robust multi-classifier for camera model identification based on convolution neural network
IEEE Access, 2018, Vol. 6, pp. 24973-24982
DOI: 10.1109/ACCESS.2018.2832066
BibTeX@article{Yao2018, author = {Yao, H. and Qiao, T. and Xu, M. and Zheng, N.}, title = {Robust multi-classifier for camera model identification based on convolution neural network}, journal = {IEEE Access}, year = {2018}, volume = {6}, pages = {24973--24982}}
-
Towards Camera Identification from Cropped Query Images
Proc. 25th IEEE Int. Conf. Image Processing (ICIP)
2018, pp. 3798-3802
DOI: 10.1109/ICIP.2018.8451749
BibTeX@inproceedings{Yaqub2018, author = {Yaqub, W. and Mohanty, M. and Memon, N.}, title = {Towards Camera Identification from Cropped Query Images}, booktitle = {Proc. 25th IEEE Int. Conf. Image Processing (ICIP)}, year = {2018}, pages = {3798--3802}}
-
Satellite Image Forgery Detection and Localization Using GAN and One-Class Classifier
ArXiv, 2018
arXiv: 1802.04881v1
BibTeX@article{Yarlagadda2018, author = {Yarlagadda, Sri Kalyan and Güera, David and Bestagini, Paolo and Zhu, Fengqing Maggie and Tubaro, Stefano and Delp, Edward J.}, title = {Satellite Image Forgery Detection and Localization Using GAN and One-Class Classifier}, journal = {ArXiv}, year = {2018}}
-
Fusion Approaches System of Copy-Move Forgery Detection
American Journal of Computer Science and Engineering Survey, 2018
BibTeX@article{Ye2018, author = {Ye, Abdalla and Mt, Iqbal and Shehata, M.}, title = {Fusion Approaches System of Copy-Move Forgery Detection}, journal = {American Journal of Computer Science and Engineering Survey}, year = {2018}}
-
Image forensic for digital image copy move forgery detection
Proc. IEEE 14th Int. Colloquium Signal Processing Its Applications (CSPA)
2018, pp. 239-244
DOI: 10.1109/CSPA.2018.8368719
BibTeX@inproceedings{Yeap2018a, author = {Yeap, Y. Y. and Sheikh, U. U. and Rahman, A. A. A.}, title = {Image forensic for digital image copy move forgery detection}, booktitle = {Proc. IEEE 14th Int. Colloquium Signal Processing Its Applications (CSPA)}, year = {2018}, pages = {239--244}}
-
Image forensic for digital image copy move forgery detection
Proc. IEEE 14th Int. Colloquium Signal Processing Its Applications (CSPA)
2018, pp. 239-244
DOI: 10.1109/CSPA.2018.8368719
BibTeX@inproceedings{Yeap2018, author = {Yeap, Y. Y. and Sheikh, U. U. and Rahman, A. A. H. A.}, title = {Image forensic for digital image copy move forgery detection}, booktitle = {Proc. IEEE 14th Int. Colloquium Signal Processing Its Applications (CSPA)}, year = {2018}, pages = {239--244}}
-
Image splicing detection with dwt domain extended Markov features
Proc. 26th Signal Processing and Communications Applications Conf. (SIU)
2018, pp. 1-4
DOI: 10.1109/SIU.2018.8404325
BibTeX@inproceedings{Yildirim2018, author = {Yildirim, E. O. and Ulutaş, G.}, title = {Image splicing detection with dwt domain extended Markov features}, booktitle = {Proc. 26th Signal Processing and Communications Applications Conf. (SIU)}, year = {2018}, pages = {1--4}}
-
Blind Detection of Partial-Color-Manipulation Based on Self-PRNU Estimation
International Journal of Digital Crime and Forensics, IGI Global, 2018, Vol. 10(3), pp. 1-14
DOI: 10.4018/ijdcf.2018070101
BibTeX@article{Yuting2018, author = {Yuting, Sun and Jing, Guo and Ling, Du and Yongzhen, Ke}, title = {Blind Detection of Partial-Color-Manipulation Based on Self-PRNU Estimation}, journal = {International Journal of Digital Crime and Forensics}, publisher = {IGI Global}, year = {2018}, volume = {10}, number = {3}, pages = {1--14}}
-
Detection of double JPEG compression using modified DenseNet model
Multimedia Tools and Applications, Springer, 2018, pp. 1
DOI: 10.1007/s11042-018-6737-3
BibTeX@article{Zeng2018, author = {Zeng, Ximei and Feng, Guorui and Zhang, Xinpeng}, title = {Detection of double JPEG compression using modified DenseNet model}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2018}, pages = {1}}
-
Detecting seam carved images using uniform local binary patterns
Multimedia Tools and Applications, Springer, 2018, pp. 1
DOI: 10.1007/s11042-018-6470-y
BibTeX@article{Zhang2018g, author = {Zhang, Dengyong and Yang, Gaobo and Li, Feng and Wang, Jin and Sangaiah, Arun Kumar}, title = {Detecting seam carved images using uniform local binary patterns}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2018}, pages = {1}}
-
An Algorithm for Asymmetric Clipping Detection Based on Parameter Optimization
Advances in Intelligent Information Hiding and Multimedia Signal Processing
Springer, 2018
DOI: 10.1007/978-3-319-63859-1_2
BibTeX@incollection{Zhang2018, author = {Zhang, Jiwei and Niu, Shaozhang and Li, Yueying and Liu, Yuhan}, title = {An Algorithm for Asymmetric Clipping Detection Based on Parameter Optimization}, booktitle = {Advances in Intelligent Information Hiding and Multimedia Signal Processing}, publisher = {Springer}, year = {2018}}
-
Image Deeper Passive Forgery Detection Based on SIFT and Higher-Order Statistics Features
Proc. IEEE Fourth Int. Conf. Multimedia Big Data (BigMM)
2018, pp. 1-6
DOI: 10.1109/BigMM.2018.8499459
BibTeX@inproceedings{Zhang2018e, author = {Zhang, J. and Ruan, Q. and Jin, Y. and Ge, J.}, title = {Image Deeper Passive Forgery Detection Based on SIFT and Higher-Order Statistics Features}, booktitle = {Proc. IEEE Fourth Int. Conf. Multimedia Big Data (BigMM)}, year = {2018}, pages = {1--6}}
-
Face Morphing Detection Using Fourier Spectrum of Sensor Pattern Noise
Proc. IEEE Int. Conf. Multimedia and Expo (ICME)
2018, pp. 1-6
DOI: 10.1109/ICME.2018.8486607
BibTeX@inproceedings{Zhang2018f, author = {Zhang, L. and Peng, F. and Long, M.}, title = {Face Morphing Detection Using Fourier Spectrum of Sensor Pattern Noise}, booktitle = {Proc. IEEE Int. Conf. Multimedia and Expo (ICME)}, year = {2018}, pages = {1--6}}
-
Digital image splicing detection based on Markov features in block DWT domain
Multimedia Tools and Applications, Springer, 2018, pp. 1
DOI: 10.1007/s11042-018-6230-z
BibTeX@article{Zhang2018c, author = {Zhang, Qingbo and Lu, Wei and Wang, Ruxin and Li, Guoqiang}, title = {Digital image splicing detection based on Markov features in block DWT domain}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2018}, pages = {1}}
-
Medical image blind integrity verification with Krawtchouk moments
International Journal of Biomedical Imaging, 2018
BibTeX@article{Zhang2018d, author = {Zhang, Xu and Liu, Xilin and Shu, Huazhong and Yang, Chen}, title = {Medical image blind integrity verification with Krawtchouk moments}, journal = {International Journal of Biomedical Imaging}, year = {2018}}
-
A semi-feature learning approach for tampered region localization across multi-format images
Multimedia Tools and Applications, Springer, 2018, pp. 1
DOI: 10.1007/s11042-018-5756-4
BibTeX@article{Zhang2018b, author = {Zhang, Ying and Thing, Vrizlynn L. L.}, title = {A semi-feature learning approach for tampered region localization across multi-format images}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2018}, pages = {1}}
-
Boundary-based Image Forgery Detection by Fast Shallow CNN
ArXiv, 2018
arXiv: 1801.06732v1
BibTeX@article{Zhang2018a, author = {Zhang, Zhongping and Zhang, Yixuan and Zhou, Zheng and Luo, Jiebo}, title = {Boundary-based Image Forgery Detection by Fast Shallow CNN}, journal = {ArXiv}, year = {2018}}
-
Source camera identification via low dimensional PRNU features
Multimedia Tools and Applications, Springer, 2018, pp. 1
DOI: 10.1007/s11042-018-6809-4
BibTeX@article{Zhao2018a, author = {Zhao, Yihua and Zheng, Ning and Qiao, Tong and Xu, Ming}, title = {Source camera identification via low dimensional PRNU features}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2018}, pages = {1}}
-
Learning Irregular Space Transformation for Person Re-Identification
#IEEE_O_ACC#, 2018, Vol. 6, pp. 53214-53225
DOI: 10.1109/ACCESS.2018.2871149
BibTeX@article{Zheng2018, author = {Zheng, Y. and Sheng, H. and Liu, Y. and Lv, K. and Ke, W. and Xiong, Z.}, title = {Learning Irregular Space Transformation for Person Re-Identification}, journal = {#IEEE_O_ACC#}, year = {2018}, volume = {6}, pages = {53214--53225}}
-
Learning Rich Features for Image Manipulation Detection
ArXiv, 2018
arXiv: 1805.04953v1
BibTeX@article{Zhou2018a, author = {Zhou, Peng and Han, Xintong and Morariu, Vlad I. and Davis, Larry S.}, title = {Learning Rich Features for Image Manipulation Detection}, journal = {ArXiv}, year = {2018}}
-
Deep Residual Network for Joint Demosaicing and Super-Resolution
ArXiv, 2018
arXiv: 1802.06573v1
BibTeX@article{Zhou2018, author = {Zhou, Ruofan and Achanta, Radhakrishna and Süsstrunk, Sabine}, title = {Deep Residual Network for Joint Demosaicing and Super-Resolution}, journal = {ArXiv}, year = {2018}}
-
Blind image splicing detection via noise level function
Signal Processing: Image Communication, Elsevier BV, 2018, Vol. 68, pp. 181-192
DOI: 10.1016/j.image.2018.07.012
BibTeX@article{Zhu2018, author = {Zhu, Nan and Li, Zhao}, title = {Blind image splicing detection via noise level function}, journal = {Signal Processing: Image Communication}, publisher = {Elsevier BV}, year = {2018}, volume = {68}, pages = {181--192}}
2017
-
On the Use of Benford's Law to Detect JPEG Biometric Data Tampering
Journal of Information Security, Scientific Research Publishing, Inc,, 2017, Vol. 08(03), pp. 240-256
DOI: 10.4236/jis.2017.83016
BibTeX@article{Aamo2017, author = {Aamo, Iorliam and Caleb, Shangbum F.}, title = {On the Use of Benford's Law to Detect JPEG Biometric Data Tampering}, journal = {Journal of Information Security}, publisher = {Scientific Research Publishing, Inc,}, year = {2017}, volume = {08}, number = {03}, pages = {240--256}}
-
A sparse representation-based approach for copy-move image forgery detection in smooth regions
Verikas, A., Radeva, P., Nikolaev, D. P., Zhang, W. & Zhou, J. (ed.)
Ninth International Conference on Machine Vision (ICMV 2016)
SPIE-Intl Soc Optical Eng, 2017
DOI: 10.1117/12.2268766
BibTeX@inproceedings{Abdessamad2017, author = {Abdessamad, Jalila and ElAdel, Asma and Zaied, Mourad}, title = {A sparse representation-based approach for copy-move image forgery detection in smooth regions}, booktitle = {Ninth International Conference on Machine Vision (ICMV 2016)}, publisher = {SPIE-Intl Soc Optical Eng}, year = {2017}}
-
Photo forensics from JPEG dimples
Proc. IEEE Workshop Information Forensics and Security (WIFS)
2017, pp. 1-6
DOI: 10.1109/WIFS.2017.8267641
BibTeX@inproceedings{Agarwal2017, author = {Agarwal, S. and Farid, H.}, title = {Photo forensics from JPEG dimples}, booktitle = {Proc. IEEE Workshop Information Forensics and Security (WIFS)}, year = {2017}, pages = {1--6}}
-
Guetzli: Perceptually Guided JPEG Encoder
arXiv, 2017
BibTeX@article{Alakuijala2017, author = {Alakuijala, Jyrki and Obryk, Robert and Stoliarchuk, Ostap and Szabadka, Zoltan and Vandevenne, Lode and Wassenberg, Jan}, title = {Guetzli: Perceptually Guided JPEG Encoder}, journal = {arXiv}, year = {2017}}
-
Modern Visibility Enhancement and Tampering Detection Tools of Digital Image Forensics: A Laconic Review
TechArt: Journal of Arts and Imaging Science, 2017, Vol. 4(1)
DOI: 10.15323/techart.2017.2.4.1.32
BibTeX@article{Al-Ameen2017, author = {Al-Ameen, Zohair and Al-Atroshi, Chiai}, title = {Modern Visibility Enhancement and Tampering Detection Tools of Digital Image Forensics: A Laconic Review}, journal = {TechArt: Journal of Arts and Imaging Science}, year = {2017}, volume = {4}, number = {1}}
-
Copy-Move Forgery Detection using Integrated DWT and SURF
Journal of Telecommunication, Electronic and Computer Engineering, 2017, Vol. 9(1-2)
BibTeX@article{Alamro2017, author = {Alamro, Loai and Yusoffthe, Nooraini}, title = {Copy-Move Forgery Detection using Integrated DWT and SURF}, journal = {Journal of Telecommunication, Electronic and Computer Engineering}, year = {2017}, volume = {9}, number = {1-2}}
-
On the SPN Estimation in Image Forensics: A Systematic Empirical Evaluation
IEEE Transactions on Information Forensics and Security, 2017, Vol. 12(5), pp. 1067-1081
DOI: 10.1109/TIFS.2016.2640938
BibTeX@article{Al-Ani2017, author = {Al-Ani, M. and Khelifi, F.}, title = {On the SPN Estimation in Image Forensics: A Systematic Empirical Evaluation}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2017}, volume = {12}, number = {5}, pages = {1067--1081}}
-
Current techniques in JPEG image authentication and forgery detection
Journal of Engineering and Applied Sciences, Medwell Journals, 2017, Vol. 12(1), pp. 104-112
DOI: 10.3923/jeasci.2017.104.112
BibTeX@article{Alherbawi2017, author = {Alherbawi, Nadeem and Shukur, Zarina and Sulaiman, Rossilawati}, title = {Current techniques in JPEG image authentication and forgery detection}, journal = {Journal of Engineering and Applied Sciences}, publisher = {Medwell Journals}, year = {2017}, volume = {12}, number = {1}, pages = {104--112}}
-
JPEG image classification in digital forensic via DCT coefficient analysis
Multimedia Tools and Applications, Springer, 2017, pp. 1
DOI: 10.1007/s11042-017-4915-3
BibTeX@article{Alherbawi2017a, author = {Alherbawi, Nadeem and Shukur, Zarina and Sulaiman, Rossilawati}, title = {JPEG image classification in digital forensic via DCT coefficient analysis}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2017}, pages = {1}}
-
Identification of inpainted satellite images using evalutionary artificial neural network (EANN) and k-nearest neighbor(KNN) algorithm
Proc. 8th Int. Conf. of Information and Communication Technology for Embedded Systems (IC-ICTES)
2017, pp. 1-6
DOI: 10.1109/ICTEmSys.2017.7958765
BibTeX@inproceedings{Ali2017, author = {Ali, L. and Kasetkasem, T. and Khan, F. G. and Chanwimaluang, T. and Nakahara, H.}, title = {Identification of inpainted satellite images using evalutionary artificial neural network (EANN) and k-nearest neighbor(KNN) algorithm}, booktitle = {Proc. 8th Int. Conf. of Information and Communication Technology for Embedded Systems (IC-ICTES)}, year = {2017}, pages = {1--6}}
-
Duplicate matching and estimating features for detection of copy-move images forgery
arXiv, 2017
BibTeX@article{Alikhajeh2017, author = {Alikhajeh, Ghassem and Mirzaei, Abdolreza and Safayani, Mehran and Ghaffari, Meysam}, title = {Duplicate matching and estimating features for detection of copy-move images forgery}, journal = {arXiv}, year = {2017}}
-
Comparison of Matching Methods for Copy-move Image Forgery Detection
9th International Conference on Robotic, Vision, Signal Processing and Power Applications
Springer, 2017
DOI: 10.1007/978-981-10-1721-6_23
BibTeX@incollection{Al-Qershi2017, author = {Al-Qershi, Osamah M. and Khoo, Bee Ee}, title = {Comparison of Matching Methods for Copy-move Image Forgery Detection}, booktitle = {9th International Conference on Robotic, Vision, Signal Processing and Power Applications}, publisher = {Springer}, year = {2017}}
-
Blind copula based copy-move forgery detection algorithm
Proc. IEEE Int. Conf. Consumer Electronics (ICCE)
2017, pp. 436-437
DOI: 10.1109/ICCE.2017.7889387
BibTeX@inproceedings{AlZahir2017, author = {AlZahir, S. and Hammad, R.}, title = {Blind copula based copy-move forgery detection algorithm}, booktitle = {Proc. IEEE Int. Conf. Consumer Electronics (ICCE)}, year = {2017}, pages = {436--437}}
-
Dealing with video source identification in social networks
Signal Processing: Image Communication, Elsevier BV, 2017, Vol. 57, pp. 1-7
DOI: 10.1016/j.image.2017.04.009
BibTeX@article{Amerini2017, author = {Amerini, Irene and Caldelli, Roberto and Mastio, Andrea Del and Fuccia, Andrea Di and Molinari, Cristiano and Rizzo, Anna Paola}, title = {Dealing with video source identification in social networks}, journal = {Signal Processing: Image Communication}, publisher = {Elsevier BV}, year = {2017}, volume = {57}, pages = {1--7}}
-
Localization of JPEG Double Compression Through Multi-domain Convolutional Neural Networks
Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW)
2017, pp. 1865-1871
DOI: 10.1109/CVPRW.2017.233
BibTeX@inproceedings{Amerini2017a, author = {Amerini, I. and Uricchio, T. and Ballan, L. and Caldelli, R.}, title = {Localization of JPEG Double Compression Through Multi-domain Convolutional Neural Networks}, booktitle = {Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW)}, year = {2017}, pages = {1865--1871}}
-
Localization of JPEG double compression through multi-domain convolutional neural networks
ArXiv, 2017
BibTeX@article{Amerini2017b, author = {Amerini, Irene and Uricchio, Tiberio and Ballan, Lamberto and Caldelli, Roberto}, title = {Localization of JPEG double compression through multi-domain convolutional neural networks}, journal = {ArXiv}, year = {2017}}
-
Tracing images back to their social network of origin: A CNN-based approach
Proc. IEEE Workshop Information Forensics and Security (WIFS)
2017, pp. 1-6
DOI: 10.1109/WIFS.2017.8267660
BibTeX@inproceedings{Amerini2017c, author = {Amerini, I. and Uricchio, T. and Caldelli, R.}, title = {Tracing images back to their social network of origin: A CNN-based approach}, booktitle = {Proc. IEEE Workshop Information Forensics and Security (WIFS)}, year = {2017}, pages = {1--6}}
-
Image authentication based on salient regions of image
Proc. Int. Electrical Engineering Congress (iEECON)
2017, pp. 1-4
DOI: 10.1109/IEECON.2017.8075882
BibTeX@inproceedings{Arya2017, author = {Arya, U. and Singh, G. and Singhal, R. and Kumar, S. and Usmaan, H.}, title = {Image authentication based on salient regions of image}, booktitle = {Proc. Int. Electrical Engineering Congress (iEECON)}, year = {2017}, pages = {1--4}}
-
Security of Multimedia Contents: A Brief
Intelligent Techniques in Signal Processing for Multimedia Security, Springer, 2017
DOI: 10.1007/978-3-319-44790-2_1
BibTeX@article{Ashour2017, author = {Ashour, Amira S. and Dey, Nilanjan}, title = {Security of Multimedia Contents: A Brief}, journal = {Intelligent Techniques in Signal Processing for Multimedia Security}, publisher = {Springer}, year = {2017}}
-
Differentiating Photographic and PRCG Images Using Tampering Localization Features
Proceedings of International Conference on Computer Vision and Image Processing
Springer, 2017
DOI: 10.1007/978-981-10-2107-7_39
BibTeX@incollection{Ayyalasomayajula2017, author = {Ayyalasomayajula, Roshan Sai and Pankajakshan, Vinod}, title = {Differentiating Photographic and PRCG Images Using Tampering Localization Features}, booktitle = {Proceedings of International Conference on Computer Vision and Image Processing}, publisher = {Springer}, year = {2017}}
-
From image to sensor: Comparative evaluation of multiple PRNU estimation schemes for identifying sensors from NIR iris images
Proc. 5th Int. Workshop Biometrics and Forensics (IWBF)
2017, pp. 1-6
DOI: 10.1109/IWBF.2017.7935081
BibTeX@inproceedings{Banerjee2017, author = {Banerjee, S. and Ross, A.}, title = {From image to sensor: Comparative evaluation of multiple PRNU estimation schemes for identifying sensors from NIR iris images}, booktitle = {Proc. 5th Int. Workshop Biometrics and Forensics (IWBF)}, year = {2017}, pages = {1--6}}
-
Exploiting Spatial Structure for Localizing Manipulated Image Regions
Proc. of the ICCV 2017
2017
BibTeX@conference{Bappy2017, author = {Bappy, Jawadul H. and Roy-Chowdhury, Amit K. and Bunk, Jason and Nataraj, Lakshmanan and Manjunath, B. S.}, title = {Exploiting Spatial Structure for Localizing Manipulated Image Regions}, booktitle = {Proc. of the ICCV 2017}, year = {2017}}
-
Aligned and Non-Aligned Double JPEG Detection Using Convolutional Neural Networks
arXiv, 2017
BibTeX@article{Barni2017a, author = {Barni, Mauro and Bondi, Luca and Bonettini, Nicolò and Bestagini, Paolo and Costanzo, Andrea and Maggini, Marco and Tondi, Benedetta and Tubaro, Stefano}, title = {Aligned and Non-Aligned Double JPEG Detection Using Convolutional Neural Networks}, journal = {arXiv}, year = {2017}}
-
Higher-Order, Adversary-Aware, Double JPEG-Detection via Selected Training on Attacked Samples.
Proc. of the 25th European Signal Processing Conference (EUSIPCO), 2017
BibTeX@article{Barni2017, author = {Barni, Mauro and Nowroozi, Ehsan and Tondi, Benedetta}, title = {Higher-Order, Adversary-Aware, Double JPEG-Detection via Selected Training on Attacked Samples.}, journal = {Proc. of the 25th European Signal Processing Conference (EUSIPCO)}, year = {2017}}
-
On the robustness of constrained convolutional neural networks to JPEG post-compression for image resampling detection
Proc. Speech and Signal Processing (ICASSP) 2017 IEEE Int. Conf. Acoustics
2017, pp. 2152-2156
DOI: 10.1109/ICASSP.2017.7952537
BibTeX@inproceedings{Bayar2017, author = {Bayar, B. and Stamm, M. C.}, title = {On the robustness of constrained convolutional neural networks to JPEG post-compression for image resampling detection}, booktitle = {Proc. Speech and Signal Processing (ICASSP) 2017 IEEE Int. Conf. Acoustics}, year = {2017}, pages = {2152--2156}}
-
A Generic Approach Towards Image Manipulation Parameter Estimation Using Convolutional Neural Networks
Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security - IHMMSec '17
ACM Press, 2017
DOI: 10.1145/3082031.3083249
BibTeX@inproceedings{Bayar2017a, author = {Bayar, Belhassen and Stamm, Matthew C.}, title = {A Generic Approach Towards Image Manipulation Parameter Estimation Using Convolutional Neural Networks}, booktitle = {Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security - IHMMSec '17}, publisher = {ACM Press}, year = {2017}}
-
Copy-move forgery detection using segmentation
Proc. 11th Int. Conf. Intelligent Systems and Control (ISCO)
2017, pp. 224-228
DOI: 10.1109/ISCO.2017.7855986
BibTeX@inproceedings{BhavyaBhanuM2017, author = {Bhavya Bhanu M, P. and Arun Kumar M, N.}, title = {Copy-move forgery detection using segmentation}, booktitle = {Proc. 11th Int. Conf. Intelligent Systems and Control (ISCO)}, year = {2017}, pages = {224--228}}
-
Fast Reflective Offset-Guided Searching Method for Copy-Move Forgery Detection
Information Sciences, Elsevier BV, 2017
DOI: 10.1016/j.ins.2017.08.044
BibTeX@article{Bi2017, author = {Bi, Xiuli and Pun, Chi-Man}, title = {Fast Reflective Offset-Guided Searching Method for Copy-Move Forgery Detection}, journal = {Information Sciences}, publisher = {Elsevier BV}, year = {2017}}
-
The consequences of understanding expert probability reporting as a decision
Science & Justice, Elsevier BV, 2017, Vol. 57(1), pp. 80-85
DOI: 10.1016/j.scijus.2016.10.005
BibTeX@article{Biedermann2017, author = {Biedermann, A. and Bozza, S. and Taroni, F. and Aitken, C.}, title = {The consequences of understanding expert probability reporting as a decision}, journal = {Science & Justice}, publisher = {Elsevier BV}, year = {2017}, volume = {57}, number = {1}, pages = {80--85}}
-
Blind image forensics using reciprocal singular value curve based local statistical features
Multimedia Tools and Applications, Springer, 2017, pp. 1
DOI: 10.1007/s11042-017-5021-2
BibTeX@article{Birajdar2017, author = {Birajdar, Gajanan K. and Mankar, Vijay H.}, title = {Blind image forensics using reciprocal singular value curve based local statistical features}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2017}, pages = {1}}
-
Subsampling-Based Blind Image Forgery Detection Using Support Vector Machine and Artificial Neural Network Classifiers
Arabian Journal for Science and Engineering, Springer, 2017, pp. 1
DOI: 10.1007/s13369-017-2671-3
BibTeX@article{Birajdar2017b, author = {Birajdar, Gajanan K. and Mankar, Vijay H.}, title = {Subsampling-Based Blind Image Forgery Detection Using Support Vector Machine and Artificial Neural Network Classifiers}, journal = {Arabian Journal for Science and Engineering}, publisher = {Springer}, year = {2017}, pages = {1}}
-
Verifying information with multimedia content on twitter
Multimedia Tools and Applications, Springer, 2017, pp. 1
DOI: 10.1007/s11042-017-5132-9
BibTeX@article{Boididou2017, author = {Boididou, Christina and Middleton, Stuart E. and Jin, Zhiwei and Papadopoulos, Symeon and Dang-Nguyen, Duc-Tien and Boato, Giulia and Kompatsiaris, Yiannis}, title = {Verifying information with multimedia content on twitter}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2017}, pages = {1}}
-
Detection and visualization of misleading content on Twitter
International Journal of Multimedia Information Retrieval, Springer, 2017, pp. 1
DOI: 10.1007/s13735-017-0143-x
BibTeX@article{Boididou2017a, author = {Boididou, Christina and Papadopoulos, Symeon and Zampoglou, Markos and Apostolidis, Lazaros and Papadopoulou, Olga and Kompatsiaris, Yiannis}, title = {Detection and visualization of misleading content on Twitter}, journal = {International Journal of Multimedia Information Retrieval}, publisher = {Springer}, year = {2017}, pages = {1}}
-
First Steps Toward Camera Model Identification With Convolutional Neural Networks
IEEE Signal Processing Letters, 2017, Vol. 24(3), pp. 259-263
DOI: 10.1109/LSP.2016.2641006
BibTeX@article{Bondi2017b, author = {Bondi, L. and Baroffio, L. and Güera, D. and Bestagini, P. and Delp, E. J. and Tubaro, S.}, title = {First Steps Toward Camera Model Identification With Convolutional Neural Networks}, journal = {IEEE Signal Processing Letters}, year = {2017}, volume = {24}, number = {3}, pages = {259--263}}
-
Tampering Detection and Localization Through Clustering of Camera-Based CNN Features
Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW)
2017, pp. 1855-1864
DOI: 10.1109/CVPRW.2017.232
BibTeX@inproceedings{Bondi2017, author = {Bondi, L. and Lameri, S. and Güera, D. and Bestagini, P. and Delp, E. J. and Tubaro, S.}, title = {Tampering Detection and Localization Through Clustering of Camera-Based CNN Features}, booktitle = {Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW)}, year = {2017}, pages = {1855--1864}}
-
JPEG-based Forensics through Convolutional Neural Networks
Politecnico Di Milano, Politecnico Di Milano, 2017
BibTeX@mastersthesis{Bonettini2017, author = {Bonettini, Nicol`o}, title = {JPEG-based Forensics through Convolutional Neural Networks}, school = {Politecnico Di Milano}, year = {2017}}
-
Spotting the Difference: Context Retrieval and Analysis for Improved Forgery Detection and Localization
arxiv, 2017
BibTeX@article{Brogan2017, author = {Brogan, Joel and Bestagini, Paolo and Bharati, Aparna and Pinto, Allan and Moreira, Daniel and Bowyer, Kevin and Flynn, Patrick and Rocha, Anderson and Scheirer, Walter}, title = {Spotting the Difference: Context Retrieval and Analysis for Improved Forgery Detection and Localization}, journal = {arxiv}, year = {2017}}
-
Automatic comparison of photo response non uniformity (PRNU) on Youtube
System and Network Engineering • January 2017, 2017
BibTeX@article{Brouwers2017, author = {Brouwers, Marcel and Mousa, Rahaf}, title = {Automatic comparison of photo response non uniformity (PRNU) on Youtube}, journal = {System and Network Engineering • January 2017}, year = {2017}}
-
Detection and Localization of Image Forgeries using Resampling Features and Deep Learning
arXiv, 2017
BibTeX@article{Bunk2017, author = {Bunk, Jason and Bappy, Jawadul H. and Mohammed, Tajuddin Manhar and Nataraj, Lakshmanan and Flenner, Arjuna and Manjunath, B. S. and Chandrasekaran, Shivkumar and Roy-Chowdhury, Amit K. and Peterson, Lawrence}, title = {Detection and Localization of Image Forgeries using Resampling Features and Deep Learning}, journal = {arXiv}, year = {2017}}
-
Detection and Localization of Image Forgeries Using Resampling Features and Deep Learning
Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW)
2017, pp. 1881-1889
DOI: 10.1109/CVPRW.2017.235
BibTeX@inproceedings{Bunk2017a, author = {Bunk, J. and Bappy, J. H. and Mohammed, T. M. and Nataraj, L. and Flenner, A. and Manjunath, B. S. and Chandrasekaran, S. and Roy-Chowdhury, A. K. and Peterson, L.}, title = {Detection and Localization of Image Forgeries Using Resampling Features and Deep Learning}, booktitle = {Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW)}, year = {2017}, pages = {1881--1889}}
-
Image Origin Classification based on Social Network Provenance
IEEE Transactions on Information Forensics and Security, 2017, Vol. PP(99), pp. 1
DOI: 10.1109/TIFS.2017.2656842
BibTeX@article{Caldelli2017, author = {Caldelli, R. and Becarelli, R. and Amerini, I.}, title = {Image Origin Classification based on Social Network Provenance}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2017}, volume = {PP}, number = {99}, pages = {1}}
-
An Efficient Implementation of the Algorithm by Lukáš et al. on Hadoop
Green, Pervasive, and Cloud Computing, Springer, 2017
DOI: 10.1007/978-3-319-57186-7_35
BibTeX@article{Cattaneo2017a, author = {Cattaneo, Giuseppe and Ferraro Petrillo, Umberto and Nappi, Michele and Narducci, Fabio and Roscigno, Gianluca}, title = {An Efficient Implementation of the Algorithm by Lukáš et al. on Hadoop}, journal = {Green, Pervasive, and Cloud Computing}, publisher = {Springer}, year = {2017}}
-
Improving the experimental analysis of tampered image detection algorithms for biometric systems
Pattern Recognition Letters, Elsevier BV, 2017
DOI: 10.1016/j.patrec.2017.01.006
BibTeX@article{Cattaneo2017, author = {Cattaneo, Giuseppe and Roscigno, Gianluca and Petrillo, Umberto Ferraro}, title = {Improving the experimental analysis of tampered image detection algorithms for biometric systems}, journal = {Pattern Recognition Letters}, publisher = {Elsevier BV}, year = {2017}}
-
PRNU-based Image Manipulation Localization with Discriminative Random Fields
2017
BibTeX@unpublished{Chakraborty2017, author = {Chakraborty, S. and Kirchner, M.}, title = {PRNU-based Image Manipulation Localization with Discriminative Random Fields}, year = {2017}}
-
Capturing Localized Image Artifacts through a CNN-based Hyper-image Representation
ArXiv, 2017
BibTeX@article{Chandakkar2017, author = {Chandakkar, Parag Shridhar and Li, Baoxin}, title = {Capturing Localized Image Artifacts through a CNN-based Hyper-image Representation}, journal = {ArXiv}, year = {2017}}
-
Investigating Human Factors in Image Forgery Detection
ArXiv, 2017
BibTeX@article{Chandakkar2017a, author = {Chandakkar, Parag S. and Li, Baoxin}, title = {Investigating Human Factors in Image Forgery Detection}, journal = {ArXiv}, year = {2017}}
-
Image Processing Operations Identification via Convolutional Neural Network
arXiv, 2017
BibTeX@article{Chen2017d, author = {Chen, Bolin and Li, Haodong and Luo, Weiqi}, title = {Image Processing Operations Identification via Convolutional Neural Network}, journal = {arXiv}, year = {2017}}
-
Quaternion pseudo-Zernike moments combining both of RGB information and depth information for color image splicing detection
Journal of Visual Communication and Image Representation, Elsevier BV, 2017
DOI: 10.1016/j.jvcir.2017.08.011
BibTeX@article{Chen2017b, author = {Chen, Beijing and Qi, Xiaoming and Sun, Xingming and Shi, Yun-Qing}, title = {Quaternion pseudo-Zernike moments combining both of RGB information and depth information for color image splicing detection}, journal = {Journal of Visual Communication and Image Representation}, publisher = {Elsevier BV}, year = {2017}}
-
Image Splicing Detection via Camera Response Function Analysis
Computer Vision Foundation (CVF), 2017
BibTeX@article{Chen2017a, author = {Chen, Can and McCloskey, Scott and Yu, Jingyi}, title = {Image Splicing Detection via Camera Response Function Analysis}, journal = {Computer Vision Foundation (CVF)}, year = {2017}}
-
Blind Forensics of Successive Geometric Transformations in Digital Images Using Spectral Method: Theory and Applications
IEEE Transactions on Image Processing, 2017, Vol. 26(6), pp. 2811-2824
DOI: 10.1109/TIP.2017.2682963
BibTeX@article{Chen2017e, author = {Chen, C. and Ni, J. and Shen, Z. and Shi, Y. Q.}, title = {Blind Forensics of Successive Geometric Transformations in Digital Images Using Spectral Method: Theory and Applications}, journal = {IEEE Transactions on Image Processing}, year = {2017}, volume = {26}, number = {6}, pages = {2811--2824}}
-
Block Sampled Matching with Region Growing for Detecting Copy-Move Forgery Duplicated Regions
Journal of Information Hiding and Multimedia Signal Processing, 2017
BibTeX@article{Chen2017c, author = {Chen, Chien-Chang and Chen, Ling-Ying and Lin, Yu-Jing}, title = {Block Sampled Matching with Region Growing for Detecting Copy-Move Forgery Duplicated Regions}, journal = {Journal of Information Hiding and Multimedia Signal Processing}, year = {2017}}
-
Detection of operation chain: JPEG-Resampling-JPEG
Signal Processing: Image Communication, Elsevier BV, 2017, Vol. 57, pp. 8-20
DOI: 10.1016/j.image.2017.04.008
BibTeX@article{Chen2017, author = {Chen, Zhipeng and Zhao, Yao and Ni, Rongrong}, title = {Detection of operation chain: JPEG-Resampling-JPEG}, journal = {Signal Processing: Image Communication}, publisher = {Elsevier BV}, year = {2017}, volume = {57}, pages = {8--20}}
-
HUE Modification Detection and Estimation using Photo Response Non-Uniformity
IJSTE - International Journal of Science Technology & Engineering, 2017
BibTeX@article{ChitraR2017, author = {Chitra R, R. and Minnu Jayan, C.}, title = {HUE Modification Detection and Estimation using Photo Response Non-Uniformity}, journal = {IJSTE - International Journal of Science Technology & Engineering}, year = {2017}}
-
Detecting composite image manipulation based on deep neural networks
Proc. Signals and Image Processing (IWSSIP) 2017 Int. Conf. Systems
2017, pp. 1-5
DOI: 10.1109/IWSSIP.2017.7965621
BibTeX@inproceedings{Choi2017b, author = {Choi, H. Y. and Jang, H. U. and Kim, D. and Son, J. and Mun, S. M. and Choi, S. and Lee, H. K.}, title = {Detecting composite image manipulation based on deep neural networks}, booktitle = {Proc. Signals and Image Processing (IWSSIP) 2017 Int. Conf. Systems}, year = {2017}, pages = {1--5}}
-
Enhanced resampling detection based on image correlation of 3D stereoscopic images
EURASIP Journal on Image and Video Processing, Springer, 2017, Vol. 2017(1), pp. 1
DOI: 10.1186/s13640-017-0170-9
BibTeX@article{Choi2017a, author = {Choi, Hak-Yeol and Hyun, Dai-Kyung and Choi, Sunghee and Lee, Heung-Kyu}, title = {Enhanced resampling detection based on image correlation of 3D stereoscopic images}, journal = {EURASIP Journal on Image and Video Processing}, publisher = {Springer}, year = {2017}, volume = {2017}, number = {1}, pages = {1}}
-
Content Recapture Detection Based on Convolutional Neural Networks
Information Science and Applications 2017
Springer Nature, 2017, pp. 339-346
DOI: 10.1007/978-981-10-4154-9_40
BibTeX@incollection{Choi2017, author = {Choi, Hak-Yeol and Jang, Han-Ul and Son, Jeongho and Kim, Dongkyu and Lee, Heung-Kyu}, title = {Content Recapture Detection Based on Convolutional Neural Networks}, booktitle = {Information Science and Applications 2017}, publisher = {Springer Nature}, year = {2017}, pages = {339--346}}
-
New dissimilarity measures for image phylogeny reconstruction
Pattern Analysis and Applications, Springer, 2017, pp. 1
DOI: 10.1007/s10044-017-0616-9
BibTeX@article{Costa2017, author = {Costa, Filipe and Oliveira, Alberto and Ferrara, Pasquale and Dias, Zanoni and Goldenstein, Siome and Rocha, Anderson}, title = {New dissimilarity measures for image phylogeny reconstruction}, journal = {Pattern Analysis and Applications}, publisher = {Springer}, year = {2017}, pages = {1}}
-
PRNU-Based Forgery Localization in a Blind Scenario
Image Analysis and Processing - ICIAP 2017, Springer, 2017
DOI: 10.1007/978-3-319-68548-9_52
BibTeX@article{Cozzolino2017a, author = {Cozzolino, Davide and Marra, Francesco and Poggi, Giovanni and Sansone, Carlo and Verdoliva, Luisa}, title = {PRNU-Based Forgery Localization in a Blind Scenario}, journal = {Image Analysis and Processing - ICIAP 2017}, publisher = {Springer}, year = {2017}}
-
Recasting Residual-based Local Descriptors as Convolutional Neural Networks: an Application to Image Forgery Detection
arX, 2017
BibTeX@article{Cozzolino2017, author = {Cozzolino, Davide and Poggi, Giovanni and Verdoliva, Luisa}, title = {Recasting Residual-based Local Descriptors as Convolutional Neural Networks: an Application to Image Forgery Detection}, journal = {arX}, year = {2017}}
-
Consistency features and fuzzy-based segmentation for shadow and reflection detection in digital image forgery
Science China Information Sciences, Springer, 2017, Vol. 60(8), pp. 1
DOI: 10.1007/s11432-016-0478-y
BibTeX@article{Cristin2017, author = {Cristin, Rajan and Cyril Raj, Velankanni}, title = {Consistency features and fuzzy-based segmentation for shadow and reflection detection in digital image forgery}, journal = {Science China Information Sciences}, publisher = {Springer}, year = {2017}, volume = {60}, number = {8}, pages = {1}}
-
Local Binary Patterns for Document Forgery Detection
Proc. 14th IAPR Int. Conf. Document Analysis and Recognition (ICDAR)
2017, Vol. 01, pp. 1223-1228
DOI: 10.1109/ICDAR.2017.202
BibTeX@inproceedings{Cruz2017, author = {Cruz, F. and Sidère, N. and Coustaty, M. and D'Andecy, V. P. and Ogier, J. M.}, title = {Local Binary Patterns for Document Forgery Detection}, booktitle = {Proc. 14th IAPR Int. Conf. Document Analysis and Recognition (ICDAR)}, year = {2017}, volume = {01}, pages = {1223--1228}}
-
Electromagnetismlike Mechanism Descriptor with Fourier Transform for a Passive Copy-move Forgery Detection in Digital Image Forensics
Proceedings of the 6th International Conference on Pattern Recognition Applications and Methods
SCITEPRESS - Science and Technology Publications, 2017
DOI: 10.5220/0006232206120619
BibTeX@inproceedings{Dadkhah2017, author = {Dadkhah, Sajjad and Köppen, Mario and Jalab, Hamid A. and Sadeghi, Somayeh and Manaf, Azizah Abdul and Uliyan, Diaa}, title = {Electromagnetismlike Mechanism Descriptor with Fourier Transform for a Passive Copy-move Forgery Detection in Digital Image Forensics}, booktitle = {Proceedings of the 6th International Conference on Pattern Recognition Applications and Methods}, publisher = {SCITEPRESS - Science and Technology Publications}, year = {2017}}
-
Sensor pattern noise based source anonymization
Proc. Signal Processing and Security (ICSSS) 2017 Third Int. Conf. Sensing
2017, pp. 93-98
DOI: 10.1109/SSPS.2017.8071572
BibTeX@inproceedings{Dafale2017, author = {Dafale, N. N. and Naskar, R.}, title = {Sensor pattern noise based source anonymization}, booktitle = {Proc. Signal Processing and Security (ICSSS) 2017 Third Int. Conf. Sensing}, year = {2017}, pages = {93--98}}
-
Forensic likelihood ratio: Statistical problems and pitfalls
Science & Justice, Elsevier BV, 2017, Vol. 57(1), pp. 73-75
DOI: 10.1016/j.scijus.2016.09.002
BibTeX@article{Dawid2017, author = {Dawid, A. Philip}, title = {Forensic likelihood ratio: Statistical problems and pitfalls}, journal = {Science & Justice}, publisher = {Elsevier BV}, year = {2017}, volume = {57}, number = {1}, pages = {73--75}}
-
On the Effectiveness of Visible Watermarks
CVPR ´17: Proceedings of the 2017 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR´17)
2017
BibTeX@inproceedings{Dekel2017, author = {Dekel, Tali and Rubinstein, Michael and Liu, Ce and Freeman, William, T.}, title = {On the Effectiveness of Visible Watermarks}, booktitle = {CVPR ´17: Proceedings of the 2017 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR´17)}, year = {2017}}
-
Splicing Forgery Detection and the Impact of Image Resolution
Faculty of Computing Blekinge Institute of Technology SE-371 79 Karlskrona Sweden, Faculty of Computing Blekinge Institute of Technology SE-371 79 Karlskrona Sweden, 2017
BibTeX@mastersthesis{Devagiri2017, author = {Devagiri, Vishnu Manasa}, title = {Splicing Forgery Detection and the Impact of Image Resolution}, school = {Faculty of Computing Blekinge Institute of Technology SE-371 79 Karlskrona Sweden}, year = {2017}}
-
Watermarking in Biomedical Signal Processing
Intelligent Techniques in Signal Processing for Multimedia Security, Springer, 2017
DOI: 10.1007/978-3-319-44790-2_16
BibTeX@article{Dey2017, author = {Dey, Nilanjan and Ashour, Amira S. and Chakraborty, Sayan and Banerjee, Sukanya and Gospodinova, Evgeniya and Gospodinov, Mitko and Hassanien, Aboul Ella}, title = {Watermarking in Biomedical Signal Processing}, journal = {Intelligent Techniques in Signal Processing for Multimedia Security}, publisher = {Springer}, year = {2017}}
-
Blur-invariant copy-move forgery detection technique with improved detection accuracy utilising SWT-SVD
IET Image Proc, 2017, Vol. 11(5), pp. 301-309
DOI: 10.1049/iet-ipr.2016.0537
BibTeX@article{Dixit2017, author = {Dixit, R. and Naskar, R. and Mishra, S.}, title = {Blur-invariant copy-move forgery detection technique with improved detection accuracy utilising SWT-SVD}, journal = {IET Image Proc}, year = {2017}, volume = {11}, number = {5}, pages = {301--309}}
-
A robust detection algorithm for image Copy-Move forgery in smooth regions
Proc. System and Simulation (ICCSS) 2017 Int. Conf. Circuits
2017, pp. 119-123
DOI: 10.1109/CIRSYSSIM.2017.8023194
BibTeX@inproceedings{Emam2017a, author = {Emam, M. and Han, Q. and Li, Q. and Zhang, H. and Emam, M.}, title = {A robust detection algorithm for image Copy-Move forgery in smooth regions}, booktitle = {Proc. System and Simulation (ICCSS) 2017 Int. Conf. Circuits}, year = {2017}, pages = {119--123}}
-
Two-stage Keypoint Detection Scheme for Region Duplication Forgery Detection in Digital Images
Journal of Forensic Sciences, Wiley-Blackwell, 2017
DOI: 10.1111/1556-4029.13456
BibTeX@article{Emam2017, author = {Emam, Mahmoud and Han, Qi and Zhang, Hongli}, title = {Two-stage Keypoint Detection Scheme for Region Duplication Forgery Detection in Digital Images}, journal = {Journal of Forensic Sciences}, publisher = {Wiley-Blackwell}, year = {2017}}
-
Source camera identification: a distributed computing approach using Hadoop
Journal of Cloud Computing, Springer, 2017, Vol. 6(1), pp. 1
DOI: 10.1186/s13677-017-0088-x
BibTeX@article{Faiz2017, author = {Faiz, Muhammad and Anuar, Nor Badrul and Wahab, Ainuddin Wahid Abdul and Shamshirband, Shahaboddin and Chronopoulos, Anthony T.}, title = {Source camera identification: a distributed computing approach using Hadoop}, journal = {Journal of Cloud Computing}, publisher = {Springer}, year = {2017}, volume = {6}, number = {1}, pages = {1}}
-
How to Detect Faked Photos
American Scientist, 2017
BibTeX@article{Farid2017, author = {Farid, Hany}, title = {How to Detect Faked Photos}, journal = {American Scientist}, year = {2017}}
-
A generic passive image forgery detection scheme using local binary pattern with rich models
Computers & Electrical Engineering, Elsevier BV, 2017
DOI: 10.1016/j.compeleceng.2017.05.008
BibTeX@article{Farooq2017, author = {Farooq, Sundus and Yousaf, Muhammad Haroon and Hussain, Fawad}, title = {A generic passive image forgery detection scheme using local binary pattern with rich models}, journal = {Computers & Electrical Engineering}, publisher = {Elsevier BV}, year = {2017}}
-
Improved Algorithms for Robust Histogram Shape-Based Image Watermarking
Digital Forensics and Watermarking, Springer, 2017
DOI: 10.1007/978-3-319-64185-0_21
BibTeX@article{Feng2017, author = {Feng, Bingwen and Weng, Jian and Lu, Wei}, title = {Improved Algorithms for Robust Histogram Shape-Based Image Watermarking}, journal = {Digital Forensics and Watermarking}, publisher = {Springer}, year = {2017}}
-
Change detection between multi-band images using a robust fusion-based approach
Proc. Speech and Signal Processing (ICASSP) 2017 IEEE Int. Conf. Acoustics
2017, pp. 3346-3350
DOI: 10.1109/ICASSP.2017.7952776
BibTeX@inproceedings{Ferraris2017, author = {Ferraris, V. and Dobigeon, N. and Wei, Q. and Chabert, M.}, title = {Change detection between multi-band images using a robust fusion-based approach}, booktitle = {Proc. Speech and Signal Processing (ICASSP) 2017 IEEE Int. Conf. Acoustics}, year = {2017}, pages = {3346--3350}}
-
Robust Fusion of Multiband Images With Different Spatial and Spectral Resolutions for Change Detection
IEEE Transactions on Computational Imaging, 2017, Vol. 3(2), pp. 175-186
DOI: 10.1109/TCI.2017.2692645
BibTeX@article{Ferraris2017a, author = {Ferraris, V. and Dobigeon, N. and Wei, Q. and Chabert, M.}, title = {Robust Fusion of Multiband Images With Different Spatial and Spectral Resolutions for Change Detection}, journal = {IEEE Transactions on Computational Imaging}, year = {2017}, volume = {3}, number = {2}, pages = {175--186}}
-
Identificación de la Fuente en Ficheros Multimedia de Redes Sociales
Departamento de Ingeniería del Software e Inteligencia Artificial FACULTAD DE INFORMÁTICA UNIVERSIDAD COMPLUTENSE DE MADRID, Departamento de Ingeniería del Software e Inteligencia Artificial FACULTAD DE INFORMÁTICA UNIVERSIDAD COMPLUTENSE DE MADRID, 2017
BibTeX@thesis{Franco2017, author = {Franco, Guillermo Rodríguez}, title = {Identificación de la Fuente en Ficheros Multimedia de Redes Sociales}, school = {Departamento de Ingeniería del Software e Inteligencia Artificial FACULTAD DE INFORMÁTICA UNIVERSIDAD COMPLUTENSE DE MADRID}, year = {2017}}
-
Deep learning for source camera identification on mobile devices
ArXiv, 2017
BibTeX@article{Freire-Obregon2017, author = {Freire-Obregón, David and Narducci, Fabio and Barra, Silvio and Castrillón-Santana, Modesto}, title = {Deep learning for source camera identification on mobile devices}, journal = {ArXiv}, year = {2017}}
-
Use of discrete wavelet transform method for detection and localization of tampering in a digital medical image
Proc. IEEE Region 10 Symp. (TENSYMP)
2017, pp. 1-5
DOI: 10.1109/TENCONSpring.2017.8070082
BibTeX@inproceedings{Gadhiya2017, author = {Gadhiya, T. D. and Roy, A. K. and Mitra, S. K. and Mall, V.}, title = {Use of discrete wavelet transform method for detection and localization of tampering in a digital medical image}, booktitle = {Proc. IEEE Region 10 Symp. (TENSYMP)}, year = {2017}, pages = {1--5}}
-
Clustering image noise patterns by embedding and visualization for common source camera detection
Digital Investigation, Elsevier BV, 2017
DOI: 10.1016/j.diin.2017.08.005
BibTeX@article{Georgievska2017, author = {Georgievska, Sonja and Bakhshi, Rena and Gavai, Anand and Sclocco, Alessio and van Werkhoven, Ben}, title = {Clustering image noise patterns by embedding and visualization for common source camera detection}, journal = {Digital Investigation}, publisher = {Elsevier BV}, year = {2017}}
-
A review paper on digital image forgery detection techniques
Proc. Communication and Networking Technologies (ICCCNT) 2017 8th Int. Conf. Computing
2017, pp. 1-7
DOI: 10.1109/ICCCNT.2017.8203904
BibTeX@inproceedings{Gill2017, author = {Gill, N. K. and Garg, R. and Doegar, E. A.}, title = {A review paper on digital image forgery detection techniques}, booktitle = {Proc. Communication and Networking Technologies (ICCCNT) 2017 8th Int. Conf. Computing}, year = {2017}, pages = {1--7}}
-
A Classification Engine for Image Ballistics of Social Data
Image Analysis and Processing - ICIAP 2017, Springer, 2017
DOI: 10.1007/978-3-319-68548-9_57
BibTeX@article{Giudice2017, author = {Giudice, Oliver and Paratore, Antonino and Moltisanti, Marco and Battiato, Sebastiano}, title = {A Classification Engine for Image Ballistics of Social Data}, journal = {Image Analysis and Processing - ICIAP 2017}, publisher = {Springer}, year = {2017}}
-
Detecção Automática De Indícios De Fraude Em Assinaturas Em Documentos Digitais
Instituto Federal De Educação, Ciência E Tecnologia De São Paulo, Instituto Federal De Educação, Ciência E Tecnologia De São Paulo, 2017
BibTeX@phdthesis{Goncalves2017, author = {Gonçalves, Leandro Inácio}, title = {Detecção Automática De Indícios De Fraude Em Assinaturas Em Documentos Digitais}, school = {Instituto Federal De Educação, Ciência E Tecnologia De São Paulo}, year = {2017}}
-
A Robust Seam Carving Forgery Detection Approach by Three-Element Joint Density of Difference Matrix
Cloud Computing and Security, Springer, 2017
DOI: 10.1007/978-3-319-68542-7_35
BibTeX@article{Gu2017, author = {Gu, Wenwu and Yang, Gaobo and Zhang, Dengyong and Xia, Ming}, title = {A Robust Seam Carving Forgery Detection Approach by Three-Element Joint Density of Difference Matrix}, journal = {Cloud Computing and Security}, publisher = {Springer}, year = {2017}}
-
A Counter-Forensic Method for CNN-Based Camera Model Identification
Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW)
2017, pp. 1840-1847
DOI: 10.1109/CVPRW.2017.230
BibTeX@inproceedings{Gueera2017, author = {Güera, D. and Wang, Y. and Bondi, L. and Bestagini, P. and Tubaro, S. and Delp, E. J.}, title = {A Counter-Forensic Method for CNN-Based Camera Model Identification}, booktitle = {Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW)}, year = {2017}, pages = {1840--1847}}
-
Performance Enhancement of Copy-Move Forgery Detection by Using Shi Tomasi-Surf Detector and Surf-PSO Algorithm
Thapar University, Thapar University, 2017
BibTeX@mastersthesis{Gupta2017, author = {Gupta, Anmol}, title = {Performance Enhancement of Copy-Move Forgery Detection by Using Shi Tomasi-Surf Detector and Surf-PSO Algorithm}, school = {Thapar University}, year = {2017}}
-
Feature base fusion for splicing forgery detection based on neuro fuzzy
arXiv, 2017
BibTeX@article{Hadigheh2017, author = {Hadigheh, Habib Ghaffari and bin sulong, Ghazali}, title = {Feature base fusion for splicing forgery detection based on neuro fuzzy}, journal = {arXiv}, year = {2017}}
-
Image forensics using EDBTC feature
Proc. IEEE Int. Conf. Consumer Electronics - Taiwan (ICCE-TW)
2017, pp. 167-168
DOI: 10.1109/ICCE-China.2017.7991048
BibTeX@inproceedings{Harjito2017, author = {Harjito, B. and Prasetyo, H.}, title = {Image forensics using EDBTC feature}, booktitle = {Proc. IEEE Int. Conf. Consumer Electronics - Taiwan (ICCE-TW)}, year = {2017}, pages = {167--168}}
-
Image forensics using EDBTC feature
Proc. IEEE Int. Conf. Consumer Electronics - Taiwan (ICCE-TW)
2017, pp. 167-168
DOI: 10.1109/ICCE-China.2017.7991048
BibTeX@inproceedings{Harjito2017a, author = {Harjito, B. and Prasetyo, H.}, title = {Image forensics using EDBTC feature}, booktitle = {Proc. IEEE Int. Conf. Consumer Electronics - Taiwan (ICCE-TW)}, year = {2017}, pages = {167--168}}
-
Forgery detection in digital images via discrete wavelet and discrete cosine transforms
Computers & Electrical Engineering, Elsevier BV, 2017
DOI: 10.1016/j.compeleceng.2017.03.013
BibTeX@article{Hayat2017, author = {Hayat, Khizar and Qazi, Tanzeela}, title = {Forgery detection in digital images via discrete wavelet and discrete cosine transforms}, journal = {Computers & Electrical Engineering}, publisher = {Elsevier BV}, year = {2017}}
-
A Novel Robust Image Forensics Algorithm Based on L1-Norm Estimation
Digital Forensics and Watermarking, Springer, 2017
DOI: 10.1007/978-3-319-53465-7_11
BibTeX@article{He2017, author = {He, Xin and Guan, Qingxiao and Tong, Yanfei and Zhao, Xianfeng and Yu, Haibo}, title = {A Novel Robust Image Forensics Algorithm Based on L1-Norm Estimation}, journal = {Digital Forensics and Watermarking}, publisher = {Springer}, year = {2017}}
-
Copy-move forgery detection using principal component analysis and discrete cosine transform
Proc. Sensors Networks Smart and Emerging Technologies (SENSET)
2017, pp. 1-4
DOI: 10.1109/SENSET.2017.8125021
BibTeX@inproceedings{Hilal2017a, author = {Hilal, A. and Hamzeh, T. and Chantaf, S.}, title = {Copy-move forgery detection using principal component analysis and discrete cosine transform}, booktitle = {Proc. Sensors Networks Smart and Emerging Technologies (SENSET)}, year = {2017}, pages = {1--4}}
-
Image inconsistency detection using histogram of orientated gradient (HOG)
Proc. 1st Int. Conf. Intelligent Systems and Information Management (ICISIM)
2017, pp. 22-25
DOI: 10.1109/ICISIM.2017.8122141
BibTeX@inproceedings{Hilal2017, author = {Hilal, M. V. and Yannawar, P. and Gaikwad, A. T.}, title = {Image inconsistency detection using histogram of orientated gradient (HOG)}, booktitle = {Proc. 1st Int. Conf. Intelligent Systems and Information Management (ICISIM)}, year = {2017}, pages = {22--25}}
-
Benchmarking face morphing forgery detection: Application of stirtrace for impact simulation of different processing steps
Proc. 5th Int. Workshop Biometrics and Forensics (IWBF)
2017, pp. 1-6
DOI: 10.1109/IWBF.2017.7935087
BibTeX@inproceedings{Hildebrandt2017, author = {Hildebrandt, M. and Neubert, T. and Makrushin, A. and Dittmann, J.}, title = {Benchmarking face morphing forgery detection: Application of stirtrace for impact simulation of different processing steps}, booktitle = {Proc. 5th Int. Workshop Biometrics and Forensics (IWBF)}, year = {2017}, pages = {1--6}}
-
A Perceptual Measure for Deep Single Image Camera Calibration
ArXiv, 2017
BibTeX@article{Hold-Geoffroy2017, author = {Hold-Geoffroy, Yannick and Sunkavalli, Kalyan and Eisenmann, Jonathan and Fisher, Matt and Gambaretto, Emiliano and Hadap, Sunil and Lalonde, Jean-François}, title = {A Perceptual Measure for Deep Single Image Camera Calibration}, journal = {ArXiv}, year = {2017}}
-
Collaborative analysis model for trending images on social networks
Future Generation Computer Systems, Elsevier BV, 2017
DOI: 10.1016/j.future.2017.01.030
BibTeX@article{Hossain2017, author = {Hossain, M. Shamim and Alhamid, Mohammed F. and Muhammad, Ghulam}, title = {Collaborative analysis model for trending images on social networks}, journal = {Future Generation Computer Systems}, publisher = {Elsevier BV}, year = {2017}}
-
A Detection Method for Copy- Move Image Forgery Using Frequency -Based Techniques
Journal of Image and Signal Processing, Hans Publishers, 2017, Vol. 06(01), pp. 8-16
DOI: 10.12677/jisp.2017.61002
BibTeX@article{Hu2017, author = {Hu, Meidong and Wang, Xiaotong and Xu, Guanlei and Yu, Hao}, title = {A Detection Method for Copy- Move Image Forgery Using Frequency -Based Techniques}, journal = {Journal of Image and Signal Processing}, publisher = {Hans Publishers}, year = {2017}, volume = {06}, number = {01}, pages = {8--16}}
-
Tamper detection and image recovery for BTC-compressed images
Multimedia Tools and Applications, Springer, 2017, Vol. 76(14), pp. 15435
DOI: 10.1007/s11042-016-3847-7
BibTeX@article{Hu2017a, author = {Hu, Yu-Chen and Choo, Kim-Kwang Raymond and Chen, Wu-Lin}, title = {Tamper detection and image recovery for BTC-compressed images}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2017}, volume = {76}, number = {14}, pages = {15435}}
-
Multiscale Local Gabor Phase Quantization for image forgery detection
Multimedia Tools and Applications, Springer, 2017, pp. 1
DOI: 10.1007/s11042-017-5189-5
BibTeX@article{Isaac2017, author = {Isaac, Meera Mary and Wilscy, M.}, title = {Multiscale Local Gabor Phase Quantization for image forgery detection}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2017}, pages = {1}}
-
Authentication of Swipe Fingerprint Scanners
IEEE Transactions on Information Forensics and Security, 2017, Vol. 12(9), pp. 2212-2226
DOI: 10.1109/TIFS.2017.2702592
BibTeX@article{Ivanov2017, author = {Ivanov, V. I. and Baras, J. S.}, title = {Authentication of Swipe Fingerprint Scanners}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2017}, volume = {12}, number = {9}, pages = {2212--2226}}
-
An enhanced statistical approach for median filtering detection using difference image
Proc. Security and Behavior Analysis (ISBA) 2017 IEEE Int. Conf. Identity
2017, pp. 1-7
DOI: 10.1109/ISBA.2017.7947704
BibTeX@inproceedings{Jain2017, author = {Jain, H. and Das, J. and Verma, H. K. and Khanna, N.}, title = {An enhanced statistical approach for median filtering detection using difference image}, booktitle = {Proc. Security and Behavior Analysis (ISBA) 2017 IEEE Int. Conf. Identity}, year = {2017}, pages = {1--7}}
-
Using Sensor Pattern Noise for Camera Identification
International Journal of Computer Science and Information Security, 2017
BibTeX@article{Javanmard2017, author = {Javanmard, Mahdi and Refayen, Raheleh}, title = {Using Sensor Pattern Noise for Camera Identification}, journal = {International Journal of Computer Science and Information Security}, year = {2017}}
-
Estimation of Bayer CFA pattern configuration based on singular value decomposition
EURASIP Journal on Image and Video Processing, Springer Nature, 2017, Vol. 2017(1)
DOI: 10.1186/s13640-017-0196-z
BibTeX@article{Jeon2017, author = {Jeon, Jong Ju and Shin, Hyun Jun and Eom, Il Kyu}, title = {Estimation of Bayer CFA pattern configuration based on singular value decomposition}, journal = {EURASIP Journal on Image and Video Processing}, publisher = {Springer Nature}, year = {2017}, volume = {2017}, number = {1}}
-
Detection of Double Compression with the Same Coding Parameters Based on Quality Degradation Mechanism Analysis
IEEE Transactions on Information Forensics and Security, 2017, Vol. PP(99), pp. 1
DOI: 10.1109/TIFS.2017.2745687
BibTeX@article{Jiang2017, author = {Jiang, X. and He, P. and Sun, T. and Xie, F. and Wang, S.}, title = {Detection of Double Compression with the Same Coding Parameters Based on Quality Degradation Mechanism Analysis}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2017}, volume = {PP}, number = {99}, pages = {1}}
-
Using The Noise Density Down Projection To Expose Splicing In JPEG Images
2017
BibTeX@electronic{Julliand2017, author = {Julliand, Thibault and Nozick, Vincent and Echizen, Isao and Talbot, Hugues}, title = {Using The Noise Density Down Projection To Expose Splicing In JPEG Images}, year = {2017}}
-
Frame-rate conversion detection based on periodicity of motion artifact
Multimedia Tools and Applications, Springer, 2017, pp. 1
DOI: 10.1007/s11042-017-4519-y
BibTeX@article{Jung2017, author = {Jung, Dae-Jin and Lee, Heung-Kyu}, title = {Frame-rate conversion detection based on periodicity of motion artifact}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2017}, pages = {1}}
-
Study and analysis of copy-move splicing image forgery detection techniques
Proc. Analytics and Cloud) (I-SMAC) 2017 Int. Conf. I-SMAC (IoT in Social, Mobile
2017, pp. 697-702
DOI: 10.1109/I-SMAC.2017.8058268
BibTeX@inproceedings{Jwaid2017, author = {Jwaid, M. F. and Baraskar, T. N.}, title = {Study and analysis of copy-move splicing image forgery detection techniques}, booktitle = {Proc. Analytics and Cloud) (I-SMAC) 2017 Int. Conf. I-SMAC (IoT in Social, Mobile}, year = {2017}, pages = {697--702}}
-
A survey of copy-move image forgery detection techniques
Proc. Int. Conf. Inventive Systems and Control (ICISC)
2017, pp. 1-6
DOI: 10.1109/ICISC.2017.8068703
BibTeX@inproceedings{Kanagavalli2017, author = {Kanagavalli, N. and Latha, L.}, title = {A survey of copy-move image forgery detection techniques}, booktitle = {Proc. Int. Conf. Inventive Systems and Control (ICISC)}, year = {2017}, pages = {1--6}}
-
An Evaluation of Digital Image Forgery Detection Approaches
arX, 2017
BibTeX@article{Kashyap2017, author = {Kashyap, Abhishek and Parmar, Rajesh Singh and Agrawal, Megha and Gupta, Hariom}, title = {An Evaluation of Digital Image Forgery Detection Approaches}, journal = {arX}, year = {2017}}
-
A fusion framework based on fuzzy integrals for passive-blind image tamper detection
Cluster Computing, Springer, 2017, pp. 1
DOI: 10.1007/s10586-017-1393-3
BibTeX@article{Kaur2017, author = {Kaur, Mandeep and Gupta, Savita}, title = {A fusion framework based on fuzzy integrals for passive-blind image tamper detection}, journal = {Cluster Computing}, publisher = {Springer}, year = {2017}, pages = {1}}
-
Analysis of SIFT and SURF features for copy-move image forgery detection
Proc. Embedded and Communication Systems (ICIIECS) 2017 Int. Conf. Innovations in Information
2017, pp. 1-4
DOI: 10.1109/ICIIECS.2017.8276160
BibTeX@inproceedings{Kaura2017, author = {Kaura, W. C. N. and Dhavale, S.}, title = {Analysis of SIFT and SURF features for copy-move image forgery detection}, booktitle = {Proc. Embedded and Communication Systems (ICIIECS) 2017 Int. Conf. Innovations in Information}, year = {2017}, pages = {1--4}}
-
Learning deep features for source color laser printer identification based on cascaded learning
arXiv, 2017
BibTeX@article{Kim2017, author = {Kim, Do-Guk and Hou, Jong-Uk and Lee, Heung-Kyu}, title = {Learning deep features for source color laser printer identification based on cascaded learning}, journal = {arXiv}, year = {2017}}
-
Image Manipulation Detection using Convolutional Neural Network
International Journal of Applied Engineering Research, 2017
BibTeX@article{Kim2017a, author = {Kim, Dong-Hyun and Le, Hae-Yeoun}, title = {Image Manipulation Detection using Convolutional Neural Network}, journal = {International Journal of Applied Engineering Research}, year = {2017}}
-
Inter-frame forgery detection in H.264 videos using motion and brightness gradients
Multimedia Tools and Applications, Springer, 2017, pp. 1
DOI: 10.1007/s11042-017-4762-2
BibTeX@article{Kingra2017, author = {Kingra, Staffy and Aggarwal, Naveen and Singh, Raahat Devender}, title = {Inter-frame forgery detection in H.264 videos using motion and brightness gradients}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2017}, pages = {1}}
-
Digital image integrity – a survey of protection and verification techniques
Digital Signal Processing, Elsevier BV, 2017
DOI: 10.1016/j.dsp.2017.08.009
BibTeX@article{Korus2017, author = {Korus, Paweł}, title = {Digital image integrity – a survey of protection and verification techniques}, journal = {Digital Signal Processing}, publisher = {Elsevier BV}, year = {2017}}
-
A Copy-Move Detection Algorithm Based on Geometric Local Binary Pattern
Digital Communication. Towards a Smart and Secure Future Internet
Springer, 2017
DOI: 10.1007/978-3-319-67639-5_7
BibTeX@incollection{Kuznetsov2017b, author = {Kuznetsov, Andrey}, title = {A Copy-Move Detection Algorithm Based on Geometric Local Binary Pattern}, booktitle = {Digital Communication. Towards a Smart and Secure Future Internet}, publisher = {Springer}, year = {2017}}
-
Using Efficient Linear Local Features in the Copy-Move Forgery Detection Task
Analysis of Images, Social Networks and Texts, Springer, 2017
DOI: 10.1007/978-3-319-52920-2_28
BibTeX@article{Kuznetsov2017, author = {Kuznetsov, Andrey and Myasnikov, Vladislav}, title = {Using Efficient Linear Local Features in the Copy-Move Forgery Detection Task}, journal = {Analysis of Images, Social Networks and Texts}, publisher = {Springer}, year = {2017}}
-
A new copy-move forgery detection algorithm using image preprocessing procedure
Procedia Engineering, Elsevier BV, 2017, Vol. 201, pp. 436-444
DOI: 10.1016/j.proeng.2017.09.671
BibTeX@article{Kuznetsov2017a, author = {Kuznetsov, Andrey and Myasnikov, Vladislav}, title = {A new copy-move forgery detection algorithm using image preprocessing procedure}, journal = {Procedia Engineering}, publisher = {Elsevier BV}, year = {2017}, volume = {201}, pages = {436--444}}
-
An improved block-based matching algorithm of copy-move forgery detection
Multimedia Tools and Applications, Springer Nature, 2017
DOI: 10.1007/s11042-017-5094-y
BibTeX@article{Lai2017, author = {Lai, Yuecong and Huang, Tianqiang and Lin, Jing and Lu, Henan}, title = {An improved block-based matching algorithm of copy-move forgery detection}, journal = {Multimedia Tools and Applications}, publisher = {Springer Nature}, year = {2017}}
-
Digital Camera Identification Using Sensor Pattern Noise for Forensics Applications
Northumbria University, Northumbria University, 2017
BibTeX@phdthesis{Lawgaly2017, author = {Lawgaly, Ashref}, title = {Digital Camera Identification Using Sensor Pattern Noise for Forensics Applications}, school = {Northumbria University}, year = {2017}}
-
Digital Video Source Identification Using Sensor Pattern Noise with Morphology Filtering -- 모폴로지 필터링 기반 센서 패턴 노이즈를 이용한 디지털 동영상 획득 장치 판별 기술
KIPS Tr. Software and Data Eng., 2017, Vol. 6(1)
DOI: 10.3745/KTSDE.2017.6.1.15
BibTeX@article{Lee2017, author = {Lee, Sang-hyeong and Kim, Dong-hyun and Oh, Tae-woo and Kim, Ki-bom and Lee, Hae-yeoun}, title = {Digital Video Source Identification Using Sensor Pattern Noise with Morphology Filtering -- 모폴로지 필터링 기반 센서 패턴 노이즈를 이용한 디지털 동영상 획득 장치 판별 기술}, journal = {KIPS Tr. Software and Data Eng.}, year = {2017}, volume = {6}, number = {1}}
-
Combined Zernike Moment and Multiscale Analysis for Tamper Detection in Digital Images
Informatica, 2017, Vol. 41, pp. 59-70
BibTeX@article{Le-Tien2017, author = {Le-Tien, Thuong and Huynh-Kha, Tu and Cong-Hoan, Long Pham and Tran-Hong, An}, title = {Combined Zernike Moment and Multiscale Analysis for Tamper Detection in Digital Images}, journal = {Informatica}, year = {2017}, volume = {41}, pages = {59--70}}
-
An evaluation on the effective processing time of Raspberry Pi-3B-based embedded systems for determining forged images
Proc. 4th NAFOSTED Conf. Information and Computer Science
2017, pp. 213-218
DOI: 10.1109/NAFOSTED.2017.8108066
BibTeX@inproceedings{Le-Tien2017a, author = {Le-Tien, T. and Huynh-Kha, T. and Nguyen-Thanh, T. and Pham-Duc, T. and Nguyen-Huu, T.}, title = {An evaluation on the effective processing time of Raspberry Pi-3B-based embedded systems for determining forged images}, booktitle = {Proc. 4th NAFOSTED Conf. Information and Computer Science}, year = {2017}, pages = {213--218}}
-
An Improved Method for Eliminating Ghosting in Image Stitching
Proc. 9th Int. Conf. Intelligent Human-Machine Systems and Cybernetics (IHMSC)
2017, Vol. 2, pp. 415-418
DOI: 10.1109/IHMSC.2017.205
BibTeX@inproceedings{Li2017f, author = {Li, A. and Zhou, S. and Wang, R.}, title = {An Improved Method for Eliminating Ghosting in Image Stitching}, booktitle = {Proc. 9th Int. Conf. Intelligent Human-Machine Systems and Cybernetics (IHMSC)}, year = {2017}, volume = {2}, pages = {415--418}}
-
A fast source-oriented image clustering method for digital forensics
EURASIP Journal on Image and Video Processing, Springer Nature, 2017, Vol. 2017(1)
DOI: 10.1186/s13640-017-0217-y
BibTeX@article{Li2017e, author = {Li, Chang-Tsun and Lin, Xufeng}, title = {A fast source-oriented image clustering method for digital forensics}, journal = {EURASIP Journal on Image and Video Processing}, publisher = {Springer Nature}, year = {2017}, volume = {2017}, number = {1}}
-
Research on Image Splicing Based on Weighted Poisson Fusion
International Journal of Computer Science Engineering (IJCSE), 2017
BibTeX@article{Li2017d, author = {Li, Dan and Yuan, Ling and Hu, Song and Wang, Zeqi}, title = {Research on Image Splicing Based on Weighted Poisson Fusion}, journal = {International Journal of Computer Science Engineering (IJCSE)}, year = {2017}}
-
Improved detection for copy-move forgery with multi-scale sliding windows
Proc. Int. Symp. Intelligent Signal Processing and Communication Systems (ISPACS)
2017, pp. 231-236
DOI: 10.1109/ISPACS.2017.8266479
BibTeX@inproceedings{Li2017h, author = {Li, F. and Xin, M. and Li, J. and Yu, J.}, title = {Improved detection for copy-move forgery with multi-scale sliding windows}, booktitle = {Proc. Int. Symp. Intelligent Signal Processing and Communication Systems (ISPACS)}, year = {2017}, pages = {231--236}}
-
Image Forgery Localization via Integrating Tampering Possibility Maps
IEEE Transactions on Information Forensics and Security, 2017, Vol. PP(99), pp. 1
DOI: 10.1109/TIFS.2017.2656823
BibTeX@article{Li2017, author = {Li, H. and Luo, W. and qiu, X. and Huang, J.}, title = {Image Forgery Localization via Integrating Tampering Possibility Maps}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2017}, volume = {PP}, number = {99}, pages = {1}}
-
Localization of Diffusion-Based Inpainting in Digital Images
IEEE Transactions on Information Forensics and Security, 2017, Vol. 12(12), pp. 3050-3064
DOI: 10.1109/TIFS.2017.2730822
BibTeX@article{Li2017b, author = {Li, H. and Luo, W. and Huang, J.}, title = {Localization of Diffusion-Based Inpainting in Digital Images}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2017}, volume = {12}, number = {12}, pages = {3050--3064}}
-
Anti-Forensics of Camera Identification and the Triangle Test by Improved Fingerprint-Copy Attack
arXiv, 2017
BibTeX@article{Li2017c, author = {Li, Haodong and Luo, Weiqi and Rao, Quanquan and Huang, Jiwu}, title = {Anti-Forensics of Camera Identification and the Triangle Test by Improved Fingerprint-Copy Attack}, journal = {arXiv}, year = {2017}}
-
Are You Lying: Validating the Time-Location of Outdoor Images
Applied Cryptography and Network Security, Springer, 2017
DOI: 10.1007/978-3-319-61204-1_6
BibTeX@article{Li2017g, author = {Li, Xiaopeng and Xu, Wenyuan and Wang, Song and Qu, Xianshan}, title = {Are You Lying: Validating the Time-Location of Outdoor Images}, journal = {Applied Cryptography and Network Security}, publisher = {Springer}, year = {2017}}
-
SIFT Keypoint Removal via Directed Graph Construction for Color Images
IEEE Transactions on Information Forensics and Security, 2017, Vol. 12(12), pp. 2971-2985
DOI: 10.1109/TIFS.2017.2730362
BibTeX@article{Li2017a, author = {Li, Y. and Zhou, J. and Cheng, A.}, title = {SIFT Keypoint Removal via Directed Graph Construction for Color Images}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2017}, volume = {12}, number = {12}, pages = {2971--2985}}
-
Soft multimedia anomaly detection based on neural network and optimization driven support vector machine
Multimedia Tools and Applications, Springer, 2017, pp. 1
DOI: 10.1007/s11042-017-5352-z
BibTeX@article{Liang2017, author = {Liang, Dong and Lu, Chen and Jin, Hao}, title = {Soft multimedia anomaly detection based on neural network and optimization driven support vector machine}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2017}, pages = {1}}
-
Region duplication detection based on image segmentation and keypoint contexts
Multimedia Tools and Applications, Springer, 2017, pp. 1
DOI: 10.1007/s11042-017-5027-9
BibTeX@article{Lin2017, author = {Lin, Cong and Lu, Wei and Sun, Wei and Zeng, Jinhua and Xu, Tianhua and Lai, Jian-Huang}, title = {Region duplication detection based on image segmentation and keypoint contexts}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2017}, pages = {1}}
-
A study on pre-processing methods for copy-move forgery detection based on SIFT
Proc. TENCON 2017 - 2017 IEEE Region 10 Conf
2017, pp. 1142-1147
DOI: 10.1109/TENCON.2017.8228029
BibTeX@inproceedings{Lionnie2017, author = {Lionnie, R. and Bahaweres, R. B. and Attamimi, S. and Alaydrus, M.}, title = {A study on pre-processing methods for copy-move forgery detection based on SIFT}, booktitle = {Proc. TENCON 2017 - 2017 IEEE Region 10 Conf}, year = {2017}, pages = {1142--1147}}
-
Median filtering forensics in digital images based on frequency-domain features
Multimedia Tools and Applications, Springer, 2017, Vol. 76(21), pp. 22119
DOI: 10.1007/s11042-017-4845-0
BibTeX@article{Liu2017h, author = {Liu, Anan and Zhao, Zhengyu and Zhang, Chengqian and Su, Yuting}, title = {Median filtering forensics in digital images based on frequency-domain features}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2017}, volume = {76}, number = {21}, pages = {22119}}
-
Multi-object splicing forgery detection using noise level difference
Proc. IEEE Conf. Dependable and Secure Computing
2017, pp. 533-534
DOI: 10.1109/DESEC.2017.8073884
BibTeX@inproceedings{Liu2017f, author = {Liu, B. and Pun, C. M.}, title = {Multi-object splicing forgery detection using noise level difference}, booktitle = {Proc. IEEE Conf. Dependable and Secure Computing}, year = {2017}, pages = {533--534}}
-
Linear Filter Kernel Estimation Based on Digital Camera Sensor Noise
2017
BibTeX@unpublished{Liu2017b, author = {Liu, Chang and Kirchner, Matthias}, title = {Linear Filter Kernel Estimation Based on Digital Camera Sensor Noise}, year = {2017}}
-
An approach to detecting JPEG down-recompression and seam carving forgery under recompression anti-forensics
Pattern Recognition, Elsevier BV, 2017, Vol. 65, pp. 35-46
DOI: 10.1016/j.patcog.2016.12.010
BibTeX@article{Liu2017a, author = {Liu, Qingzhong}, title = {An approach to detecting JPEG down-recompression and seam carving forgery under recompression anti-forensics}, journal = {Pattern Recognition}, publisher = {Elsevier BV}, year = {2017}, volume = {65}, pages = {35--46}}
-
Copy-move Forgery Detection based on Convolutional Kernel Network
arXiv, 2017
BibTeX@article{Liu2017c, author = {Liu, Yaqi and Guan, Qingxiao and Zhao, Xianfeng}, title = {Copy-move Forgery Detection based on Convolutional Kernel Network}, journal = {arXiv}, year = {2017}}
-
Copy-move forgery detection based on convolutional kernel network
Multimedia Tools and Applications, Springer, 2017, pp. 1
DOI: 10.1007/s11042-017-5374-6
BibTeX@article{Liu2017g, author = {Liu, Yaqi and Guan, Qingxiao and Zhao, Xianfeng}, title = {Copy-move forgery detection based on convolutional kernel network}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2017}, pages = {1}}
-
Noisy Smoothing Image Source Identification
Cyberspace Safety and Security
Springer International Publishing, 2017, pp. 135-147
DOI: 10.1007/978-3-319-69471-9_10
BibTeX@incollection{Liu2017d, author = {Liu, Yuying and Huang, Yonggang and Zhang, Jun and Liu, Xu and Shen, Hualei}, title = {Noisy Smoothing Image Source Identification}, booktitle = {Cyberspace Safety and Security}, publisher = {Springer International Publishing}, year = {2017}, pages = {135--147}}
-
Forensics of Operation History Including Image Blurring and Noise Addition based on Joint Features
Advances in Intelligent Information Hiding and Multimedia Signal Processing
Springer, 2017
DOI: 10.1007/978-3-319-50212-0_11
BibTeX@incollection{Liu2017, author = {Liu, Yahui and Ni, Rongrong and Zhao, Yao}, title = {Forensics of Operation History Including Image Blurring and Noise Addition based on Joint Features}, booktitle = {Advances in Intelligent Information Hiding and Multimedia Signal Processing}, publisher = {Springer}, year = {2017}}
-
An Efficient Copy-Move Detection Algorithm Based on Superpixel Segmentation and Harris Key-Points
Cloud Computing and Security, Springer, 2017
DOI: 10.1007/978-3-319-68505-2_6
BibTeX@article{Liu2017e, author = {Liu, Yong and Wang, Hong-Xia and Wu, Han-Zhou and Chen, Yi}, title = {An Efficient Copy-Move Detection Algorithm Based on Superpixel Segmentation and Harris Key-Points}, journal = {Cloud Computing and Security}, publisher = {Springer}, year = {2017}}
-
Identifying natural images and computer generated graphics based on binary similarity measures of PRNU
Multimedia Tools and Applications, Springer Nature, 2017
DOI: 10.1007/s11042-017-5101-3
BibTeX@article{Long2017, author = {Long, Min and Peng, Fei and Zhu, Yin}, title = {Identifying natural images and computer generated graphics based on binary similarity measures of PRNU}, journal = {Multimedia Tools and Applications}, publisher = {Springer Nature}, year = {2017}}
-
Identificación De La Fuente En Vídeos De Dispositivos Móviles
Departamento De Ingeniería del Software e Inteligencia Artificial Universidad Complutense de Madrid, Departamento De Ingeniería del Software e Inteligencia Artificial Universidad Complutense de Madrid, 2017
BibTeX@mastersthesis{Lopez2017, author = {López, Raquel Ramos}, title = {Identificación De La Fuente En Vídeos De Dispositivos Móviles}, school = {Departamento De Ingeniería del Software e Inteligencia Artificial Universidad Complutense de Madrid}, year = {2017}}
-
Deep Photo Style Transfer
arXiv, 2017
BibTeX@article{Luan2017, author = {Luan, Fujun and Paris, Sylvain and Shechtman, Eli and Bala, Kavita}, title = {Deep Photo Style Transfer}, journal = {arXiv}, year = {2017}}
-
Copy-Paste Detection Based on a SIFT Marked Graph Feature Vector
Chinese Journal of Electronics, 2017
BibTeX@article{Lyu2017, author = {Lyu, Y. and Shen, X. and Chen, H.}, title = {Copy-Paste Detection Based on a SIFT Marked Graph Feature Vector}, journal = {Chinese Journal of Electronics}, year = {2017}}
-
Identifying Computer-Generated Portraits: The Importance of Training and Incentives
Perception, SAGE Publications, 2017, Vol. 46(9), pp. 1062-1076
DOI: 10.1177/0301006617713633
BibTeX@article{Mader2017, author = {Mader, Brandon and Banks, Martin S. and Farid, Hany}, title = {Identifying Computer-Generated Portraits: The Importance of Training and Incentives}, journal = {Perception}, publisher = {SAGE Publications}, year = {2017}, volume = {46}, number = {9}, pages = {1062--1076}}
-
Image Inconsistency Detection Using Local Binary Pattern (LBP)
Procedia Computer Science, Elsevier BV, 2017, Vol. 115, pp. 501-508
DOI: 10.1016/j.procs.2017.09.097
BibTeX@article{Mahale2017, author = {Mahale, Vivek H. and Ali, Mouad M. H. and Yannawar, Pravin L. and Gaikwad, Ashok T.}, title = {Image Inconsistency Detection Using Local Binary Pattern (LBP)}, journal = {Procedia Computer Science}, publisher = {Elsevier BV}, year = {2017}, volume = {115}, pages = {501--508}}
-
Copy–move forgery detection through stationary wavelets and local binary pattern variance for forensic analysis in digital images
Forensic Science International, Elsevier BV, 2017, Vol. 279, pp. 8-21
DOI: 10.1016/j.forsciint.2017.07.037
BibTeX@article{Mahmood2017, author = {Mahmood, Toqeer and Irtaza, Aun and Mehmood, Zahid and Mahmood, Muhammad Tariq}, title = {Copy–move forgery detection through stationary wavelets and local binary pattern variance for forensic analysis in digital images}, journal = {Forensic Science International}, publisher = {Elsevier BV}, year = {2017}, volume = {279}, pages = {8--21}}
-
An efficient forensic technique for exposing region duplication forgery in digital images
Applied Intelligence, Springer, 2017, pp. 1
DOI: 10.1007/s10489-017-1038-5
BibTeX@article{Mahmood2017a, author = {Mahmood, Toqeer and Mehmood, Zahid and Shah, Mohsin and Khan, Zakir}, title = {An efficient forensic technique for exposing region duplication forgery in digital images}, journal = {Applied Intelligence}, publisher = {Springer}, year = {2017}, pages = {1}}
-
Tampering Detection and Localization in Images from Social Networks: A CBIR Approach
Image Analysis and Processing - ICIAP 2017, Springer, 2017
DOI: 10.1007/978-3-319-68560-1_67
BibTeX@article{Maigrot2017, author = {Maigrot, Cedric and Kijak, Ewa and Sicre, Ronan and Claveau, Vincent}, title = {Tampering Detection and Localization in Images from Social Networks: A CBIR Approach}, journal = {Image Analysis and Processing - ICIAP 2017}, publisher = {Springer}, year = {2017}}
-
Limitation of PFA-Events as a Forensic Tool
2017
BibTeX@electronic{Malik2017, author = {Malik, Parveen}, title = {Limitation of PFA-Events as a Forensic Tool}, year = {2017}}
-
Iterative content adaptable purple fringe detection
Signal, Image and Video Processing, Springer, 2017, pp. 1
DOI: 10.1007/s11760-017-1144-1
BibTeX@article{Malik2017a, author = {Malik, Parveen and Karthik, Kannan}, title = {Iterative content adaptable purple fringe detection}, journal = {Signal, Image and Video Processing}, publisher = {Springer}, year = {2017}, pages = {1}}
-
Inpainting-based Camera Anonymization
Proc of the ICIP 2017
Pr, 2017
BibTeX@inproceedings{Mandelli2017, author = {Mandelli, Sara and Bondi, Luca and Lameri, Silvia and Lipari, Vincenzo and Bestagini, Paolo and Tubaro, Stefano}, title = {Inpainting-based Camera Anonymization}, booktitle = {Proc of the ICIP 2017}, journal = {Pr}, year = {2017}}
-
Blind technique using blocking artifacts and entropy of histograms for image tampering detection
Jiang, X., Arai, M. & Chen, G. (ed.)
Second International Workshop on Pattern Recognition
SPIE, 2017
DOI: 10.1117/12.2280306
BibTeX@inproceedings{Manu2017a, author = {Manu, V. T. and Mehtre, B. M.}, title = {Blind technique using blocking artifacts and entropy of histograms for image tampering detection}, booktitle = {Second International Workshop on Pattern Recognition}, publisher = {SPIE}, year = {2017}}
-
Copy-move tampering detection using affine transformation property preservation on clustered keypoints
Signal, Image and Video Processing, Springer, 2017, pp. 1
DOI: 10.1007/s11760-017-1191-7
BibTeX@article{Manu2017, author = {Manu, V. T. and Mehtre, B. M.}, title = {Copy-move tampering detection using affine transformation property preservation on clustered keypoints}, journal = {Signal, Image and Video Processing}, publisher = {Springer}, year = {2017}, pages = {1}}
-
A deep learning approach for iris sensor model identification
Pattern Recognition Letters, Elsevier BV, 2017
DOI: 10.1016/j.patrec.2017.04.010
BibTeX@article{Marra2017, author = {Marra, Francesco and Poggi, Giovanni and Sansone, Carlo and Verdoliva, Luisa}, title = {A deep learning approach for iris sensor model identification}, journal = {Pattern Recognition Letters}, publisher = {Elsevier BV}, year = {2017}}
-
Blind PRNU-Based Image Clustering for Source Identification
IEEE Transactions on Information Forensics and Security, 2017, Vol. 12(9), pp. 2197-2211
DOI: 10.1109/TIFS.2017.2701335
BibTeX@article{Marra2017a, author = {Marra, F. and Poggi, G. and Sansone, C. and Verdoliva, L.}, title = {Blind PRNU-Based Image Clustering for Source Identification}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2017}, volume = {12}, number = {9}, pages = {2197--2211}}
-
On the likelihood of “encapsulating all uncertainty”
Science & Justice, Elsevier BV, 2017, Vol. 57(1), pp. 76-79
DOI: 10.1016/j.scijus.2016.10.004
BibTeX@article{Martire2017, author = {Martire, Kristy A. and Edmond, Gary and Navarro, Daniel J. and Newell, Ben R.}, title = {On the likelihood of “encapsulating all uncertainty”}, journal = {Science & Justice}, publisher = {Elsevier BV}, year = {2017}, volume = {57}, number = {1}, pages = {76--79}}
-
Countering Anti-Forensics of Lateral Chromatic Aberration
Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security - IHMMSec '17
ACM Press, 2017
DOI: 10.1145/3082031.3083242
BibTeX@inproceedings{Mayer2017, author = {Mayer, Owen and Stamm, Matthew C.}, title = {Countering Anti-Forensics of Lateral Chromatic Aberration}, booktitle = {Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security - IHMMSec '17}, publisher = {ACM Press}, year = {2017}}
-
ASRD: Algorithm for Spliced Region Detection in Digital Image Forensics
Software Engineering Trends and Techniques in Intelligent Systems, Springer, 2017
DOI: 10.1007/978-3-319-57141-6_10
BibTeX@article{MeenakshiSundaram2017, author = {Meenakshi Sundaram, A. and Nandini, C.}, title = {ASRD: Algorithm for Spliced Region Detection in Digital Image Forensics}, journal = {Software Engineering Trends and Techniques in Intelligent Systems}, publisher = {Springer}, year = {2017}}
-
Case Studies of Selected IoT Deployments
Security Challenges and Approaches in Internet of Things, Springer, 2017
DOI: 10.1007/978-3-319-44230-3_6
BibTeX@article{Misra2017, author = {Misra, Sridipta and Maheswaran, Muthucumaru and Hashmi, Salman}, title = {Case Studies of Selected IoT Deployments}, journal = {Security Challenges and Approaches in Internet of Things}, publisher = {Springer}, year = {2017}}
-
System Model for the Internet of Things
Security Challenges and Approaches in Internet of Things, Springer, 2017
DOI: 10.1007/978-3-319-44230-3_2
BibTeX@article{Misra2017a, author = {Misra, Sridipta and Maheswaran, Muthucumaru and Hashmi, Salman}, title = {System Model for the Internet of Things}, journal = {Security Challenges and Approaches in Internet of Things}, publisher = {Springer}, year = {2017}}
-
Vulnerable Features and Threats
Security Challenges and Approaches in Internet of Things, Springer, 2017
DOI: 10.1007/978-3-319-44230-3_3
BibTeX@article{Misra2017b, author = {Misra, Sridipta and Maheswaran, Muthucumaru and Hashmi, Salman}, title = {Vulnerable Features and Threats}, journal = {Security Challenges and Approaches in Internet of Things}, publisher = {Springer}, year = {2017}}
-
Behaviour knowledge space-based fusion for image forgery detection
Proc. Int. Conf. Inventive Communication and Computational Technologies (ICICCT)
2017, pp. 400-403
DOI: 10.1109/ICICCT.2017.7975228
BibTeX@inproceedings{Monson2017, author = {Monson, N. S. and Kumar, K. V. M.}, title = {Behaviour knowledge space-based fusion for image forgery detection}, booktitle = {Proc. Int. Conf. Inventive Communication and Computational Technologies (ICICCT)}, year = {2017}, pages = {400--403}}
-
Integridad En Imágenes de Dispositivos Móviles
Departamento de Ingeniería del Software e Inteligencia Artificial Universidad Complutense de Madrid, Departamento de Ingeniería del Software e Inteligencia Artificial Universidad Complutense de Madrid, 2017
BibTeX@mastersthesis{Munoz2017, author = {Muñoz, Santiago Gómez}, title = {Integridad En Imágenes de Dispositivos Móviles}, school = {Departamento de Ingeniería del Software e Inteligencia Artificial Universidad Complutense de Madrid}, year = {2017}}
-
Copy-Move forgery detection in images using grey-level run length matrix features
International Journal of Forensic Engineering, Inderscience Publishers, 2017, Vol. 3(4), pp. 303
DOI: 10.1504/ijfe.2017.087645
BibTeX@article{Mushtaq2017, author = {Mushtaq, Saba and Mir, Ajaz Hussain}, title = {Copy-Move forgery detection in images using grey-level run length matrix features}, journal = {International Journal of Forensic Engineering}, publisher = {Inderscience Publishers}, year = {2017}, volume = {3}, number = {4}, pages = {303}}
-
Recent keypoint based copy move forgery detection techniques
Proc. Int. Artificial Intelligence and Data Processing Symp. (IDAP)
2017, pp. 1-7
DOI: 10.1109/IDAP.2017.8090251
BibTeX@inproceedings{Muzaffer2017, author = {Muzaffer, G. and Karaagacli, E. S. and Ulutas, G.}, title = {Recent keypoint based copy move forgery detection techniques}, booktitle = {Proc. Int. Artificial Intelligence and Data Processing Symp. (IDAP)}, year = {2017}, pages = {1--7}}
-
A fast and effective digital image copy move forgery detection with binarized SIFT
Proc. 40th Int. Conf. Telecommunications and Signal Processing (TSP)
2017, pp. 595-598
DOI: 10.1109/TSP.2017.8076056
BibTeX@inproceedings{Muzaffer2017b, author = {Muzaffer, G. and Ulutas, G.}, title = {A fast and effective digital image copy move forgery detection with binarized SIFT}, booktitle = {Proc. 40th Int. Conf. Telecommunications and Signal Processing (TSP)}, year = {2017}, pages = {595--598}}
-
PSO and SURF based digital image forgery detection
Proc. Int. Conf. Computer Science and Engineering (UBMK)
2017, pp. 688-692
DOI: 10.1109/UBMK.2017.8093499
BibTeX@inproceedings{Muzaffer2017a, author = {Muzaffer, G. and Ulutaş, G. and Gedikli, E.}, title = {PSO and SURF based digital image forgery detection}, booktitle = {Proc. Int. Conf. Computer Science and Engineering (UBMK)}, year = {2017}, pages = {688--692}}
-
Detecting morphological filtering of binary images
IEEE Transactions on Information Forensics and Security, 2017, Vol. PP(99), pp. 1
DOI: 10.1109/TIFS.2017.2656472
BibTeX@article{Natale2017, author = {Natale, F. G. B. De and Boato, G.}, title = {Detecting morphological filtering of binary images}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2017}, volume = {PP}, number = {99}, pages = {1}}
-
Comparison between image forgery detection algorithms
Proc. 8th Int. Conf. Information Technology (ICIT)
2017, pp. 442-445
DOI: 10.1109/ICITECH.2017.8080040
BibTeX@inproceedings{Nazli2017, author = {Nazli, M. N. and Maghari, A. Y. A.}, title = {Comparison between image forgery detection algorithms}, booktitle = {Proc. 8th Int. Conf. Information Technology (ICIT)}, year = {2017}, pages = {442--445}}
-
Preliminary on Watermarking Technology
Digital Watermarking, Springer, 2017
DOI: 10.1007/978-981-10-2095-7_1
BibTeX@article{Nematollahi2017, author = {Nematollahi, Mohammad Ali and Vorakulpipat, Chalee and Rosales, Hamurabi Gamboa}, title = {Preliminary on Watermarking Technology}, journal = {Digital Watermarking}, publisher = {Springer}, year = {2017}}
-
Face Morphing Detection: An Approach Based on Image Degradation Analysis
Digital Forensics and Watermarking, Springer, 2017
DOI: 10.1007/978-3-319-64185-0_8
BibTeX@article{Neubert2017, author = {Neubert, Tom}, title = {Face Morphing Detection: An Approach Based on Image Degradation Analysis}, journal = {Digital Forensics and Watermarking}, publisher = {Springer}, year = {2017}}
-
RAW Image Reconstruction Using a Self-contained sRGB–JPEG Image with Small Memory Overhead
International Journal of Computer Vision, Springer, 2017, pp. 1
DOI: 10.1007/s11263-017-1056-0
BibTeX@article{Nguyen2017, author = {Nguyen, Rang M. H. and Brown, Michael S.}, title = {RAW Image Reconstruction Using a Self-contained sRGB–JPEG Image with Small Memory Overhead}, journal = {International Journal of Computer Vision}, publisher = {Springer}, year = {2017}, pages = {1}}
-
Blind Forensics of Successive Geometric Transformations in Digital Images using Spectral Method: Theory and Applications
IEEE Transactions on Image Processing, 2017, Vol. PP(99), pp. 1
DOI: 10.1109/TIP.2017.2682963
BibTeX@article{Ni2017, author = {Ni, J. and Chen, C. and Shen, Z. and Shi, Y. Q.}, title = {Blind Forensics of Successive Geometric Transformations in Digital Images using Spectral Method: Theory and Applications}, journal = {IEEE Transactions on Image Processing}, year = {2017}, volume = {PP}, number = {99}, pages = {1}}
-
Can people identify original and manipulated photos of real-world scenes?
Cognitive Research:Principles and Implications, 2017
DOI: 10.1186/s41235-017-0067-2
BibTeX@article{Nightingale2017, author = {Nightingale, Sophie J. and Wade, Kimerley A. and Watson, Derrick G.}, title = {Can people identify original and manipulated photos of real-world scenes?}, journal = {Cognitive Research:Principles and Implications}, year = {2017}}
-
Robust Median Filtering Detection based on Local Difference Descriptor
Signal Processing: Image Communication, Elsevier BV, 2017
DOI: 10.1016/j.image.2017.01.008
BibTeX@article{Niu2017, author = {Niu, Yakun and Zhao, Yao and Ni, RongRong}, title = {Robust Median Filtering Detection based on Local Difference Descriptor}, journal = {Signal Processing: Image Communication}, publisher = {Elsevier BV}, year = {2017}}
-
Detection and Identification of Image Manipulation Based on Reversible Histogram Shift
Electronics and Communications in Japan, Wiley-Blackwell, 2017, Vol. 100(9), pp. 13-22
DOI: 10.1002/ecj.11973
BibTeX@article{Obara2017, author = {Obara, Y. U. K. I. and Yusuke, N. I. W. A. and Shigeo, W. A. D. A.}, title = {Detection and Identification of Image Manipulation Based on Reversible Histogram Shift}, journal = {Electronics and Communications in Japan}, publisher = {Wiley-Blackwell}, year = {2017}, volume = {100}, number = {9}, pages = {13--22}}
-
Algebraic technique for computationally efficient Hahn moment invariants
Multidimensional Systems and Signal Processing, Springer, 2017, pp. 1
DOI: 10.1007/s11045-017-0516-6
BibTeX@article{Pandey2017, author = {Pandey, Vishal Kumar and Singh, Jyotsna and Parthasarathy, Harish}, title = {Algebraic technique for computationally efficient Hahn moment invariants}, journal = {Multidimensional Systems and Signal Processing}, publisher = {Springer}, year = {2017}, pages = {1}}
-
Fast and robust copy-move forgery detection based on scale-space representation
Multimedia Tools and Applications, Springer, 2017, pp. 1
DOI: 10.1007/s11042-017-5248-y
BibTeX@article{Park2017, author = {Park, Chun-Su and Choeh, Joon Yeon}, title = {Fast and robust copy-move forgery detection based on scale-space representation}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2017}, pages = {1}}
-
Statistical Detection of JPEG Traces in Digital Images in Uncompressed Formats
IEEE Transactions on Information Forensics and Security, 2017, Vol. 12(12), pp. 2890-2905
DOI: 10.1109/TIFS.2017.2725201
BibTeX@article{Pasquini2017, author = {Pasquini, C. and Boato, G. and Pérez-González, F.}, title = {Statistical Detection of JPEG Traces in Digital Images in Uncompressed Formats}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2017}, volume = {12}, number = {12}, pages = {2890--2905}}
-
Revealing Traces of Image Resampling and Resampling Antiforensics
Advances in Multimedia, 2017
DOI: 10.1155/2017/7130491
BibTeX@article{Peng2017, author = {Peng, Anjie and Wu, Yadong and Kang, Xiangui}, title = {Revealing Traces of Image Resampling and Resampling Antiforensics}, journal = {Advances in Multimedia}, year = {2017}}
-
Position Determines Perspective: Investigating Perspective Distortion for Image Forensics of Faces
Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW)
2017, pp. 1813-1821
DOI: 10.1109/CVPRW.2017.227
BibTeX@inproceedings{Peng2017a, author = {Peng, B. and Wang, W. and Dong, J. and Tan, T.}, title = {Position Determines Perspective: Investigating Perspective Distortion for Image Forensics of Faces}, booktitle = {Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW)}, year = {2017}, pages = {1813--1821}}
-
Image Forensics Based on Planar Contact Constraints of 3D Objects
IEEE Transactions on Information Forensics and Security, 2017, Vol. PP(99), pp. 1
DOI: 10.1109/TIFS.2017.2752728
BibTeX@article{Peng2017b, author = {Peng, B. and Wang, W. and Dong, J. and Tan, T.}, title = {Image Forensics Based on Planar Contact Constraints of 3D Objects}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2017}, volume = {PP}, number = {99}, pages = {1}}
-
Position Determines Perspective: Investigating Perspective Distortion for Image Forensics of Faces
Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW)
2017, pp. 1813-1821
DOI: 10.1109/CVPRW.2017.227
BibTeX@inproceedings{Peng2017d, author = {Peng, B. and Wang, W. and Dong, J. and Tan, T.}, title = {Position Determines Perspective: Investigating Perspective Distortion for Image Forensics of Faces}, booktitle = {Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW)}, year = {2017}, pages = {1813--1821}}
-
Identification of Natural Images and Computer Generated Graphics Based on Multiple LBPs in Multicolor Spaces
Security, Privacy, and Anonymity in Computation, Communication, and Storage, Springer, 2017
DOI: 10.1007/978-3-319-72389-1_30
BibTeX@article{Peng2017c, author = {Peng, Fei and Hu, Xiao-hua and Long, Min}, title = {Identification of Natural Images and Computer Generated Graphics Based on Multiple LBPs in Multicolor Spaces}, journal = {Security, Privacy, and Anonymity in Computation, Communication, and Storage}, publisher = {Springer}, year = {2017}}
-
Image Clustering by Source Camera via Sparse Representation
Proceedings of the 2nd International Workshop on Multimedia Forensics and Security - MFSec '17
ACM Press, 2017
DOI: 10.1145/3078897.3080532
BibTeX@inproceedings{Phan2017, author = {Phan, Quoc-Tin and Boato, Giulia and Natale, Francesco G. B. De}, title = {Image Clustering by Source Camera via Sparse Representation}, booktitle = {Proceedings of the 2nd International Workshop on Multimedia Forensics and Security - MFSec '17}, publisher = {ACM Press}, year = {2017}}
-
Copy Move Forgery Detection Using Histogram Quantization of Cross Power Spectrum
Proc. Int. Conf. High Performance Computing Simulation (HPCS)
2017, pp. 826-831
DOI: 10.1109/HPCS.2017.125
BibTeX@inproceedings{Pourkashani2017, author = {Pourkashani, A. and Shahbahrami, A. and Fomani, B. A.}, title = {Copy Move Forgery Detection Using Histogram Quantization of Cross Power Spectrum}, booktitle = {Proc. Int. Conf. High Performance Computing Simulation (HPCS)}, year = {2017}, pages = {826--831}}
-
Detection of Copy-move Image Forgery Using Dct
Advances in Computational Intelligence
Springer, 2017
DOI: 10.1007/978-981-10-2525-9_25
BibTeX@incollection{Prakash2017, author = {Prakash, Choudhary Shyam and Anand, Kumar Vijay and Maheshkar, Sushila}, title = {Detection of Copy-move Image Forgery Using Dct}, booktitle = {Advances in Computational Intelligence}, publisher = {Springer}, year = {2017}}
-
Detection Algorithm for Copy-Move Forgery Based on Circle Block
Proceedings of International Conference on Computer Vision and Image Processing, Springer, 2017
DOI: 10.1007/978-981-10-2107-7_32
BibTeX@article{Prakash2017a, author = {Prakash, Choudhary Shyam and Maheshkar, Sushila}, title = {Detection Algorithm for Copy-Move Forgery Based on Circle Block}, journal = {Proceedings of International Conference on Computer Vision and Image Processing}, publisher = {Springer}, year = {2017}}
-
Copy-Move Forgery Detection Using DyWT
International Journal of Multimedia Data Engineering and Management (IJMDEM), IGI Global, 2017, Vol. 8(2), pp. 1-9
BibTeX@article{Prakash2017b, author = {Prakash, Choudhary Shyam and Maheshkar, Sushila}, title = {Copy-Move Forgery Detection Using DyWT}, journal = {International Journal of Multimedia Data Engineering and Management (IJMDEM)}, publisher = {IGI Global}, year = {2017}, volume = {8}, number = {2}, pages = {1--9}}
-
Individual camera device identification from JPEG images
Signal Processing: Image Communication, Elsevier BV, 2017, Vol. 52, pp. 74-86
DOI: 10.1016/j.image.2016.12.011
BibTeX@article{Qiao2017, author = {Qiao, Tong and Retraint, Florent and Cogranne, Rémi and Thai, Thanh Hai}, title = {Individual camera device identification from JPEG images}, journal = {Signal Processing: Image Communication}, publisher = {Elsevier BV}, year = {2017}, volume = {52}, pages = {74--86}}
-
Exposing image resampling forgery by using linear parametric model
Multimedia Tools and Applications, Springer, 2017, pp. 1
DOI: 10.1007/s11042-016-4314-1
BibTeX@article{Qiao2017a, author = {Qiao, Tong and Zhu, Aichun and Retraint, Florent}, title = {Exposing image resampling forgery by using linear parametric model}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2017}, pages = {1}}
-
Estimating Reflectance Parameters, Light Direction, and Shape from a Single Multispectral Image
IEEE Transactions on Computational Imaging, 2017, Vol. PP(99), pp. 1
DOI: 10.1109/TCI.2017.2717788
BibTeX@article{Rahman2017, author = {Rahman, S. and Robles-Kelly, A.}, title = {Estimating Reflectance Parameters, Light Direction, and Shape from a Single Multispectral Image}, journal = {IEEE Transactions on Computational Imaging}, year = {2017}, volume = {PP}, number = {99}, pages = {1}}
-
Distinguishing computer graphics from natural images using convolution neural networks
Proc. IEEE Workshop Information Forensics and Security (WIFS)
2017, pp. 1-6
DOI: 10.1109/WIFS.2017.8267647
BibTeX@inproceedings{Rahmouni2017, author = {Rahmouni, N. and Nozick, V. and Yamagishi, J. and Echizen, I.}, title = {Distinguishing computer graphics from natural images using convolution neural networks}, booktitle = {Proc. IEEE Workshop Information Forensics and Security (WIFS)}, year = {2017}, pages = {1--6}}
-
A fuzzy fusion approach for modified contrast enhancement based image forensics against attacks
Multimedia Tools and Applications, Springer, 2017, pp. 1
DOI: 10.1007/s11042-017-4426-2
BibTeX@article{Rao2017, author = {Rao, B. Subrahmanyeswara}, title = {A fuzzy fusion approach for modified contrast enhancement based image forensics against attacks}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2017}, pages = {1}}
-
Suppressing Random Artifacts in Reference Sensor Pattern Noise via Decorrelation
IEEE Signal Processing Letters, Institute of Electrical and Electronics Engineers (IEEE), 2017, pp. 1-1
DOI: 10.1109/lsp.2017.2681426
BibTeX@article{Rao2017a, author = {Rao, Qiang and Wang, Jianjun}, title = {Suppressing Random Artifacts in Reference Sensor Pattern Noise via Decorrelation}, journal = {IEEE Signal Processing Letters}, publisher = {Institute of Electrical and Electronics Engineers (IEEE)}, year = {2017}, pages = {1--1}}
-
Suppressing Random Artifacts in Reference Sensor Pattern Noise via Decorrelation
IEEE Signal Processing Letters, Institute of Electrical and Electronics Engineers (IEEE), 2017, Vol. 24(6), pp. 809-813
DOI: 10.1109/LSP.2017.2681426
BibTeX@article{Rao2017b, author = {Rao, Q. and Wang, J.}, title = {Suppressing Random Artifacts in Reference Sensor Pattern Noise via Decorrelation}, journal = {IEEE Signal Processing Letters}, publisher = {Institute of Electrical and Electronics Engineers (IEEE)}, year = {2017}, volume = {24}, number = {6}, pages = {809--813}}
-
A novel segmentation based copy-move forgery detection in digital images
Proc. Int. Conf. Networks Advances in Computational Technologies (NetACT)
2017, pp. 346-350
DOI: 10.1109/NETACT.2017.8076793
BibTeX@inproceedings{Resmi2017, author = {Resmi, M. R. and Vishnukumar, S.}, title = {A novel segmentation based copy-move forgery detection in digital images}, booktitle = {Proc. Int. Conf. Networks Advances in Computational Technologies (NetACT)}, year = {2017}, pages = {346--350}}
-
Median filtering detection based on variations and residual in image forensics
2017
BibTeX@unpublished{Rhee2017, author = {Rhee, Hyeon Kang}, title = {Median filtering detection based on variations and residual in image forensics}, year = {2017}}
-
Forgery image detection of Gaussian filtering by support vector machine using edge characteristics
Proc. Ninth Int. Conf. Ubiquitous and Future Networks (ICUFN)
2017, pp. 231-236
DOI: 10.1109/ICUFN.2017.7993782
BibTeX@inproceedings{Rhee2017a, author = {Rhee, K. H.}, title = {Forgery image detection of Gaussian filtering by support vector machine using edge characteristics}, booktitle = {Proc. Ninth Int. Conf. Ubiquitous and Future Networks (ICUFN)}, year = {2017}, pages = {231--236}}
-
Forgery image detection of Gaussian filtering by support vector machine using edge characteristics
Proc. Ninth Int. Conf. Ubiquitous and Future Networks (ICUFN)
2017, pp. 231-236
DOI: 10.1109/ICUFN.2017.7993782
BibTeX@inproceedings{Rhee2017b, author = {Rhee, K. H.}, title = {Forgery image detection of Gaussian filtering by support vector machine using edge characteristics}, booktitle = {Proc. Ninth Int. Conf. Ubiquitous and Future Networks (ICUFN)}, year = {2017}, pages = {231--236}}
-
Detection of JPEG Compression Anti-Forensics
Journal of the Institute of Electronics and Information Engineers, 2017, Vol. 54(11)
BibTeX@article{Rhee2017c, author = {Rhee, Kang Hyeon}, title = {Detection of JPEG Compression Anti-Forensics}, journal = {Journal of the Institute of Electronics and Information Engineers}, year = {2017}, volume = {54}, number = {11}}
-
Image Forensic for detecting Splicing Image with Distance Function
International Journal of Computer Applications, 2017, Vol. 169(5), pp. 6-10
BibTeX@article{Riad2017, author = {Riad, Imam and Fadlil, Abdul and Sari, Titi}, title = {Image Forensic for detecting Splicing Image with Distance Function}, journal = {International Journal of Computer Applications}, year = {2017}, volume = {169}, number = {5}, pages = {6--10}}
-
Illumination Analysis in Physics-Based Image Forensics: A Joint Discussion of Illumination Direction and Color
Digital Communication. Towards a Smart and Secure Future Internet
Springer, 2017
DOI: 10.1007/978-3-319-67639-5_9
BibTeX@incollection{Riess2017a, author = {Riess, Christian}, title = {Illumination Analysis in Physics-Based Image Forensics: A Joint Discussion of Illumination Direction and Color}, booktitle = {Digital Communication. Towards a Smart and Secure Future Internet}, publisher = {Springer}, year = {2017}}
-
Handling multiple materials for exposure of digital forgeries using 2-D lighting environments
Multimedia Tools and Applications, Springer, 2017, Vol. 76(4), pp. 4747
DOI: 10.1007/s11042-016-3655-0
BibTeX@article{Riess2017, author = {Riess, Christian and Unberath, Mathias and Naderi, Farzad and Pfaller, Sven and Stamminger, Marc and Angelopoulou, Elli}, title = {Handling multiple materials for exposure of digital forgeries using 2-D lighting environments}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2017}, volume = {76}, number = {4}, pages = {4747}}
-
Camera Source Identification Using Discrete Cosine Transform Residue Features and Ensemble Classifier
Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW)
2017, pp. 1848-1854
DOI: 10.1109/CVPRW.2017.231
BibTeX@inproceedings{Roy2017, author = {Roy, A. and Chakraborty, R. S. and Sameer, U. and Naskar, R.}, title = {Camera Source Identification Using Discrete Cosine Transform Residue Features and Ensemble Classifier}, booktitle = {Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW)}, year = {2017}, pages = {1848--1854}}
-
A Robust and Fast Technique to Detect Copy Move Forgery in Digital Images Using SLIC Segmentation and SURF Keypoints
Proceeding of International Conference on Intelligent Communication, Control and Devices, Springer, 2017
DOI: 10.1007/978-981-10-1708-7_91
BibTeX@article{Sachdev2017, author = {Sachdev, Kanica and Kaur, Mandeep and Gupta, Savita}, title = {A Robust and Fast Technique to Detect Copy Move Forgery in Digital Images Using SLIC Segmentation and SURF Keypoints}, journal = {Proceeding of International Conference on Intelligent Communication, Control and Devices}, publisher = {Springer}, year = {2017}}
-
State of the art in passive digital image forgery detection: copy-move image forgery
Pattern Analysis and Applications, Springer, 2017, pp. 1
DOI: 10.1007/s10044-017-0678-8
BibTeX@article{Sadeghi2017, author = {Sadeghi, Somayeh and Dadkhah, Sajjad and Jalab, Hamid A. and Mazzola, Giuseppe and Uliyan, Diaa}, title = {State of the art in passive digital image forgery detection: copy-move image forgery}, journal = {Pattern Analysis and Applications}, publisher = {Springer}, year = {2017}, pages = {1}}
-
A Theoretical Framework for Estimating False Acceptance Rate of PRNU-based Camera Identification
IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers (IEEE), 2017, pp. 1-1
DOI: 10.1109/tifs.2017.2692683
BibTeX@article{Saito2017, author = {Saito, Shota and Tomioka, Yoichi and Kitazawa, Hitoshi}, title = {A Theoretical Framework for Estimating False Acceptance Rate of PRNU-based Camera Identification}, journal = {IEEE Transactions on Information Forensics and Security}, publisher = {Institute of Electrical and Electronics Engineers (IEEE)}, year = {2017}, pages = {1--1}}
-
A Theoretical Framework for Estimating False Acceptance Rate of PRNU-Based Camera Identification
IEEE Transactions on Information Forensics and Security, 2017, Vol. 12(9), pp. 2026-2035
DOI: 10.1109/TIFS.2017.2692683
BibTeX@article{Saito2017a, author = {Saito, S. and Tomioka, Y. and Kitazawa, H.}, title = {A Theoretical Framework for Estimating False Acceptance Rate of PRNU-Based Camera Identification}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2017}, volume = {12}, number = {9}, pages = {2026--2035}}
-
Deteksi Copy-move Untuk Forensik Citra Dengan Modifikasi Algoritma Duplication Detection Dan Robust Detection
Jurusan Teknik Informatika Fakultas Teknologi Informasi Institut Teknologi Sepuluh Nopember Surabaya, Jurusan Teknik Informatika Fakultas Teknologi Informasi Institut Teknologi Sepuluh Nopember Surabaya, 2017
BibTeX@thesis{Salimi2017, author = {Salimi, Rahmat Nazali}, title = {Deteksi Copy-move Untuk Forensik Citra Dengan Modifikasi Algoritma Duplication Detection Dan Robust Detection}, school = {Jurusan Teknik Informatika Fakultas Teknologi Informasi Institut Teknologi Sepuluh Nopember Surabaya}, year = {2017}}
-
Image Splicing Localization Using A Multi-Task Fully Convolutional Network (MFCN)
ArXiv, 2017
BibTeX@article{Salloum2017, author = {Salloum, Ronald and Ren, Yuzhuo and Kuo, C. C. Jay}, title = {Image Splicing Localization Using A Multi-Task Fully Convolutional Network (MFCN)}, journal = {ArXiv}, year = {2017}}
-
Deep Learning Based Counter–Forensic Image Classification for Camera Model Identification
Digital Forensics and Watermarking, Springer, 2017
DOI: 10.1007/978-3-319-64185-0_5
BibTeX@article{Sameer2017, author = {Sameer, Venkata Udaya and Naskar, Ruchira and Musthyala, Nikhita and Kokkalla, Kalyan}, title = {Deep Learning Based Counter–Forensic Image Classification for Camera Model Identification}, journal = {Digital Forensics and Watermarking}, publisher = {Springer}, year = {2017}}
-
Image Forgery Detection confronts Image Composition
Computers & Graphics, Elsevier BV, 2017
DOI: 10.1016/j.cag.2017.08.014
BibTeX@article{Schetinger2017, author = {Schetinger, Victor and Iuliani, Massimo and Piva, Alessandro and Oliveira, Manuel M.}, title = {Image Forgery Detection confronts Image Composition}, journal = {Computers & Graphics}, publisher = {Elsevier BV}, year = {2017}}
-
Detection of Face Morphing Attacks by Deep Learning
Digital Forensics and Watermarking, Springer, 2017
DOI: 10.1007/978-3-319-64185-0_9
BibTeX@article{Seibold2017, author = {Seibold, Clemens and Samek, Wojciech and Hilsmann, Anna and Eisert, Peter}, title = {Detection of Face Morphing Attacks by Deep Learning}, journal = {Digital Forensics and Watermarking}, publisher = {Springer}, year = {2017}}
-
Seam carving based image resizing detection using hybrid features
Tehnicki vjesnik - Technical Gazette, Mechanical Engineering Faculty in Slavonski Brod, 2017, Vol. 24(6)
DOI: 10.17559/tv-20160804121351
BibTeX@article{Senturk2017, author = {Senturk, Zehra Karapinar and Akgun, Devrim}, title = {Seam carving based image resizing detection using hybrid features}, journal = {Tehnicki vjesnik - Technical Gazette}, publisher = {Mechanical Engineering Faculty in Slavonski Brod}, year = {2017}, volume = {24}, number = {6}}
-
Tradeoffs Between Forensics and Anti-Forensics of Digital Images
International Journal of Rough Sets and Data Analysis, IGI Global, 2017, Vol. 4(2), pp. 92-105
DOI: 10.4018/ijrsda.2017040107
BibTeX@article{Shelke2017, author = {Shelke, Priya Makarand and Prasad, Rajesh Shardanand}, title = {Tradeoffs Between Forensics and Anti-Forensics of Digital Images}, journal = {International Journal of Rough Sets and Data Analysis}, publisher = {IGI Global}, year = {2017}, volume = {4}, number = {2}, pages = {92--105}}
-
Challenges of Distributed Storage Systems in Internet of Things
Internet of Things: Novel Advances and Envisioned Applications, Springer, 2017
DOI: 10.1007/978-3-319-53472-5_9
BibTeX@article{Shetty2017, author = {Shetty, Madhvaraj M. and Manjaiah, D. H.}, title = {Challenges of Distributed Storage Systems in Internet of Things}, journal = {Internet of Things: Novel Advances and Envisioned Applications}, publisher = {Springer}, year = {2017}}
-
A local variance based approach to alleviate the scene content interference for source camera identification
Digital Investigation, Elsevier BV, 2017
DOI: 10.1016/j.diin.2017.07.005
BibTeX@article{Shi2017a, author = {Shi, Chao and Law, Ngai-Fong and Leung, Frank H. F. and Siu, Wan-Chi}, title = {A local variance based approach to alleviate the scene content interference for source camera identification}, journal = {Digital Investigation}, publisher = {Elsevier BV}, year = {2017}}
-
Bayer CFA pattern identification using color difference model
Proc of the ICEIC 2017 International Conference on Electronics, Information, and Communication
2017, pp. 187-188
BibTeX@inproceedings{Shin2017, author = {Shin, Hyun Jun and Jeon, Jong Ju and Eom, Il Kyu}, title = {Bayer CFA pattern identification using color difference model}, booktitle = {Proc of the ICEIC 2017 International Conference on Electronics, Information, and Communication}, year = {2017}, pages = {187--188}}
-
Color filter array pattern identification using variance of color difference image
Journal of Electronic Imaging, SPIE-Intl Soc Optical Eng, 2017, Vol. 26(4), pp. 043015
DOI: 10.1117/1.jei.26.4.043015
BibTeX@article{Shin2017a, author = {Shin, Hyun Jun and Jeon, Jong Ju and Eom, Il Kyu}, title = {Color filter array pattern identification using variance of color difference image}, journal = {Journal of Electronic Imaging}, publisher = {SPIE-Intl Soc Optical Eng}, year = {2017}, volume = {26}, number = {4}, pages = {043015}}
-
A dataset for forgery detection and spotting in document images
Proc. Seventh Int. Conf. Emerging Security Technologies (EST)
2017, pp. 26-31
DOI: 10.1109/EST.2017.8090394
BibTeX@inproceedings{Sidere2017, author = {Sidere, N. and Cruz, F. and Coustaty, M. and Ogier, J. M.}, title = {A dataset for forgery detection and spotting in document images}, booktitle = {Proc. Seventh Int. Conf. Emerging Security Technologies (EST)}, year = {2017}, pages = {26--31}}
-
Improved JPEG anti-forensics with better image visual quality and forensic undetectability
Forensic Science International, Elsevier BV, 2017, Vol. 277, pp. 133-147
DOI: 10.1016/j.forsciint.2017.06.003
BibTeX@article{Singh2017a, author = {Singh, Gurinder and Singh, Kulbir}, title = {Improved JPEG anti-forensics with better image visual quality and forensic undetectability}, journal = {Forensic Science International}, publisher = {Elsevier BV}, year = {2017}, volume = {277}, pages = {133--147}}
-
Global Contrast Enhancement Based Image Forensics Using Statistical Features
Advances in Electrical and Electronic Engineering, VSB Technical University of Ostrava, Faculty of Electrical Engineering and Computer Sciences, 2017, Vol. 15(3)
DOI: 10.15598/aeee.v15i3.2189
BibTeX@article{Singh2017b, author = {Singh, Neetu and Gupta, Abhinav and Jain, Roop Chand}, title = {Global Contrast Enhancement Based Image Forensics Using Statistical Features}, journal = {Advances in Electrical and Electronic Engineering}, publisher = {VSB Technical University of Ostrava, Faculty of Electrical Engineering and Computer Sciences}, year = {2017}, volume = {15}, number = {3}}
-
Video content authentication techniques: a comprehensive survey
Multimedia Systems, Springer, 2017, pp. 1
DOI: 10.1007/s00530-017-0538-9
BibTeX@article{Singh2017, author = {Singh, Raahat Devender and Aggarwal, Naveen}, title = {Video content authentication techniques: a comprehensive survey}, journal = {Multimedia Systems}, publisher = {Springer}, year = {2017}, pages = {1}}
-
A Study on Security and Surveillance System Using Gait Recognition
Intelligent Techniques in Signal Processing for Multimedia Security, Springer, 2017
DOI: 10.1007/978-3-319-44790-2_11
BibTeX@article{Sivarathinabala2017, author = {Sivarathinabala, M. and Abirami, S. and Baskaran, R.}, title = {A Study on Security and Surveillance System Using Gait Recognition}, journal = {Intelligent Techniques in Signal Processing for Multimedia Security}, publisher = {Springer}, year = {2017}}
-
Random Matrix Models and Nonparametric Method for Uncertainty Quantification
Handbook of Uncertainty Quantification, Springer, 2017
DOI: 10.1007/978-3-319-12385-1_5
BibTeX@article{Soize2017, author = {Soize, Christian}, title = {Random Matrix Models and Nonparametric Method for Uncertainty Quantification}, journal = {Handbook of Uncertainty Quantification}, publisher = {Springer}, year = {2017}}
-
Copy-Move Tampering Detection based on Local Binary Pattern Histogram Fourier Feature
Proceedings of the 7th International Conference on Computer and Communication Technology - ICCCT-2017
ACM Press, 2017
DOI: 10.1145/3154979.3155001
BibTeX@inproceedings{Soni2017, author = {Soni, Badal and Das, Pradip K. and Thounaojam, Dalton Meitei}, title = {Copy-Move Tampering Detection based on Local Binary Pattern Histogram Fourier Feature}, booktitle = {Proceedings of the 7th International Conference on Computer and Communication Technology - ICCCT-2017}, publisher = {ACM Press}, year = {2017}}
-
Source Camera Identification Using Non-decimated Wavelet Transform
11th International Conference on Global Security, Safety & Sustainability
2017
BibTeX@inproceedings{Soobhany2017, author = {Soobhany, A. Ryad and Akbari, A. Sheikh and Schreuders, Z. C.}, title = {Source Camera Identification Using Non-decimated Wavelet Transform}, booktitle = {11th International Conference on Global Security, Safety & Sustainability}, year = {2017}}
-
Reinforced source camera identification using non-decimated wavelet transform
IET International Conference on Biomedical Image and Signal Processing, 2017
BibTeX@article{Soobhany2017a, author = {Soobhany, A. R. and Sheikh Akbari, A. and Schreuders, Z. C.}, title = {Reinforced source camera identification using non-decimated wavelet transform}, journal = {IET International Conference on Biomedical Image and Signal Processing}, year = {2017}}
-
A novel passive forgery detection algorithm for video region duplication
Multidimensional Systems and Signal Processing, Springer Nature, 2017
DOI: 10.1007/s11045-017-0496-6
BibTeX@article{Su2017, author = {Su, Lichao and Li, Cuihua}, title = {A novel passive forgery detection algorithm for video region duplication}, journal = {Multidimensional Systems and Signal Processing}, publisher = {Springer Nature}, year = {2017}}
-
Hierarchical Image Resampling Detection Based on Blind Deconvolution
Journal of Visual Communication and Image Representation, Elsevier BV, 2017
DOI: 10.1016/j.jvcir.2017.01.009
BibTeX@article{Su2017a, author = {Su, Yuting and Jin, Xiao and Zhang, Chengqian and Chen, Yawei}, title = {Hierarchical Image Resampling Detection Based on Blind Deconvolution}, journal = {Journal of Visual Communication and Image Representation}, publisher = {Elsevier BV}, year = {2017}}
-
A fuzzy fusion approach for modified contrast enhancement based image forensics against attacks
Multimedia Tools and Applications, Springer, 2017, pp. 1
DOI: 10.1007/s11042-017-4426-2
BibTeX@article{SubrahmanyeswaraRao2017, author = {Subrahmanyeswara Rao, B.}, title = {A fuzzy fusion approach for modified contrast enhancement based image forensics against attacks}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2017}, pages = {1}}
-
Automated JPEG forgery detection with correlation based localization
Proc. IEEE Int. Conf. Multimedia Expo Workshops (ICMEW)
2017, pp. 226-231
DOI: 10.1109/ICMEW.2017.8026326
BibTeX@inproceedings{Tariang2017, author = {Tariang, D. B. and Roy, A. and Chakraborty, R. S. and Naskar, R.}, title = {Automated JPEG forgery detection with correlation based localization}, booktitle = {Proc. IEEE Int. Conf. Multimedia Expo Workshops (ICMEW)}, year = {2017}, pages = {226--231}}
-
M-SIFT: A detection algorithm for copy move image forgery
Proc. Computing and Control (ISPCC) 2017 4th Int. Conf. Signal Processing
2017, pp. 425-430
DOI: 10.1109/ISPCC.2017.8269716
BibTeX@inproceedings{Tarman2017, author = {Tarman and Saini, H.}, title = {M-SIFT: A detection algorithm for copy move image forgery}, booktitle = {Proc. Computing and Control (ISPCC) 2017 4th Int. Conf. Signal Processing}, year = {2017}, pages = {425--430}}
-
PRNU-Based Camera Attribution From Multiple Seam-Carved Images
IEEE Transactions on Information Forensics and Security, 2017, Vol. 12(12), pp. 3065-3080
DOI: 10.1109/TIFS.2017.2737961
BibTeX@article{Taspinar2017, author = {Taspinar, S. and Mohanty, M. and Memon, N.}, title = {PRNU-Based Camera Attribution From Multiple Seam-Carved Images}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2017}, volume = {12}, number = {12}, pages = {3065--3080}}
-
Detecting Doctored JPEG Image Based on Block Noise Analysis and Double JPEG Analysis
IEEJ Transactions on Electronics, Information and Systems, Institute of Electrical Engineers of Japan (IEE Japan), 2017, Vol. 137(5), pp. 742-749
DOI: 10.1541/ieejeiss.137.742
BibTeX@article{Taya2017, author = {Taya, Kunihiko and Takeda, Naoto and Kobayashi, Tadashi and Ozaki, Yoshiaki and Kuroki, Nobutaka}, title = {Detecting Doctored JPEG Image Based on Block Noise Analysis and Double JPEG Analysis}, journal = {IEEJ Transactions on Electronics, Information and Systems}, publisher = {Institute of Electrical Engineers of Japan (IEE Japan)}, year = {2017}, volume = {137}, number = {5}, pages = {742--749}}
-
Digital Media Tampering Detection Techniques: An Overview
Proc. IEEE 41st Annual Computer Software and Applications Conf. (COMPSAC)
2017, Vol. 2, pp. 170-174
DOI: 10.1109/COMPSAC.2017.109
BibTeX@inproceedings{Teerakanok2017, author = {Teerakanok, S. and Uehara, T.}, title = {Digital Media Tampering Detection Techniques: An Overview}, booktitle = {Proc. IEEE 41st Annual Computer Software and Applications Conf. (COMPSAC)}, year = {2017}, volume = {2}, pages = {170--174}}
-
Survey of copy-paste forgery detection in digital image forensic
Proc. Int. Conf. Innovative Mechanisms for Industry Applications (ICIMIA)
2017, pp. 248-252
DOI: 10.1109/ICIMIA.2017.7975613
BibTeX@inproceedings{Tembe2017, author = {Tembe, A. U. and Thombre, S. S.}, title = {Survey of copy-paste forgery detection in digital image forensic}, booktitle = {Proc. Int. Conf. Innovative Mechanisms for Industry Applications (ICIMIA)}, year = {2017}, pages = {248--252}}
-
The InVID Plug-in: Web Video Verification on the Browser
Proceedings of the 1st workshop on multimedia verification, 2017
DOI: 10.1145/3132384.3132387
BibTeX@article{Teyssou2017, author = {Teyssou, Denis and Leung, Jean-Michel and Apostolidis, Evlampios and Apostolidis, Konstantinos and Papadopoulos, Symeon and Zampoglou, Markos and Papadopoulou, Olga and Mezaris, Vasileios}, title = {The InVID Plug-in: Web Video Verification on the Browser}, journal = {Proceedings of the 1st workshop on multimedia verification}, year = {2017}}
-
JPEG Quantization Step Estimation and Its Applications to Digital Image Forensics
IEEE Transactions on Information Forensics and Security, 2017, Vol. 12(1), pp. 123-133
DOI: 10.1109/TIFS.2016.2604208
BibTeX@article{Thai2017, author = {Thai, T. H. and Cogranne, R. and Retraint, F. and Doan, T. N. C.}, title = {JPEG Quantization Step Estimation and Its Applications to Digital Image Forensics}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2017}, volume = {12}, number = {1}, pages = {123--133}}
-
JPEG Quantization Step Estimation and Its Applications to Digital Image Forensics
IEEE Transactions on Information Forensics and Security, 2017, Vol. 12(1), pp. 123-133
DOI: 10.1109/TIFS.2016.2604208
BibTeX@article{Thai2017a, author = {Thai, T. H. and Cogranne, R. and Retraint, F. and Doan, T. N. C.}, title = {JPEG Quantization Step Estimation and Its Applications to Digital Image Forensics}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2017}, volume = {12}, number = {1}, pages = {123--133}}
-
Camera identification based on very low bit rate videos with overall noise pattern having time varying statistics
Multimedia Tools and Applications, Springer, 2017, pp. 1
DOI: 10.1007/s11042-016-4323-0
BibTeX@article{Tian2017, author = {Tian, Nili and Ling, Bingo Wing-Kuen and Qing, Chunmei and Yang, Zhijing}, title = {Camera identification based on very low bit rate videos with overall noise pattern having time varying statistics}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2017}, pages = {1}}
-
Identification of Manipulation in Digital Images through Hybrid Block-based and Key Points Algorithm
QUID, 2017(28), pp. 78-92
BibTeX@article{Tirnaz2017, author = {Tirnaz, Mohammad Hossein and Bastan fard, Azam}, title = {Identification of Manipulation in Digital Images through Hybrid Block-based and Key Points Algorithm}, journal = {QUID}, year = {2017}, number = {28}, pages = {78--92}}
-
Develop an algorithm for image forensics using feature comparison and sharpness estimation
Proc. Telecommunications Computing (SigTelCom) 2017 Int. Conf. Recent Advances in Signal Processing
2017, pp. 82-87
DOI: 10.1109/SIGTELCOM.2017.7849800
BibTeX@inproceedings{Tu2017, author = {Tu, H. K. and Thuong, L. T. and Synh, H. V. U. and San, H. T. and Khoa, H. Van}, title = {Develop an algorithm for image forensics using feature comparison and sharpness estimation}, booktitle = {Proc. Telecommunications Computing (SigTelCom) 2017 Int. Conf. Recent Advances in Signal Processing}, year = {2017}, pages = {82--87}}
-
Develop an algorithm for image forensics using feature comparison and sharpness estimation
Proc. Telecommunications Computing (SigTelCom) 2017 Int. Conf. Recent Advances in Signal Processing
2017, pp. 82-87
DOI: 10.1109/SIGTELCOM.2017.7849800
BibTeX@inproceedings{Tu2017a, author = {Tu, H. K. and Thuong, L. T. and Synh, H. V. U. and San, H. T. and Khoa, H. Van}, title = {Develop an algorithm for image forensics using feature comparison and sharpness estimation}, booktitle = {Proc. Telecommunications Computing (SigTelCom) 2017 Int. Conf. Recent Advances in Signal Processing}, year = {2017}, pages = {82--87}}
-
Digital image forgery detection based on shadow HSV inconsistency
2017 5th International Symposium on Digital Forensic and Security (ISDFS)
IEEE, 2017
DOI: 10.1109/isdfs.2017.7916505
BibTeX@inproceedings{Tuba2017, author = {Tuba, Viktor and Jovanovic, Raka and Tuba, Milan}, title = {Digital image forgery detection based on shadow HSV inconsistency}, booktitle = {2017 5th International Symposium on Digital Forensic and Security (ISDFS)}, publisher = {IEEE}, year = {2017}}
-
Segmented-Based Region Duplication Forgery Detection Using MOD Keypoints and Texture Descriptor
Proceedings of the International Conference on Future Networks and Distributed Systems
ACM, 2017, pp. 6:1-6:6
DOI: 10.1145/3102304.3102310
BibTeX@inproceedings{Uliyan2017, author = {Uliyan, Diaa M. and Jalab, Hamid A. and Abuarqoub, Abdelrahman and Abu-Hashem, Muhannad}, title = {Segmented-Based Region Duplication Forgery Detection Using MOD Keypoints and Texture Descriptor}, booktitle = {Proceedings of the International Conference on Future Networks and Distributed Systems}, publisher = {ACM}, year = {2017}, pages = {6:1--6:6}}
-
Medical Image Tamper Detection Based on Passive Image Authentication
Journal of Digital Imaging, Springer, 2017, pp. 1
DOI: 10.1007/s10278-017-9961-x
BibTeX@article{Ulutas2017, author = {Ulutas, Guzin and Ustubioglu, Arda and Ustubioglu, Beste and Nabiyev, Vasif and Ulutas, Mustafa}, title = {Medical Image Tamper Detection Based on Passive Image Authentication}, journal = {Journal of Digital Imaging}, publisher = {Springer}, year = {2017}, pages = {1}}
-
A fast detection method for frame duplication forgery based on correlation
Proc. 25th Signal Processing and Communications Applications Conf. (SIU)
2017, pp. 1-4
DOI: 10.1109/SIU.2017.7960530
BibTeX@inproceedings{Uestuebioglu2017, author = {Üstübioğlu, B. and Ulutaş, G. and Nabiyev, V. V. and Ulutaş, M. and Üstübioğlu, A.}, title = {A fast detection method for frame duplication forgery based on correlation}, booktitle = {Proc. 25th Signal Processing and Communications Applications Conf. (SIU)}, year = {2017}, pages = {1--4}}
-
User Authentication via PRNU-Based Physical Unclonable Functions
IEEE Transactions on Information Forensics and Security, 2017, Vol. 12(8), pp. 1941-1956
DOI: 10.1109/TIFS.2017.2697402
BibTeX@article{Valsesia2017a, author = {Valsesia, D. and Coluccia, G. and Bianchi, T. and Magli, E.}, title = {User Authentication via PRNU-Based Physical Unclonable Functions}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2017}, volume = {12}, number = {8}, pages = {1941--1956}}
-
User Authentication via PRNU-based Physical Unclonable Functions
IEEE Transactions on Information, 2017
BibTeX@article{Valsesia2017, author = {Valsesia, D. and Coluccia, G. and Bianchi, T. and MagliValsesia, E.}, title = {User Authentication via PRNU-based Physical Unclonable Functions}, journal = {IEEE Transactions on Information}, year = {2017}}
-
Derivation of the Asymptotic Eigenvalue Distribution for Causal 2D-AR Models under Upscaling
arXiv, 2017
BibTeX@article{Vazquez-Padin2017, author = {Vázquez-Padín, David and Pérez-González, Fernando and Comesaña-Alfaro, Pedro}, title = {Derivation of the Asymptotic Eigenvalue Distribution for Causal 2D-AR Models under Upscaling}, journal = {arXiv}, year = {2017}}
-
A Random Matrix Approach to the Forensic Analysis of Upscaled Images
IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers (IEEE), 2017, Vol. 12(9), pp. 1-1
DOI: 10.1109/tifs.2017.2699638
BibTeX@article{Vazquez-Padin2017a, author = {Vázquez-Padín, D. and Pérez-González, F. and Comesaña-Alfaro, P.}, title = {A Random Matrix Approach to the Forensic Analysis of Upscaled Images}, journal = {IEEE Transactions on Information Forensics and Security}, publisher = {Institute of Electrical and Electronics Engineers (IEEE)}, year = {2017}, volume = {12}, number = {9}, pages = {1--1}}
-
Random Matrix Theory for Modeling the Eigenvalue Distribution of Images Under Upscaling
Digital Communication. Towards a Smart and Secure Future Internet
Springer, 2017
DOI: 10.1007/978-3-319-67639-5_10
BibTeX@incollection{Vazquez-Padin2017b, author = {Vázquez-Padín, David and Pérez-González, Fernando and Comesaña-Alfaro, Pedro}, title = {Random Matrix Theory for Modeling the Eigenvalue Distribution of Images Under Upscaling}, booktitle = {Digital Communication. Towards a Smart and Secure Future Internet}, publisher = {Springer}, year = {2017}}
-
Deep Learning based Counter-Forensic Image Classification for Camera Model Identification
Proc of the International Workshop on Digital Forensics and Watermarking (IWDW), Madgeburg, Germany, 23-25 August 2017
2017
BibTeX@conference{Venkata2017, author = {Venkata, Udaya Sameer and Naskar, Ruchira and Musthyala, Nikhita and Kokkalla, Kalyan}, title = {Deep Learning based Counter-Forensic Image Classification for Camera Model Identification}, booktitle = {Proc of the International Workshop on Digital Forensics and Watermarking (IWDW), Madgeburg, Germany, 23-25 August 2017}, year = {2017}}
-
DCT-domain Deep Convolutional Neural Networks for Multiple JPEG Compression Classification
ArXiv, 2017
BibTeX@article{Verma2017, author = {Verma, Vinay and Agarwal, Nikita and Khanna, Nitin}, title = {DCT-domain Deep Convolutional Neural Networks for Multiple JPEG Compression Classification}, journal = {ArXiv}, year = {2017}}
-
Detecting Spliced Face Using Texture Analysis
Security, Privacy, and Anonymity in Computation, Communication, and Storage, Springer, 2017
DOI: 10.1007/978-3-319-72395-2_72
BibTeX@article{Vidyadharan2017, author = {Vidyadharan, Divya S. and Thampi, Sabu M.}, title = {Detecting Spliced Face Using Texture Analysis}, journal = {Security, Privacy, and Anonymity in Computation, Communication, and Storage}, publisher = {Springer}, year = {2017}}
-
Tamper detection of medical images using statistical moments against various attacks
Multimedia Tools and Applications, Springer, 2017, pp. 1
DOI: 10.1007/s11042-017-5473-4
BibTeX@article{Vijayanandh2017, author = {Vijayanandh, T. and Shenbagavalli, A.}, title = {Tamper detection of medical images using statistical moments against various attacks}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2017}, pages = {1}}
-
Comprehensive expansion in Anti-Forensics Techniques (AFTs) based compressed image
Proc. Annual Conf. New Trends in Information Communications Technology Applications (NTICT)
2017, pp. 156-161
DOI: 10.1109/NTICT.2017.7976108
BibTeX@inproceedings{Waleed2017, author = {Waleed, J. and Hasan, T. M. and Abbas, T.}, title = {Comprehensive expansion in Anti-Forensics Techniques (AFTs) based compressed image}, booktitle = {Proc. Annual Conf. New Trends in Information Communications Technology Applications (NTICT)}, year = {2017}, pages = {156--161}}
-
Comprehensive expansion in Anti-Forensics Techniques (AFTs) based compressed image
Proc. Annual Conf. New Trends in Information Communications Technology Applications (NTICT)
2017, pp. 156-161
DOI: 10.1109/NTICT.2017.7976108
BibTeX@inproceedings{Waleed2017a, author = {Waleed, J. and Hasan, T. M. and Abbas, T.}, title = {Comprehensive expansion in Anti-Forensics Techniques (AFTs) based compressed image}, booktitle = {Proc. Annual Conf. New Trends in Information Communications Technology Applications (NTICT)}, year = {2017}, pages = {156--161}}
-
A video forensic technique for detecting frame integrity using human visual system-inspired measure
Proc. IEEE Int. Symp. Technologies for Homeland Security (HST)
2017, pp. 1-6
DOI: 10.1109/THS.2017.7943466
BibTeX@inproceedings{Wan2017, author = {Wan, Q. and Panetta, K. and Agaian, S.}, title = {A video forensic technique for detecting frame integrity using human visual system-inspired measure}, booktitle = {Proc. IEEE Int. Symp. Technologies for Homeland Security (HST)}, year = {2017}, pages = {1--6}}
-
Robust Copy-move Forgery Detection through Invariant Moment Features
The Fifth International Conference on Informatics & Applications (ICIA 2016)
2017
BibTeX@conference{Wang2017c, author = {Wang, Chien-Chang Chen and Han}, title = {Robust Copy-move Forgery Detection through Invariant Moment Features}, booktitle = {The Fifth International Conference on Informatics & Applications (ICIA 2016)}, year = {2017}}
-
A Simple and Effective Image-Statistics-Based Approach to Detecting Recaptured Images from LCD Screens
2017
BibTeX@unpublished{Wang2017, author = {Wang, Kai}, title = {A Simple and Effective Image-Statistics-Based Approach to Detecting Recaptured Images from LCD Screens}, year = {2017}}
-
Digital image splicing detection based on Markov features in QDCT and QWT domain
ArXiv, 2017
BibTeX@article{Wang2017b, author = {Wang, Ruxin and Lu, Wei and Xiang, Shijun and Zhao, Xianfeng and Wang, Jinwei}, title = {Digital image splicing detection based on Markov features in QDCT and QWT domain}, journal = {ArXiv}, year = {2017}}
-
Temporal Integration Based Visual Cryptography Scheme and Its Application
Digital Forensics and Watermarking, Springer, 2017
DOI: 10.1007/978-3-319-64185-0_30
BibTeX@article{Wang2017a, author = {Wang, Wen and Liu, Feng and Guo, Teng and Ren, Yawei}, title = {Temporal Integration Based Visual Cryptography Scheme and Its Application}, journal = {Digital Forensics and Watermarking}, publisher = {Springer}, year = {2017}}
-
LBP-SVD Based Copy Move Forgery Detection Algorithm
Proc. IEEE Int. Symp. Multimedia (ISM)
2017, pp. 553-556
DOI: 10.1109/ISM.2017.108
BibTeX@inproceedings{Wang2017f, author = {Wang, Y. and Tian, L. and Li, C.}, title = {LBP-SVD Based Copy Move Forgery Detection Algorithm}, booktitle = {Proc. IEEE Int. Symp. Multimedia (ISM)}, year = {2017}, pages = {553--556}}
-
Double compression detection based on feature fusion
Proc. Int. Conf. Machine Learning and Cybernetics (ICMLC)
2017, Vol. 2, pp. 379-384
DOI: 10.1109/ICMLC.2017.8108951
BibTeX@inproceedings{Wang2017d, author = {Wang, Z. F. and Zhu, L. and Min, Q. S. and Zeng, C. Y.}, title = {Double compression detection based on feature fusion}, booktitle = {Proc. Int. Conf. Machine Learning and Cybernetics (ICMLC)}, year = {2017}, volume = {2}, pages = {379--384}}
-
A scale invariant digital image copy-paste forgery detection approach based on NCC
International Journal of Computer Applications, 2017
BibTeX@article{Warbhe2017, author = {Warbhe, Anil Dada and Dharaskar, Rajiv V. and Thakare, Vilas M.}, title = {A scale invariant digital image copy-paste forgery detection approach based on NCC}, journal = {International Journal of Computer Applications}, year = {2017}}
-
Circle Block Based Copy-Move Forgery Detection
Yoon, K. & Kim, C. G. (ed.)
Proceedings of the 3rd EEECS 2017 Okinawa Jichikaikan Okinawa Pref. Municipal Center, Japan January 9-11, 2017
2017
BibTeX@inproceedings{Weldtsadik2017, author = {Weldtsadik, Wendimagegn Tariku and Kim, Hyoung Joog and Choi, Yongsoo and Kim, Cheongghil}, title = {Circle Block Based Copy-Move Forgery Detection}, booktitle = {Proceedings of the 3rd EEECS 2017 Okinawa Jichikaikan Okinawa Pref. Municipal Center, Japan January 9-11, 2017}, year = {2017}}
-
Contrast Enhancement Estimation for Digital Image Forensics
ArXiv, 2017
BibTeX@article{Wen2017a, author = {Wen, Longyin and Qi, Honggang and Lyu, Siwei}, title = {Contrast Enhancement Estimation for Digital Image Forensics}, journal = {ArXiv}, year = {2017}}
-
Estimation of Image Sensor Fill Factor Using a Single Arbitrary Image
Sensors, MDPI AG, 2017, Vol. 17(3), pp. 620
DOI: 10.3390/s17030620
BibTeX@article{Wen2017, author = {Wen, Wei and Khatibi, Siamak}, title = {Estimation of Image Sensor Fill Factor Using a Single Arbitrary Image}, journal = {Sensors}, publisher = {MDPI AG}, year = {2017}, volume = {17}, number = {3}, pages = {620}}
-
Copy --move forgery detection based on multi-radius PCET
IET Image Proc, 2017, Vol. 11(2), pp. 99-108
DOI: 10.1049/iet-ipr.2016.0229
BibTeX@article{Wo2017, author = {Wo, Y. and Yang, K. and Han, G. and Chen, H. and Wu, W.}, title = {Copy --move forgery detection based on multi-radius PCET}, journal = {IET Image Proc}, year = {2017}, volume = {11}, number = {2}, pages = {99--108}}
-
Image Quality Assessment in Reversible Data Hiding with Contrast Enhancement
Digital Forensics and Watermarking, Springer, 2017
DOI: 10.1007/978-3-319-64185-0_22
BibTeX@article{Wu2017a, author = {Wu, Hao-Tian and Tang, Shaohua and Shi, Yun-Qing}, title = {Image Quality Assessment in Reversible Data Hiding with Contrast Enhancement}, journal = {Digital Forensics and Watermarking}, publisher = {Springer}, year = {2017}}
-
Image-format-independent tampered image detection based on overlapping concurrent directional patterns and neural networks
Applied Intelligence, Springer, 2017, pp. 1
DOI: 10.1007/s10489-017-0893-4
BibTeX@article{Wu2017, author = {Wu, Meng-Luen and Fahn, Chin-Shyurng and Chen, Yi-Fan}, title = {Image-format-independent tampered image detection based on overlapping concurrent directional patterns and neural networks}, journal = {Applied Intelligence}, publisher = {Springer}, year = {2017}, pages = {1}}
-
Blind Identification Technology of Computer Generated Image Based on Texture Recognition
Journal of Computational and Theoretical Nanoscience, American Scientific Publishers, 2017, Vol. 14(7), pp. 3312-3322
DOI: 10.1166/jctn.2017.6628
BibTeX@article{Xing2017, author = {Xing, Weiwei and Zhao, Shibo and Zhang, Shunli}, title = {Blind Identification Technology of Computer Generated Image Based on Texture Recognition}, journal = {Journal of Computational and Theoretical Nanoscience}, publisher = {American Scientific Publishers}, year = {2017}, volume = {14}, number = {7}, pages = {3312--3322}}
-
HEVC Double Compression Detection Based on SN-PUPM Feature
Digital Forensics and Watermarking, Springer, 2017
DOI: 10.1007/978-3-319-64185-0_1
BibTeX@article{Xu2017, author = {Xu, Qianyi and Sun, Tanfeng and Jiang, Xinghao and Dong, Yi}, title = {HEVC Double Compression Detection Based on SN-PUPM Feature}, journal = {Digital Forensics and Watermarking}, publisher = {Springer}, year = {2017}}
-
A Novel Approach for Copy Move Forgery Detection Using Template Matching
Proceedings of International Conference on Communication and Networks, Springer, 2017
DOI: 10.1007/978-981-10-2750-5_72
BibTeX@article{Yaduwanshi2017, author = {Yaduwanshi, Jyoti and Bansal, Pratosh}, title = {A Novel Approach for Copy Move Forgery Detection Using Template Matching}, journal = {Proceedings of International Conference on Communication and Networks}, publisher = {Springer}, year = {2017}}
-
Novel Security and Privacy Perspectives of Camera Fingerprints
Security Protocols XXIV, Springer, 2017
DOI: 10.1007/978-3-319-62033-6_11
BibTeX@article{Yan2017, author = {Yan, Jeff}, title = {Novel Security and Privacy Perspectives of Camera Fingerprints}, journal = {Security Protocols XXIV}, publisher = {Springer}, year = {2017}}
-
Novel Security and Privacy Perspectives of Camera Fingerprints (Transcript of Discussion)
Security Protocols XXIV, Springer, 2017
DOI: 10.1007/978-3-319-62033-6_12
BibTeX@article{Yan2017a, author = {Yan, Jeff}, title = {Novel Security and Privacy Perspectives of Camera Fingerprints (Transcript of Discussion)}, journal = {Security Protocols XXIV}, publisher = {Springer}, year = {2017}}
-
A Median Filtering Forensics Approach Based on Machine Learning
Cloud Computing and Security, Springer, 2017
DOI: 10.1007/978-3-319-68542-7_44
BibTeX@article{Yang2017i, author = {Yang, Bin and Li, Zhenyu and Hu, Weifeng and Cao, Enguo}, title = {A Median Filtering Forensics Approach Based on Machine Learning}, journal = {Cloud Computing and Security}, publisher = {Springer}, year = {2017}}
-
Exposing Copy-move Forgery Based on Improved Sift Descriptor
Journal of Internet Technology, 2017, Vol. 18(2), pp. 417-425
BibTeX@article{Yang2017c, author = {Yang, Bin and Qiu, Xiaolin and Hu, Weifeng and Guo, Honglei and Song, Chunlin}, title = {Exposing Copy-move Forgery Based on Improved Sift Descriptor}, journal = {Journal of Internet Technology}, year = {2017}, volume = {18}, number = {2}, pages = {417--425}}
-
A copy-move forgery detection method based on CMFD-SIFT
Multimedia Tools and Applications, Springer, 2017, pp. 1
DOI: 10.1007/s11042-016-4289-y
BibTeX@article{Yang2017, author = {Yang, Bin and Sun, Xingming and Guo, Honglei and Xia, Zhihua and Chen, Xianyi}, title = {A copy-move forgery detection method based on CMFD-SIFT}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2017}, pages = {1}}
-
Copy-move forgery detection based on hybrid features
Engineering Applications of Artificial Intelligence, Elsevier BV, 2017, Vol. 59, pp. 73-83
DOI: 10.1016/j.engappai.2016.12.022
BibTeX@article{Yang2017a, author = {Yang, Fan and Li, Jingwei and Lu, Wei and Weng, Jian}, title = {Copy-move forgery detection based on hybrid features}, journal = {Engineering Applications of Artificial Intelligence}, publisher = {Elsevier BV}, year = {2017}, volume = {59}, pages = {73--83}}
-
Improved Reversible Visible Watermarking Based on Adaptive Block Partition
Digital Forensics and Watermarking, Springer, 2017
DOI: 10.1007/978-3-319-64185-0_23
BibTeX@article{Yang2017f, author = {Yang, Guangyuan and Qi, Wenfa and Li, Xiaolong and Guo, Zongming}, title = {Improved Reversible Visible Watermarking Based on Adaptive Block Partition}, journal = {Digital Forensics and Watermarking}, publisher = {Springer}, year = {2017}}
-
Robust copy-move forgery detection based on multi-granularity Superpixels matching
Multimedia Tools and Applications, Springer, 2017, pp. 1
DOI: 10.1007/s11042-017-4978-1
BibTeX@article{Yang2017g, author = {Yang, Hong-ying and Niu, Ying and Jiao, Li-xian and Liu, Yu-nan and Wang, Xiang-yang and Zhou, Zhi-li}, title = {Robust copy-move forgery detection based on multi-granularity Superpixels matching}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2017}, pages = {1}}
-
Detecting median filtering via two-dimensional AR models of multiple filtered residuals
Multimedia Tools and Applications, Springer, 2017, pp. 1
DOI: 10.1007/s11042-017-4691-0
BibTeX@article{Yang2017d, author = {Yang, Jianquan and Ren, Honglei and Zhu, Guopu and Huang, Jiwu and Shi, Yun-Qing}, title = {Detecting median filtering via two-dimensional AR models of multiple filtered residuals}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2017}, pages = {1}}
-
Recaptured Image Forensics Based on Quality Aware and Histogram Feature
Digital Forensics and Watermarking, Springer, 2017
DOI: 10.1007/978-3-319-64185-0_3
BibTeX@article{Yang2017e, author = {Yang, Pengpeng and Li, Ruihan and Ni, Rongrong and Zhao, Yao}, title = {Recaptured Image Forensics Based on Quality Aware and Histogram Feature}, journal = {Digital Forensics and Watermarking}, publisher = {Springer}, year = {2017}}
-
Source camera identification based on content-adaptive fusion residual networks
Pattern Recognition Letters, Elsevier BV, 2017
DOI: 10.1016/j.patrec.2017.10.016
BibTeX@article{Yang2017h, author = {Yang, Pengpeng and Ni, Rongrong and Zhao, Yao and Zhao, Wei}, title = {Source camera identification based on content-adaptive fusion residual networks}, journal = {Pattern Recognition Letters}, publisher = {Elsevier BV}, year = {2017}}
-
Source Camera Identification Based On Content-Adaptive Fusion Network
arXiv, 2017
BibTeX@article{Yang2017b, author = {Yang, Pengpeng and Zhao, Wei and Ni, Rongrong and Zhao, Yao}, title = {Source Camera Identification Based On Content-Adaptive Fusion Network}, journal = {arXiv}, year = {2017}}
-
Expose noise level inconsistency incorporating the inhomogeneity scoring strategy
Multimedia Tools and Applications, Springer Nature, 2017
DOI: 10.1007/s11042-017-5206-8
BibTeX@article{Yao2017, author = {Yao, Heng and Cao, Fang and Tang, Zhenjun and Wang, Jinwei and Qiao, Tong}, title = {Expose noise level inconsistency incorporating the inhomogeneity scoring strategy}, journal = {Multimedia Tools and Applications}, publisher = {Springer Nature}, year = {2017}}
-
A Hybrid Feature Model for Seam Carving Detection
Digital Forensics and Watermarking, Springer, 2017
DOI: 10.1007/978-3-319-64185-0_7
BibTeX@article{Ye2017, author = {Ye, Jingyu and Shi, Yun-Qing}, title = {A Hybrid Feature Model for Seam Carving Detection}, journal = {Digital Forensics and Watermarking}, publisher = {Springer}, year = {2017}}
-
Image Forgery Detection Based on Semantic Image Understanding
Communications in Computer and Information Science
Springer Singapore, 2017, pp. 472-481
DOI: 10.1007/978-981-10-7299-4_39
BibTeX@incollection{Ye2017b, author = {Ye, Kui and Dong, Jing and Wang, Wei and Xu, Jindong and Tan, Tieniu}, title = {Image Forgery Detection Based on Semantic Image Understanding}, booktitle = {Communications in Computer and Information Science}, publisher = {Springer Singapore}, year = {2017}, pages = {472--481}}
-
Influence Evaluation for Image Tampering Using Saliency Mechanism
Communications in Computer and Information Science
Springer Singapore, 2017, pp. 518-527
DOI: 10.1007/978-981-10-7299-4_43
BibTeX@incollection{Ye2017a, author = {Ye, Kui and Sun, Xiaobo and Xu, Jindong and Dong, Jing and Tan, Tieniu}, title = {Influence Evaluation for Image Tampering Using Saliency Mechanism}, booktitle = {Communications in Computer and Information Science}, publisher = {Springer Singapore}, year = {2017}, pages = {518--527}}
-
Digital multimedia audio forensics: past, present and future
Multimedia Tools and Applications, Springer, 2017, pp. 1
DOI: 10.1007/s11042-016-4277-2
BibTeX@article{Zakariah2017, author = {Zakariah, Mohammed and Khan, Muhammad Khurram and Malik, Hafiz}, title = {Digital multimedia audio forensics: past, present and future}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2017}, pages = {1}}
-
A Web-Based Service for Disturbing Image Detection
MultiMedia Modeling, Springer, 2017
DOI: 10.1007/978-3-319-51814-5_37
BibTeX@article{Zampoglou2017a, author = {Zampoglou, Markos and Papadopoulos, Symeon and Kompatsiaris, Yiannis and Spangenberg, Jochen}, title = {A Web-Based Service for Disturbing Image Detection}, journal = {MultiMedia Modeling}, publisher = {Springer}, year = {2017}}
-
Detecting blurred image splicing using blur type inconsistency
International Journal of Innovative Computing and Applications, Inderscience Publishers, 2017, Vol. 8(1), pp. 31
DOI: 10.1504/ijica.2017.082495
BibTeX@article{Zeng2017, author = {Zeng, Feng and Wang, Wei and Chen, Junjie and Tang, Min}, title = {Detecting blurred image splicing using blur type inconsistency}, journal = {International Journal of Innovative Computing and Applications}, publisher = {Inderscience Publishers}, year = {2017}, volume = {8}, number = {1}, pages = {31}}
-
Countering JPEG anti-forensics based on noise level estimation
Science China Information Sciences, Springer Nature, 2017, Vol. 61(3)
DOI: 10.1007/s11432-016-0426-1
BibTeX@article{Zeng2017a, author = {Zeng, Hui and Yu, Jingjing and Kang, Xiangui and Lyu, Siwei}, title = {Countering JPEG anti-forensics based on noise level estimation}, journal = {Science China Information Sciences}, publisher = {Springer Nature}, year = {2017}, volume = {61}, number = {3}}
-
Image Forensics Based on Transfer Learning and Convolutional Neural Network
Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security - IHMMSec 17
ACM Press, 2017
DOI: 10.1145/3082031.3083250
BibTeX@inproceedings{Zhan2017, author = {Zhan, Yifeng and Chen, Yifang and Zhang, Qiong and Kang, Xiangui}, title = {Image Forensics Based on Transfer Learning and Convolutional Neural Network}, booktitle = {Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security - IHMMSec 17}, publisher = {ACM Press}, year = {2017}}
-
Detection of image seam carving by using weber local descriptor and local binary patterns
Journal of Information Security and Applications, Elsevier BV, 2017, Vol. 36, pp. 135-144
DOI: 10.1016/j.jisa.2017.09.003
BibTeX@article{Zhang2017e, author = {Zhang, Dengyong and Li, Qingguo and Yang, Gaobo and Li, Leida and Sun, Xingming}, title = {Detection of image seam carving by using weber local descriptor and local binary patterns}, journal = {Journal of Information Security and Applications}, publisher = {Elsevier BV}, year = {2017}, volume = {36}, pages = {135--144}}
-
A robust forgery detection algorithm for object removal by exemplar-based image inpainting
Multimedia Tools and Applications, Springer, 2017, pp. 1
DOI: 10.1007/s11042-017-4829-0
BibTeX@article{Zhang2017c, author = {Zhang, Dengyong and Liang, Zaoshan and Yang, Gaobo and Li, Qingguo and Li, Leida and Sun, Xingming}, title = {A robust forgery detection algorithm for object removal by exemplar-based image inpainting}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2017}, pages = {1}}
-
Detecting image seam carving with low scaling ratio using multi-scale spatial and spectral entropies
Journal of Visual Communication and Image Representation, Elsevier BV, 2017, Vol. 48, pp. 281-291
DOI: 10.1016/j.jvcir.2017.07.006
BibTeX@article{Zhang2017b, author = {Zhang, Dengyong and Yin, Ting and Yang, Gaobo and Xia, Ming and Li, Leida and Sun, Xingming}, title = {Detecting image seam carving with low scaling ratio using multi-scale spatial and spectral entropies}, journal = {Journal of Visual Communication and Image Representation}, publisher = {Elsevier BV}, year = {2017}, volume = {48}, pages = {281--291}}
-
Source Camera Identification Based on Guided Image Estimation and Block Weighted Average
Digital Forensics and Watermarking, Springer, 2017
DOI: 10.1007/978-3-319-53465-7_8
BibTeX@article{Zhang2017, author = {Zhang, Le-Bing and Peng, Fei and Long, Min}, title = {Source Camera Identification Based on Guided Image Estimation and Block Weighted Average}, journal = {Digital Forensics and Watermarking}, publisher = {Springer}, year = {2017}}
-
Detection of Copy-Move Forgery in Flat Region Based on Feature Enhancement
Digital Forensics and Watermarking, Springer, 2017
DOI: 10.1007/978-3-319-53465-7_12
BibTeX@article{Zhang2017a, author = {Zhang, Weiwei and Yang, Zhenghong and Niu, Shaozhang and Wang, Junbin}, title = {Detection of Copy-Move Forgery in Flat Region Based on Feature Enhancement}, journal = {Digital Forensics and Watermarking}, publisher = {Springer}, year = {2017}}
-
A multi-scale noise-resistant feature adaptation approach for image tampering localization over Facebook
Proc. IEEE 2nd Int. Conf. Signal and Image Processing (ICSIP)
2017, pp. 272-276
DOI: 10.1109/SIPROCESS.2017.8124547
BibTeX@inproceedings{Zhang2017f, author = {Zhang, Y. and Thing, V. L. L.}, title = {A multi-scale noise-resistant feature adaptation approach for image tampering localization over Facebook}, booktitle = {Proc. IEEE 2nd Int. Conf. Signal and Image Processing (ICSIP)}, year = {2017}, pages = {272--276}}
-
Automated face swapping and its detection
Proc. IEEE 2nd Int. Conf. Signal and Image Processing (ICSIP)
2017, pp. 15-19
DOI: 10.1109/SIPROCESS.2017.8124497
BibTeX@inproceedings{Zhang2017g, author = {Zhang, Y. and Zheng, L. and Thing, V. L. L.}, title = {Automated face swapping and its detection}, booktitle = {Proc. IEEE 2nd Int. Conf. Signal and Image Processing (ICSIP)}, year = {2017}, pages = {15--19}}
-
Detecting Copy-move Forgeries in Images Based on DCT and Main Transfer Vectors
KSII Transactions on Internet and Information Systems, Korean Society for Internet Information (KSII), 2017, Vol. 11(9)
DOI: 10.3837/tiis.2017.09.021
BibTeX@article{Zhang2017d, author = {Zhang, Zhi and Wang, Dongyan and Wang, Chengyou and Zhou, Xiao}, title = {Detecting Copy-move Forgeries in Images Based on DCT and Main Transfer Vectors}, journal = {KSII Transactions on Internet and Information Systems}, publisher = {Korean Society for Internet Information (KSII)}, year = {2017}, volume = {11}, number = {9}}
-
Image forgery detection using segmentation and swarm intelligent algorithm
Wuhan University Journal of Natural Sciences, Springer, 2017, Vol. 22(2), pp. 141
DOI: 10.1007/s11859-017-1227-4
BibTeX@article{Zhao2017, author = {Zhao, Fei and Shi, Wenchang and Qin, Bo and Liang, Bin}, title = {Image forgery detection using segmentation and swarm intelligent algorithm}, journal = {Wuhan University Journal of Natural Sciences}, publisher = {Springer}, year = {2017}, volume = {22}, number = {2}, pages = {141}}
-
A new block-based method for copy move forgery detection under image geometric transforms
Multimedia Tools and Applications, Springer, 2017, Vol. 76(13), pp. 14887
DOI: 10.1007/s11042-016-4201-9
BibTeX@article{Zhong2017, author = {Zhong, Junliu and Gan, Yanfen and Young, Janson and Huang, Lian and Lin, Peiyu}, title = {A new block-based method for copy move forgery detection under image geometric transforms}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2017}, volume = {76}, number = {13}, pages = {14887}}
-
Block-Based Convolutional Neural Network for Image Forgery Detection
Digital Forensics and Watermarking, Springer, 2017
DOI: 10.1007/978-3-319-64185-0_6
BibTeX@article{Zhou2017, author = {Zhou, Jianghong and Ni, Jiangqun and Rao, Yuan}, title = {Block-Based Convolutional Neural Network for Image Forgery Detection}, journal = {Digital Forensics and Watermarking}, publisher = {Springer}, year = {2017}}
-
Copy-move forgery detection in the presence of similar but genuine objects
Proc. IEEE 2nd Int. Conf. Signal and Image Processing (ICSIP)
2017, pp. 25-29
DOI: 10.1109/SIPROCESS.2017.8124499
BibTeX@inproceedings{Zhu2017, author = {Zhu, Y. and Ng, T. T. and Wen, B. and Shen, X. and Li, B.}, title = {Copy-move forgery detection in the presence of similar but genuine objects}, booktitle = {Proc. IEEE 2nd Int. Conf. Signal and Image Processing (ICSIP)}, year = {2017}, pages = {25--29}}
-
Image Splicing Localization Based on CFA-artifacts Analysis
Компьютерная оптика, 2017
BibTeX@article{Варламова2017, author = {Варламова, Анна Александровна and Кузнецов, Андрей Владимирович}, title = {Image Splicing Localization Based on CFA-artifacts Analysis}, journal = {Компьютерная оптика}, year = {2017}}
-
Digital Forensics and Watermarking: 15th International Workshop, IWDW 2016, Beijing, China, September 17-19, 2016, Revised Selected Papers (Lecture Notes in Computer Science)
Shi, Y. Q., Kim, H. J., Perez-Gonzalez & F., Liu, F. (ed.)
Springer, 2017
BibTeX@book{Shi2017,, title = {Digital Forensics and Watermarking: 15th International Workshop, IWDW 2016, Beijing, China, September 17-19, 2016, Revised Selected Papers (Lecture Notes in Computer Science)}, publisher = {Springer}, year = {2017}}
2016
-
Information Science and Applications (ICIsa) 2016
Kim, J. K. & Joukov, N. (ed.)
Lecture Notes in Electrical Engineering
Chapter Copy-Move Forgery Detection Using on Locality Sensitive Hashing and k-means Clustering
Springer Singapore, 2016, pp. 663-672
DOI: 10.1007/978-981-10-0557-2_65
BibTeX@inbook{Al-Qershi2016, author = {Al-Qershi, Osamah M. and Khoo, Bee Ee}, title = {Information Science and Applications (ICIsa) 2016}, booktitle = {Lecture Notes in Electrical Engineering}, publisher = {Springer Singapore}, year = {2016}, pages = {663--672}}
-
Malicious Inter-frame Video Tampering Detection in Mpeg Videos Using Time and Spatial Domain Analysis of Quantization Effects
Multimedia Tools and Applications, Springer, 2016, pp. 1
DOI: 10.1007/s11042-016-4004-z
BibTeX@article{AbbasiAghamaleki2016, author = {Abbasi Aghamaleki, Javad and Behrad, Alireza}, title = {Malicious Inter-frame Video Tampering Detection in Mpeg Videos Using Time and Spatial Domain Analysis of Quantization Effects}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2016}, pages = {1}}
-
Detecting Copy--move Forgeries in Scanned Text Documents
Digital-Forensics and Watermarking
Springer Science + Business Media, 2016, pp. 3-18
DOI: 10.1007/978-3-662-43886-2_1
BibTeX@incollection{Abramova2016, author = {Abramova, Svetlana and Böhme, Rainer}, title = {Detecting Copy--move Forgeries in Scanned Text Documents}, booktitle = {Digital-Forensics and Watermarking}, publisher = {Springer Science + Business Media}, year = {2016}, pages = {3--18}}
-
A Dictionary Based Approach to JPEG Anti-forensics
Proc. IEEE 8th Int. Conf. Intelligent Systems (IS)
2016, pp. 778-783
DOI: 10.1109/IS.2016.7737401
BibTeX@inproceedings{Afshin2016, author = {Afshin, N. and Razzazi, F. and Moin, M. S.}, title = {A Dictionary Based Approach to JPEG Anti-forensics}, booktitle = {Proc. IEEE 8th Int. Conf. Intelligent Systems (IS)}, year = {2016}, pages = {778--783}}
-
Texture Operator Based Image Splicing Detection Hybrid Technique
Proc. Second Int. Conf. Computational Intelligence Communication Technology (CICT)
2016, pp. 116-120
DOI: 10.1109/CICT.2016.31
BibTeX@inproceedings{Agarwal2016, author = {Agarwal, Saurabh and Chand, Satish}, title = {Texture Operator Based Image Splicing Detection Hybrid Technique}, booktitle = {Proc. Second Int. Conf. Computational Intelligence Communication Technology (CICT)}, year = {2016}, pages = {116--120}}
-
Image tampering detection using local phase based operator
Proc. Int. Conf. Emerging Trends in Electrical Electronics Sustainable Energy Systems (ICETEESES)
2016, pp. 355-360
DOI: 10.1109/ICETEESES.2016.7581409
BibTeX@inproceedings{Agarwal2016a, author = {Agarwal, Saurabh and Chand, Satish}, title = {Image tampering detection using local phase based operator}, booktitle = {Proc. Int. Conf. Emerging Trends in Electrical Electronics Sustainable Energy Systems (ICETEESES)}, year = {2016}, pages = {355--360}}
-
Reflective SIFT for improving the detection of copy-move image forgery
Proc. Second Int. Conf. Research in Computational Intelligence and Communication Networks (ICRCICN)
2016, pp. 84-88
DOI: 10.1109/ICRCICN.2016.7813636
BibTeX@inproceedings{Agarwal2016b, author = {Agarwal, V. and Mane, V.}, title = {Reflective SIFT for improving the detection of copy-move image forgery}, booktitle = {Proc. Second Int. Conf. Research in Computational Intelligence and Communication Networks (ICRCICN)}, year = {2016}, pages = {84--88}}
-
Identifying High Quality JPEG Compressed Images through Exhaustive Recompression Technique
Proc. Communications and Informatics (ICACCI) 2016 Int. Conf. Advances in Computing
2016, pp. 652-656
DOI: 10.1109/ICACCI.2016.7732120
BibTeX@inproceedings{Akhtar2016, author = {Akhtar, Z. and Khan, E.}, title = {Identifying High Quality JPEG Compressed Images through Exhaustive Recompression Technique}, booktitle = {Proc. Communications and Informatics (ICACCI) 2016 Int. Conf. Advances in Computing}, year = {2016}, pages = {652--656}}
-
Source Camera Identification Using Noise Residual
Proc. of the International conference on Recent Trends in Electronics, Information & Communication Technology, 20/05/2016, SVCE Bangalore
2016
BibTeX@inproceedings{Akshatha2016, author = {Akshatha, K. R. and Anitha, H. and Karunakar, A. K. and Raghavendra, U. and Shetty, Dinesh}, title = {Source Camera Identification Using Noise Residual}, booktitle = {Proc. of the International conference on Recent Trends in Electronics, Information & Communication Technology, 20/05/2016, SVCE Bangalore}, year = {2016}}
-
Digital Camera Identification Using PRNU: A Feature Based Approach
Digital Investigation, Elsevier BV, 2016
DOI: 10.1016/j.diin.2016.10.002
BibTeX@article{Akshatha2016a, author = {Akshatha, K. R. and Karunakar, A. K. and Anitha, H. and Raghavendra, U. and Shetty, Dinesh}, title = {Digital Camera Identification Using PRNU: A Feature Based Approach}, journal = {Digital Investigation}, publisher = {Elsevier BV}, year = {2016}}
-
Passive Detection of Image Forgery Using DCT and Local Binary Pattern
Signal, Image and Video Processing, 2016, pp. 1-8
DOI: 10.1007/s11760-016-0899-0
BibTeX@article{Alahmadi2016, author = {Alahmadi, Amani and Hussain, Muhammad and Aboalsamh, Hatim and Muhammad, Ghulam and Bebis, George and Mathkour, Hassan}, title = {Passive Detection of Image Forgery Using DCT and Local Binary Pattern}, journal = {Signal, Image and Video Processing}, year = {2016}, pages = {1--8}}
-
Copy-move Forgery Detection in Digital Image
AIP Conference Proceedings, 2016, Vol. 1761(1)
DOI: 10.1063/1.4960855
BibTeX@article{Alamro2016, author = {Alamro, Loai and Yusoff, Nooraini}, title = {Copy-move Forgery Detection in Digital Image}, journal = {AIP Conference Proceedings}, year = {2016}, volume = {1761}, number = {1}}
-
On the Sensor Pattern Noise Estimation in Image Forensics: A Systematic Empirical Evaluation
IEEE Transactions on Information Forensics and Security, 2016, Vol. PP(99), pp. 1
DOI: 10.1109/TIFS.2016.2640938
BibTeX@article{Al-Ani2016, author = {Al-Ani, M. and Khelifi, F.}, title = {On the Sensor Pattern Noise Estimation in Image Forensics: A Systematic Empirical Evaluation}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2016}, volume = {PP}, number = {99}, pages = {1}}
-
Improving SURF Based Copy-Move Forgery Detection Using Super Resolution
Proc. IEEE Int. Symp. Multimedia (ISM)
2016, pp. 341-344
DOI: 10.1109/ISM.2016.0075
BibTeX@inproceedings{Al-Hammadi2016, author = {Al-Hammadi, M. M. and Emmanuel, S.}, title = {Improving SURF Based Copy-Move Forgery Detection Using Super Resolution}, booktitle = {Proc. IEEE Int. Symp. Multimedia (ISM)}, year = {2016}, pages = {341--344}}
-
Image Tampering Detection Based on Local Texture Descriptor and Extreme Learning Machine
Proc. UKSim-AMSS 18th Int. Conf. Computer Modelling and Simulation (UKSim)
2016, pp. 196-199
DOI: 10.1109/UKSim.2016.39
BibTeX@inproceedings{Alhussein2016, author = {Alhussein, M.}, title = {Image Tampering Detection Based on Local Texture Descriptor and Extreme Learning Machine}, booktitle = {Proc. UKSim-AMSS 18th Int. Conf. Computer Modelling and Simulation (UKSim)}, year = {2016}, pages = {196--199}}
-
Detection of copy-move image forgery based on discrete cosine transform
Neural Computing and Applications, Springer, 2016, pp. 1
DOI: 10.1007/s00521-016-2663-3
BibTeX@article{Alkawaz2016, author = {Alkawaz, Mohammed Hazim and Sulong, Ghazali and Saba, Tanzila and Rehman, Amjad}, title = {Detection of copy-move image forgery based on discrete cosine transform}, journal = {Neural Computing and Applications}, publisher = {Springer}, year = {2016}, pages = {1}}
-
Biofov -- an Open Platform for Forensic Video Analysis and Biometric Data Extraction
Proc. 4th Int. Conf. Biometrics and Forensics (IWBF)
2016, pp. 1-6
DOI: 10.1109/IWBF.2016.7449693
BibTeX@inproceedings{Almeida2016, author = {Almeida, M. and Correia, P. L. and Larsen, P. K.}, title = {Biofov -- an Open Platform for Forensic Video Analysis and Biometric Data Extraction}, booktitle = {Proc. 4th Int. Conf. Biometrics and Forensics (IWBF)}, year = {2016}, pages = {1--6}}
-
Copy-move Forgery Detection Using on Locality Sensitive Hashing and K-means Clustering
Information Science and Applications (ICISA) 2016
Springer, 2016
DOI: 10.1007/978-981-10-0557-2_65
BibTeX@incollection{Al-Qershi2016b, author = {Al-Qershi, Osamah M. and Khoo, Bee Ee}, title = {Copy-move Forgery Detection Using on Locality Sensitive Hashing and K-means Clustering}, booktitle = {Information Science and Applications (ICISA) 2016}, publisher = {Springer}, year = {2016}}
-
Media Trustworthiness Verification and Event Assessment through an Integrated Framework: A Case-study
Multimedia Tools and Applications, Springer, 2016, pp. 1
DOI: 10.1007/s11042-016-3303-8
BibTeX@article{Amerini2016, author = {Amerini, Irene and Becarelli, Rudy and Brancati, Francesco and Caldelli, Roberto and Giunta, Gabriele and Itria, Massimiliano L.}, title = {Media Trustworthiness Verification and Event Assessment through an Integrated Framework: A Case-study}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2016}, pages = {1}}
-
Feature Development Based on CFA Artifacts for Image Forgery Detection
Thapar University, Thapar University, 2016
BibTeX@mastersthesis{Amneet2016, author = {Amneet, Singh}, title = {Feature Development Based on CFA Artifacts for Image Forgery Detection}, school = {Thapar University}, year = {2016}}
-
Evaluation of Sensor Pattern Noise Estimators for Source Camera Identification
International Journal of Computer, Electrical, Automation, Control and Information Engineering, 2016, Vol. 10(12)
BibTeX@article{Anderson-Sackaney2016, author = {Anderson-Sackaney, Benjamin and Abdel-Dayem, Amr}, title = {Evaluation of Sensor Pattern Noise Estimators for Source Camera Identification}, journal = {International Journal of Computer, Electrical, Automation, Control and Information Engineering}, year = {2016}, volume = {10}, number = {12}}
-
Copy-move and Splicing Image Forgery Detection and Localization Techniques: A Review
Australian Journal of Forensic Sciences, 2016, Vol. 0(0), pp. 1-27
DOI: 10.1080/00450618.2016.1153711
BibTeX@article{Asghar2016, author = {Asghar, Khurshid and Habib, Zulfiqar and Hussain, Muhammad}, title = {Copy-move and Splicing Image Forgery Detection and Localization Techniques: A Review}, journal = {Australian Journal of Forensic Sciences}, year = {2016}, volume = {0}, number = {0}, pages = {1--27}}
-
Detection of copy move forgery using Legendre Moments
Proc. 24th Signal Processing and Communication Application Conf. (SIU)
2016, pp. 1125-1128
DOI: 10.1109/SIU.2016.7495942
BibTeX@inproceedings{Aymaz2016, author = {Aymaz, S. and Aymaz, Ş. and Ulutaş, G.}, title = {Detection of copy move forgery using Legendre Moments}, booktitle = {Proc. 24th Signal Processing and Communication Application Conf. (SIU)}, year = {2016}, pages = {1125--1128}}
-
An automatic JPEG ghost detection approach for digital image forensics
Proc. 24th Iranian Conf. Electrical Engineering (ICEE)
2016, pp. 1645-1649
DOI: 10.1109/IranianCEE.2016.7585785
BibTeX@inproceedings{Azarian-Pour2016, author = {Azarian-Pour, S. and Babaie-Zadeh, M. and Sadri, A. R.}, title = {An automatic JPEG ghost detection approach for digital image forensics}, booktitle = {Proc. 24th Iranian Conf. Electrical Engineering (ICEE)}, year = {2016}, pages = {1645--1649}}
-
An automatic JPEG ghost detection approach for digital image forensics
Proc. 24th Iranian Conf. Electrical Engineering (ICEE)
2016, pp. 1645-1649
DOI: 10.1109/IranianCEE.2016.7585785
BibTeX@inproceedings{Azarian-Pour2016a, author = {Azarian-Pour, S. and Babaie-Zadeh, M. and Sadri, A. R.}, title = {An automatic JPEG ghost detection approach for digital image forensics}, booktitle = {Proc. 24th Iranian Conf. Electrical Engineering (ICEE)}, year = {2016}, pages = {1645--1649}}
-
Chroma Key Background Detection for Digital Video Using Statistical Correlation of Blurring Artifact
Digital Investigation, Elsevier BV, 2016, Vol. 19, pp. 29-43
DOI: 10.1016/j.diin.2016.09.001
BibTeX@article{Bagiwa2016, author = {Bagiwa, Mustapha Aminu and Wahab, Ainuddin Wahid Abdul and Idris, Mohd Yamani Idna and Khan, Suleman and Choo, Kim-Kwang Raymond}, title = {Chroma Key Background Detection for Digital Video Using Statistical Correlation of Blurring Artifact}, journal = {Digital Investigation}, publisher = {Elsevier BV}, year = {2016}, volume = {19}, pages = {29--43}}
-
A novel Analysis of Image Forgery Detection Using SVM
2016
BibTeX@article{Bansal2016, author = {Bansal}, title = {A novel Analysis of Image Forgery Detection Using SVM}, year = {2016}}
-
Adversary-aware, data-driven detection of double JPEG compression: How to make counter-forensics harder
Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)
2016, pp. 1-6
DOI: 10.1109/WIFS.2016.7823902
BibTeX@inproceedings{Barni2016, author = {Barni, M. and Chen, Z. and Tondi, B.}, title = {Adversary-aware, data-driven detection of double JPEG compression: How to make counter-forensics harder}, booktitle = {Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)}, year = {2016}, pages = {1--6}}
-
Camera Identification with Deep Convolutional Networks
arXiv preprint arXiv:1603.01068, 2016
DOI: 10.1016/j.image.2016.05.007
BibTeX@article{Baroffio2016, author = {Baroffio, Luca and Bondi, Luca and Bestagini, Paolo and Tubaro, Stefano}, title = {Camera Identification with Deep Convolutional Networks}, journal = {arXiv preprint arXiv:1603.01068}, year = {2016}}
-
A Discriminative Statistical Model for Digital Image Forgery Detection
I.J. Engineering and Manufacturing, 2016
DOI: 10.5815/ijem.
BibTeX@article{Baumy2016, author = {Baumy, Amira and Soiliman, Naglaa. F. and Abdalla, Mahmoud and El-Samie, Fathi Abd}, title = {A Discriminative Statistical Model for Digital Image Forgery Detection}, journal = {I.J. Engineering and Manufacturing}, year = {2016}}
-
A Deep Learning Approach to Universal Image Manipulation Detection Using a New Convolutional Layer
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security
ACM, 2016, pp. 5-10
DOI: 10.1145/2909827.2930786
BibTeX@inproceedings{Bayar2016, author = {Bayar, Belhassen and Stamm, Matthew C.}, title = {A Deep Learning Approach to Universal Image Manipulation Detection Using a New Convolutional Layer}, booktitle = {Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security}, publisher = {ACM}, year = {2016}, pages = {5--10}}
-
Image forgery detection based on SIFT and k-means++
Proc. 39th Int. Conf. Telecommunications and Signal Processing (TSP)
2016, pp. 474-477
DOI: 10.1109/TSP.2016.7760924
BibTeX@inproceedings{Baykal2016, author = {Baykal, E. and Ustubioglu, B. and Ulutas, G.}, title = {Image forgery detection based on SIFT and k-means++}, booktitle = {Proc. 39th Int. Conf. Telecommunications and Signal Processing (TSP)}, year = {2016}, pages = {474--477}}
-
The LR does not exist
Science & Justice, Elsevier BV, 2016, Vol. 56(5), pp. 388-391
DOI: 10.1016/j.scijus.2016.06.005
BibTeX@article{Berger2016, author = {Berger, Charles E. H. and Slooten, Klaas}, title = {The LR does not exist}, journal = {Science & Justice}, publisher = {Elsevier BV}, year = {2016}, volume = {56}, number = {5}, pages = {388--391}}
-
Social Media Investigations Using Shared Photos
2016
DOI: 10.1145/2790755.2790765
BibTeX@electronic{Bertini2016, author = {Bertini, Flavio and Sharma, Rajesh and Iannı, Andrea and Montesi, Danilo and Zamboni, Mura Anteo}, title = {Social Media Investigations Using Shared Photos}, year = {2016}}
-
Codec and Gop Identification in Double Compressed Videos
IEEE Transactions on Image Processing, 2016, Vol. 25(5), pp. 2298-2310
DOI: 10.1109/TIP.2016.2541960
BibTeX@article{Bestagini2016, author = {Bestagini, P. and Milani, S. and Tagliasacchi, M. and Tubaro, S.}, title = {Codec and Gop Identification in Double Compressed Videos}, journal = {IEEE Transactions on Image Processing}, year = {2016}, volume = {25}, number = {5}, pages = {2298--2310}}
-
Image Phylogeny Tree Reconstruction Based on Region Selection
Proc. Speech and Signal Processing (ICASSP) 2016 IEEE Int. Conf. Acoustics
2016, pp. 2059-2063
DOI: 10.1109/ICASSP.2016.7472039
BibTeX@inproceedings{Bestagini2016a, author = {Bestagini, P. and Tagliasacchi, M. and Tubaro, S.}, title = {Image Phylogeny Tree Reconstruction Based on Region Selection}, booktitle = {Proc. Speech and Signal Processing (ICASSP) 2016 IEEE Int. Conf. Acoustics}, year = {2016}, pages = {2059--2063}}
-
Detecting Facial Retouching Using Supervised Deep Learning
IEEE Transactions on Information Forensics and Security, 2016, Vol. PP(99), pp. 1-1
DOI: 10.1109/TIFS.2016.2561898
BibTeX@article{Bharati2016, author = {Bharati, A. and Singh, R. and Vatsa, M. and Bowyer, K.}, title = {Detecting Facial Retouching Using Supervised Deep Learning}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2016}, volume = {PP}, number = {99}, pages = {1--1}}
-
A Survey of Image Forgery Detection Techniques
Proc. Signal Processing and Networking (WiSPNET) 2016 Int. Conf. Wireless Communications
2016, pp. 877-881
DOI: 10.1109/WiSPNET.2016.7566257
BibTeX@inproceedings{Bharti2016, author = {Bharti, C. N. and Tandel, P.}, title = {A Survey of Image Forgery Detection Techniques}, booktitle = {Proc. Signal Processing and Networking (WiSPNET) 2016 Int. Conf. Wireless Communications}, year = {2016}, pages = {877--881}}
-
Forgery Detection Using Feature-clustering in Recompressed JPEG Images
Multimedia Tools and Applications, Springer, 2016, pp. 1
DOI: 10.1007/s11042-016-3964-3
BibTeX@article{Bhartiya2016, author = {Bhartiya, Gunjan and Jalal, Anand Singh}, title = {Forgery Detection Using Feature-clustering in Recompressed JPEG Images}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2016}, pages = {1}}
-
Adaptive Polar Based Filtering Method for Image Copy-Move Forgery Detection
Proc. IEEE Trustcom/BigDataSE/ISPA
2016, pp. 952-956
DOI: 10.1109/TrustCom.2016.0161
BibTeX@inproceedings{Bi2016a, author = {Bi, X. and Pun, C. M. and Yuan, X. C.}, title = {Adaptive Polar Based Filtering Method for Image Copy-Move Forgery Detection}, booktitle = {Proc. IEEE Trustcom/BigDataSE/ISPA}, year = {2016}, pages = {952--956}}
-
Multi-scale feature extraction and adaptive matching for copy-move forgery detection
Multimedia Tools and Applications, Springer, 2016, pp. 1
DOI: 10.1007/s11042-016-4276-3
BibTeX@article{Bi2016, author = {Bi, XiuLi and Pun, Chi-Man and Yuan, Xiao-Chen}, title = {Multi-scale feature extraction and adaptive matching for copy-move forgery detection}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2016}, pages = {1}}
-
Reframing the debate: A question of probability, not of likelihood ratio
Science & Justice, Elsevier BV, 2016, Vol. 56(5), pp. 392-396
DOI: 10.1016/j.scijus.2016.05.008
BibTeX@article{Biedermann2016, author = {Biedermann, A. and Bozza, S. and Taroni, F. and Aitken, C.}, title = {Reframing the debate: A question of probability, not of likelihood ratio}, journal = {Science & Justice}, publisher = {Elsevier BV}, year = {2016}, volume = {56}, number = {5}, pages = {392--396}}
-
An advance to cloning detection in digital forensics investigations
Proc. Int. Conf. Emerging Technological Trends (ICETT)
2016, pp. 1-5
DOI: 10.1109/ICETT.2016.7873743
BibTeX@inproceedings{Binson2016, author = {Binson, V. A. and Thomas, N. M. and Thoams, S. and Augustine, A. and Sivakumar, K. S.}, title = {An advance to cloning detection in digital forensics investigations}, booktitle = {Proc. Int. Conf. Emerging Technological Trends (ICETT)}, year = {2016}, pages = {1--5}}
-
Passive Image Manipulation Detection Using Wavelet Transform and Support Vector Machine Classifier
Satapathy, C. S., Joshi, A., Modi, N. & Pathak, N. (ed.)
Proceedings of International Conference on ICT for Sustainable Development
Chapter Passive Image Manipulation Detection Using Wavelet Transform and Support Vector Machine Classifier
Springer Singapore, 2016, pp. 447-455
DOI: 10.1007/978-981-10-0129-1_47
BibTeX@inbook{Birajdar2016, author = {Birajdar, Gajanan K. and Mankar, Vijay H.}, title = {Passive Image Manipulation Detection Using Wavelet Transform and Support Vector Machine Classifier}, booktitle = {Proceedings of International Conference on ICT for Sustainable Development}, publisher = {Springer Singapore}, year = {2016}, pages = {447--455}}
-
Digital Image Forgery Identification Using Motion Blur Variations as Clue
KHOJ – Journal of Indian Management Research and Practices, 2016
BibTeX@article{Birajdar2016a, author = {Birajdar, P. M. and Dharashive, N. G.}, title = {Digital Image Forgery Identification Using Motion Blur Variations as Clue}, journal = {KHOJ – Journal of Indian Management Research and Practices}, year = {2016}}
-
Media Forensics
Information Hiding
Chapter Chapter 9
Artech House - Boston, 2016, pp. 231259
BibTeX@inbook{Boehme2016, author = {Böhme, Rainer and Kirchner, Matthias}, title = {Media Forensics}, booktitle = {Information Hiding}, publisher = {Artech House - Boston}, year = {2016}, pages = {231259}}
-
Copy-move image forgery detection based on LBP and DCT
Proc. 24th Signal Processing and Communication Application Conf. (SIU)
2016, pp. 561-564
DOI: 10.1109/SIU.2016.7495802
BibTeX@inproceedings{Boz2016, author = {Boz, A. and Bilge, H. Ş.}, title = {Copy-move image forgery detection based on LBP and DCT}, booktitle = {Proc. 24th Signal Processing and Communication Application Conf. (SIU)}, year = {2016}, pages = {561--564}}
-
Neural Photo Editing with Introspective Adversarial Networks
arXiv, 2016
BibTeX@article{Brock2016, author = {Brock, Andrew and Lim, Theodore and Ritchie, J. M. and Weston, Nick}, title = {Neural Photo Editing with Introspective Adversarial Networks}, journal = {arXiv}, year = {2016}}
-
Scene-based Non-uniformity Correction with Readout Noise Compensation
Image and Video Technology, Springer, 2016
DOI: 10.1007/978-3-319-29451-3_26
BibTeX@article{Buerker2016, author = {Bürker, Martin and Lensch, Hendrik P. A.}, title = {Scene-based Non-uniformity Correction with Readout Noise Compensation}, journal = {Image and Video Technology}, publisher = {Springer}, year = {2016}}
-
Illuminant-based Transformed Spaces for Image Forensics
IEEE Transactions on Information Forensics and Security, 2016, Vol. 11(4), pp. 720-733
DOI: 10.1109/TIFS.2015.2506548
BibTeX@article{Carvalho2016, author = {Carvalho, T. and Faria, F. A. and Pedrini, H. and da S. Torres, R. and Rocha, A.}, title = {Illuminant-based Transformed Spaces for Image Forensics}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2016}, volume = {11}, number = {4}, pages = {720--733}}
-
Using PNU-based Techniques to Detect Alien Frames in Videos
Advanced Concepts for Intelligent Vision Systems, Springer, 2016
DOI: 10.1007/978-3-319-48680-2_64
BibTeX@article{Cattaneo2016, author = {Cattaneo, Giuseppe and Roscigno, Gianluca and Bruno, Andrea}, title = {Using PNU-based Techniques to Detect Alien Frames in Videos}, journal = {Advanced Concepts for Intelligent Vision Systems}, publisher = {Springer}, year = {2016}}
-
Compression Forensics beyond the First Significant Digit
2016
DOI: 10.1109/wifs.2015.7368578
BibTeX@electronic{Chakraborty2016, author = {Chakraborty, Sujoy and Kirchner, Matthias}, title = {Compression Forensics beyond the First Significant Digit}, year = {2016}}
-
Survey on Keypoint Based Copy-move Forgery Detection Methods on Image
Procedia Computer Science, Elsevier BV, 2016, Vol. 85, pp. 206-212
DOI: 10.1016/j.procs.2016.05.213
BibTeX@article{Chauhan2016, author = {Chauhan, Devanshi and Kasat, Dipali and Jain, Sanjeev and Thakare, Vilas}, title = {Survey on Keypoint Based Copy-move Forgery Detection Methods on Image}, journal = {Procedia Computer Science}, publisher = {Elsevier BV}, year = {2016}, volume = {85}, pages = {206--212}}
-
An efficiency enhanced cluster expanding block algorithm for copy-move forgery detection
Multimedia Tools and Applications, Springer, 2016, pp. 1
DOI: 10.1007/s11042-016-4179-3
BibTeX@article{Chen2016c, author = {Chen, Chien-Chang and Wang, Han and Lin, Cheng-Shian}, title = {An efficiency enhanced cluster expanding block algorithm for copy-move forgery detection}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2016}, pages = {1}}
-
Histogram-based Colour Image Fuzzy Clustering Algorithm
Multimedia Tools and Applications, Springer, 2016, Vol. 75(18), pp. 11417
DOI: 10.1007/s11042-015-2860-6
BibTeX@article{Chen2016a, author = {Chen, Hai-peng and Shen, Xuan-Jing and Long, Jian-Wu}, title = {Histogram-based Colour Image Fuzzy Clustering Algorithm}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2016}, volume = {75}, number = {18}, pages = {11417}}
-
Detecting Double MPEG Compression with the Same Quantiser Scale Based on Mbm Feature
Proc. Speech and Signal Processing (ICASSP) 2016 IEEE Int. Conf. Acoustics
2016, pp. 2064-2068
DOI: 10.1109/ICASSP.2016.7472040
BibTeX@inproceedings{Chen2016, author = {Chen, J. and Jiang, X. and Sun, T. and He, P. and Wang, S.}, title = {Detecting Double MPEG Compression with the Same Quantiser Scale Based on Mbm Feature}, booktitle = {Proc. Speech and Signal Processing (ICASSP) 2016 IEEE Int. Conf. Acoustics}, year = {2016}, pages = {2064--2068}}
-
Automatic Detection of Object-Based Forgery in Advanced Video
IEEE Transactions on Circuits and Systems for Video Technology, 2016, Vol. 26(11), pp. 2138-2151
DOI: 10.1109/TCSVT.2015.2473436
BibTeX@article{Chen2016b, author = {Chen, S. and Tan, S. and Li, B. and Huang, J.}, title = {Automatic Detection of Object-Based Forgery in Advanced Video}, journal = {IEEE Transactions on Circuits and Systems for Video Technology}, year = {2016}, volume = {26}, number = {11}, pages = {2138--2151}}
-
An information theoretic framework for order of operations forensics
Proc. Speech and Signal Processing (ICASSP) 2016 IEEE Int. Conf. Acoustics
2016, pp. 2049-2053
DOI: 10.1109/ICASSP.2016.7472037
BibTeX@inproceedings{Chu2016, author = {Chu, X. and Chen, Y. and Liu, K. J. R.}, title = {An information theoretic framework for order of operations forensics}, booktitle = {Proc. Speech and Signal Processing (ICASSP) 2016 IEEE Int. Conf. Acoustics}, year = {2016}, pages = {2049--2053}}
-
Detectability of the Order of Operations: An Information Theoretic Approach
IEEE Transactions on Information Forensics and Security, 2016, Vol. 11(4), pp. 823-836
DOI: 10.1109/TIFS.2015.2510958
BibTeX@article{Chu2016a, author = {Chu, X. and Chen, Y. and Liu, K. J. R.}, title = {Detectability of the Order of Operations: An Information Theoretic Approach}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2016}, volume = {11}, number = {4}, pages = {823--836}}
-
Single-image splicing localization through autoencoder-based anomaly detection
Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)
2016, pp. 1-6
DOI: 10.1109/WIFS.2016.7823921
BibTeX@inproceedings{Cozzolino2016, author = {Cozzolino, D. and Verdoliva, L.}, title = {Single-image splicing localization through autoencoder-based anomaly detection}, booktitle = {Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)}, year = {2016}, pages = {1--6}}
-
Exposing Image Manipulation with Curved Surface Reflection
Indian Journal of Science and Technology, Indian Society for Education and Environment, 2016, Vol. 9(38)
DOI: 10.17485/ijst/2016/v9i38/99998
BibTeX@article{Cristin2016, author = {Cristin, R. and Raj, V. Cyril}, title = {Exposing Image Manipulation with Curved Surface Reflection}, journal = {Indian Journal of Science and Technology}, publisher = {Indian Society for Education and Environment}, year = {2016}, volume = {9}, number = {38}}
-
First Quantization Matrix Estimation for Double Compressed JPEG Images Utilizing Novel DCT Histogram Selection Strategy
Proceedings of the Tenth Indian Conference on Computer Vision, Graphics and Image Processing - ICVGIP '16
ACM, 2016, pp. 271-278
DOI: 10.1145/3009977.3010067
BibTeX@inproceedings{Dalmia2016, author = {Dalmia, Nandita and Okade, Manish}, title = {First Quantization Matrix Estimation for Double Compressed JPEG Images Utilizing Novel DCT Histogram Selection Strategy}, booktitle = {Proceedings of the Tenth Indian Conference on Computer Vision, Graphics and Image Processing - ICVGIP '16}, publisher = {ACM}, year = {2016}, pages = {271--278}}
-
A novel technique for misalignment parameter estimation in double compressed JPEG images
Proc. Visual Communications and Image Processing (VCIP)
2016, pp. 1-4
DOI: 10.1109/VCIP.2016.7805446
BibTeX@inproceedings{Dalmia2016a, author = {Dalmia, N. and Okade, M.}, title = {A novel technique for misalignment parameter estimation in double compressed JPEG images}, booktitle = {Proc. Visual Communications and Image Processing (VCIP)}, year = {2016}, pages = {1--4}}
-
Image splicing detection using Gaussian or defocus blur
Proc. Int. Conf. Communication and Signal Processing (ICCSP)
2016, pp. 1237-1241
DOI: 10.1109/ICCSP.2016.7754350
BibTeX@inproceedings{Das2016, author = {Das, A. and Medhi, A. and Karsh, R. K. and Laskar, R. H.}, title = {Image splicing detection using Gaussian or defocus blur}, booktitle = {Proc. Int. Conf. Communication and Signal Processing (ICCSP)}, year = {2016}, pages = {1237--1241}}
-
Perceptual Image Hashing Using Center-symmetric Local Binary Patterns
Multimedia Tools and Applications, Springer, 2016, Vol. 75(8), pp. 4639
DOI: 10.1007/s11042-015-2496-6
BibTeX@article{Davarzani2016, author = {Davarzani, Reza and Mozaffari, Saeed and Yaghmaie, Khashayar}, title = {Perceptual Image Hashing Using Center-symmetric Local Binary Patterns}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2016}, volume = {75}, number = {8}, pages = {4639}}
-
Jpgcarve: An Advanced Tool for Automated Recovery of Fragmented JPEG Files
IEEE Transactions on Information Forensics and Security, 2016, Vol. 11(1), pp. 19-34
DOI: 10.1109/TIFS.2015.2475238
BibTeX@article{DeBock2016, author = {De Bock, J. and De Smet, P.}, title = {Jpgcarve: An Advanced Tool for Automated Recovery of Fragmented JPEG Files}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2016}, volume = {11}, number = {1}, pages = {19--34}}
-
Comparison of PRNU Enhancement Techniques to Generate PRNU Fingerprints for Biometric Source Sensor Attribution
2016 4th International Conference on Biometrics and Forensics (IWBF)
2016, pp. 1-6
DOI: 10.1109/IWBF.2016.7449674
BibTeX@inproceedings{Debiasi2016, author = {Debiasi, L. and Uhl, A.}, title = {Comparison of PRNU Enhancement Techniques to Generate PRNU Fingerprints for Biometric Source Sensor Attribution}, booktitle = {2016 4th International Conference on Biometrics and Forensics (IWBF)}, year = {2016}, pages = {1--6}}
-
An Advanced Texture Analysis Method for Image Sharpening Detection
Digital-Forensics and Watermarking, Springer, 2016
DOI: 10.1007/978-3-319-31960-5_7
BibTeX@article{Ding2016, author = {Ding, Feng and Dong, Weiqiang and Zhu, Guopu and Shi, Yun-Qing}, title = {An Advanced Texture Analysis Method for Image Sharpening Detection}, journal = {Digital-Forensics and Watermarking}, publisher = {Springer}, year = {2016}}
-
Copy-move Image Forgery Detection Using Frequency-based Techniques: A Review
International Journal of Signal Processing, Image Processing and Pattern Recognition, Science and Engineering Research Support Society, 2016, Vol. 9(3), pp. 71-88
DOI: 10.14257/ijsip.2016.9.3.07
BibTeX@article{Dixit2016, author = {Dixit, Anuja and Gupta, R. K.}, title = {Copy-move Image Forgery Detection Using Frequency-based Techniques: A Review}, journal = {International Journal of Signal Processing, Image Processing and Pattern Recognition}, publisher = {Science and Engineering Research Support Society}, year = {2016}, volume = {9}, number = {3}, pages = {71--88}}
-
Dywt Based Copy-move Forgery Detection with Improved Detection Accuracy
Proc. 3rd Int. Conf. Signal Processing and Integrated Networks (SPIN)
2016, pp. 133-138
DOI: 10.1109/SPIN.2016.7566676
BibTeX@inproceedings{Dixit2016a, author = {Dixit, R. and Naskar, R.}, title = {Dywt Based Copy-move Forgery Detection with Improved Detection Accuracy}, booktitle = {Proc. 3rd Int. Conf. Signal Processing and Integrated Networks (SPIN)}, year = {2016}, pages = {133--138}}
-
A Novel Image Splicing Detection Method Based on the Inconsistency of Image Noise
Proc. IEEE 11th Conf. Industrial Electronics and Applications (ICIEA)
2016, pp. 560-563
DOI: 10.1109/ICIEA.2016.7603647
BibTeX@inproceedings{Dong2016, author = {Dong, J. and Chen, L. and Tian, J. and Xu, X.}, title = {A Novel Image Splicing Detection Method Based on the Inconsistency of Image Noise}, booktitle = {Proc. IEEE 11th Conf. Industrial Electronics and Applications (ICIEA)}, year = {2016}, pages = {560--563}}
-
JPEG Compression Forensics against Resizing
Proc. IEEE Trustcom/BigDataSE/ISPA
2016, pp. 1001-1007
DOI: 10.1109/TrustCom.2016.0168
BibTeX@inproceedings{Dong2016a, author = {Dong, W. and Wang, J.}, title = {JPEG Compression Forensics against Resizing}, booktitle = {Proc. IEEE Trustcom/BigDataSE/ISPA}, year = {2016}, pages = {1001--1007}}
-
Rotation angle estimation of an image using least square method
Proc. 3rd Int. Conf. Signal Processing and Integrated Networks (SPIN)
2016, pp. 296-300
DOI: 10.1109/SPIN.2016.7566707
BibTeX@inproceedings{Dua2016, author = {Dua, S. and Singh, J. and Parthasarathy, H.}, title = {Rotation angle estimation of an image using least square method}, booktitle = {Proc. 3rd Int. Conf. Signal Processing and Integrated Networks (SPIN)}, year = {2016}, pages = {296--300}}
-
Computed Tomography Image Origin Identification Based on Original Sensor Pattern Noise and 3D Image Reconstruction Algorithm Footprints
IEEE Journal of Biomedical and Health Informatics, 2016, Vol. PP(99), pp. 1
DOI: 10.1109/JBHI.2016.2575398
BibTeX@article{Duan2016, author = {Duan, Y. and Bouslimi, D. and Yang, G. and Shu, H. and Coatrieux, G.}, title = {Computed Tomography Image Origin Identification Based on Original Sensor Pattern Noise and 3D Image Reconstruction Algorithm Footprints}, journal = {IEEE Journal of Biomedical and Health Informatics}, year = {2016}, volume = {PP}, number = {99}, pages = {1}}
-
Robust Content Authentication of Gray and Color Images Using LBP-dct Markov-based Features
Multimedia Tools and Applications, Springer, 2016, pp. 1
DOI: 10.1007/s11042-016-3855-7
BibTeX@article{El-Alfy2016, author = {El-Alfy, El-Sayed M. and Qureshi, Muhammad A.}, title = {Robust Content Authentication of Gray and Color Images Using LBP-dct Markov-based Features}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2016}, pages = {1}}
-
Image Anonymization for PRNU Forensics: A Set Theoretic Framework Addressing Compression Resilience
Proc. IEEE Int. Conf. Image Processing (ICIP)
2016, pp. 3907-3911
DOI: 10.1109/ICIP.2016.7533092
BibTeX@inproceedings{Elliethy2016, author = {Elliethy, A. and Sharma, G.}, title = {Image Anonymization for PRNU Forensics: A Set Theoretic Framework Addressing Compression Resilience}, booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)}, year = {2016}, pages = {3907--3911}}
-
Image anonymization for PRNU forensics: A set theoretic framework addressing compression resilience
Proc. IEEE Int. Conf. Image Processing (ICIP)
2016, pp. 3907-3911
DOI: 10.1109/ICIP.2016.7533092
BibTeX@inproceedings{Elliethy2016a, author = {Elliethy, A. and Sharma, G.}, title = {Image anonymization for PRNU forensics: A set theoretic framework addressing compression resilience}, booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)}, year = {2016}, pages = {3907--3911}}
-
A Keypoint-based Region Duplication Forgery Detection Algorithm
IEICE TRANSACTIONS on Information and Systems, 2016, Vol. 99-(9), pp. 2413-2416
DOI: 10.1587/transinf.2016edl8024
BibTeX@article{Emam2016, author = {Emam, Mahmoud and Han, Qi and Zhang, Hongli}, title = {A Keypoint-based Region Duplication Forgery Detection Algorithm}, journal = {IEICE TRANSACTIONS on Information and Systems}, year = {2016}, volume = {99-}, number = {9}, pages = {2413--2416}}
-
Detection of Copy-scale-move Forgery in Digital Images Using Sfop and MROGH
Social Computing
Springer, 2016
DOI: 10.1007/978-981-10-2053-7_29
BibTeX@incollection{Emam2016a, author = {Emam, Mahmoud and Han, Qi and Zhang, Hongli}, title = {Detection of Copy-scale-move Forgery in Digital Images Using Sfop and MROGH}, booktitle = {Social Computing}, publisher = {Springer}, year = {2016}}
-
Copy - Move Detection Algorithm Based on Local Derivative Pattern S
Information Technology and Nanotechnolog, 2016
DOI: 10.18287/1613-0073-2016-1638-304-312
BibTeX@article{Evdokimova2016, author = {Evdokimova, N. I. and Kuznetsov, A. V.}, title = {Copy - Move Detection Algorithm Based on Local Derivative Pattern S}, journal = {Information Technology and Nanotechnolog}, year = {2016}}
-
Integrated Model: Statistical Features, Memory Analysis for Scanner and Printer Forensics
Proc. 4th Int. Symp. Digital Forensic and Security (ISDFS)
2016, pp. 74-77
DOI: 10.1109/ISDFS.2016.7473521
BibTeX@inproceedings{Fahd2016, author = {Fahd, S. and Iqbal, M. M. W. and Arif, M. and Javed, M. I.}, title = {Integrated Model: Statistical Features, Memory Analysis for Scanner and Printer Forensics}, booktitle = {Proc. 4th Int. Symp. Digital Forensic and Security (ISDFS)}, year = {2016}, pages = {74--77}}
-
Phase based forgery detection of JPEG anti forensics
Proc. IEEE Int. Symp. Signal Processing and Information Technology (ISSPIT)
2016, pp. 144-149
DOI: 10.1109/ISSPIT.2016.7886024
BibTeX@inproceedings{Fahmy2016b, author = {Fahmy, G. and Wurtz, R.}, title = {Phase based forgery detection of JPEG anti forensics}, booktitle = {Proc. IEEE Int. Symp. Signal Processing and Information Technology (ISSPIT)}, year = {2016}, pages = {144--149}}
-
A New Morphological Based Forgery Detection Scheme
2016 33rd National Radio Science Conference (NRSC)
2016, pp. 212-216
DOI: 10.1109/NRSC.2016.7450830
BibTeX@inproceedings{Fahmy2016, author = {Fahmy, M. F. and Fahmy, O. M.}, title = {A New Morphological Based Forgery Detection Scheme}, booktitle = {2016 33rd National Radio Science Conference (NRSC)}, year = {2016}, pages = {212--216}}
-
A new Zernike moments based technique for camera identification and forgery detection
Signal, Image and Video Processing, Springer, 2016, pp. 1
DOI: 10.1007/s11760-016-1023-1
BibTeX@article{Fahmy2016a, author = {Fahmy, O. M.}, title = {A new Zernike moments based technique for camera identification and forgery detection}, journal = {Signal, Image and Video Processing}, publisher = {Springer}, year = {2016}, pages = {1}}
-
EXIF-white Balance Recognition for Image Forensic Analysis
Multidimensional Systems and Signal Processing, Springer, 2016, pp. 1
DOI: 10.1007/s11045-015-0377-9
BibTeX@article{Fan2016, author = {Fan, Jiayuan and Chen, Tao and Kot, Alex ChiChung}, title = {EXIF-white Balance Recognition for Image Forensic Analysis}, journal = {Multidimensional Systems and Signal Processing}, publisher = {Springer}, year = {2016}, pages = {1}}
-
Forensic Detection of Inverse Tone Mapping in Hdr Images
Proc. IEEE Int. Conf. Image Processing (ICIP)
2016, pp. 166-170
DOI: 10.1109/ICIP.2016.7532340
BibTeX@inproceedings{Fan2016a, author = {Fan, W. and Valenzise, G. and Banterle, F. and Dufaux, F.}, title = {Forensic Detection of Inverse Tone Mapping in Hdr Images}, booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)}, year = {2016}, pages = {166--170}}
-
Corrections to “JPEG Anti-Forensics With Improved Tradeoff Between Forensic Undetectability and Image Quality ” [Aug 14 1211-1226]
IEEE Transactions on Information Forensics and Security, 2016, Vol. 11(11), pp. 2628
DOI: 10.1109/TIFS.2016.2585398
BibTeX@article{Fan2016b, author = {Fan, W. and Wang, K. and Cayre, F. and Xiong, Z.}, title = {Corrections to “JPEG Anti-Forensics With Improved Tradeoff Between Forensic Undetectability and Image Quality ” [Aug 14 1211-1226]}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2016}, volume = {11}, number = {11}, pages = {2628}}
-
Behavior Knowledge Space-based Fusion for Copy --move Forgery Detection
IEEE Transactions on Image Processing, 2016, Vol. 25(10), pp. 4729-4742
DOI: 10.1109/TIP.2016.2593583
BibTeX@article{Ferreira2016, author = {Ferreira, A. and Felipussi, S. C. and Alfaro, C. and Fonseca, P. and Vargas-Muñoz, J. E. and dos Santos, J. A. and Rocha, A.}, title = {Behavior Knowledge Space-based Fusion for Copy --move Forgery Detection}, journal = {IEEE Transactions on Image Processing}, year = {2016}, volume = {25}, number = {10}, pages = {4729--4742}}
-
Multi-directional and Multi-scale Perturbation Approaches for Blind Forensic Median Filtering Detection
Intelligent Data Analysis, IOS Press, 2016, Vol. 20(s1), pp. S17-S36
DOI: 10.3233/IDA-160843
BibTeX@article{Ferreira2016a, author = {Ferreira, Anselmo and Santos, Jefersson A. Dos and Rocha, Anderson}, title = {Multi-directional and Multi-scale Perturbation Approaches for Blind Forensic Median Filtering Detection}, journal = {Intelligent Data Analysis}, publisher = {IOS Press}, year = {2016}, volume = {20}, number = {s1}, pages = {S17-S36}}
-
First Quantization Table Detection in Double Compressed JPEG Images
Universitversità degli Studi di Udine, DIPARTIMENTO MATEMATICA E INFORMATICA - DIMI, Università degli Studi di Udine, Dottorato di ricerca in Dottorato di ricerca in Informatica, 27, 2016
BibTeX@phdthesis{Galvan2016, author = {Galvan, Fausto}, title = {First Quantization Table Detection in Double Compressed JPEG Images}, school = {Universitversità degli Studi di Udine, DIPARTIMENTO MATEMATICA E INFORMATICA - DIMI}, year = {2016}}
-
Application of Afmt Method for Composite Forgery Detection
Nonlinear Dynamics, Springer, 2016, Vol. 84(1), pp. 341
DOI: 10.1007/s11071-015-2524-0
BibTeX@article{Gan2016, author = {Gan, Yanfen and Zhong, Junliu}, title = {Application of Afmt Method for Composite Forgery Detection}, journal = {Nonlinear Dynamics}, publisher = {Springer}, year = {2016}, volume = {84}, number = {1}, pages = {341}}
-
A Classification Engine for Image Ballistics of Social Data
ArXiv, 2016
BibTeX@article{Giudice2016, author = {Giudice, Oliver and Paratore, Antonino and Moltisanti, Marco and Battiato, Sebastiano}, title = {A Classification Engine for Image Ballistics of Social Data}, journal = {ArXiv}, year = {2016}}
-
Image Copy-move Forgery Detection Using SURF in Opponent Color Space
Transactions of Tianjin University, Springer, 2016, Vol. 22(2), pp. 151
DOI: 10.1007/s12209-016-2705-z
BibTeX@article{Gong2016, author = {Gong, Jiachang and Guo, Jichang}, title = {Image Copy-move Forgery Detection Using SURF in Opponent Color Space}, journal = {Transactions of Tianjin University}, publisher = {Springer}, year = {2016}, volume = {22}, number = {2}, pages = {151}}
-
Spectral-hashing-based Image Retrieval and Copy-move Forgery Detection
Australian Journal of Forensic Sciences, Taylor & Francis, 2016, pp. 1-16
DOI: 10.1080/00450618.2015.1128966
BibTeX@article{Granty2016, author = {Granty, Regina Elwin J. and Kousalya, G.}, title = {Spectral-hashing-based Image Retrieval and Copy-move Forgery Detection}, journal = {Australian Journal of Forensic Sciences}, publisher = {Taylor & Francis}, year = {2016}, pages = {1--16}}
-
USM Sharpening Detection Based on Sparse Coding
Proc. Int. Conf. Digital Image Computing: Techniques and Applications (DICTA)
2016, pp. 1-5
DOI: 10.1109/DICTA.2016.7797092
BibTeX@inproceedings{Gu2016, author = {Gu, Y. and Wang, S. and Lin, X. and Sun, T.}, title = {USM Sharpening Detection Based on Sparse Coding}, booktitle = {Proc. Int. Conf. Digital Image Computing: Techniques and Applications (DICTA)}, year = {2016}, pages = {1--5}}
-
Highlighting Image Tampering by Feature Extraction Based on Image Quality Deterioration
Proc. 3rd Int. Conf. Computing for Sustainable Global Development (INDIACom)
2016, pp. 2362-2367
BibTeX@inproceedings{Gupta2016, author = {Gupta, S. and Sandhu, P. S.}, title = {Highlighting Image Tampering by Feature Extraction Based on Image Quality Deterioration}, booktitle = {Proc. 3rd Int. Conf. Computing for Sustainable Global Development (INDIACom)}, year = {2016}, pages = {2362--2367}}
-
Efficient Markov Feature Extraction Method for Image Splicing Detection Using Maximization and Threshold Expansion
Journal of Electronic Imaging, 2016, Vol. 25(2), pp. 023031
DOI: 10.1117/1.JEI.25.2.023031
BibTeX@article{Han2016, author = {Han, Jong Goo and Park, Tae Hee and Moon, Yong Ho and Eom, Il Kyu}, title = {Efficient Markov Feature Extraction Method for Image Splicing Detection Using Maximization and Threshold Expansion}, journal = {Journal of Electronic Imaging}, year = {2016}, volume = {25}, number = {2}, pages = {023031}}
-
Selective Feature Extraction Method between Markov Transition Probability and Co-occurrence Probability for Image Splicing Detection
Journal of the Korea Institute of Information and Communication Engineering, The Korean Institute of Information and Communication Sciences, 2016, Vol. 20(4), pp. 833-839
DOI: 10.6109/jkiice.2016.20.4.833
BibTeX@article{Han2016a, author = {Han, Jong-Goo and Eom, Il-Kyu and Moon, Yong-Ho and Ha, Seok-Wun}, title = {Selective Feature Extraction Method between Markov Transition Probability and Co-occurrence Probability for Image Splicing Detection}, journal = {Journal of the Korea Institute of Information and Communication Engineering}, publisher = {The Korean Institute of Information and Communication Sciences}, year = {2016}, volume = {20}, number = {4}, pages = {833--839}}
-
Fuzzy Based Image Forensic Tool for Detection and Classification of Image Cloning
International Journal of Computational Intelligence Systems, 2016, Vol. 9(2), pp. 351-375
DOI: 10.1080/18756891.2016.1161364
BibTeX@article{Hashmi2016, author = {Hashmi, Mohammad Farukh and Keskara, Avinash G. and Yadav, Vikas}, title = {Fuzzy Based Image Forensic Tool for Detection and Classification of Image Cloning}, journal = {International Journal of Computational Intelligence Systems}, year = {2016}, volume = {9}, number = {2}, pages = {351--375}}
-
Digital Photography Analysis: Analytical Framework for Measuring the Effects of Saturation on Photo Response Non-uniformity
University of Central Florida, University of Central Florida, 2016
BibTeX@mastersthesis{Henry2016, author = {Henry, Kris}, title = {Digital Photography Analysis: Analytical Framework for Measuring the Effects of Saturation on Photo Response Non-uniformity}, school = {University of Central Florida}, year = {2016}}
-
Assessing and Improving the Identification of Computer-generated Portraits
ACM Trans. Appl. Percept., ACM, 2016, Vol. 13(2), pp. 71-712
DOI: 10.1145/2871714
BibTeX@article{Holmes2016, author = {Holmes, Olivia and Banks, Martin S. and Farid, Hany}, title = {Assessing and Improving the Identification of Computer-generated Portraits}, journal = {ACM Trans. Appl. Percept.}, publisher = {ACM}, year = {2016}, volume = {13}, number = {2}, pages = {71--712}}
-
Detection of Hue Modification Using Photo Response Non-uniformity
IEEE Transactions on Circuits and Systems for Video Technology, 2016, Vol. PP(99), pp. 1-1
DOI: 10.1109/TCSVT.2016.2539828
BibTeX@article{Hou2016, author = {Hou, J. U. and Lee, H. K.}, title = {Detection of Hue Modification Using Photo Response Non-uniformity}, journal = {IEEE Transactions on Circuits and Systems for Video Technology}, year = {2016}, volume = {PP}, number = {99}, pages = {1--1}}
-
Posterior distributions for likelihood ratios in forensic science
Science & Justice, Elsevier BV, 2016, Vol. 56(5), pp. 397-401
DOI: 10.1016/j.scijus.2016.06.011
BibTeX@article{VandenHout2016, author = {van den Hout, Ardo and Alberink, Ivo}, title = {Posterior distributions for likelihood ratios in forensic science}, journal = {Science & Justice}, publisher = {Elsevier BV}, year = {2016}, volume = {56}, number = {5}, pages = {397--401}}
-
On Digital Image Trustworthiness
Applied Soft Computing, Elsevier BV, 2016, Vol. 48, pp. 240-253
DOI: 10.1016/j.asoc.2016.07.010
BibTeX@article{Hu2016c, author = {Hu, Donghui and Zhang, Xiaotian and Fan, Yuqi and Zhao, Zhong-Qiu and Wang, Lina and Wu, Xintao and Wu, Xindong}, title = {On Digital Image Trustworthiness}, journal = {Applied Soft Computing}, publisher = {Elsevier BV}, year = {2016}, volume = {48}, pages = {240--253}}
-
Effective Image Forgery Detection of Tampered Foreground or Background Image Based on Image Watermarking and Alpha Mattes
Multimedia Tools and Applications, Springer, 2016, Vol. 75(6), pp. 3495
DOI: 10.1007/s11042-015-2449-0
BibTeX@article{Hu2016, author = {Hu, Wu-Chih and Chen, Wei-Hao and Huang, Deng-Yuan and Yang, Ching-Yu}, title = {Effective Image Forgery Detection of Tampered Foreground or Background Image Based on Image Watermarking and Alpha Mattes}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2016}, volume = {75}, number = {6}, pages = {3495}}
-
Detecting Video Forgery by Estimating Extrinsic Camera Parameters
Digital-Forensics and Watermarking, Springer, 2016
DOI: 10.1007/978-3-319-31960-5_3
BibTeX@article{Hu2016a, author = {Hu, Xianglei and Ni, Jiangqun and Pan, Runbiao}, title = {Detecting Video Forgery by Estimating Extrinsic Camera Parameters}, journal = {Digital-Forensics and Watermarking}, publisher = {Springer}, year = {2016}}
-
Probability-based Reversible Image Authentication Scheme for Image Demosaicking
Future Generation Computer Systems, Elsevier BV, 2016, Vol. 62, pp. 92-103
DOI: 10.1016/j.future.2016.04.001
BibTeX@article{Hu2016b, author = {Hu, Yu-Chen and Lo, Chun-Chi and Chen, Wu-Lin}, title = {Probability-based Reversible Image Authentication Scheme for Image Demosaicking}, journal = {Future Generation Computer Systems}, publisher = {Elsevier BV}, year = {2016}, volume = {62}, pages = {92--103}}
-
Source Camera Identification with Imbalanced Training Dataset
IJDTA, Science and Engineering Research Support Society, 2016, Vol. 9(1), pp. 205-214
DOI: 10.14257/ijdta.2016.9.2.22
BibTeX@article{Huang2016, author = {Huang, Yonggang and Zhang, Jun and Lan, Xinkai}, title = {Source Camera Identification with Imbalanced Training Dataset}, journal = {IJDTA}, publisher = {Science and Engineering Research Support Society}, year = {2016}, volume = {9}, number = {1}, pages = {205--214}}
-
Improving the Computational Cost for Copied Region Detection in Forensic Images
JOURNAL OF SCIENCE AND TECHNOLOGY: ISSUE ON INFORMATION AND COMMUNICATIONS TECHNOLOGY, 2016, Vol. 2(1), pp. 55-63
BibTeX@article{Huynh-Kha2016, author = {Huynh-Kha, Tu and Le-Tien, Thuong and Ha, Synh and Huynh-Van, Khoa}, title = {Improving the Computational Cost for Copied Region Detection in Forensic Images}, journal = {JOURNAL OF SCIENCE AND TECHNOLOGY: ISSUE ON INFORMATION AND COMMUNICATIONS TECHNOLOGY}, year = {2016}, volume = {2}, number = {1}, pages = {55--63}}
-
Gaussian filtering detection based on features of residuals in image forensics
Proc. and Vision for the Future (RIVF) 2016 IEEE RIVF Int. Conf. Computing Communication Technologies, Research, Innovation
2016, pp. 153-157
DOI: 10.1109/RIVF.2016.7800286
BibTeX@inproceedings{Hwang2016a, author = {Hwang, J. J. and Rhee, K. H.}, title = {Gaussian filtering detection based on features of residuals in image forensics}, booktitle = {Proc. and Vision for the Future (RIVF) 2016 IEEE RIVF Int. Conf. Computing Communication Technologies, Research, Innovation}, year = {2016}, pages = {153--157}}
-
A Method of Identifying Digital Images with Geometric Distortion
Australian Journal of Forensic Sciences, 2016
DOI: 10.1080/00450618.2015.1128970
BibTeX@article{Hwang2016, author = {gu Hwang, Min and , Sung min Kim and hwan Har, Dong}, title = {A Method of Identifying Digital Images with Geometric Distortion}, journal = {Australian Journal of Forensic Sciences}, year = {2016}}
-
A key point based copy-move forgery detection using HOG features
Proc. Power and Computing Technologies (ICCPCT) 2016 Int. Conf. Circuit
2016, pp. 1-6
DOI: 10.1109/ICCPCT.2016.7530253
BibTeX@inproceedings{Isaac2016, author = {Isaac, M. M. and Wilscy, M.}, title = {A key point based copy-move forgery detection using HOG features}, booktitle = {Proc. Power and Computing Technologies (ICCPCT) 2016 Int. Conf. Circuit}, year = {2016}, pages = {1--6}}
-
Image Forensics in the Wild
Universit`a di Firenze, Universit`a di Perugia, INdAM consorziate nel CIAFM, Universit`a di Firenze, Universit`a di Perugia, INdAM consorziate nel CIAFM, 2016
BibTeX@phdthesis{Iuliani2016a, author = {Iuliani, Massimo}, title = {Image Forensics in the Wild}, school = {Universit`a di Firenze, Universit`a di Perugia, INdAM consorziate nel CIAFM}, year = {2016}}
-
Reliability Assessment of Principal Point Estimates for Forensic Applications
Journal of Visual Communication and Image Representation, Elsevier BV, 2016
DOI: 10.1016/j.jvcir.2016.11.010
BibTeX@article{Iuliani2016, author = {Iuliani, Massimo and Fanfani, Marco and Colombo, Carlo and Piva, Alessandro}, title = {Reliability Assessment of Principal Point Estimates for Forensic Applications}, journal = {Journal of Visual Communication and Image Representation}, publisher = {Elsevier BV}, year = {2016}}
-
An Evolution of Image Source Camera Attribution Approaches
Forensic Sci Int, Elsevier BV, 2016, Vol. 262, pp. 242275
DOI: 10.1016/j.forsciint.2016.03.035
BibTeX@article{Jahanirad2016, author = {Jahanirad, Mehdi and Wahab, Ainuddin Wahid Abdul and Anuar, Nor Badrul}, title = {An Evolution of Image Source Camera Attribution Approaches}, journal = {Forensic Sci Int}, publisher = {Elsevier BV}, year = {2016}, volume = {262}, pages = {242275}}
-
Image Splicing Detection Using Electromagnetism like Based Descriptor.
Proc. of the SAI Intelligent Systems Conference 2016, 2016
BibTeX@article{Jalab2016, author = {Jalab, Hamid A. and Moghaddasi, Zahra and Hasan, Ali M. and Wakaf, Zouhir}, title = {Image Splicing Detection Using Electromagnetism like Based Descriptor.}, journal = {Proc. of the SAI Intelligent Systems Conference 2016}, year = {2016}}
-
Semi-automatic wavelet soft-thresholding applied to digital image error level analysis
PeerJ Preprints, 2016
DOI: 10.7287/peerj.preprints.2619v1
BibTeX@electronic{Jeronymo2016, author = {Jeronymo, Daniel C.}, title = {Semi-automatic wavelet soft-thresholding applied to digital image error level analysis}, publisher = {PeerJ Preprints}, year = {2016}}
-
Camera Fingerprint: A New Perspective for Identifying User's Identity
arXiv, 2016
BibTeX@article{Jiang2016, author = {Jiang, Xiang and Wei, Shikui and Zhao, Ruizhen and Zhao, Yao and Wu, Xindong}, title = {Camera Fingerprint: A New Perspective for Identifying User's Identity}, journal = {arXiv}, year = {2016}}
-
Image Forgery Detection Algorithm Based on Non Sampling Wavelet Transform and Zernike Moments
International Journal of Security and Its Applications, 2016, Vol. 10(2), pp. 27-38
DOI: 10.14257/ijsia.2016.10.2.03
BibTeX@article{Jinke2016, author = {Jinke, Xiao}, title = {Image Forgery Detection Algorithm Based on Non Sampling Wavelet Transform and Zernike Moments}, journal = {International Journal of Security and Its Applications}, year = {2016}, volume = {10}, number = {2}, pages = {27--38}}
-
Automatic Image Splicing Detection Based on Noise Density Analysis in Raw Images
2016
DOI: 10.1049/ic.2015.0111
BibTeX@unpublished{Julliand2016, author = {Julliand, Thibault and Nozick, Vincent and Talbot, Hugues}, title = {Automatic Image Splicing Detection Based on Noise Density Analysis in Raw Images}, year = {2016}}
-
Image Noise and Digital Image Forensics
Digital-Forensics and Watermarking, Springer, 2016
DOI: 10.1007/978-3-319-31960-5_1
BibTeX@article{Julliand2016a, author = {Julliand, Thibaut and Nozick, Vincent and Talbot, Hugues}, title = {Image Noise and Digital Image Forensics}, journal = {Digital-Forensics and Watermarking}, publisher = {Springer}, year = {2016}}
-
Automatic Image Splicing Detection Based on Noise Density Analysis in Raw Images
Advanced Concepts for Intelligent Vision Systems, Springer, 2016
DOI: 10.1007/978-3-319-48680-2_12
BibTeX@article{Julliand2016b, author = {Julliand, Thibault and Nozick, Vincent and Talbot, Hugues}, title = {Automatic Image Splicing Detection Based on Noise Density Analysis in Raw Images}, journal = {Advanced Concepts for Intelligent Vision Systems}, publisher = {Springer}, year = {2016}}
-
Pizzaro: Forensic Analysis and Restoration of Image and Video Data
Forensic Science International, 2016, Vol. 264, pp. 153-166
DOI: 10.1016/j.forsciint.2016.04.027
BibTeX@article{Kamenicky2016, author = {Kamenicky, Jan and Bartos, Michal and Flusser, Jan and Mahdian, Babak and Kotera, Jan and Novozamsky, Adam and Saic, Stanislav and Sroubek, Filip and Sorel, Michal and Zita, Ales and Zitova, Barbara and Sima, Zdenek and Svarc, Petr and Horinek, Jan}, title = {Pizzaro: Forensic Analysis and Restoration of Image and Video Data}, journal = {Forensic Science International}, year = {2016}, volume = {264}, pages = {153--166}}
-
Classification based time-efficient, blind source camera identification for videos
Proc. Int. Conf. Communication and Signal Processing (ICCSP)
2016, pp. 0871-0875
DOI: 10.1109/ICCSP.2016.7754271
BibTeX@inproceedings{Kandepu2016, author = {Kandepu, A. M. and Naskar, R.}, title = {Classification based time-efficient, blind source camera identification for videos}, booktitle = {Proc. Int. Conf. Communication and Signal Processing (ICCSP)}, year = {2016}, pages = {0871--0875}}
-
Copy-move forgery detection using ASIFT
Proc. 1st India Int. Conf. Information Processing (IICIP)
2016, pp. 1-5
DOI: 10.1109/IICIP.2016.7975329
BibTeX@inproceedings{Karsh2016, author = {Karsh, R. K. and Das, A. and Swetha, G. L. and Medhi, A. and Laskar, R. H. and Arya, U. and Agarwal, R. K.}, title = {Copy-move forgery detection using ASIFT}, booktitle = {Proc. 1st India Int. Conf. Information Processing (IICIP)}, year = {2016}, pages = {1--5}}
-
PRNU-based Image Alignment for Defective Pixel Detection
2016
BibTeX@electronic{Kauba2016, author = {Kauba, Christof and Uhl, Andreas}, title = {PRNU-based Image Alignment for Defective Pixel Detection}, year = {2016}}
-
A Passive Blind Approach for Image Splicing Detection Based on Dwt and LBP Histograms
Security in Computing and Communications
Springer, 2016
DOI: 10.1007/978-981-10-2738-3_27
BibTeX@incollection{Kaur2016, author = {Kaur, Mandeep and Gupta, Savita}, title = {A Passive Blind Approach for Image Splicing Detection Based on Dwt and LBP Histograms}, booktitle = {Security in Computing and Communications}, publisher = {Springer}, year = {2016}}
-
A Passive Blind Approach for Image Splicing Detection Based on Dwt and LBP Histograms
Security in Computing and Communications, Springer, 2016
DOI: 10.1007/978-981-10-2738-3_27
BibTeX@article{Kaur2016a, author = {Kaur, Mandeep and Gupta, Savita}, title = {A Passive Blind Approach for Image Splicing Detection Based on Dwt and LBP Histograms}, journal = {Security in Computing and Communications}, publisher = {Springer}, year = {2016}}
-
Detection of Seam Carved Image Based on Additional Seam Carving Behavior
International Journal of Signal Processing, Image Processing and Pattern Recognition, 2016, Vol. 9(2), pp. 167-178
DOI: 10.14257/ijsip.2016.9.2.15
BibTeX@article{Ke2016, author = {Ke, Yongzhen and Shan, Qingqing and Qin, Fan and Min, Weidong and Guo, Jing}, title = {Detection of Seam Carved Image Based on Additional Seam Carving Behavior}, journal = {International Journal of Signal Processing, Image Processing and Pattern Recognition}, year = {2016}, volume = {9}, number = {2}, pages = {167--178}}
-
Improved DSIFT Descriptor Based Copy-rotate-move Forgery Detection
Image and Video Technology, Springer, 2016
DOI: 10.1007/978-3-319-29451-3_51
BibTeX@article{Khayeat2016, author = {Khayeat, Ali Retha Hasoon and Sun, Xianfang and Rosin, Paul L.}, title = {Improved DSIFT Descriptor Based Copy-rotate-move Forgery Detection}, journal = {Image and Video Technology}, publisher = {Springer}, year = {2016}}
-
Building a Database of Dqt Information to Identify a Source of the Smartphone JPEG Image File
Journal of the Korea Institute of Information Security and Cryptology, Korea Institute of Information Security and Cryptology, 2016, Vol. 26(2), pp. 359-367
DOI: 10.13089/JKIISC.2016.26.2.359
BibTeX@article{Kim2016, author = {Kim}, title = {Building a Database of Dqt Information to Identify a Source of the Smartphone JPEG Image File}, journal = {Journal of the Korea Institute of Information Security and Cryptology}, publisher = {Korea Institute of Information Security and Cryptology}, year = {2016}, volume = {26}, number = {2}, pages = {359--367}}
-
Multiple Heterogeneous JPEG Image Hierarchical Forensic
Advanced Multimedia and Ubiquitous Engineering
Springer, 2016
DOI: 10.1007/978-981-10-1536-6_66
BibTeX@incollection{Kong2016, author = {Kong, Xiangwei and Wang, Bo and Yang, Mingliang and Feng, Yue}, title = {Multiple Heterogeneous JPEG Image Hierarchical Forensic}, booktitle = {Advanced Multimedia and Ubiquitous Engineering}, publisher = {Springer}, year = {2016}}
-
Improved Tampering Localization in Digital Image Forensics Based on Maximal Entropy Random Walk
IEEE Signal Processing Letters, 2016, Vol. 23(1), pp. 169-173
DOI: 10.1109/LSP.2015.2507598
BibTeX@article{Korus2016, author = {Korus, P. and Huang, J.}, title = {Improved Tampering Localization in Digital Image Forensics Based on Maximal Entropy Random Walk}, journal = {IEEE Signal Processing Letters}, year = {2016}, volume = {23}, number = {1}, pages = {169--173}}
-
Multi-scale Fusion for Improved Localization of Malicious Tampering in Digital Images
IEEE Transactions on Image Processing, 2016, Vol. 25(3), pp. 1312-1326
DOI: 10.1109/TIP.2016.2518870
BibTeX@article{Korus2016a, author = {Korus, P. and Huang, J.}, title = {Multi-scale Fusion for Improved Localization of Malicious Tampering in Digital Images}, journal = {IEEE Transactions on Image Processing}, year = {2016}, volume = {25}, number = {3}, pages = {1312--1326}}
-
Multi-scale Analysis Strategies in PRNU-based Tampering Localization
IEEE Transactions on Information Forensics and Security, 2016, Vol. PP(99), pp. 1
DOI: 10.1109/TIFS.2016.2636089
BibTeX@article{Korus2016b, author = {Korus, P. and Huang, J.}, title = {Multi-scale Analysis Strategies in PRNU-based Tampering Localization}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2016}, volume = {PP}, number = {99}, pages = {1}}
-
Evaluation of random field models in multi-modal unsupervised tampering localization
Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)
2016, pp. 1-6
DOI: 10.1109/WIFS.2016.7823898
BibTeX@inproceedings{Korus2016c, author = {Korus, P. and Huang, J.}, title = {Evaluation of random field models in multi-modal unsupervised tampering localization}, booktitle = {Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)}, year = {2016}, pages = {1--6}}
-
Improved Tampering Localization in Digital Image Forensics Based on Maximal Entropy Random Walk
IEEE Signal Processing Letters, 2016, Vol. 23(1), pp. 169-173
DOI: 10.1109/LSP.2015.2507598
BibTeX@article{Korus2016d, author = {Korus, P. and Huang, J.}, title = {Improved Tampering Localization in Digital Image Forensics Based on Maximal Entropy Random Walk}, journal = {IEEE Signal Processing Letters}, year = {2016}, volume = {23}, number = {1}, pages = {169--173}}
-
Identifying Photo Forgery using Lighting Elements
Indian Journal of Science and Technology, Indian Society for Education and Environment, 2016, Vol. 9(48)
DOI: 10.17485/ijst/2016/v9i48/105748
BibTeX@article{Kumar2016, author = {Kumar, Manoj and Srivastava, Sangeet}, title = {Identifying Photo Forgery using Lighting Elements}, journal = {Indian Journal of Science and Technology}, publisher = {Indian Society for Education and Environment}, year = {2016}, volume = {9}, number = {48}}
-
A Fast Keypoint Based Hybrid Method for Copy Move Forgery Detection
ArXiv, 2016
DOI: 10.12785/ijcds/040203
BibTeX@article{Kumar2016a, author = {Kumar, Sunil and Desai, J. V. and Mukherjee, Shaktidev}, title = {A Fast Keypoint Based Hybrid Method for Copy Move Forgery Detection}, journal = {ArXiv}, year = {2016}}
-
Copy-Move Forgery Detection Using Color Space and Moment Invariants-Based Features
Proc. Int. Conf. Digital Image Computing: Techniques and Applications (DICTA)
2016, pp. 1-6
DOI: 10.1109/DICTA.2016.7797027
BibTeX@inproceedings{Kushol2016, author = {Kushol, R. and Salekin, M. S. and Kabir, M. H. and Khan, A. A.}, title = {Copy-Move Forgery Detection Using Color Space and Moment Invariants-Based Features}, booktitle = {Proc. Int. Conf. Digital Image Computing: Techniques and Applications (DICTA)}, year = {2016}, pages = {1--6}}
-
Remote Sensing Data Copy-move Forgery Protection Algorithm
Computer Vision and Graphics, Springer, 2016
DOI: 10.1007/978-3-319-46418-3_48
BibTeX@article{Kuznetsov2016, author = {Kuznetsov, Andrey}, title = {Remote Sensing Data Copy-move Forgery Protection Algorithm}, journal = {Computer Vision and Graphics}, publisher = {Springer}, year = {2016}}
-
Copy - Move Detection Algorithm Efficiency Increase Using Binary Space Partitioning Trees
Information Technology and Nanotechnolog, 2016
DOI: 10.18287/1613-0073-2016-1638-373-378
BibTeX@article{Kuznetsov2016b, author = {Kuznetsov, A. and Myasnikov, E.}, title = {Copy - Move Detection Algorithm Efficiency Increase Using Binary Space Partitioning Trees}, journal = {Information Technology and Nanotechnolog}, year = {2016}}
-
A Copy-move Detection Algorithm Using Binary Gradient Contours
Image Analysis and Recognition, Springer, 2016
DOI: 10.1007/978-3-319-41501-7_40
BibTeX@article{Kuznetsov2016c, author = {Kuznetsov, Andrey and Myasnikov, Vladislav}, title = {A Copy-move Detection Algorithm Using Binary Gradient Contours}, journal = {Image Analysis and Recognition}, publisher = {Springer}, year = {2016}}
-
New Algorithms for Verifying the Consistency between Satellite Images and Survey Conditions
Pattern Recognition and Image Analysis, Springer, 2016, Vol. 26(3), pp. 593
DOI: 10.1134/S1054661816030135
BibTeX@article{Kuznetsov2016a, author = {Kuznetsov, A. V. and Myasnikov, V. V.}, title = {New Algorithms for Verifying the Consistency between Satellite Images and Survey Conditions}, journal = {Pattern Recognition and Image Analysis}, publisher = {Springer}, year = {2016}, volume = {26}, number = {3}, pages = {593}}
-
Sensor Pattern Noise Estimation Based on Improved Locally Adaptive DCT Filtering and Weighted Averaging for Source Camera Identification and Verification
IEEE Transactions on Information Forensics and Security, 2016, Vol. PP(99), pp. 1
DOI: 10.1109/TIFS.2016.2620280
BibTeX@article{Lawgely2016, author = {Lawgely, A. and Khelifi, F.}, title = {Sensor Pattern Noise Estimation Based on Improved Locally Adaptive DCT Filtering and Weighted Averaging for Source Camera Identification and Verification}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2016}, volume = {PP}, number = {99}, pages = {1}}
-
Imaging Device Identification using Sensor Pattern Noise Based on Wiener Filtering
2016
BibTeX@article{Lee2016c, author = {Lee, Hae-Yeoun}, title = {Imaging Device Identification using Sensor Pattern Noise Based on Wiener Filtering}, year = {2016}}
-
Camera Identification of Dibr-based Stereoscopic Image Using Sensor Pattern Noise
Journal of the Korea Institute of Military Science and Technology, The Korea Institute of Military Science and Technology, 2016, Vol. 19(1), pp. 66-75
DOI: 10.9766/KIMST.2016.19.1.066
BibTeX@article{Lee2016, author = {Lee, Jun-Hee}, title = {Camera Identification of Dibr-based Stereoscopic Image Using Sensor Pattern Noise}, journal = {Journal of the Korea Institute of Military Science and Technology}, publisher = {The Korea Institute of Military Science and Technology}, year = {2016}, volume = {19}, number = {1}, pages = {66--75}}
-
A Study on the Evidence Investigation of Forged/modulated Time-stamp at iOS(iPhone, iPad)
KIPS Transactions on Computer and Communication Systems, Korea Information Processing Society, 2016, Vol. 5(7), pp. 173-180
DOI: 10.3745/KTCCS.2016.5.7.173
BibTeX@article{Lee2016a, author = {Lee, Sanghyun and Lee, Yunho and Lee, Sangjin}, title = {A Study on the Evidence Investigation of Forged/modulated Time-stamp at iOS(iPhone, iPad)}, journal = {KIPS Transactions on Computer and Communication Systems}, publisher = {Korea Information Processing Society}, year = {2016}, volume = {5}, number = {7}, pages = {173--180}}
-
Video Acquisition Device Identification using Sensor Pattern Noise
International Journal of Applied Engineering Research, 2016
BibTeX@article{Lee2016b, author = {Lee, Sang-Hyeong and Kim, Dong-Hyun and Lee, Hae Yeoun}, title = {Video Acquisition Device Identification using Sensor Pattern Noise}, journal = {International Journal of Applied Engineering Research}, year = {2016}}
-
Color Space Identification from Single Images
Proc. IEEE Int. Symp. Circuits and Systems (ISCAS)
2016, pp. 1774-1777
DOI: 10.1109/ISCAS.2016.7538912
BibTeX@inproceedings{Li2016c, author = {Li, H. and Kot, A. C. and Li, L.}, title = {Color Space Identification from Single Images}, booktitle = {Proc. IEEE Int. Symp. Circuits and Systems (ISCAS)}, year = {2016}, pages = {1774--1777}}
-
Identification of Various Image Operations Using Residual-based Features
IEEE Transactions on Circuits and Systems for Video Technology, 2016, Vol. PP(99), pp. 1
DOI: 10.1109/TCSVT.2016.2599849
BibTeX@article{Li2016d, author = {Li, H. and Luo, W. and Qiu, X. and Huang, J.}, title = {Identification of Various Image Operations Using Residual-based Features}, journal = {IEEE Transactions on Circuits and Systems for Video Technology}, year = {2016}, volume = {PP}, number = {99}, pages = {1}}
-
A Qdct- and Svd-based Color Image Watermarking Scheme Using an Optimized Encrypted Binary Computer-generated Hologram
Soft Computing, Springer, 2016, pp. 1
DOI: 10.1007/s00500-016-2320-x
BibTeX@article{Li2016b, author = {Li, Jianzhong and Lin, Qun and Yu, Chuying and Ren, Xuechang and Li, Ping}, title = {A Qdct- and Svd-based Color Image Watermarking Scheme Using an Optimized Encrypted Binary Computer-generated Hologram}, journal = {Soft Computing}, publisher = {Springer}, year = {2016}, pages = {1}}
-
Keypoint-based Copy-move Detection Scheme by Adopting Mscrs and Improved Feature Matching
Multimedia Tools and Applications, Springer, 2016, pp. 1
DOI: 10.1007/s11042-016-3967-0
BibTeX@article{Li2016a, author = {Li, Jingwei and Yang, Fan and Lu, Wei and Sun, Wei}, title = {Keypoint-based Copy-move Detection Scheme by Adopting Mscrs and Improved Feature Matching}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2016}, pages = {1}}
-
An Effective Detection Method Based on Physical Traits of Recaptured Images on LCD Screens
Digital-Forensics and Watermarking, Springer, 2016
DOI: 10.1007/978-3-319-31960-5_10
BibTeX@article{Li2016f, author = {Li, Ruihan and Ni, Rongrong and Zhao, Yao}, title = {An Effective Detection Method Based on Physical Traits of Recaptured Images on LCD Screens}, journal = {Digital-Forensics and Watermarking}, publisher = {Springer}, year = {2016}}
-
Image copy-move forgery detection using hierarchical feature point matching
Proc. Asia-Pacific Signal and Information Processing Association Annual Summit and Conf. (APSIPA)
2016, pp. 1-4
DOI: 10.1109/APSIPA.2016.7820758
BibTeX@inproceedings{Li2016g, author = {Li, Y. and Zhou, J.}, title = {Image copy-move forgery detection using hierarchical feature point matching}, booktitle = {Proc. Asia-Pacific Signal and Information Processing Association Annual Summit and Conf. (APSIPA)}, year = {2016}, pages = {1--4}}
-
SIFT Keypoint Removal and Injection Via Convex Relaxation
IEEE Transactions on Information Forensics and Security, 2016, Vol. 11(8), pp. 1722-1735
DOI: 10.1109/TIFS.2016.2553645
BibTeX@article{Li2016, author = {Li, Y. and Zhou, J. and Cheng, A. and Liu, X. and Tang, Y. Y.}, title = {SIFT Keypoint Removal and Injection Via Convex Relaxation}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2016}, volume = {11}, number = {8}, pages = {1722--1735}}
-
Applying Polar Sine Transform for Detecting Copy-move Forgery
Energy Science and Applied Technology ESAT 2016, 2016
BibTeX@article{Lin2016d, author = {Lin, P. and Gan, Y. and Young, J. and Zhao, J. and Lian, H.}, title = {Applying Polar Sine Transform for Detecting Copy-move Forgery}, journal = {Energy Science and Applied Technology ESAT 2016}, year = {2016}}
-
Preprocessing Reference Sensor Pattern Noise Via Spectrum Equalization
IEEE Transactions on Information Forensics and Security, 2016, Vol. 11(1), pp. 126-140
DOI: 10.1109/TIFS.2015.2478748
BibTeX@article{Lin2016, author = {Lin, X. and Li, C.}, title = {Preprocessing Reference Sensor Pattern Noise Via Spectrum Equalization}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2016}, volume = {11}, number = {1}, pages = {126--140}}
-
Enhancing Sensor Pattern Noise Via Filtering Distortion Removal
IEEE Signal Processing Letters, 2016, Vol. 23(3), pp. 381-385
DOI: 10.1109/LSP.2016.2521349
BibTeX@article{Lin2016a, author = {Lin, X. and Li, C. T.}, title = {Enhancing Sensor Pattern Noise Via Filtering Distortion Removal}, journal = {IEEE Signal Processing Letters}, year = {2016}, volume = {23}, number = {3}, pages = {381--385}}
-
Refining PRNU-based Detection of Image Forgeries
Proc. Digital Media Industry Academic Forum (DMIAF)
2016, pp. 222-226
DOI: 10.1109/DMIAF.2016.7574937
BibTeX@inproceedings{Lin2016b, author = {Lin, X. and Li, C. T.}, title = {Refining PRNU-based Detection of Image Forgeries}, booktitle = {Proc. Digital Media Industry Academic Forum (DMIAF)}, year = {2016}, pages = {222--226}}
-
Preprocessing Reference Sensor Pattern Noise Via Spectrum Equalization
IEEE Transactions on Information Forensics and Security, 2016, Vol. 11(1), pp. 126-140
DOI: 10.1109/TIFS.2015.2478748
BibTeX@article{Lin2016c, author = {Lin, X. and Li, C. T.}, title = {Preprocessing Reference Sensor Pattern Noise Via Spectrum Equalization}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2016}, volume = {11}, number = {1}, pages = {126--140}}
-
Preprocessing Reference Sensor Pattern Noise via Spectrum Equalization
IEEE Transactions on Information Forensics and Security, 2016, Vol. 11(1), pp. 126-140
DOI: 10.1109/TIFS.2015.2478748
BibTeX@article{Lin2016f, author = {Lin, X. and Li, C. T.}, title = {Preprocessing Reference Sensor Pattern Noise via Spectrum Equalization}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2016}, volume = {11}, number = {1}, pages = {126--140}}
-
Image provenance inference through content-based device fingerprint analysis
Chapter 9
2016
BibTeX@electronic{Lin2016e, author = {Lin, Xufeng and Li, Chang-Tsun}, title = {Image provenance inference through content-based device fingerprint analysis}, year = {2016}}
-
An Experimental Study on Block DCT Coefficient Analysis for Image Splicing Detection
Proc. IEEE First Int. Conf. Data Science in Cyberspace (DSC)
2016, pp. 69-73
DOI: 10.1109/DSC.2016.38
BibTeX@inproceedings{Lin2016g, author = {Lin, X. and Wang, S. L. and Huang, W. J. and Lai, J. Y.}, title = {An Experimental Study on Block DCT Coefficient Analysis for Image Splicing Detection}, booktitle = {Proc. IEEE First Int. Conf. Data Science in Cyberspace (DSC)}, year = {2016}, pages = {69--73}}
-
Smooth filtering identification based on convolutional neural networks
Multimedia Tools and Applications, Springer Nature, 2016
DOI: 10.1007/s11042-016-4251-z
BibTeX@article{Liu2016a, author = {Liu, Anan and Zhao, Zhengyu and Zhang, Chengqian and Su, Yuting}, title = {Smooth filtering identification based on convolutional neural networks}, journal = {Multimedia Tools and Applications}, publisher = {Springer Nature}, year = {2016}}
-
Exposing Seam Carving Forgery under Recompression Attacks by Hybrid Large Feature Mining
International Conference on Pattern Recognition, At Cancun
2016
BibTeX@conference{Liu2016, author = {Liu, Qingzhong}, title = {Exposing Seam Carving Forgery under Recompression Attacks by Hybrid Large Feature Mining}, booktitle = {International Conference on Pattern Recognition, At Cancun}, year = {2016}}
-
Exposing Inpainting Forgery in JPEG Images under Recompression Attacks
Proc. 15th IEEE Int. Conf. Machine Learning and Applications (ICMLA)
2016, pp. 164-169
DOI: 10.1109/ICMLA.2016.0035
BibTeX@inproceedings{Liu2016b, author = {Liu, Q. and Sung, A. H. and Zhou, B. and Qiao, M.}, title = {Exposing Inpainting Forgery in JPEG Images under Recompression Attacks}, booktitle = {Proc. 15th IEEE Int. Conf. Machine Learning and Applications (ICMLA)}, year = {2016}, pages = {164--169}}
-
A novel dual-threshold SIFT-based copy-move forgery detection
Proc. Asia-Pacific Signal and Information Processing Association Annual Summit and Conf. (APSIPA)
2016, pp. 1-5
DOI: 10.1109/APSIPA.2016.7820872
BibTeX@inproceedings{Luan2016, author = {Luan, H. and Law, N. F.}, title = {A novel dual-threshold SIFT-based copy-move forgery detection}, booktitle = {Proc. Asia-Pacific Signal and Information Processing Association Annual Summit and Conf. (APSIPA)}, year = {2016}, pages = {1--5}}
-
Copy-move Forgery Detection Technique for Forensic Analysis in Digital Images
Mathematical Problems in Engineering, 2016
DOI: 10.1109/icet.2015.7389169
BibTeX@article{Mahmood2016, author = {Mahmood, Toqeer and Nawaz, Tabassam and Irtaza, Aun and Ashraf, Rehan and Shah, Mohsin and Mahmood, Muhammad Tariq}, title = {Copy-move Forgery Detection Technique for Forensic Analysis in Digital Images}, journal = {Mathematical Problems in Engineering}, year = {2016}}
-
Forensic analysis of copy-move forgery in digital images using the stationary wavelets
Proc. Sixth Int. Conf. Innovative Computing Technology (INTECH)
2016, pp. 578-583
DOI: 10.1109/INTECH.2016.7845040
BibTeX@inproceedings{Mahmood2016a, author = {Mahmood, T. and Nawaz, T. and Mehmood, Z. and Khan, Z. and Shah, M. and Ashraf, R.}, title = {Forensic analysis of copy-move forgery in digital images using the stationary wavelets}, booktitle = {Proc. Sixth Int. Conf. Innovative Computing Technology (INTECH)}, year = {2016}, pages = {578--583}}
-
Moment Based Copy Move Forgery Detection Methods
International Journal of Computer Science and Information Security (IJCSIS), 2016
BibTeX@article{Mahmoud2016, author = {Mahmoud, Khaled W. and Al-Rukab, Arwa Husien Abu}, title = {Moment Based Copy Move Forgery Detection Methods}, journal = {International Journal of Computer Science and Information Security (IJCSIS)}, year = {2016}}
-
An Image Forensic Technique for Detection of Copy-move Forgery in Digital Image
Security in Computing and Communications
Springer, 2016
DOI: 10.1007/978-981-10-2738-3_28
BibTeX@incollection{Malviya2016a, author = {Malviya, Ashwini and Ladhake, Siddharth}, title = {An Image Forensic Technique for Detection of Copy-move Forgery in Digital Image}, booktitle = {Security in Computing and Communications}, publisher = {Springer}, year = {2016}}
-
Pixel Based Image Forensic Technique for Copy-move Forgery Detection Using Auto Color Correlogram
Procedia Computer Science, 2016, Vol. 79, pp. 383-390
DOI: 10.1016/j.procs.2016.03.050
BibTeX@article{Malviya2016, author = {Malviya, Ashwini V. and Ladhake, Siddharth A.}, title = {Pixel Based Image Forensic Technique for Copy-move Forgery Detection Using Auto Color Correlogram}, journal = {Procedia Computer Science}, year = {2016}, volume = {79}, pages = {383--390}}
-
Region duplication detection using color histogram and moments in digital image
Proc. Int. Conf. Inventive Computation Technologies (ICICT)
2016, Vol. 1, pp. 1-4
DOI: 10.1109/INVENTIVE.2016.7823199
BibTeX@inproceedings{Malviya2016b, author = {Malviya, A. V. and Ladhake, S. A.}, title = {Region duplication detection using color histogram and moments in digital image}, booktitle = {Proc. Int. Conf. Inventive Computation Technologies (ICICT)}, year = {2016}, volume = {1}, pages = {1--4}}
-
Improved copy-move forgery detection in image by feature extraction with KPCA and adaptive method
Proc. 2nd Int. Conf. Next Generation Computing Technologies (NGCT)
2016, pp. 694-703
DOI: 10.1109/NGCT.2016.7877501
BibTeX@inproceedings{Mangat2016, author = {Mangat, S. S. and Kaur, H.}, title = {Improved copy-move forgery detection in image by feature extraction with KPCA and adaptive method}, booktitle = {Proc. 2nd Int. Conf. Next Generation Computing Technologies (NGCT)}, year = {2016}, pages = {694--703}}
-
A Context Dependent Fragile Watermarking Scheme for Tamper Detection from Demosaicked Color Images
Proceedings of the Tenth Indian Conference on Computer Vision, Graphics and Image Processing
ACM, 2016, pp. 611-618
DOI: 10.1145/3009977.3009987
BibTeX@inproceedings{Manikandan2016, author = {Manikandan, V. M. and Masilamani, V.}, title = {A Context Dependent Fragile Watermarking Scheme for Tamper Detection from Demosaicked Color Images}, booktitle = {Proceedings of the Tenth Indian Conference on Computer Vision, Graphics and Image Processing}, publisher = {ACM}, year = {2016}, pages = {611--618}}
-
Detection of Copy-move Forgery in Images Using Segmentation and SURF
Advances in Signal Processing and Intelligent Recognition Systems, Springer, 2016
DOI: 10.1007/978-3-319-28658-7_55
BibTeX@article{Manu2016, author = {Manu, V. T. and Mehtre, B. M.}, title = {Detection of Copy-move Forgery in Images Using Segmentation and SURF}, journal = {Advances in Signal Processing and Intelligent Recognition Systems}, publisher = {Springer}, year = {2016}}
-
A Study of Co-occurrence Based Local Features for Camera Model Identification
Multimedia Tools and Applications, Springer, 2016, pp. 1
DOI: 10.1007/s11042-016-3663-0
BibTeX@article{Marra2016, author = {Marra, Francesco and Poggi, Giovanni and Sansone, Carlo and Verdoliva, Luisa}, title = {A Study of Co-occurrence Based Local Features for Camera Model Identification}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2016}, pages = {1}}
-
Correlation clustering for PRNU-based blind image source identification
Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)
2016, pp. 1-6
DOI: 10.1109/WIFS.2016.7823910
BibTeX@inproceedings{Marra2016a, author = {Marra, F. and Poggi, G. and Sansone, C. and Verdoliva, L.}, title = {Correlation clustering for PRNU-based blind image source identification}, booktitle = {Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)}, year = {2016}, pages = {1--6}}
-
Video Forgery Detection and Localization Using Normalized Cross-correlation of Moment Features
2016 IEEE Southwest Symposium on Image Analysis and Interpretation (SSIAI)
2016, pp. 149-152
DOI: 10.1109/SSIAI.2016.7459197
BibTeX@inproceedings{Mathai2016, author = {Mathai, M. and Rajan, D. and Emmanuel, S.}, title = {Video Forgery Detection and Localization Using Normalized Cross-correlation of Moment Features}, booktitle = {2016 IEEE Southwest Symposium on Image Analysis and Interpretation (SSIAI)}, year = {2016}, pages = {149--152}}
-
Improved Forgery Detection with Lateral Chromatic Aberration
Proc. Speech and Signal Processing (ICASSP) 2016 IEEE Int. Conf. Acoustics
2016, pp. 2024-2028
DOI: 10.1109/ICASSP.2016.7472032
BibTeX@inproceedings{Mayer2016, author = {Mayer, O. and Stamm, M.}, title = {Improved Forgery Detection with Lateral Chromatic Aberration}, booktitle = {Proc. Speech and Signal Processing (ICASSP) 2016 IEEE Int. Conf. Acoustics}, year = {2016}, pages = {2024--2028}}
-
Exposing Splicing Forgeries in Digital Images Through Dichromatic Plane Histogram Discrepancies
Proceedings of the Tenth Indian Conference on Computer Vision, Graphics and Image Processing
ACM, 2016, pp. 621-628
DOI: 10.1145/3009977.3010032
BibTeX@inproceedings{Mazumdar2016, author = {Mazumdar, Aniruddha and Bora, Prabin Kumar}, title = {Exposing Splicing Forgeries in Digital Images Through Dichromatic Plane Histogram Discrepancies}, booktitle = {Proceedings of the Tenth Indian Conference on Computer Vision, Graphics and Image Processing}, publisher = {ACM}, year = {2016}, pages = {621--628}}
-
Sensor Pattern Noise Estimation Using Probabilistically Estimated Raw Values
IEEE Signal Processing Letters, 2016, Vol. 23(5), pp. 693-697
DOI: 10.1109/LSP.2016.2549059
BibTeX@article{Mehrish2016, author = {Mehrish, A. and Subramanyam, A. V. and Emmanuel, S.}, title = {Sensor Pattern Noise Estimation Using Probabilistically Estimated Raw Values}, journal = {IEEE Signal Processing Letters}, year = {2016}, volume = {23}, number = {5}, pages = {693--697}}
-
Phylogenetic Analysis of Near-duplicate Images Using Processing Age Metrics
Proc. Speech and Signal Processing (ICASSP) 2016 IEEE Int. Conf. Acoustics
2016, pp. 2054-2058
DOI: 10.1109/ICASSP.2016.7472038
BibTeX@inproceedings{Milani2016, author = {Milani, S. and Fontana, M. and Bestagini, P. and Tubaro, S.}, title = {Phylogenetic Analysis of Near-duplicate Images Using Processing Age Metrics}, booktitle = {Proc. Speech and Signal Processing (ICASSP) 2016 IEEE Int. Conf. Acoustics}, year = {2016}, pages = {2054--2058}}
-
Improving three-dimensional reconstruction of buildings from web-harvested images using forensic clues
Journal of Electronic Imaging, SPIE-Intl Soc Optical Eng, 2016, Vol. 26(1), pp. 011009
DOI: 10.1117/1.jei.26.1.011009
BibTeX@article{Milani2016a, author = {Milani, Simone and Tronca, Enrico}, title = {Improving three-dimensional reconstruction of buildings from web-harvested images using forensic clues}, journal = {Journal of Electronic Imaging}, publisher = {SPIE-Intl Soc Optical Eng}, year = {2016}, volume = {26}, number = {1}, pages = {011009}}
-
Improving Three-dimensional Reconstruction of Buildings from Web-harvested Images Using Forensic Clues
Journal of Electronic Imaging, SPIE-Intl Soc Optical Eng, 2016, Vol. 26(1), pp. 011009
DOI: 10.1117/1.jei.26.1.011009
BibTeX@article{Milani2016b, author = {Milani, Simone and Tronca, Enrico}, title = {Improving Three-dimensional Reconstruction of Buildings from Web-harvested Images Using Forensic Clues}, journal = {Journal of Electronic Imaging}, publisher = {SPIE-Intl Soc Optical Eng}, year = {2016}, volume = {26}, number = {1}, pages = {011009}}
-
Tampering Localization in Digital Image Using First Two Digit Probability Features
Satapathy, C. S., Mandal, K. J., Udgata, K. S. & Bhateja, V. (ed.)
Information Systems Design and Intelligent Applications: Proceedings of Third International Conference INDIA 2016, Volume 3
Chapter Tampering Localization in Digital Image Using First Two Digit Probability Features
Springer India, 2016, pp. 133-141
DOI: 10.1007/978-81-322-2757-1_15
BibTeX@inbook{Mire2016, author = {Mire, Archana V. and Dhok, Sanjay B. and Mistry, Narendra J. and Porey, Prakash D.}, title = {Tampering Localization in Digital Image Using First Two Digit Probability Features}, booktitle = {Information Systems Design and Intelligent Applications: Proceedings of Third International Conference INDIA 2016, Volume 3}, publisher = {Springer India}, year = {2016}, pages = {133--141}}
-
A new block-based copy-move forgery detection method in digital images
Proc. Int. Conf. Communication and Signal Processing (ICCSP)
2016, pp. 1208-1212
DOI: 10.1109/ICCSP.2016.7754344
BibTeX@inproceedings{Moradi-Gharghani2016, author = {Moradi-Gharghani, H. and Nasri, M.}, title = {A new block-based copy-move forgery detection method in digital images}, booktitle = {Proc. Int. Conf. Communication and Signal Processing (ICCSP)}, year = {2016}, pages = {1208--1212}}
-
Special issue on measuring and reporting the precision of forensic likelihood ratios: Introduction to the debate
Science & Justice, Elsevier BV, 2016, Vol. 56(5), pp. 371-373
DOI: 10.1016/j.scijus.2016.05.002
BibTeX@article{Morrison2016, author = {Morrison, Geoffrey Stewart}, title = {Special issue on measuring and reporting the precision of forensic likelihood ratios: Introduction to the debate}, journal = {Science & Justice}, publisher = {Elsevier BV}, year = {2016}, volume = {56}, number = {5}, pages = {371--373}}
-
Copy Move Forgery Detection Using Gabor Filter and Orb
Proceedings of 2016International Conference on Image Processing, Production and Computer Science (ICIPCS'2016)
2016
BibTeX@conference{Muzaffer2016, author = {Muzaffer, Gul and Makul, Ozge and Ustubioglu, Beste and Ulutas, Guzin}, title = {Copy Move Forgery Detection Using Gabor Filter and Orb}, booktitle = {Proceedings of 2016International Conference on Image Processing, Production and Computer Science (ICIPCS'2016)}, year = {2016}}
-
Digital Image Forgery --- A Threaten to Digital Forensics
Proc. Power and Computing Technologies (ICCPCT) 2016 Int. Conf. Circuit
2016, pp. 1-6
DOI: 10.1109/ICCPCT.2016.7530370
BibTeX@inproceedings{Nampoothiri2016, author = {Nampoothiri, V. P. and Sugitha, N.}, title = {Digital Image Forgery --- A Threaten to Digital Forensics}, booktitle = {Proc. Power and Computing Technologies (ICCPCT) 2016 Int. Conf. Circuit}, year = {2016}, pages = {1--6}}
-
Digital image forgery --- A threaten to digital forensics
Proc. Power and Computing Technologies (ICCPCT) 2016 Int. Conf. Circuit
2016, pp. 1-6
DOI: 10.1109/ICCPCT.2016.7530370
BibTeX@inproceedings{Nampoothiri2016a, author = {Nampoothiri, V. P. and Sugitha, N.}, title = {Digital image forgery --- A threaten to digital forensics}, booktitle = {Proc. Power and Computing Technologies (ICCPCT) 2016 Int. Conf. Circuit}, year = {2016}, pages = {1--6}}
-
A Machine Learning Based Technique for Detecting Digital Image Resampling
Nguyen, T. N., Trawiʼnski, B., Fujita, H. & Hong, T.-P. (ed.)
Intelligent Information and Database Systems: 8th Asian Conference, ACIIDS 2016, Da Nang, Vietnam, March 14-16, 2016, Proceedings, Part II
Chapter A Machine Learning Based Technique for Detecting Digital Image Resampling
Springer Berlin Heidelberg, 2016, pp. 75-84
DOI: 10.1007/978-3-662-49390-8_7
BibTeX@inbook{Nguyen2016, author = {Nguyen, Hieu Cuong}, title = {A Machine Learning Based Technique for Detecting Digital Image Resampling}, booktitle = {Intelligent Information and Database Systems: 8th Asian Conference, ACIIDS 2016, Da Nang, Vietnam, March 14-16, 2016, Proceedings, Part II}, publisher = {Springer Berlin Heidelberg}, year = {2016}, pages = {75--84}}
-
Discriminating between Computer-generated Facial Images and Natural Ones Using Smoothness Property and Local Entropy
Digital-Forensics and Watermarking
Digital-Forensics and Watermarking, Springer, 2016, pp. 39-50
DOI: 10.1007/978-3-319-31960-5_4
BibTeX@article{Nguyen2016a, author = {Nguyen, Huy H. and Nguyen-Son, Hoang-Quoc and Nguyen, Thuc D. and Echizen, Isao}, title = {Discriminating between Computer-generated Facial Images and Natural Ones Using Smoothness Property and Local Entropy}, booktitle = {Digital-Forensics and Watermarking}, journal = {Digital-Forensics and Watermarking}, publisher = {Springer}, year = {2016}, pages = {39--50}}
-
RAW Image Reconstruction Using a Self-Contained sRGB-JPEG Image with Only 64 KB Overhead
Proc. IEEE Conf. Computer Vision and Pattern Recognition (CVPR)
2016, pp. 1655-1663
DOI: 10.1109/CVPR.2016.183
BibTeX@inproceedings{Nguyen2016b, author = {Nguyen, R. M. H. and Brown, M. S.}, title = {RAW Image Reconstruction Using a Self-Contained sRGB-JPEG Image with Only 64 KB Overhead}, booktitle = {Proc. IEEE Conf. Computer Vision and Pattern Recognition (CVPR)}, year = {2016}, pages = {1655--1663}}
-
Key point descriptor based copy and move image forgery detection system
Proc. Second Int. Conf. Science Technology Engineering and Management (ICONSTEM)
2016, pp. 577-581
DOI: 10.1109/ICONSTEM.2016.7560959
BibTeX@inproceedings{Nithiya2016, author = {Nithiya, R. and Veluchamy, S.}, title = {Key point descriptor based copy and move image forgery detection system}, booktitle = {Proc. Second Int. Conf. Science Technology Engineering and Management (ICONSTEM)}, year = {2016}, pages = {577--581}}
-
Compressed Fragile Sensor Noise Fingerprint for Smartphone Identification
Binghamton University State University of New York, Binghamton University State University of New York, 2016
BibTeX@mastersthesis{Nuchu2016, author = {Nuchu, Madhu Sudhan Yadav}, title = {Compressed Fragile Sensor Noise Fingerprint for Smartphone Identification}, school = {Binghamton University State University of New York}, year = {2016}}
-
Multiple Parenting Phylogeny Relationships in Digital Images
IEEE Transactions on Information Forensics and Security, 2016, Vol. 11(2), pp. 328-343
DOI: 10.1109/TIFS.2015.2493989
BibTeX@article{Oliveira2016, author = {de Oliveira, A. A. and Ferrara, P. and Rosa, A. De and Piva, A. and Barni, Mauro and Goldenstein, S. and Dias, Z. and Rocha, A.}, title = {Multiple Parenting Phylogeny Relationships in Digital Images}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2016}, volume = {11}, number = {2}, pages = {328--343}}
-
Scale Invariant Detection of Copy-move Forgery Using Fractal Dimension and Singular Values
Advances in Signal Processing and Intelligent Recognition Systems, Springer, 2016
DOI: 10.1007/978-3-319-28658-7_47
BibTeX@article{Oommen2016, author = {Oommen, Rani Susan and Jayamohan, M. and Sruthy, S.}, title = {Scale Invariant Detection of Copy-move Forgery Using Fractal Dimension and Singular Values}, journal = {Advances in Signal Processing and Intelligent Recognition Systems}, publisher = {Springer}, year = {2016}}
-
Using Fractal Dimension and Singular Values for Image Forgery Detection and Localization
Procedia Technology, Elsevier BV, 2016, Vol. 24, pp. 1452-1459
DOI: 10.1016/j.protcy.2016.05.176
BibTeX@article{Oommen2016a, author = {Oommen, Rani Susan and Jayamohan, M. and Sruthy, S.}, title = {Using Fractal Dimension and Singular Values for Image Forgery Detection and Localization}, journal = {Procedia Technology}, publisher = {Elsevier BV}, year = {2016}, volume = {24}, pages = {1452--1459}}
-
Theia: A Tool for the Forensic Analysis of Mobile Devices Pictures
Computing, Springer Science mathplus Business Media, 2016, pp. 1-36
DOI: 10.1007/s00607-015-0482-5
BibTeX@article{Orozco2016, author = {Orozco, Ana Lucila Sandoval and Corripio, Jocelin Rosales and González, David Manuel Arenas and Villalba, Luis Javier Garc\ia and Hernandez-Castro, Julio}, title = {Theia: A Tool for the Forensic Analysis of Mobile Devices Pictures}, journal = {Computing}, publisher = {Springer Science mathplus Business Media}, year = {2016}, pages = {1--36}}
-
Robust Hashing for Image Authentication Using SIFT Feature and Quaternion Zernike Moments
Multimedia Tools and Applications, Springer, 2016, pp. 1
DOI: 10.1007/s11042-015-3225-x
BibTeX@article{Ouyang2016, author = {Ouyang, Junlin and Liu, Yizhi and Shu, Huazhong}, title = {Robust Hashing for Image Authentication Using SIFT Feature and Quaternion Zernike Moments}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2016}, pages = {1}}
-
Image Splicing Detection Using HMRF-GMM Based Segmentation Technique and Local Noise Variances
INROADS- An International Journal of Jaipur National University, Diva Enterprises Private Limited, 2016, Vol. 5(1s), pp. 223
DOI: 10.5958/2277-4912.2016.00043.6
BibTeX@article{Pandey2016a, author = {Pandey, Ramesh Chand and Prasad, Shiv and Singh, Sanjay Kumar and Shukla, K. K.}, title = {Image Splicing Detection Using HMRF-GMM Based Segmentation Technique and Local Noise Variances}, journal = {INROADS- An International Journal of Jaipur National University}, publisher = {Diva Enterprises Private Limited}, year = {2016}, volume = {5}, number = {1s}, pages = {223}}
-
Passive Forensics in Image and Video Using Noise Features: A Review
Digital Investigation, Elsevier BV, 2016, Vol. 19, pp. 1-28
DOI: 10.1016/j.diin.2016.08.002
BibTeX@article{Pandey2016, author = {Pandey, Ramesh C. and Singh, Sanjay K. and Shukla, Kaushal K.}, title = {Passive Forensics in Image and Video Using Noise Features: A Review}, journal = {Digital Investigation}, publisher = {Elsevier BV}, year = {2016}, volume = {19}, pages = {1--28}}
-
Copy-move forgery detection by using HSV preprocessing and keypoint extraction
Proc. Distributed and Grid Computing (PDGC) 2016 Fourth Int. Conf. Parallel
2016, pp. 264-269
DOI: 10.1109/PDGC.2016.7913156
BibTeX@inproceedings{Panzade2016, author = {Panzade, P. P. and Prakash, C. S. and Maheshkar, S.}, title = {Copy-move forgery detection by using HSV preprocessing and keypoint extraction}, booktitle = {Proc. Distributed and Grid Computing (PDGC) 2016 Fourth Int. Conf. Parallel}, year = {2016}, pages = {264--269}}
-
Rotation and Scale Invariant Upsampled Log-polar Fourier Descriptor for Copy-move Forgery Detection
Multimedia Tools and Applications, Springer, 2016, pp. 1
DOI: 10.1007/s11042-016-3575-z
BibTeX@article{Park2016, author = {Park, Chun-Su and Kim, Changjae and Lee, Jihoon and Kwon, Goo-Rak}, title = {Rotation and Scale Invariant Upsampled Log-polar Fourier Descriptor for Copy-move Forgery Detection}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2016}, pages = {1}}
-
Detecting Digital Image Forgery in Near-infrared Image of Cctv
Multimedia Tools and Applications, Springer, 2016, pp. 1
DOI: 10.1007/s11042-016-3871-7
BibTeX@article{Park2016b, author = {Park, Jin-Seok and Hyun, Dai-Kyung and Hou, Jong-Uk and Kim, Do-Guk and Lee, Heung-Kyu}, title = {Detecting Digital Image Forgery in Near-infrared Image of Cctv}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2016}, pages = {1}}
-
Image Splicing Detection Based on Inter-scale 2d Joint Characteristic Function Moments in Wavelet Domain
EURASIP Journal on Image and Video Processing, 2016, Vol. 2016(1), pp. 1-10
DOI: 10.1186/s13640-016-0136-3
BibTeX@article{Park2016a, author = {Park, Tae Hee and Han, Jong Goo and Moon, Yong Ho and Eom, Il Kyu}, title = {Image Splicing Detection Based on Inter-scale 2d Joint Characteristic Function Moments in Wavelet Domain}, journal = {EURASIP Journal on Image and Video Processing}, year = {2016}, volume = {2016}, number = {1}, pages = {1--10}}
-
An algorithm to detect the forged part in an image
Proc. Int. Conf. Communication and Signal Processing (ICCSP)
2016, pp. 1486-1490
DOI: 10.1109/ICCSP.2016.7754405
BibTeX@inproceedings{Parveen2016, author = {Parveen, A. and Tayal, A.}, title = {An algorithm to detect the forged part in an image}, booktitle = {Proc. Int. Conf. Communication and Signal Processing (ICCSP)}, year = {2016}, pages = {1486--1490}}
-
A Deterministic Approach to Detect Median Filtering in 1D Data
IEEE Transactions on Information Forensics and Security, 2016, Vol. 11(7), pp. 1425-1437
DOI: 10.1109/TIFS.2016.2530636
BibTeX@article{Pasquini2016, author = {Pasquini, C. and Boato, G. and Alajlan, N. and Natale, F. G. B. De}, title = {A Deterministic Approach to Detect Median Filtering in 1D Data}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2016}, volume = {11}, number = {7}, pages = {1425--1437}}
-
Copy move forgery detection
Proc. Int. Conf. Workshop Electronics Telecommunication Engineering (ICWET 2016)
2016, pp. 188-193
DOI: 10.1049/cp.2016.1145
BibTeX@inproceedings{Patankar2016, author = {Patankar, A. B. and Sukhpal, A. and Shetye, S. and Shroff, A.}, title = {Copy move forgery detection}, booktitle = {Proc. Int. Conf. Workshop Electronics Telecommunication Engineering (ICWET 2016)}, year = {2016}, pages = {188--193}}
-
Automatic Detection of 3D Lighting Inconsistencies Via a Facial Landmark Based Morphable Model
Proc. IEEE Int. Conf. Image Processing (ICIP)
2016, pp. 3932-3936
DOI: 10.1109/ICIP.2016.7533097
BibTeX@inproceedings{Peng2016, author = {Peng, B. and Wang, W. and Dong, J. and Tan, T.}, title = {Automatic Detection of 3D Lighting Inconsistencies Via a Facial Landmark Based Morphable Model}, booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)}, year = {2016}, pages = {3932--3936}}
-
Optimized 3D Lighting Environment Estimation for Image Forgery Detection
IEEE Transactions on Information Forensics and Security, 2016, Vol. PP(99), pp. 1
DOI: 10.1109/TIFS.2016.2623589
BibTeX@article{Peng2016a, author = {Peng, B. and Wang, W. and Dong, J. and Tan, T.}, title = {Optimized 3D Lighting Environment Estimation for Image Forgery Detection}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2016}, volume = {PP}, number = {99}, pages = {1}}
-
Fast Sequential Forensic Detection of Camera Fingerprint
Proc. IEEE Int. Conf. Image Processing (ICIP)
2016, pp. 3902-3906
DOI: 10.1109/ICIP.2016.7533091
BibTeX@inproceedings{Perez-Gonzalez2016, author = {Pérez-González, F. and Masciopinto, M. and González-Iglesias, I. and Comesaña, P.}, title = {Fast Sequential Forensic Detection of Camera Fingerprint}, booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)}, year = {2016}, pages = {3902--3906}}
-
Copy-move forgery detection using lexicographical sort
Proc. Distributed and Grid Computing (PDGC) 2016 Fourth Int. Conf. Parallel
2016, pp. 149-153
DOI: 10.1109/PDGC.2016.7913133
BibTeX@inproceedings{Prakash2016, author = {Prakash, C. S. and Maheshkar, S.}, title = {Copy-move forgery detection using lexicographical sort}, booktitle = {Proc. Distributed and Grid Computing (PDGC) 2016 Fourth Int. Conf. Parallel}, year = {2016}, pages = {149--153}}
-
Passive copy-move forgery detection using SIFT, HOG and SURF features
Proc. Information Communication Technology (RTEICT) 2016 IEEE Int. Conf. Recent Trends in Electronics
2016, pp. 706-710
DOI: 10.1109/RTEICT.2016.7807915
BibTeX@inproceedings{Prasad2016, author = {Prasad, S. and Ramkumar, B.}, title = {Passive copy-move forgery detection using SIFT, HOG and SURF features}, booktitle = {Proc. Information Communication Technology (RTEICT) 2016 IEEE Int. Conf. Recent Trends in Electronics}, year = {2016}, pages = {706--710}}
-
Multi-scale Noise Estimation for Image Splicing Forgery Detection
Journal of Visual Communication and Image Representation, 2016, Vol. 38, pp. 195-206
DOI: 10.1016/j.jvcir.2016.03.005
BibTeX@article{Pun2016, author = {Pun, Chi-Man and Liu, Bo and Yuan, Xiao-Chen}, title = {Multi-scale Noise Estimation for Image Splicing Forgery Detection}, journal = {Journal of Visual Communication and Image Representation}, year = {2016}, volume = {38}, pages = {195--206}}
-
Splicing Localization in Motion Blurred 3D Scenes
Proc. IEEE Int. Conf. Image Processing (ICIP)
2016, pp. 3922-3926
DOI: 10.1109/ICIP.2016.7533095
BibTeX@inproceedings{Purohit2016, author = {Purohit, K. and Rajagopalan, A. N.}, title = {Splicing Localization in Motion Blurred 3D Scenes}, booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)}, year = {2016}, pages = {3922--3926}}
-
Statistical Detection for Digital Image Forensics
University of technology of troyes, University of technology of troyes, 2016
BibTeX@phdthesis{Qiao2016, author = {Qiao, Tong}, title = {Statistical Detection for Digital Image Forensics}, school = {University of technology of troyes}, year = {2016}}
-
Fragile image watermarking scheme based on VQ index sharing and self-embedding
Multimedia Tools and Applications, Springer, 2016, pp. 1
DOI: 10.1007/s11042-015-3218-9
BibTeX@article{Qin2016, author = {Qin, Chuan and Ji, Ping and Wang, Jinwei and Chang, Chin-Chen}, title = {Fragile image watermarking scheme based on VQ index sharing and self-embedding}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2016}, pages = {1}}
-
Mage Forgery Detection Using Improved SLIC
International Research Journal of Engineering and Technology (IRJET), 2016, Vol. 3(12), pp. 1350-1356
BibTeX@article{Ramya2016, author = {Ramya, M. and Sridevi, P.}, title = {Mage Forgery Detection Using Improved SLIC}, journal = {International Research Journal of Engineering and Technology (IRJET)}, year = {2016}, volume = {3}, number = {12}, pages = {1350--1356}}
-
Enhancing Source Camera Identification Based on Multiplicative Denoising Filter
Proc. IEEE Trustcom/BigDataSE/ISPA
2016, pp. 983-988
DOI: 10.1109/TrustCom.2016.0165
BibTeX@inproceedings{Rao2016a, author = {Rao, Q. and Wang, J. and Zhang, L.}, title = {Enhancing Source Camera Identification Based on Multiplicative Denoising Filter}, booktitle = {Proc. IEEE Trustcom/BigDataSE/ISPA}, year = {2016}, pages = {983--988}}
-
A deep learning approach to detection of splicing and copy-move forgeries in images
Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)
2016, pp. 1-6
DOI: 10.1109/WIFS.2016.7823911
BibTeX@inproceedings{Rao2016, author = {Rao, Y. and Ni, J.}, title = {A deep learning approach to detection of splicing and copy-move forgeries in images}, booktitle = {Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)}, year = {2016}, pages = {1--6}}
-
Implementação Do Algoritmo De Detecção De Cópia/clonagem Na Análise Forense De Imagens Digitais
Acta De Ciências E Saúde, 2016
BibTeX@article{dosReis2016, author = {dos Reis and Costa, Gustavo Aranha Araújo}, title = {Implementação Do Algoritmo De Detecção De Cópia/clonagem Na Análise Forense De Imagens Digitais}, journal = {Acta De Ciências E Saúde}, year = {2016}}
-
Special issue on multimodal data fusion for multidimensional signal processing
Multidimensional Systems and Signal Processing, Springer, 2016, Vol. 27(4), pp. 801
DOI: 10.1007/s11045-016-0441-0
BibTeX@article{Ren2016, author = {Ren, Jinchang and Han, Junwei and Dalla Mura, Mauro}, title = {Special issue on multimodal data fusion for multidimensional signal processing}, journal = {Multidimensional Systems and Signal Processing}, publisher = {Springer}, year = {2016}, volume = {27}, number = {4}, pages = {801}}
-
Efficient data integrity auditing for storage security in mobile health cloud
Peer-to-Peer Networking and Applications, Springer, 2016, Vol. 9(5), pp. 854
DOI: 10.1007/s12083-015-0346-y
BibTeX@article{Ren2016a, author = {Ren, Yongjun and Shen, Jian and Zheng, Yuhui and Wang, Jin and Chao, Han-Chieh}, title = {Efficient data integrity auditing for storage security in mobile health cloud}, journal = {Peer-to-Peer Networking and Applications}, publisher = {Springer}, year = {2016}, volume = {9}, number = {5}, pages = {854}}
-
Downscaling Forgery Detection Using Pixel Value's Gradients of Digital Image
Journal of the Institute of Electronics and Information Engineers, 2016
DOI: 10.5573/ieie.2016.53.2.047
BibTeX@article{Rhee2016, author = {Rhee, Kang Hyeon}, title = {Downscaling Forgery Detection Using Pixel Value's Gradients of Digital Image}, journal = {Journal of the Institute of Electronics and Information Engineers}, year = {2016}}
-
Gaussian filtering detection using band pass residual and contrast of forgery image
Proc. Electronics and Mobile Communication Conf 2016 IEEE 7th Annual Information Technology (IEMCON)
2016, pp. 1-4
DOI: 10.1109/IEMCON.2016.7746310
BibTeX@inproceedings{Rhee2016a, author = {Rhee, K. H.}, title = {Gaussian filtering detection using band pass residual and contrast of forgery image}, booktitle = {Proc. Electronics and Mobile Communication Conf 2016 IEEE 7th Annual Information Technology (IEMCON)}, year = {2016}, pages = {1--4}}
-
Median Filtering Detection Using Variation of Neighboring Line Pairs for Image Forensic
Proc. IEEE 5th Int Consumer Electronics - Berlin (ICCE-Berlin) Conf
Journal of Electronic Imaging, SPIE-Intl Soc Optical Eng, 2016, Vol. 25(5), pp. 103-107
DOI: 10.1117/1.JEI.25.5.053039
BibTeX@inproceedings{Rhee2016b, author = {Rhee, K. H.}, title = {Median Filtering Detection Using Variation of Neighboring Line Pairs for Image Forensic}, booktitle = {Proc. IEEE 5th Int Consumer Electronics - Berlin (ICCE-Berlin) Conf}, journal = {Journal of Electronic Imaging}, publisher = {SPIE-Intl Soc Optical Eng}, year = {2016}, volume = {25}, number = {5}, pages = {103--107}}
-
Bad teacher or unruly student: Can deep learning say something in Image Forensics analysis?
Proc. 23rd Int. Conf. Pattern Recognition (ICPR)
2016, pp. 2503-2508
DOI: 10.1109/ICPR.2016.7900012
BibTeX@inproceedings{Rota2016, author = {Rota, P. and Sangineto, E. and Conotter, V. and Pramerdorfer, C.}, title = {Bad teacher or unruly student: Can deep learning say something in Image Forensics analysis?}, booktitle = {Proc. 23rd Int. Conf. Pattern Recognition (ICPR)}, year = {2016}, pages = {2503--2508}}
-
Bad teacher or unruly student: Can deep learning say something in Image Forensics analysis?
Proc. 23rd Int. Conf. Pattern Recognition (ICPR)
2016, pp. 2503-2508
DOI: 10.1109/ICPR.2016.7900012
BibTeX@inproceedings{Rota2016a, author = {Rota, P. and Sangineto, E. and Conotter, V. and Pramerdorfer, C.}, title = {Bad teacher or unruly student: Can deep learning say something in Image Forensics analysis?}, booktitle = {Proc. 23rd Int. Conf. Pattern Recognition (ICPR)}, year = {2016}, pages = {2503--2508}}
-
Improvement in Copy-Move Forgery Detection Using Hybrid Approach
International Journal of Modern Education & Computer Science, 2016
BibTeX@article{Saini2016, author = {Saini, Gurmeet Kaur and Mahajan, Manish}, title = {Improvement in Copy-Move Forgery Detection Using Hybrid Approach}, journal = {International Journal of Modern Education & Computer Science}, year = {2016}}
-
Identification of source-enhanced composite images
Proc. Int. Conf. Emerging Technological Trends (ICETT)
2016, pp. 1-6
DOI: 10.1109/ICETT.2016.7873666
BibTeX@inproceedings{Saji2016, author = {Saji, N. S. and Rajan, R.}, title = {Identification of source-enhanced composite images}, booktitle = {Proc. Int. Conf. Emerging Technological Trends (ICETT)}, year = {2016}, pages = {1--6}}
-
An Efficient Circular Block Approach for Copy-Move Forgery Detection
IUT JOURNAL OF ENGINEERING AND TECHNOLOGY (JET), 2016, Vol. 12(2), pp. 9-20
BibTeX@article{Salekin2016, author = {Salekin, Sirajus and Kushol, Rafsanjany and Kabir, Hasanul}, title = {An Efficient Circular Block Approach for Copy-Move Forgery Detection}, journal = {IUT JOURNAL OF ENGINEERING AND TECHNOLOGY (JET)}, year = {2016}, volume = {12}, number = {2}, pages = {9--20}}
-
Digital Forensic Source Camera Identification with Efficient Feature Selection Using Filter, Wrapper and Hybrid Approaches
Information Systems Security, Springer, 2016
DOI: 10.1007/978-3-319-49806-5_22
BibTeX@article{Sameer2016, author = {Sameer, Venkata Udaya and Sugumaran, S. and Naskar, Ruchira}, title = {Digital Forensic Source Camera Identification with Efficient Feature Selection Using Filter, Wrapper and Hybrid Approaches}, journal = {Information Systems Security}, publisher = {Springer}, year = {2016}}
-
Image Source Acquisition Identification of Mobile Devices Based on the Use of Features
Multimedia Tools and Applications, Springer, 2016, Vol. 75(12), pp. 7087
DOI: 10.1007/s11042-015-2633-2
BibTeX@article{SandovalOrozco2016, author = {Sandoval Orozco, Ana Lucila and Corripio, Jocelin Rosales and GarcÃa Villalba, Luis Javier and Hernández Castro, Julio César}, title = {Image Source Acquisition Identification of Mobile Devices Based on the Use of Features}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2016}, volume = {75}, number = {12}, pages = {7087}}
-
Image Based Geo-localization in the Alps
International Journal of Computer Vision, Springer, 2016, Vol. 116(3), pp. 213
DOI: 10.1007/s11263-015-0830-0
BibTeX@article{Saurer2016, author = {Saurer, Olivier and Baatz, Georges and Köser, Kevin and Ladický, L’ubor and Pollefeys, Marc}, title = {Image Based Geo-localization in the Alps}, journal = {International Journal of Computer Vision}, publisher = {Springer}, year = {2016}, volume = {116}, number = {3}, pages = {213}}
-
Image-based Large-scale Geo-localization in Mountainous Regions
Large-Scale Visual Geo-Localization, Springer, 2016
DOI: 10.1007/978-3-319-25781-5_11
BibTeX@article{Saurer2016a, author = {Saurer, Olivier and Baatz, Georges and Köser, Kevin and Ladický, L’ubor and Pollefeys, Marc}, title = {Image-based Large-scale Geo-localization in Mountainous Regions}, journal = {Large-Scale Visual Geo-Localization}, publisher = {Springer}, year = {2016}}
-
Digital Image Forensics Vs. Image Composition: An Indirect Arms Race
arXiv preprint arXiv:1601.03239, 2016
DOI: 10.1109/wifs.2015.7368598
BibTeX@article{Schetinger2016, author = {Schetinger, Victor and Iuliani, Massimo and Piva, Alessandro and Oliveira, Manuel M.}, title = {Digital Image Forensics Vs. Image Composition: An Indirect Arms Race}, journal = {arXiv preprint arXiv:1601.03239}, year = {2016}}
-
Digital Image Forensics vs. Image Composition: An Indirect Arms Race
arxiv, 2016
BibTeX@article{Schetinger2016a, author = {Schetinger, Victor and Iuliani, Massimo and Piva, Alessandro and Oliveira, Manuel M.}, title = {Digital Image Forensics vs. Image Composition: An Indirect Arms Race}, journal = {arxiv}, year = {2016}}
-
A Study on Segmentation-based Copy-move Forgery Detection Using DAISY Descriptor
Suresh, P. L. & Panigrahi, K. B. (ed.)
Proceedings of the International Conference on Soft Computing Systems: ICSCS 2015, Volume 2
Chapter A Study on Segmentation-Based Copy-Move Forgery Detection Using DAISY Descriptor
Springer India, 2016, pp. 223-233
DOI: 10.1007/978-81-322-2674-1_23
BibTeX@inbook{Sekhar2016b, author = {Sekhar, Resmi and Shaji, R. S.}, title = {A Study on Segmentation-based Copy-move Forgery Detection Using DAISY Descriptor}, booktitle = {Proceedings of the International Conference on Soft Computing Systems: ICSCS 2015, Volume 2}, publisher = {Springer India}, year = {2016}, pages = {223--233}}
-
Machine listening techniques as a complement to video image analysis in forensics
Proc. IEEE Int. Conf. Image Processing (ICIP)
2016, pp. 948-952
DOI: 10.1109/ICIP.2016.7532497
BibTeX@inproceedings{Serizel2016, author = {Serizel, R. and Bisot, V. and Essid, S. and Richard, G.}, title = {Machine listening techniques as a complement to video image analysis in forensics}, booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)}, year = {2016}, pages = {948--952}}
-
Copy-move forgery detection in digital images using affine-SIFT
Proc. 2nd Int. Conf. of Signal Processing and Intelligent Systems (ICSPIS)
2016, pp. 1-5
DOI: 10.1109/ICSPIS.2016.7869896
BibTeX@inproceedings{Shahroudnejad2016, author = {Shahroudnejad, A. and Rahmati, M.}, title = {Copy-move forgery detection in digital images using affine-SIFT}, booktitle = {Proc. 2nd Int. Conf. of Signal Processing and Intelligent Systems (ICSPIS)}, year = {2016}, pages = {1--5}}
-
A review of passive forensic techniques for detection of copy-move attacks on digital videos
Proc. 3rd Int. Conf. Advanced Computing and Communication Systems (ICACCS)
2016, Vol. 01, pp. 1-6
DOI: 10.1109/ICACCS.2016.7586396
BibTeX@inproceedings{Sharma2016, author = {Sharma, S. and Dhavale, S. V.}, title = {A review of passive forensic techniques for detection of copy-move attacks on digital videos}, booktitle = {Proc. 3rd Int. Conf. Advanced Computing and Communication Systems (ICACCS)}, year = {2016}, volume = {01}, pages = {1--6}}
-
Anti-forensic technique for median filtering using L1-L2 TV model
Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)
2016, pp. 1-6
DOI: 10.1109/WIFS.2016.7823571
BibTeX@inproceedings{Sharma2016a, author = {Sharma, S. and Subramanyam, A. V. and Jain, M. and Mehrish, A. and Emmanuel, S.}, title = {Anti-forensic technique for median filtering using L1-L2 TV model}, booktitle = {Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)}, year = {2016}, pages = {1--6}}
-
Improved JPEG Anti-forensics Using Non Local Means De-noising
Advances in Innovative Engineering and Technologies, 2016
BibTeX@article{Shelke2016, author = {Shelke, P. M. and Prasad, Rajesh S.}, title = {Improved JPEG Anti-forensics Using Non Local Means De-noising}, journal = {Advances in Innovative Engineering and Technologies}, year = {2016}}
-
Detection of Seam-carving Image Based on Benford}s Law for Forensic Applications
International Journal of Digital Crime and Forensics (IJDCF), 2016, Vol. 8(1)
DOI: 10.4018/IJDCF.2016010104
BibTeX@article{Sheng2016a, author = {Sheng, Guorui and Gao, Tiegang}, title = {Detection of Seam-carving Image Based on Benford}s Law for Forensic Applications}, journal = {International Journal of Digital Crime and Forensics (IJDCF)}, year = {2016}, volume = {8}, number = {1}}
-
Detection of Content-aware Image Resizing Based on Benford}s Law
Soft Computing, 2016, pp. 1-9
DOI: 10.1007/s00500-016-2146-6
BibTeX@article{Sheng2016, author = {Sheng, Guorui and Li, Tao and Su, Qingtang and Chen, Beijing and Tang, Yi}, title = {Detection of Content-aware Image Resizing Based on Benford}s Law}, journal = {Soft Computing}, year = {2016}, pages = {1--9}}
-
Fast Detection of Copy-Move Forgery Image using Two Step Search Algorithm
IJSIA, Science and Engineering Research Support Society, 2016, Vol. 10(5), pp. 203-214
DOI: 10.14257/ijsia.2016.10.5.19
BibTeX@article{Shin2016a, author = {Shin, Y. D.}, title = {Fast Detection of Copy-Move Forgery Image using Two Step Search Algorithm}, journal = {IJSIA}, publisher = {Science and Engineering Research Support Society}, year = {2016}, volume = {10}, number = {5}, pages = {203--214}}
-
Fast Exploration of Copy-move Forgery Image
Advanced Science and Technology Letters, 2016
DOI: 10.9717/kmms.2013.16.4.411
BibTeX@article{Shin2016, author = {Shin, Yong-Dal}, title = {Fast Exploration of Copy-move Forgery Image}, journal = {Advanced Science and Technology Letters}, year = {2016}}
-
Forensics for partially double compressed doctored JPEG images
Multimedia Tools and Applications, Springer, 2016, pp. 1
DOI: 10.1007/s11042-016-4290-5
BibTeX@article{Singh2016b, author = {Singh, Gurinder and Singh, Kulbir}, title = {Forensics for partially double compressed doctored JPEG images}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2016}, pages = {1}}
-
Analysis of contrast enhancement forensics in compressed and uncompressed images
Proc. Int. Conf. Signal Processing and Communication (ICSC)
2016, pp. 303-307
DOI: 10.1109/ICSPCom.2016.7980596
BibTeX@inproceedings{Singh2016c, author = {Singh, N. and Gupta, A.}, title = {Analysis of contrast enhancement forensics in compressed and uncompressed images}, booktitle = {Proc. Int. Conf. Signal Processing and Communication (ICSC)}, year = {2016}, pages = {303--307}}
-
Digital Image Forensics and Counter Anti-forensics
Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing, Springer, 2016
DOI: 10.1007/978-81-322-2638-3_90
BibTeX@article{Singh2016, author = {Singh, Neha and Joshi, Sandeep}, title = {Digital Image Forensics and Counter Anti-forensics}, journal = {Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing}, publisher = {Springer}, year = {2016}}
-
Digital Image Forensics and Counter Anti-forensics
Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing
Springer, 2016
DOI: 10.1007/978-81-322-2638-3_90
BibTeX@incollection{Singh2016a, author = {Singh, Neha and Joshi, Sandeep}, title = {Digital Image Forensics and Counter Anti-forensics}, booktitle = {Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing}, publisher = {Springer}, year = {2016}}
-
Block-based Forgery Detection Using Global and Local Features
Proceedings of the International Conference on Soft Computing Systems, Springer, 2016
DOI: 10.1007/978-81-322-2671-0_14
BibTeX@article{Soman2016, author = {Soman, Gayathri and John, Jyothish K.}, title = {Block-based Forgery Detection Using Global and Local Features}, journal = {Proceedings of the International Conference on Soft Computing Systems}, publisher = {Springer}, year = {2016}}
-
Source Camera Identification Using Non-decimated Wavelet Transform
Global Security, Safety and Sustainability - The Security Challenges of the Connected World, Springer, 2016
DOI: 10.1007/978-3-319-51064-4_11
BibTeX@article{Soobhany2016, author = {Soobhany, Ahmad Ryad and Sheikh-Akbari, Akbar and Schreuders, Z. Cliffe}, title = {Source Camera Identification Using Non-decimated Wavelet Transform}, journal = {Global Security, Safety and Sustainability - The Security Challenges of the Connected World}, publisher = {Springer}, year = {2016}}
-
An improved method for copy-move forgery detection in digital forensic
Proc. Online Int. Conf. Green Engineering and Technologies (IC-GET)
2016, pp. 1-4
DOI: 10.1109/GET.2016.7916684
BibTeX@inproceedings{SreelakshmyI2016, author = {Sreelakshmy I, J. and Anver, J.}, title = {An improved method for copy-move forgery detection in digital forensic}, booktitle = {Proc. Online Int. Conf. Green Engineering and Technologies (IC-GET)}, year = {2016}, pages = {1--4}}
-
Image Authentication Using Local Binary Pattern on the Low Frequency Components
Microelectronics, Electromagnetics and Telecommunications, Springer, 2016
DOI: 10.1007/978-81-322-2728-1_49
BibTeX@article{SrinivasaRao2016, author = {Srinivasa Rao, Ch. and Tilak Babu, S. B. G.}, title = {Image Authentication Using Local Binary Pattern on the Low Frequency Components}, journal = {Microelectronics, Electromagnetics and Telecommunications}, publisher = {Springer}, year = {2016}}
-
Image Authentication Using Local Binary Pattern on the Low Frequency Components
Microelectronics, Electromagnetics and Telecommunications
Springer, 2016
DOI: 10.1007/978-81-322-2728-1_49
BibTeX@incollection{SrinivasaRao2016a, author = {Srinivasa Rao, Ch. and Tilak Babu, S. B. G.}, title = {Image Authentication Using Local Binary Pattern on the Low Frequency Components}, booktitle = {Microelectronics, Electromagnetics and Telecommunications}, publisher = {Springer}, year = {2016}}
-
Scale Invariant Kernelized Correlation Filter Based on Gaussian Output
Cloud Computing and Security, Springer, 2016
DOI: 10.1007/978-3-319-48674-1_50
BibTeX@article{Su2016, author = {Su, Xiangbo and Zhang, Baochang and Yang, Linlin and Li, Zhigang and Yang, Yun}, title = {Scale Invariant Kernelized Correlation Filter Based on Gaussian Output}, journal = {Cloud Computing and Security}, publisher = {Springer}, year = {2016}}
-
Redundant sift features via level sets for fast copy move forgery detection
Proc. Int. Conf. Signal and Information Processing (IConSIP)
2016, pp. 1-4
DOI: 10.1109/ICONSIP.2016.7857475
BibTeX@inproceedings{Sudhakar2016, author = {Sudhakar, K. and Sandeep, V. M. and Kulkarni, S.}, title = {Redundant sift features via level sets for fast copy move forgery detection}, booktitle = {Proc. Int. Conf. Signal and Information Processing (IConSIP)}, year = {2016}, pages = {1--4}}
-
A Novel Forensic Image Analysis Tool for Discovering Double JPEG Compression Clues
Multimedia Tools and Applications, 2016, pp. 1-35
DOI: 10.1007/s11042-016-3409-z
BibTeX@article{Taimori2016, author = {Taimori, Ali and Razzazi, Farbod and Behrad, Alireza and Ahmadi, Ali and Babaie-Zadeh, Massoud}, title = {A Novel Forensic Image Analysis Tool for Discovering Double JPEG Compression Clues}, journal = {Multimedia Tools and Applications}, year = {2016}, pages = {1--35}}
-
Digital-forensics and Watermarking: 14th International Workshop, Iwdw 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers
Shi, Y.-Q., Kim, J. H., Pérez-González, F. & Echizen, I. (ed.)
Volume 9569 of the series Lecture Notes in Computer Science
Chapter Camera Source Identification with Limited Labeled Training Set
Springer International Publishing, 2016, pp. 18-27
DOI: 10.1007/978-3-319-31960-5_2
BibTeX@inbook{Tan2016, author = {Tan, Yue and Wang, Bo and Li, Ming and Guo, Yanqing and Kong, Xiangwei and Shi, Yunqing}, title = {Digital-forensics and Watermarking: 14th International Workshop, Iwdw 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers}, booktitle = {Volume 9569 of the series Lecture Notes in Computer Science}, publisher = {Springer International Publishing}, year = {2016}, pages = {18--27}}
-
PRNU Based Source Attribution with a Collection of Seam-carved Images
Proc. IEEE Int. Conf. Image Processing (ICIP)
2016, pp. 156-160
DOI: 10.1109/ICIP.2016.7532338
BibTeX@inproceedings{Taspinar2016, author = {Taspinar, S. and Mohanty, M. and Memon, N.}, title = {PRNU Based Source Attribution with a Collection of Seam-carved Images}, booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)}, year = {2016}, pages = {156--160}}
-
Enhancing Image Forgery Detection Using 2-d Cross Products
Advances in Digital Forensics XII
Springer, 2016
DOI: 10.1007/978-3-319-46279-0_15
BibTeX@incollection{Teerakanok2016, author = {Teerakanok, Songpon and Uehara, Tetsutaro}, title = {Enhancing Image Forgery Detection Using 2-d Cross Products}, booktitle = {Advances in Digital Forensics XII}, publisher = {Springer}, year = {2016}}
-
Camera model identification based on the generalized noise model in natural images
Digital Signal Processing, Elsevier BV, 2016, Vol. 48, pp. 285-297
DOI: 10.1016/j.dsp.2015.10.002
BibTeX@article{Thai2016, author = {Thai, Thanh Hai and Retraint, Florent and Cogranne, Rémi}, title = {Camera model identification based on the generalized noise model in natural images}, journal = {Digital Signal Processing}, publisher = {Elsevier BV}, year = {2016}, volume = {48}, pages = {285--297}}
-
Learning Based No Reference Algorithm for Dropped Frame Identification in Uncompressed Video
Satapathy, C. S., Mandal, K. J., Udgata, K. S. & Bhateja, V. (ed.)
Information Systems Design and Intelligent Applications: Proceedings of Third International Conference INDIA 2016, Volume 3
Chapter Learning Based No Reference Algorithm for Dropped Frame Identification in Uncompressed Video
Springer India, 2016, pp. 451-459
DOI: 10.1007/978-81-322-2757-1_45
BibTeX@inbook{Thakur2016, author = {Thakur, Manish K. and Saxena, Vikas and Gupta, J. P.}, title = {Learning Based No Reference Algorithm for Dropped Frame Identification in Uncompressed Video}, booktitle = {Information Systems Design and Intelligent Applications: Proceedings of Third International Conference INDIA 2016, Volume 3}, publisher = {Springer India}, year = {2016}, pages = {451--459}}
-
Blind Image Forgeries Detection Using Detail Components from the Wavelet Transform
Frontiers in Artificial Intelligence and Applications, IOS Press, 2016, Vol. 282(Advances in Digital Technologies), pp. 91-104
DOI: 10.3233/978-1-61499-637-8-91
BibTeX@article{Le-Tien2016, author = {Thuong, Le-Tien and Tu, Huynh-Kha and Sinh, Bui-Duc}, title = {Blind Image Forgeries Detection Using Detail Components from the Wavelet Transform}, journal = {Frontiers in Artificial Intelligence and Applications}, publisher = {IOS Press}, year = {2016}, volume = {282}, number = {Advances in Digital Technologies}, pages = {91--104}}
-
Digital forensics for printed character source identification
Proc. IEEE Int. Conf. Multimedia and Expo (ICME)
2016, pp. 1-6
DOI: 10.1109/ICME.2016.7552892
BibTeX@inproceedings{Tsai2016, author = {Tsai, M. J. and Hsu, C. L. and Yin, J. S. and Yuadi, I.}, title = {Digital forensics for printed character source identification}, booktitle = {Proc. IEEE Int. Conf. Multimedia and Expo (ICME)}, year = {2016}, pages = {1--6}}
-
Camera Model Identification Based Machine Learning Approach with High Order Statistics Features
Poc. of the 24th European Signal Processing Conference (EUSIPCO 2016), 2016
BibTeX@article{Tuama2016a, author = {Tuama, A.}, title = {Camera Model Identification Based Machine Learning Approach with High Order Statistics Features}, journal = {Poc. of the 24th European Signal Processing Conference (EUSIPCO 2016)}, year = {2016}}
-
Source Camera Model Identification Using Features from Contaminated Sensor Noise
Digital-Forensics and Watermarking, Springer, 2016
DOI: 10.1007/978-3-319-31960-5_8
BibTeX@article{Tuama2016, author = {Tuama, Amel and Comby, Frederic and Chaumont, Marc}, title = {Source Camera Model Identification Using Features from Contaminated Sensor Noise}, journal = {Digital-Forensics and Watermarking}, publisher = {Springer}, year = {2016}}
-
Camera Model Identification with the Use of Deep Convolutional Neural Networks
IEEE International Workshop on Information Forensics and Security, Dec 201, 2016
BibTeX@article{Tuama2016b, author = {Tuama, Amel and Comby, Frederic and Chaumont., Marc}, title = {Camera Model Identification with the Use of Deep Convolutional Neural Networks}, journal = {IEEE International Workshop on Information Forensics and Security, Dec 201}, year = {2016}}
-
Digital image forgery detection based on shadow texture features
Proc. 24th Telecommunications Forum (TELFOR)
2016, pp. 1-4
DOI: 10.1109/TELFOR.2016.7818875
BibTeX@inproceedings{Tuba2016, author = {Tuba, I. and Tuba, E. and Beko, M.}, title = {Digital image forgery detection based on shadow texture features}, booktitle = {Proc. 24th Telecommunications Forum (TELFOR)}, year = {2016}, pages = {1--4}}
-
Overlapping Block Based Algorithm for Copy-move Forgery Detection in Digital Images
International Journal of Computers, 2016
BibTeX@article{Brajic2016, author = {Tuba, Momcilo Brajicand Eva and Jovanovic, Raka}, title = {Overlapping Block Based Algorithm for Copy-move Forgery Detection in Digital Images}, journal = {International Journal of Computers}, year = {2016}}
-
Image Region Duplication Forgery Detection Based on Angular Radial Partitioning and Harris Key-points
Symmetry, 2016
DOI: 10.3390/sym8070062
BibTeX@article{Uliyan2016a, author = {Uliyan, Diaa M. and Jalab, Hamid A. and Wahab, Ainuddin W. Abdul and Sadeghi, Somayeh}, title = {Image Region Duplication Forgery Detection Based on Angular Radial Partitioning and Harris Key-points}, journal = {Symmetry}, year = {2016}}
-
A Novel Forged Blurred Region Detection System for Image Forensic Applications
Expert Systems with Applications, Elsevier BV, 2016, Vol. 64, pp. 1-10
DOI: 10.1016/j.eswa.2016.07.026
BibTeX@article{Uliyan2016, author = {Uliyan, Diaa M. and Jalab, Hamid A. and Wahab, Ainuddin W. Abdul and Shivakumara, Palaiahnakote and Sadeghi, Somayeh}, title = {A Novel Forged Blurred Region Detection System for Image Forensic Applications}, journal = {Expert Systems with Applications}, publisher = {Elsevier BV}, year = {2016}, volume = {64}, pages = {1--10}}
-
LBP-DCT Based Copy Move Forgery Detection Algorithm
Lecture Notes in Electrical Engineering
Springer, 2016, pp. 127-136
DOI: 10.1007/978-3-319-22635-4_11
BibTeX@incollection{Ustubioglu2016, author = {Ustubioglu, Beste and Ulutas, Guzin and Ulutas, Mustafa and Nabiyev, Vasif and Ustubioglu, Arda}, title = {LBP-DCT Based Copy Move Forgery Detection Algorithm}, booktitle = {Lecture Notes in Electrical Engineering}, publisher = {Springer}, year = {2016}, pages = {127--136}}
-
Improved Copy-move Forgery Detection Based on the Clds and Colour Moments
The Imaging Science Journal, 2016, Vol. 64(4), pp. 215-225
DOI: 10.1080/13682199.2016.1162922
BibTeX@article{Ustubioglu2016a, author = {Ustubioglu, B. and Ulutas, G. and Ulutas, M. and Nabiyev, V. V.}, title = {Improved Copy-move Forgery Detection Based on the Clds and Colour Moments}, journal = {The Imaging Science Journal}, year = {2016}, volume = {64}, number = {4}, pages = {215--225}}
-
A New Copy Move Forgery Detection Technique with Automatic Threshold Determination
AEU\ - International Journal of Electronics and Communications, 2016, pp. -
DOI: 10.1016/j.aeue.2016.05.005
BibTeX@article{Ustubioglu2016b, author = {Ustubioglu, Beste and Ulutas, Guzin and Ulutas, Mustafa and Nabiyev, Vasif V.}, title = {A New Copy Move Forgery Detection Technique with Automatic Threshold Determination}, journal = {AEU\ - International Journal of Electronics and Communications}, year = {2016}, pages = {-}}
-
A PRNU-based counter-forensic method to manipulate smartphone image source identification techniques
Future Generation Computer Systems, Elsevier, 2016
DOI: 10.1016/j.future.2016.11.007
BibTeX@article{Villalba2016a, author = {Villalba, Luis Javier Garc\ia and Orozco, Ana Lucila Sandoval and Corripio, Jocelin Rosales and Hernandez-Castro, Julio}, title = {A PRNU-based counter-forensic method to manipulate smartphone image source identification techniques}, journal = {Future Generation Computer Systems}, publisher = {Elsevier}, year = {2016}}
-
Identification of Smartphone Brand and Model Via Forensic Video Analysis
Expert Systems with Applications, 2016, Vol. 55, pp. 59-69
DOI: 10.1016/j.eswa.2016.01.025
BibTeX@article{Villalba2016, author = {Villalba, Luis Javier García and Orozco, Ana Lucila Sandoval and López, Raquel Ramos and Castro, Julio Hernandez}, title = {Identification of Smartphone Brand and Model Via Forensic Video Analysis}, journal = {Expert Systems with Applications}, year = {2016}, volume = {55}, pages = {59--69}}
-
An Efficient Passive Authentication Scheme for Copy-Move Forgery Based on DCT
Cloud Computing and Security, Springer, 2016
DOI: 10.1007/978-3-319-48674-1_37
BibTeX@article{Wang2016o, author = {Wang, Huan and Wang, Hongxia and Shi, Canghong}, title = {An Efficient Passive Authentication Scheme for Copy-Move Forgery Based on DCT}, journal = {Cloud Computing and Security}, publisher = {Springer}, year = {2016}}
-
A Passive Authentication Scheme for Copy-move Forgery Based on Package Clustering Algorithm
Multimedia Tools and Applications, Springer, 2016, pp. 1
DOI: 10.1007/s11042-016-3687-5
BibTeX@article{Wang2016a, author = {Wang, Huan and Wang, Hong-Xia and Sun, Xing-Ming and Qian, Qing}, title = {A Passive Authentication Scheme for Copy-move Forgery Based on Package Clustering Algorithm}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2016}, pages = {1}}
-
Forensics feature analysis in quaternion wavelet domain for distinguishing photographic images and computer graphics
Multimedia Tools and Applications, Springer, 2016, pp. 1
DOI: 10.1007/s11042-016-4153-0
BibTeX@article{Wang2016d, author = {Wang, Jinwei and Li, Ting and Shi, Yun-Qing and Lian, Shiguo and Ye, Jingyu}, title = {Forensics feature analysis in quaternion wavelet domain for distinguishing photographic images and computer graphics}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2016}, pages = {1}}
-
Double JPEG Compression Forensics Based on a Convolutional Neural Network
EURASIP Journal on Information Security, Springer, 2016, Vol. 2016(1), pp. 1
DOI: 10.1186/s13635-016-0047-y
BibTeX@article{Wang2016b, author = {Wang, Qing and Zhang, Rong}, title = {Double JPEG Compression Forensics Based on a Convolutional Neural Network}, journal = {EURASIP Journal on Information Security}, publisher = {Springer}, year = {2016}, volume = {2016}, number = {1}, pages = {1}}
-
Double JPEG compression forensics based on a convolutional neural network
EURASIP Journal on Information Security, Springer, 2016, Vol. 2016(1), pp. 1
DOI: 10.1186/s13635-016-0047-y
BibTeX@article{Wang2016e, author = {Wang, Qing and Zhang, Rong}, title = {Double JPEG compression forensics based on a convolutional neural network}, journal = {EURASIP Journal on Information Security}, publisher = {Springer}, year = {2016}, volume = {2016}, number = {1}, pages = {1}}
-
A new keypoint-based copy-move forgery detection for small smooth regions
Multimedia Tools and Applications, Springer, 2016, pp. 1
DOI: 10.1007/s11042-016-4140-5
BibTeX@article{Wang2016c, author = {Wang, Xiang-Yang and Li, Shuo and Liu, Yu-Nan and Niu, Ying and Yang, Hong-Ying and Zhou, Zhi-li}, title = {A new keypoint-based copy-move forgery detection for small smooth regions}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2016}, pages = {1}}
-
Robust Copy-move Forgery Detection Using Quaternion Exponent Moments
Pattern Analysis and Applications, Springer, 2016, pp. 1
DOI: 10.1007/s10044-016-0588-1
BibTeX@article{Wang2016, author = {Wang, Xiang-yang and Liu, Yu-nan and Xu, Huan and Wang, Pei and Yang, Hong-ying}, title = {Robust Copy-move Forgery Detection Using Quaternion Exponent Moments}, journal = {Pattern Analysis and Applications}, publisher = {Springer}, year = {2016}, pages = {1}}
-
A Scaling Robust Copy-paste Tampering Detection for Digital Image Forensics
Procedia Computer Science, 2016, Vol. 79, pp. 458-465
DOI: 10.1016/j.procs.2016.03.059
BibTeX@article{Warbhe2016, author = {Warbhe, Anil Dada and Dharaskar, R. V. and Thakare, V. M.}, title = {A Scaling Robust Copy-paste Tampering Detection for Digital Image Forensics}, journal = {Procedia Computer Science}, year = {2016}, volume = {79}, pages = {458--465}}
-
Computationally Efficient Digital Image Forensic Method for Image Authentication
Procedia Computer Science, 2016, Vol. 78, pp. 464-470
DOI: 10.1016/j.procs.2016.02.089
BibTeX@article{Warbhe2016a, author = {Warbhe, Anil Dada and Dharaskar, R. V. and Thakare, V. M.}, title = {Computationally Efficient Digital Image Forensic Method for Image Authentication}, journal = {Procedia Computer Science}, year = {2016}, volume = {78}, pages = {464--470}}
-
Digital Image Forensics: An Affine Transform Robust Copy-paste Tampering Detection
Proc. 10th Int. Conf. Intelligent Systems and Control (ISCO)
2016, pp. 1-5
DOI: 10.1109/ISCO.2016.7727045
BibTeX@inproceedings{Warbhe2016b, author = {Warbhe, A. Dada and Dharaskar, R. V. and Thakare, V. M.}, title = {Digital Image Forensics: An Affine Transform Robust Copy-paste Tampering Detection}, booktitle = {Proc. 10th Int. Conf. Intelligent Systems and Control (ISCO)}, year = {2016}, pages = {1--5}}
-
Digital image forensics: An affine transform robust copy-paste tampering detection
Proc. 10th Int. Conf. Intelligent Systems and Control (ISCO)
2016, pp. 1-5
DOI: 10.1109/ISCO.2016.7727045
BibTeX@inproceedings{Warbhe2016c, author = {Warbhe, A. Dada and Dharaskar, R. V. and Thakare, V. M.}, title = {Digital image forensics: An affine transform robust copy-paste tampering detection}, booktitle = {Proc. 10th Int. Conf. Intelligent Systems and Control (ISCO)}, year = {2016}, pages = {1--5}}
-
Copy-move Forgery Detection: Survey, Challenges and Future Directions
Journal of Network and Computer Applications, Elsevier BV, 2016, Vol. 75, pp. 259-278
DOI: 10.1016/j.jnca.2016.09.008
BibTeX@article{Ashraf2016, author = {Warif, Nor Bakiah Abd and Wahab, Ainuddin Wahid Abdul and Idris, Mohd Yamani Idna and Ramli, Roziana and Salleh, Rosli and Shamshirband, Shahaboddin and Choo, Kim-Kwang Raymond}, title = {Copy-move Forgery Detection: Survey, Challenges and Future Directions}, journal = {Journal of Network and Computer Applications}, publisher = {Elsevier BV}, year = {2016}, volume = {75}, pages = {259--278}}
-
COVERAGE --- A novel database for copy-move forgery detection
Proc. IEEE Int. Conf. Image Processing (ICIP)
2016, pp. 161-165
DOI: 10.1109/ICIP.2016.7532339
BibTeX@inproceedings{Wen2016a, author = {Wen, B. and Zhu, Y. and Subramanian, R. and Ng, T. T. and Shen, X. and Winkler, S.}, title = {COVERAGE --- A novel database for copy-move forgery detection}, booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)}, year = {2016}, pages = {161--165}}
-
COVERAGE Novel Database for Copy-move Forgery Detection
ICASSP(submitted), 2016
DOI: 10.1109/icip.2016.7532339
BibTeX@article{Wen2016, author = {Wen, Bihan and Zhu, Ye and Subramanian, Ramanathan and Ng, Tian-Tsong and Shen, Xuanjing and Winkler, Stefan}, title = {COVERAGE Novel Database for Copy-move Forgery Detection}, journal = {ICASSP(submitted)}, year = {2016}}
-
Improving Image Copy-move Forgery Detection with Particle Swarm Optimization Techniques
China Communications, 2016, Vol. 13(1), pp. 139-149
DOI: 10.1109/CC.2016.7405711
BibTeX@article{Wenchang2016, author = {Wenchang, Shi and Fei, Zhao and Bo, Qin and Bin, Liang}, title = {Improving Image Copy-move Forgery Detection with Particle Swarm Optimization Techniques}, journal = {China Communications}, year = {2016}, volume = {13}, number = {1}, pages = {139--149}}
-
Fraudulent Image Recognition Using Stable Inherent Feature
Advances in Signal Processing and Intelligent Recognition Systems, Springer, 2016
DOI: 10.1007/978-3-319-28658-7_2
BibTeX@article{Williams2016, author = {Williams, Deny and Krishnalal, G. and Jagathy Raj, V. P.}, title = {Fraudulent Image Recognition Using Stable Inherent Feature}, journal = {Advances in Signal Processing and Intelligent Recognition Systems}, publisher = {Springer}, year = {2016}}
-
Fraudulent Image Recognition Using Stable Inherent Feature
Advances in Signal Processing and Intelligent Recognition Systems
Springer, 2016
DOI: 10.1007/978-3-319-28658-7_2
BibTeX@incollection{Williams2016a, author = {Williams, Deny and Krishnalal, G. and Jagathy Raj, V. P.}, title = {Fraudulent Image Recognition Using Stable Inherent Feature}, booktitle = {Advances in Signal Processing and Intelligent Recognition Systems}, publisher = {Springer}, year = {2016}}
-
Detecting Video Frame Rate Up-conversion Based on Frame-level Analysis of Average Texture Variation
Multimedia Tools and Applications, Springer, 2016, pp. 1
DOI: 10.1007/s11042-016-3468-1
BibTeX@article{Xia2016, author = {Xia, Min and Yang, Gaobo and Li, Leida and Li, Ran and Sun, Xingming}, title = {Detecting Video Frame Rate Up-conversion Based on Frame-level Analysis of Average Texture Variation}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2016}, pages = {1}}
-
Blind Identification Algorithm of Photorealistic Computer Grapic Based on Weber Local Features.
Journal of Digital Information Management, 2016
BibTeX@article{Xicheng2016, author = {Xicheng, Liu and Jianzhong, Xi}, title = {Blind Identification Algorithm of Photorealistic Computer Grapic Based on Weber Local Features.}, journal = {Journal of Digital Information Management}, year = {2016}}
-
Blind Authentication for Detecting Multi-image Forgery
Proc. SPIE, 2016, Vol. 10033, pp. 1003346-1003346-5
DOI: 10.1117/12.2245319
BibTeX@other{Xie2016, author = {Xie, Yi and Wang, Yulin}, title = {Blind Authentication for Detecting Multi-image Forgery}, journal = {Proc. SPIE}, year = {2016}, volume = {10033}, pages = {1003346-1003346-5}}
-
Source Camera Identification from Image Texture Features
Neurocomputing, 2016, pp. -
DOI: 10.1016/j.neucom.2016.05.012
BibTeX@article{Xu2016, author = {Xu, Bingchao and Wang, Xiaofeng and Zhou, Xiaorui and Xi, Jianghuan and Wang, Shangping}, title = {Source Camera Identification from Image Texture Features}, journal = {Neurocomputing}, year = {2016}, pages = {-}}
-
Quaternion-Based Image Hashing for Adaptive Tampering Localization
IEEE Transactions on Information Forensics and Security, 2016, Vol. 11(12), pp. 2664-2677
DOI: 10.1109/TIFS.2016.2594136
BibTeX@article{Yan2016, author = {Yan, C. P. and Pun, C. M. and Yuan, X. C.}, title = {Quaternion-Based Image Hashing for Adaptive Tampering Localization}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2016}, volume = {11}, number = {12}, pages = {2664--2677}}
-
An Efficient Forensic Method Based on High-speed Corner Detection Technique and SIFT Descriptor
Cloud Computing and Security, Springer, 2016
DOI: 10.1007/978-3-319-48674-1_40
BibTeX@article{Yang2016b, author = {Yang, Bin and Guo, Honglei}, title = {An Efficient Forensic Method Based on High-speed Corner Detection Technique and SIFT Descriptor}, journal = {Cloud Computing and Security}, publisher = {Springer}, year = {2016}}
-
Contrast Modification Forensics Algorithm Based on Merged Weight Histogram of Run Length
International Journal of Digital Crime and Forensics (IJDCF), 2016
DOI: 10.4018/IJDCF.2016040103
BibTeX@article{Yang2016, author = {Yang, Liang and Gao, Tiegang and Xuan, Yan and Gao, Hang}, title = {Contrast Modification Forensics Algorithm Based on Merged Weight Histogram of Run Length}, journal = {International Journal of Digital Crime and Forensics (IJDCF)}, year = {2016}}
-
Rotation Invariant Local Binary Pattern for Blind Detection of Copy-move Forgery with Affine Transform
Cloud Computing and Security, Springer, 2016
DOI: 10.1007/978-3-319-48674-1_36
BibTeX@article{Yang2016c, author = {Yang, Pei and Yang, Gaobo and Zhang, Dengyong}, title = {Rotation Invariant Local Binary Pattern for Blind Detection of Copy-move Forgery with Affine Transform}, journal = {Cloud Computing and Security}, publisher = {Springer}, year = {2016}}
-
A Novel Image Noise Level Function Estimation Approach Using Camera Response Function Constraint
Plapper, P., Guo, M. & Suhag, S. (ed.)
MATEC Web of Conferences, EDP Sciences, 2016, Vol. 42, pp. 06004
DOI: 10.1051/matecconf/20164206004
BibTeX@article{Yao2016a, author = {Yao, Heng}, title = {A Novel Image Noise Level Function Estimation Approach Using Camera Response Function Constraint}, journal = {MATEC Web of Conferences}, publisher = {EDP Sciences}, year = {2016}, volume = {42}, pages = {06004}}
-
Detecting Image Splicing Based on Noise Level Inconsistency
Multimedia Tools and Applications, Springer, 2016, pp. 1
DOI: 10.1007/s11042-016-3660-3
BibTeX@article{Yao2016, author = {Yao, Heng and Wang, Shuozhong and Zhang, Xinpeng and Qin, Chuan and Wang, Jinwei}, title = {Detecting Image Splicing Based on Noise Level Inconsistency}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2016}, pages = {1}}
-
Video Objects Removal Forgery Detection and Localization
Proc. Nicograph Int. (NicoInt)
2016, pp. 137
DOI: 10.1109/NicoInt.2016.30
BibTeX@inproceedings{Yao2016b, author = {Yao, Y. and Cheng, Y. and Li, X.}, title = {Video Objects Removal Forgery Detection and Localization}, booktitle = {Proc. Nicograph Int. (NicoInt)}, year = {2016}, pages = {137}}
-
Suspect Camera Determination
Proc. 24th Signal Processing and Communication Application Conf. (SIU)
2016, pp. 1837-1840
DOI: 10.1109/SIU.2016.7496120
BibTeX@inproceedings{Yasar2016, author = {Yaşar, A. and Deniz, F. and Doru, M.}, title = {Suspect Camera Determination}, booktitle = {Proc. 24th Signal Processing and Communication Application Conf. (SIU)}, year = {2016}, pages = {1837--1840}}
-
An Effective Detection Algorithm for Region Duplication Forgery in Digital Images
Casasent, D. & Alam, M. S. (ed.)
Proc. SPIE 9845, Optical Pattern Recognition XXVII, 98450O (April 20, 2016)
Proc. SPIE, 2016, Vol. 9845, pp. 98450O-98450O-7
DOI: 10.1117/12.2223732
BibTeX@inproceedings{Yavuz2016, author = {Yavuz, Fatih and Bal, Abdullah and Cukur, Huseyin}, title = {An Effective Detection Algorithm for Region Duplication Forgery in Digital Images}, booktitle = {Proc. SPIE 9845, Optical Pattern Recognition XXVII, 98450O (April 20, 2016)}, journal = {Proc. SPIE}, year = {2016}, volume = {9845}, pages = {98450O-98450O-7}}
-
Detection of copy-move forgery based on Gabor filter
Proc. IEEE Int. Conf. Engineering and Technology (ICETECH)
2016, pp. 629-634
DOI: 10.1109/ICETECH.2016.7569326
BibTeX@inproceedings{Yohannan2016, author = {Yohannan, R. P. and Manuel, M.}, title = {Detection of copy-move forgery based on Gabor filter}, booktitle = {Proc. IEEE Int. Conf. Engineering and Technology (ICETECH)}, year = {2016}, pages = {629--634}}
-
Image Forgery Detection using FREAK Binary Descriptor and Level Set Segmentation
International Journal of Scientific & Engineering Research, Volu, 2016, Vol. 7(2)
BibTeX@article{Youssef2016, author = {Youssef, Bayumy A. B. and Atta, Essam H.}, title = {Image Forgery Detection using FREAK Binary Descriptor and Level Set Segmentation}, journal = {International Journal of Scientific & Engineering Research, Volu}, year = {2016}, volume = {7}, number = {2}}
-
Feature Point-based Copy-move Forgery Detection: Covering the Non-textured Areas
Multimedia Tools and Applications, Springer, 2016, Vol. 75(2), pp. 1159
DOI: 10.1007/s11042-014-2362-y
BibTeX@article{Yu2016, author = {Yu, Liyang and Han, Qi and Niu, Xiamu}, title = {Feature Point-based Copy-move Forgery Detection: Covering the Non-textured Areas}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2016}, volume = {75}, number = {2}, pages = {1159}}
-
Robust Region Duplication Detection on Log-polar Domain Using Band Limitation
Arabian Journal for Science and Engineering, Springer, 2016, pp. 1
DOI: 10.1007/s13369-016-2268-2
BibTeX@article{Yuan2016, author = {Yuan, Yue and Zhang, Yun and Chen, Shuang and Wang, Hong}, title = {Robust Region Duplication Detection on Log-polar Domain Using Band Limitation}, journal = {Arabian Journal for Science and Engineering}, publisher = {Springer}, year = {2016}, pages = {1}}
-
Large-scale Evaluation of Splicing Localization Algorithms for Web Images
Multimedia Tools and Applications, Springer, 2016, pp. 1
DOI: 10.1007/s11042-016-3795-2
BibTeX@article{Zampoglou2016a, author = {Zampoglou, Markos and Papadopoulos, Symeon and Kompatsiaris, Yiannis}, title = {Large-scale Evaluation of Splicing Localization Algorithms for Web Images}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2016}, pages = {1}}
-
Web and Social Media Image Forensics for News Professionals
2016
BibTeX@electronic{Zampoglou2016, author = {Zampoglou, Markos and Papadopoulos, Symeon and Kompatsiaris, Yiannis and Bouwmeester, Ruben and Spangenberg, Jochen}, title = {Web and Social Media Image Forensics for News Professionals}, year = {2016}}
-
Iterative Copy-Move Forgery Detection Based on a New Interest Point Detector
IEEE Transactions on Information Forensics and Security, 2016, Vol. 11(11), pp. 2499-2512
DOI: 10.1109/TIFS.2016.2585118
BibTeX@article{Zandi2016, author = {Zandi, M. and Mahmoudi-Aznaveh, A. and Talebpour, A.}, title = {Iterative Copy-Move Forgery Detection Based on a New Interest Point Detector}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2016}, volume = {11}, number = {11}, pages = {2499--2512}}
-
A Multi-purpose Countermeasure against Image Anti-forensics Using Autoregressive Model
Neurocomputing, Elsevier BV, 2016, Vol. 189, pp. 117-122
DOI: 10.1016/j.neucom.2015.12.089
BibTeX@article{Zeng2016, author = {Zeng, Hui and Kang, Xiangui and Peng, Anjie}, title = {A Multi-purpose Countermeasure against Image Anti-forensics Using Autoregressive Model}, journal = {Neurocomputing}, publisher = {Elsevier BV}, year = {2016}, volume = {189}, pages = {117--122}}
-
A Framework of Camera Source Identification Bayesian Game
IEEE Transactions on Cybernetics, 2016, Vol. PP(99), pp. 1-12
DOI: 10.1109/TCYB.2016.2557802
BibTeX@article{Zeng2016a, author = {Zeng, H. and Liu, J. and Yu, J. and Kang, X. and Shi, Y. Q. and Wang, Z. J.}, title = {A Framework of Camera Source Identification Bayesian Game}, journal = {IEEE Transactions on Cybernetics}, year = {2016}, volume = {PP}, number = {99}, pages = {1--12}}
-
Image Splicing Localization Using PCA-based Noise Level Estimation
Multimedia Tools and Applications, Springer, 2016, pp. 1
DOI: 10.1007/s11042-016-3712-8
BibTeX@article{Zeng2016c, author = {Zeng, Hui and Zhan, Yifeng and Kang, Xiangui and Lin, Xiaodan}, title = {Image Splicing Localization Using PCA-based Noise Level Estimation}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2016}, pages = {1}}
-
Practical Tools for Digital Image Forensic Authentication
Advanced Multimedia and Ubiquitous Engineering
Springer, 2016
DOI: 10.1007/978-981-10-1536-6_59
BibTeX@incollection{Zeng2016d, author = {Zeng, Jinhua and Lu, Wei and Yang, Rui and Qiu, Xiulian}, title = {Practical Tools for Digital Image Forensic Authentication}, booktitle = {Advanced Multimedia and Ubiquitous Engineering}, publisher = {Springer}, year = {2016}}
-
Practical Inspection Workflow for Digital Image Forensic Authentication
Proc. 4th Int. Symp. Digital Forensic and Security (ISDFS)
2016, pp. 172
DOI: 10.1109/ISDFS.2016.7473540
BibTeX@inproceedings{Zeng2016b, author = {Zeng, J. and Shi, S. and Li, Y. and Lu, Q.}, title = {Practical Inspection Workflow for Digital Image Forensic Authentication}, booktitle = {Proc. 4th Int. Symp. Digital Forensic and Security (ISDFS)}, year = {2016}, pages = {172}}
-
An Image Splicing Detection Method Based on PCA Minimum Eigenvalues
Journal of Information Hiding and Multimedia Signal Processing, 2016
BibTeX@article{Zhan2016, author = {Zhan, Lifei and Zhu, Yuesheng and Mo, Zhiwei}, title = {An Image Splicing Detection Method Based on PCA Minimum Eigenvalues}, journal = {Journal of Information Hiding and Multimedia Signal Processing}, year = {2016}}
-
Image Copy Detection Based on Convolutional Neural Networks
Pattern Recognition, Springer, 2016
DOI: 10.1007/978-981-10-3005-5_10
BibTeX@article{Zhang2016d, author = {Zhang, Jing and Zhu, Wenting and Li, Bing and Hu, Weiming and Yang, Jinfeng}, title = {Image Copy Detection Based on Convolutional Neural Networks}, journal = {Pattern Recognition}, publisher = {Springer}, year = {2016}}
-
Identifing source camera using guided image estimation and block weighted average
Journal of Visual Communication and Image Representation, Elsevier BV, 2016
DOI: 10.1016/j.jvcir.2016.12.013
BibTeX@article{Zhang2016b, author = {Zhang, Le-Bing and Peng, Fei and Long, Min}, title = {Identifing source camera using guided image estimation and block weighted average}, journal = {Journal of Visual Communication and Image Representation}, publisher = {Elsevier BV}, year = {2016}}
-
Joint Image Splicing Detection in DCT and Contourlet Transform Domain
Journal of Visual Communication and Image Representation, Elsevier BV, 2016, Vol. 40, pp. 449-458
DOI: 10.1016/j.jvcir.2016.07.013
BibTeX@article{Zhang2016a, author = {Zhang, Qingbo and Lu, Wei and Weng, Jian}, title = {Joint Image Splicing Detection in DCT and Contourlet Transform Domain}, journal = {Journal of Visual Communication and Image Representation}, publisher = {Elsevier BV}, year = {2016}, volume = {40}, pages = {449--458}}
-
Inter-frame Forgery Detection for Static-background Video Based on Mvp Consistency
Digital-Forensics and Watermarking, Springer, 2016
DOI: 10.1007/978-3-319-31960-5_9
BibTeX@article{Zhang2016, author = {Zhang, Zhenzhen and Hou, Jianjun and Li, Zhaohong and Li, Dongdong}, title = {Inter-frame Forgery Detection for Static-background Video Based on Mvp Consistency}, journal = {Digital-Forensics and Watermarking}, publisher = {Springer}, year = {2016}}
-
Image Region Forgery Detection: A Deep Learning Approach
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016: Cyber-Security by Design
2016, Vol. 14, pp. 1
DOI: 10.1109/icip.1994.413765
BibTeX@inproceedings{Zhanga2016, author = {Zhanga, Ying and Goha, Jonathan and Wina, Lei Lei and Thinga, Vrizlynn}, title = {Image Region Forgery Detection: A Deep Learning Approach}, booktitle = {Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016: Cyber-Security by Design}, year = {2016}, volume = {14}, pages = {1}}
-
An Overview on Passive Image Forensics Technology for Automatic Computer Forgery
International Journal of Digital Crime and Forensics (IJDCF), 2016, Vol. 8(4)
DOI: 10.4018/IJDCF.2016100102
BibTeX@article{Zhao2016a, author = {Zhao}, title = {An Overview on Passive Image Forensics Technology for Automatic Computer Forgery}, journal = {International Journal of Digital Crime and Forensics (IJDCF)}, year = {2016}, volume = {8}, number = {4}}
-
Analysis of SIFT Method Based on Swarm Intelligent Algorithms for Copy-move Forgery Detection
Security, Privacy, and Anonymity in Computation, Communication, and Storage, Springer, 2016
DOI: 10.1007/978-3-319-49148-6_39
BibTeX@article{Zhao2016b, author = {Zhao, Fei and Shi, Wenchang and Qin, Bo and Liang, Bin}, title = {Analysis of SIFT Method Based on Swarm Intelligent Algorithms for Copy-move Forgery Detection}, journal = {Security, Privacy, and Anonymity in Computation, Communication, and Storage}, publisher = {Springer}, year = {2016}}
-
A Copy-Move Forgery Detection Scheme with Improved Clone Region Estimation
Proc. Third Int. Conf. Trustworthy Systems and their Applications (TSA)
2016, pp. 8-16
DOI: 10.1109/TSA.2016.12
BibTeX@inproceedings{Zhao2016c, author = {Zhao, F. and Shi, W. and Qin, B. and Liang, B.}, title = {A Copy-Move Forgery Detection Scheme with Improved Clone Region Estimation}, booktitle = {Proc. Third Int. Conf. Trustworthy Systems and their Applications (TSA)}, year = {2016}, pages = {8--16}}
-
Computationally Efficient Demosaicing Filter Estimation for Forensic Camera Model Identification
Proc. IEEE Int. Conf. Image Processing (ICIP)
2016, pp. 151-155
DOI: 10.1109/ICIP.2016.7532337
BibTeX@inproceedings{Zhao2016, author = {Zhao, X. and Stamm, M. C.}, title = {Computationally Efficient Demosaicing Filter Estimation for Forensic Camera Model Identification}, booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)}, year = {2016}, pages = {151--155}}
-
Fusion of Block and Keypoints Based Approaches for Effective Copy-move Image Forgery Detection
Multidimensional Systems and Signal Processing, 2016, pp. 1-17
DOI: 10.1007/s11045-016-0416-1
BibTeX@article{Zheng2016, author = {Zheng, Jiangbin and Liu, Yanan and Ren, Jinchang and Zhu, Tingge and Yan, Yijun and Yang, Heng}, title = {Fusion of Block and Keypoints Based Approaches for Effective Copy-move Image Forgery Detection}, journal = {Multidimensional Systems and Signal Processing}, year = {2016}, pages = {1--17}}
-
Digital Image Modification Detection Using Color Information and Its Histograms
Forensic Science International, Elsevier BV, 2016, Vol. 266, pp. 379-388
DOI: 10.1016/j.forsciint.2016.06.005
BibTeX@article{Zhou2016, author = {Zhou, Haoyu and Shen, Yue and Zhu, Xinghui and Liu, Bo and Fu, Zigang and Fan, Na}, title = {Digital Image Modification Detection Using Color Information and Its Histograms}, journal = {Forensic Science International}, publisher = {Elsevier BV}, year = {2016}, volume = {266}, pages = {379--388}}
-
Copy-move Forgery Detection Using Improved SIFT
Proc. SPIE, 2016, Vol. 10033, pp. 100334S-100334S-6
DOI: 10.1117/12.2244287
BibTeX@other{Zhou2016a, author = {Zhou, Yigang and Xie, Yunfang}, title = {Copy-move Forgery Detection Using Improved SIFT}, journal = {Proc. SPIE}, year = {2016}, volume = {10033}, pages = {100334S-100334S-6}}
-
A Learning-to-rank Approach for Image Scaling Factor Estimation
Neurocomputing, 2016, pp. -
DOI: 10.1016/j.neucom.2015.06.113
BibTeX@article{Zhu2016, author = {Zhu, Nan and Deng, Cheng and Gao, Xinbo}, title = {A Learning-to-rank Approach for Image Scaling Factor Estimation}, journal = {Neurocomputing}, year = {2016}, pages = {-}}
-
Image Sharpening Detection Based on Multiresolution Overshoot Artifact Analysis
Multimedia Tools and Applications, Springer, 2016, pp. 1
DOI: 10.1007/s11042-016-3938-5
BibTeX@article{Zhu2016c, author = {Zhu, Nan and Deng, Cheng and Gao, Xinbo}, title = {Image Sharpening Detection Based on Multiresolution Overshoot Artifact Analysis}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2016}, pages = {1}}
-
Revisiting Copy-move Forgery Detection by Considering Realistic Image with Similar but Genuine Objects
arXiv preprint arXiv:1601.07262, 2016
DOI: 10.1007/s11042-014-2431-2
BibTeX@article{Zhu2016a, author = {Zhu, Ye and Ng, Tian-Tsong and Shen, Xuanjing and Wen, Bihan}, title = {Revisiting Copy-move Forgery Detection by Considering Realistic Image with Similar but Genuine Objects}, journal = {arXiv preprint arXiv:1601.07262}, year = {2016}}
-
Copy-move Forgery Detection Based on Scaled ORB
Multimedia Tools and Applications, Springer, 2016, Vol. 75(6), pp. 3221
DOI: 10.1007/s11042-014-2431-2
BibTeX@article{Zhu2016b, author = {Zhu, Ye and Shen, Xuanjing and Chen, Haipeng}, title = {Copy-move Forgery Detection Based on Scaled ORB}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2016}, volume = {75}, number = {6}, pages = {3221}}
-
Comparison of human and machine performance for copy-move image forgery detection involving similar but genuine objects
Proc. IEEE Region 10 Conf. (TENCON)
2016, pp. 1379-1383
DOI: 10.1109/TENCON.2016.7848240
BibTeX@inproceedings{Zhu2016e, author = {Zhu, Y. and Subramanian, R. and Ng, T. T. and Winkler, S. and Ratnam, R.}, title = {Comparison of human and machine performance for copy-move image forgery detection involving similar but genuine objects}, booktitle = {Proc. IEEE Region 10 Conf. (TENCON)}, year = {2016}, pages = {1379--1383}}
-
Comparison of Human and Machine Performance for Copy-move Image Forgery Detection Involving Similar but Genuine Objects
Proc. IEEE Region 10 International Conference (TENCON), Singapore, Nov. 22-25, 2016
2016
BibTeX@conference{Zhu2016d, author = {Zhu, Y. and Subramanian, R. and Ng, T.-T. and Winkler, S. and Ratnam, R.}, title = {Comparison of Human and Machine Performance for Copy-move Image Forgery Detection Involving Similar but Genuine Objects}, booktitle = {Proc. IEEE Region 10 International Conference (TENCON), Singapore, Nov. 22-25, 2016}, year = {2016}}
-
Method of Photomontage Detection under Conditions of Limitations Absence for Photos Falsification
Odes'kyi Politechnichnyi Universytet. Pratsi, Odessa National Polytechnic University, 2016(2), pp. 51-55
DOI: 10.15276/opu.2.49.2016.12
BibTeX@article{Zorilo2016, author = {Zorilo, Viktoriya and Lebedeva, Yelena and Kozina, Maria and Belush, Daria}, title = {Method of Photomontage Detection under Conditions of Limitations Absence for Photos Falsification}, journal = {Odes'kyi Politechnichnyi Universytet. Pratsi}, publisher = {Odessa National Polytechnic University}, year = {2016}, number = {2}, pages = {51--55}}
-
Digital-Forensics and Watermarking
Shi, Y.-Q., Kim, H. J., Pérez-González, F. & Echizen, I. (ed.)
Springer International Publishing, 2016
BibTeX@book{Shi2016,, title = {Digital-Forensics and Watermarking}, publisher = {Springer International Publishing}, year = {2016}}
2015
-
An Image Forensic Technique Based on 2D Lighting Estimation Using Spherical Harmonic Frames
Zha, H., Chen, X., Wang, L. & Miao, Q. (ed.)
Computer Vision
Springer Berlin Heidelberg, 2015, Vol. 546, pp. 325-334
DOI: 10.1007/978-3-662-48558-3_33
BibTeX@incollection{Zhao2015b, author = {Zhao, Wenyong and Liu, Hong}, title = {An Image Forensic Technique Based on 2D Lighting Estimation Using Spherical Harmonic Frames}, booktitle = {Computer Vision}, publisher = {Springer Berlin Heidelberg}, year = {2015}, volume = {546}, pages = {325--334}}
-
Multiple Point Android Digital Image Authentication
Proc. Int Signals, Circuits and Systems (ISSCS) Symp
2015, pp. 1-4
DOI: 10.1109/ISSCS.2015.7203945
BibTeX@inproceedings{Achimescu2015, author = {Achimescu, E. and Preda, R. O. and Vizireanu, N. and Pirnog, I.}, title = {Multiple Point Android Digital Image Authentication}, booktitle = {Proc. Int Signals, Circuits and Systems (ISSCS) Symp}, year = {2015}, pages = {1--4}}
-
Image Forgery Detection Using Multi Scale Entropy Filter and Local Phase Quantization
I.J. Image, Graphics and Signal Processing, 2015
DOI: 10.5815/ijigsp.2015.10.08
BibTeX@article{Agarwal2015, author = {Agarwal, Saurabh and Chand, Satish}, title = {Image Forgery Detection Using Multi Scale Entropy Filter and Local Phase Quantization}, journal = {I.J. Image, Graphics and Signal Processing}, year = {2015}}
-
Anti-forensics of JPEG Images Using Interpolation
I.J. Image, Graphics and Signal Processing, 2015, Vol. 12, pp. 10-17
DOI: 10.5815/ijigsp.2015.12.02
BibTeX@article{Agarwal2015a, author = {Agarwal, Saurabh and Chand, Satish}, title = {Anti-forensics of JPEG Images Using Interpolation}, journal = {I.J. Image, Graphics and Signal Processing}, year = {2015}, volume = {12}, pages = {10--17}}
-
A Method for Detect Forgery from Images
Eng.& Tech.Journal, 2015, Vol. 33(2)
DOI: 10.1109/ceec.2014.6958558
BibTeX@article{Ahmed2015, author = {Ahmed, Hanaa Mohsin and Salim, Sabaa Rakan}, title = {A Method for Detect Forgery from Images}, journal = {Eng.& Tech.Journal}, year = {2015}, volume = {33}, number = {2}}
-
Method for Detect and Extract Forgery from Images
Al - Mansour Journal, 2015
BibTeX@article{Ahmed2015a, author = {Ahmed, Hanaa Mohsin and Salim, Sabaa Rakan}, title = {Method for Detect and Extract Forgery from Images}, journal = {Al - Mansour Journal}, year = {2015}}
-
The Value of Metadata in Digital Forensics
Proc. European Intelligence and Security Informatics Conf
2015, pp. 182
DOI: 10.1109/EISIC.2015.26
BibTeX@inproceedings{Alanazi2015, author = {Alanazi, F. and Jones, A.}, title = {The Value of Metadata in Digital Forensics}, booktitle = {Proc. European Intelligence and Security Informatics Conf}, year = {2015}, pages = {182}}
-
Detection Techniques of Digital Image Forgery by Using Images Metadata in Digital Investigation
Proc. of the Int. Academic Conf. on Law, Politics & Management
Al-Khanjari,, 2015
BibTeX@inproceedings{Alani2015, author = {Alani, A. and Al-Khanjari, Z.}, title = {Detection Techniques of Digital Image Forgery by Using Images Metadata in Digital Investigation}, booktitle = {Proc. of the Int. Academic Conf. on Law, Politics & Management}, journal = {Al-Khanjari,}, year = {2015}}
-
A Novel Image Filtering Approach for Sensor Fingerprint Estimation in Source Camera Identification
Proc. 12th IEEE Int Advanced Video and Signal Based Surveillance (AVSS) Conf
2015, pp. 1-5
DOI: 10.1109/AVSS.2015.7301808
BibTeX@inproceedings{Al-Ani2015, author = {Al-Ani, Mustafa and Khelifi, Fouad and Lawgaly, Ashref and Bouridane, Ahmed}, title = {A Novel Image Filtering Approach for Sensor Fingerprint Estimation in Source Camera Identification}, booktitle = {Proc. 12th IEEE Int Advanced Video and Signal Based Surveillance (AVSS) Conf}, year = {2015}, pages = {1--5}}
-
Cloning Localization Approach Using K-means Clustering and Support Vector Machine
Journal of Electronic Imaging, 2015, Vol. 24(4), pp. 043019
DOI: 10.1117/1.JEI.24.4.043019
BibTeX@article{Alfraih2015, author = {Alfraih, Areej S. and Briffa, Johann A. and Wesemeyer, Stephan}, title = {Cloning Localization Approach Using K-means Clustering and Support Vector Machine}, journal = {Journal of Electronic Imaging}, year = {2015}, volume = {24}, number = {4}, pages = {043019}}
-
Cloning Localization Based on Feature Extraction and K-means Clustering
Digital-Forensics and Watermarking, Springer, 2015
DOI: 10.1007/978-3-319-19321-2_31
BibTeX@article{Alfraih2015a, author = {Alfraih, Areej S. and Briffa, Johann A. and Wesemeyer, Stephan}, title = {Cloning Localization Based on Feature Extraction and K-means Clustering}, journal = {Digital-Forensics and Watermarking}, publisher = {Springer}, year = {2015}}
-
Enhanced Matching Method for Copy-move Forgery Detection by Means of Zernike Moments
Digital-Forensics and Watermarking, Springer, 2015
DOI: 10.1007/978-3-319-19321-2_37
BibTeX@article{Al-Qershi2015, author = {Al-Qershi, Osamah M. and Khoo, Bee Ee}, title = {Enhanced Matching Method for Copy-move Forgery Detection by Means of Zernike Moments}, journal = {Digital-Forensics and Watermarking}, publisher = {Springer}, year = {2015}}
-
Detection of Copy-move Forgery in Images Containing Flipped and Random-shaped Tampered Regions
Egyptian Computer Science Journal, ECS, 2015, Vol. 36(6), pp. 80-95
BibTeX@article{Alsanussi2015, author = {Alsanussi, Reem A. and Shamardan, Hossam Eldeen and Mostafa and Mostafa, Sami M.}, title = {Detection of Copy-move Forgery in Images Containing Flipped and Random-shaped Tampered Regions}, journal = {Egyptian Computer Science Journal, ECS}, year = {2015}, volume = {36}, number = {6}, pages = {80--95}}
-
A Feature-based Forensic Procedure for Splicing Forgeries Detection
Mathematical Problems in Engineering, 2015, Vol. 2015(653164)
DOI: 10.1155/2015/653164
BibTeX@article{Amerini2015b, author = {Amerini, Irene}, title = {A Feature-based Forensic Procedure for Splicing Forgeries Detection}, journal = {Mathematical Problems in Engineering}, year = {2015}, volume = {2015}, number = {653164}}
-
Acquisition Source Identification through a Blind Image Classification
Image Processing, IET, 2015, Vol. 9(4), pp. 329-337
DOI: 10.1049/iet-ipr.2014.0316
BibTeX@article{Amerini2015a, author = {Amerini, Irene and Becarelli, R. and Bertini, B. and Caldelli, R.}, title = {Acquisition Source Identification through a Blind Image Classification}, journal = {Image Processing, IET}, year = {2015}, volume = {9}, number = {4}, pages = {329--337}}
-
Detection of Manipulations on Printed Images to Address Crime Scene Analysis: A Case Study
Forensic Science International, 2015
DOI: 10.1016/j.forsciint.2015.03.020
BibTeX@article{Amerini2015, author = {Amerini, Irene and Caldelli, Roberto and Bimbo, Alberto Del and Fuccia, Andrea Di and Rizzo, Anna Paola and Saravo, Luigi}, title = {Detection of Manipulations on Printed Images to Address Crime Scene Analysis: A Case Study}, journal = {Forensic Science International}, year = {2015}}
-
On Forensic Use of Biometrics
Ho/Handbook of Digital Forensics of Multimedia Data and Devices
Wiley-Blackwell, 2015, pp. 270-304
DOI: 10.1002/9781118705773.ch7
BibTeX@incollection{Arbab-Zavar2015, author = {Arbab-Zavar, Banafshe and Wei, Xingjie and Bustard, John D. and Nixon, Mark S. and Li, Chang-Tsun}, title = {On Forensic Use of Biometrics}, booktitle = {Ho/Handbook of Digital Forensics of Multimedia Data and Devices}, publisher = {Wiley-Blackwell}, year = {2015}, pages = {270--304}}
-
Copy-move Forgery Detection by Matching Triangles of Keypoints
IEEE Transactions on Information Forensics and Security, 2015, Vol. 10(10), pp. 2084-2094
DOI: 10.1109/TIFS.2015.2445742
BibTeX@article{Ardizzone2015a, author = {Ardizzone, Edoardo and Bruno, Arcangelo Ranieri. and Mazzola, Giuseppe}, title = {Copy-move Forgery Detection by Matching Triangles of Keypoints}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2015}, volume = {10}, number = {10}, pages = {2084--2094}}
-
A Tool to Support the Creation of Datasets of Tampered Videos
Image Analysis and Processing — ICIAP 2015
Springer, 2015, pp. 665-675
DOI: 10.1007/978-3-319-23234-8_61
BibTeX@incollection{Ardizzone2015, author = {Ardizzone, Edoardo and Mazzola, Giuseppe}, title = {A Tool to Support the Creation of Datasets of Tampered Videos}, booktitle = {Image Analysis and Processing — ICIAP 2015}, publisher = {Springer}, year = {2015}, pages = {665--675}}
-
Image Forgery and Its Detection: A Survey
Proc. Int Innovations in Information, Embedded and Communication Systems (ICIIECS) Conf
2015, pp. 1-9
DOI: 10.1109/ICIIECS.2015.7193253
BibTeX@inproceedings{ArunAnoop2015, author = {Arun Anoop, M.}, title = {Image Forgery and Its Detection: A Survey}, booktitle = {Proc. Int Innovations in Information, Embedded and Communication Systems (ICIIECS) Conf}, year = {2015}, pages = {1--9}}
-
Adaptive Neuro Fuzzy Classifier Based Digital Image Forgery Detection Using Color Illumination
International Journal of Advanced Engineering and Global Technology, 2015, Vol. 3(2)
BibTeX@article{Arun2015, author = {Arun, Anusree and Vimala, A. and Joshya, Y. Camy and Murugan, C. Arul}, title = {Adaptive Neuro Fuzzy Classifier Based Digital Image Forgery Detection Using Color Illumination}, journal = {International Journal of Advanced Engineering and Global Technology}, year = {2015}, volume = {3}, number = {2}}
-
Blurred Image Splicing Localization by Exposing Blur Type Inconsistency
Information Forensics and Security, IEEE Transactions on, 2015, Vol. 10(99), pp. 999-1009
DOI: 10.1109/TIFS.2015.2394231
BibTeX@article{Bahrami2015, author = {Bahrami, K. and Kot, A. and Li, L. and Li, H.}, title = {Blurred Image Splicing Localization by Exposing Blur Type Inconsistency}, journal = {Information Forensics and Security, IEEE Transactions on}, year = {2015}, volume = {10}, number = {99}, pages = {999--1009}}
-
Image Splicing Localization Based on Blur Type Inconsistency
Proc. IEEE Int Circuits and Systems (ISCAS) Symp
Institute of Electrical & Electronics Engineers (IEEE), 2015, pp. 1042-1045
DOI: 10.1109/ISCAS.2015.7168815
BibTeX@inproceedings{Bahrami2015a, author = {Bahrami, K. and Kot, A. C.}, title = {Image Splicing Localization Based on Blur Type Inconsistency}, booktitle = {Proc. IEEE Int Circuits and Systems (ISCAS) Symp}, publisher = {Institute of Electrical & Electronics Engineers (IEEE)}, year = {2015}, pages = {1042--1045}}
-
Universal Counterforensics of Multiple Compressed JPEG Images
Digital-Forensics and Watermarking, Springer, 2015
DOI: 10.1007/978-3-319-19321-2_3
BibTeX@article{Barni2015, author = {Barni, Mauro and Fontani, Marco and Tondi, Benedetta}, title = {Universal Counterforensics of Multiple Compressed JPEG Images}, journal = {Digital-Forensics and Watermarking}, publisher = {Springer}, year = {2015}}
-
Analysis of Photo Response Non-uniformity (PRNU)
Journal of Homicide and Major Incident, 2015, Vol. 10(2), pp. 45-57
DOI: 10.1016/j.forsciint.2012.12.018
BibTeX@article{Bartle2015, author = {Bartle, Anna and Langley, Andy}, title = {Analysis of Photo Response Non-uniformity (PRNU)}, journal = {Journal of Homicide and Major Incident}, year = {2015}, volume = {10}, number = {2}, pages = {45--57}}
-
Sensor Fingerprint Identification through Composite Fingerprints and Group Testing
Information Forensics and Security, IEEE Transactions on, 2015, Vol. 10(3), pp. 597-612
DOI: 10.1109/TIFS.2014.2385634
BibTeX@article{Bayram2015, author = {Bayram, Sevinc and Sencar, H. T. and Memon, N.}, title = {Sensor Fingerprint Identification through Composite Fingerprints and Group Testing}, journal = {Information Forensics and Security, IEEE Transactions on}, year = {2015}, volume = {10}, number = {3}, pages = {597--612}}
-
Performance analysis of forgery detection of JPEG image compression
Proc. Online Int. Conf. Green Engineering and Technologies (IC-GET)
2015, pp. 1-12
DOI: 10.1109/GET.2015.7453773
BibTeX@inproceedings{Bennet2015, author = {Bennet, M. A. and Krishna, R. K. and Babu, G. S. and Jayavignesh, B. S.}, title = {Performance analysis of forgery detection of JPEG image compression}, booktitle = {Proc. Online Int. Conf. Green Engineering and Technologies (IC-GET)}, year = {2015}, pages = {1--12}}
-
Smartphone Verification and User Profiles Linking across Social Networks by Camera Fingerprinting
Digital Forensics and Cyber Crime, Springer, 2015
DOI: 10.1007/978-3-319-25512-5_12
BibTeX@article{Bertini2015b, author = {Bertini, Flavio and Sharma, Rajesh and Iannì, Andrea and Montesi, Danilo}, title = {Smartphone Verification and User Profiles Linking across Social Networks by Camera Fingerprinting}, journal = {Digital Forensics and Cyber Crime}, publisher = {Springer}, year = {2015}}
-
Smartphone Verification and User Profiles Linking across Social Networks by Camera Fingerprinting
James, J. & Breitinger, F. (ed.)
Digital Forensics and Cyber Crime
Springer International Publishing, 2015, Vol. 157, pp. 176-186
DOI: 10.1007/978-3-319-25512-5_12
BibTeX@incollection{Bertini2015, author = {Bertini, Flavio and Sharma, Rajesh and Iannì, Andrea and Montesi, Danilo}, title = {Smartphone Verification and User Profiles Linking across Social Networks by Camera Fingerprinting}, booktitle = {Digital Forensics and Cyber Crime}, publisher = {Springer International Publishing}, year = {2015}, volume = {157}, pages = {176--186}}
-
Profile Resolution across Multilayer Networks through Smartphone Camera Fingerprint
Proceedings of the 19th International Database Engineering &38, Applications Symposium
ACM, 2015, pp. 23-32
DOI: 10.1145/2790755.2790765
BibTeX@inproceedings{Bertini2015a, author = {Bertini, Flavio and Sharma, Rajesh and Iann\i, Andrea and Montesi, Danilo}, title = {Profile Resolution across Multilayer Networks through Smartphone Camera Fingerprint}, booktitle = {Proceedings of the 19th International Database Engineering &38, Applications Symposium}, publisher = {ACM}, year = {2015}, pages = {23--32}}
-
Over-segmentation Based Image Forgery Detection
Proc of the International Conference on Electronic Science and Automation Control (ESAC 2015)
2015
DOI: 10.2991/esac-15.2015.7
BibTeX@inproceedings{Bi2015, author = {Bi, Xiu-Li and Pun, Chi-Man and Yuan, Xiao-Chen}, title = {Over-segmentation Based Image Forgery Detection}, booktitle = {Proc of the International Conference on Electronic Science and Automation Control (ESAC 2015)}, year = {2015}}
-
Image and Video Processing History Recovery
Ho/Handbook of Digital Forensics of Multimedia Data and Devices
Wiley-Blackwell, 2015, pp. 572-611
DOI: 10.1002/9781118705773.ch15
BibTeX@incollection{Bianchi2015, author = {Bianchi, Tiziano and Piva, Alessandro}, title = {Image and Video Processing History Recovery}, booktitle = {Ho/Handbook of Digital Forensics of Multimedia Data and Devices}, publisher = {Wiley-Blackwell}, year = {2015}, pages = {572--611}}
-
Robust Technique of Localizing Blurred Image Splicing Based on Exposing Blur Type Inconsistency
Proc. Int. Conf. Applied and Theoretical Computing and Communication Technology (iCATccT)
2015, pp. 398-402
DOI: 10.1109/ICATCCT.2015.7456916
BibTeX@inproceedings{Binnar2015, author = {Binnar, P. and Mane, V.}, title = {Robust Technique of Localizing Blurred Image Splicing Based on Exposing Blur Type Inconsistency}, booktitle = {Proc. Int. Conf. Applied and Theoretical Computing and Communication Technology (iCATccT)}, year = {2015}, pages = {398--402}}
-
Fake As a Format of Modern Journalism: The Information Reliability Problem
Indian Journal of Science and Technology, 2015, Vol. 8(Special Issue 10)
DOI: 10.17485/ijst/2015/v8is(10)/84840
BibTeX@article{Blokhin2015, author = {Blokhin, Igor Nikolaevich and Ilchenko, Sergey Nikolaevich}, title = {Fake As a Format of Modern Journalism: The Information Reliability Problem}, journal = {Indian Journal of Science and Technology}, year = {2015}, volume = {8}, number = {Special Issue 10}}
-
Localization Overlaid Text Based on Noise Inconsistencies
Advanced Computational Intelligence: An International Journal, 2015
BibTeX@article{Boaz2015, author = {Boaz, Too Kipyego and Prabhakar, C. J.}, title = {Localization Overlaid Text Based on Noise Inconsistencies}, journal = {Advanced Computational Intelligence: An International Journal}, year = {2015}}
-
Digital Image Processing: An Algorithmic Introduction Using Java
Springer, 2015
DOI: 10.1007/978-1-84800-195-4_1
BibTeX@book{Burger2015, author = {Burger, Wilhelm and Burge, Mark J.}, title = {Digital Image Processing: An Algorithmic Introduction Using Java}, publisher = {Springer}, year = {2015}, edition = {3rd}}
-
SIFT Match Removal and Keypoint Preservation through Dominant Orientation Shift
Proc. of the 23rd European Signal Processing Conference (EUSIPCO) 2015
Institute of Electrical & Electronics Engineers (IEEE), 2015
DOI: 10.1109/eusipco.2015.7362747
BibTeX@inproceedings{Caldelli2015, author = {Caldelli, R. and Amerini, Irene and Costanzo, A.}, title = {SIFT Match Removal and Keypoint Preservation through Dominant Orientation Shift}, booktitle = {Proc. of the 23rd European Signal Processing Conference (EUSIPCO) 2015}, publisher = {Institute of Electrical & Electronics Engineers (IEEE)}, year = {2015}}
-
Detection of copy-move forgery in digital image using locality preserving projections
Proc. 8th Int. Congress Image and Signal Processing (CISP)
2015, pp. 599-603
DOI: 10.1109/CISP.2015.7407949
BibTeX@inproceedings{Cao2015c, author = {Cao, G. and Chen, Y. and Zong, G. and Chen, Y.}, title = {Detection of copy-move forgery in digital image using locality preserving projections}, booktitle = {Proc. 8th Int. Congress Image and Signal Processing (CISP)}, year = {2015}, pages = {599--603}}
-
On the Security of Image Manipulation Forensics
Ho, Y.-S., Sang, J., Ro, Y., Kim, J. & Wu, F. (ed.)
Advances in Multimedia Information Processing - PCM 2015
Advances in Multimedia Information Processing -- PCM 2015, Springer Science + Business Media, 2015, Vol. 9314, pp. 97-105
DOI: 10.1007/978-3-319-24075-6_10
BibTeX@incollection{Cao2015b, author = {Cao, Gang and Wang, Yongbin and Zhao, Yao and Ni, Rongrong and Lin, Chunyu}, title = {On the Security of Image Manipulation Forensics}, booktitle = {Advances in Multimedia Information Processing - PCM 2015}, journal = {Advances in Multimedia Information Processing -- PCM 2015}, publisher = {Springer Science + Business Media}, year = {2015}, volume = {9314}, pages = {97--105}}
-
Image Composite Authentication Using a Single Shadow Observation
Science China Information Sciences, Science China Press, 2015, pp. 1-13
DOI: 10.1007/s11432-015-5296-8
BibTeX@article{Cao2015a, author = {Cao, XiaoChun and Zhao, HanDong and Wang, Chuan and Zhang, Wei}, title = {Image Composite Authentication Using a Single Shadow Observation}, journal = {Science China Information Sciences}, publisher = {Science China Press}, year = {2015}, pages = {1--13}}
-
A New Anti-forensic Scheme--hiding the Single JPEG Compression Trace for Digital Image.
J Forensic Sci, College of Information Technical Science, Nankai University, No 94, Weijin Road, Tianjin, Nankai District, 300071, China., College of Information Technical Science, Nankai University, No 94, Weijin Road, Tianjin, Nankai District, 300071, China., 2015, Vol. 60(1), pp. 197-205
DOI: 10.1111/1556-4029.12618
BibTeX@article{Cao2015, author = {Cao, Yanjun and Gao, Tiegang and Sheng, Guorui and Fan, Li and Gao, Lin}, title = {A New Anti-forensic Scheme--hiding the Single JPEG Compression Trace for Digital Image.}, journal = {J Forensic Sci}, school = {College of Information Technical Science, Nankai University, No 94, Weijin Road, Tianjin, Nankai District, 300071, China.}, year = {2015}, volume = {60}, number = {1}, pages = {197--205}}
-
Forensics of High-quality JPEG Images with Color Subsampling
Information Forensics and Security (WIFS), 2015 IEEE International Workshop on
Institute of Electrical & Electronics Engineers (IEEE), 2015, pp. 1-6
DOI: 10.1109/WIFS.2015.7368556
BibTeX@inproceedings{Carnein2015, author = {Carnein, M. and Schöttle, P. and Böhme, R.}, title = {Forensics of High-quality JPEG Images with Color Subsampling}, booktitle = {Information Forensics and Security (WIFS), 2015 IEEE International Workshop on}, publisher = {Institute of Electrical & Electronics Engineers (IEEE)}, year = {2015}, pages = {1--6}}
-
Forensics of high-quality JPEG images with color subsampling
Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)
2015, pp. 1-6
DOI: 10.1109/WIFS.2015.7368556
BibTeX@inproceedings{Carnein2015a, author = {Carnein, M. and Schöttle, P. and Böhme, R.}, title = {Forensics of high-quality JPEG images with color subsampling}, booktitle = {Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)}, year = {2015}, pages = {1--6}}
-
Illuminant-based Transformed Spaces for Image Forensics
IEEE Transactions on Information Forensics and Security, 2015, Vol. PP(99), pp. 1
DOI: 10.1109/TIFS.2015.2506548
BibTeX@article{Carvalho2015a, author = {Carvalho, T. and Faria, F. A. and Pedrini, H. and Torres, R. S. and Rocha, A.}, title = {Illuminant-based Transformed Spaces for Image Forensics}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2015}, volume = {PP}, number = {99}, pages = {1}}
-
Exposing Photo Manipulation from User-guided 3D Lighting Analysis
IS&T/SPIE Electronic Imaging
Proc. SPIE, 2015, Vol. 9409, pp. 940902-940902-10
DOI: 10.1117/12.2075544
BibTeX@inproceedings{Carvalho2015, author = {Carvalho, Tiago and Farid, Hany and Kee, Eric}, title = {Exposing Photo Manipulation from User-guided 3D Lighting Analysis}, booktitle = {IS&T/SPIE Electronic Imaging}, journal = {Proc. SPIE}, year = {2015}, volume = {9409}, pages = {940902-940902-10}}
-
A PNU-based Technique to Detect Forged Regions in Digital Images
Battiato, S., Blanc-Talon, J., Gallo, G., Philips, W., Popescu, D. & Scheunders, P. (ed.)
Advanced Concepts for Intelligent Vision Systems
Advanced Concepts for Intelligent Vision Systems, Springer, 2015, Vol. 9386, pp. 486-498
DOI: 10.1007/978-3-319-25903-1_42
BibTeX@article{Cattaneo2015, author = {Cattaneo, Giuseppe and Ferraro Petrillo, Umberto and Roscigno, Gianluca and Fusco, Carmine}, title = {A PNU-based Technique to Detect Forged Regions in Digital Images}, booktitle = {Advanced Concepts for Intelligent Vision Systems}, journal = {Advanced Concepts for Intelligent Vision Systems}, publisher = {Springer}, year = {2015}, volume = {9386}, pages = {486--498}}
-
Revealing Image Forgery through Image Manipulation Detection
Proc. Global Conf. Communication Technologies (GCCT)
2015, pp. 723-727
DOI: 10.1109/GCCT.2015.7342759
BibTeX@inproceedings{Charpe2015, author = {Charpe, J. and Bhattacharya, A.}, title = {Revealing Image Forgery through Image Manipulation Detection}, booktitle = {Proc. Global Conf. Communication Technologies (GCCT)}, year = {2015}, pages = {723--727}}
-
Fast Computation of Sliding Discrete Tchebichef Moments and Its Application in Duplicated Regions Detection
IEEE Transactions on Signal Processing, Institute of Electrical and Electronics Engineers (IEEE), 2015, Vol. 63(20), pp. 5424-5436
DOI: 10.1109/TSP.2015.2451107
BibTeX@article{Chen2015b, author = {Chen, B. and Coatrieux, G. and Wu, J. and Dong, Z. and Coatrieux, J. and Shu, H.}, title = {Fast Computation of Sliding Discrete Tchebichef Moments and Its Application in Duplicated Regions Detection}, journal = {IEEE Transactions on Signal Processing}, publisher = {Institute of Electrical and Electronics Engineers (IEEE)}, year = {2015}, volume = {63}, number = {20}, pages = {5424--5436}}
-
Camera Model Identification Framework Using an Ensemble of Demosaicing Features
Information Forensics and Security (WIFS), 2015 IEEE International Workshop on
2015, pp. 1-6
DOI: 10.1109/WIFS.2015.7368573
BibTeX@inproceedings{Chen2015a, author = {Chen, Chen and Stamm, M. C.}, title = {Camera Model Identification Framework Using an Ensemble of Demosaicing Features}, booktitle = {Information Forensics and Security (WIFS), 2015 IEEE International Workshop on}, year = {2015}, pages = {1--6}}
-
Median Filtering Forensics Based on Convolutional Neural Networks
Signal Processing Letters, IEEE, 2015, Vol. 22(11), pp. 1849-1853
DOI: 10.1109/LSP.2015.2438008
BibTeX@article{Chen2015, author = {Chen, J. and Kang, X. and Liu, Y. and Wang, Z. J.}, title = {Median Filtering Forensics Based on Convolutional Neural Networks}, journal = {Signal Processing Letters, IEEE}, year = {2015}, volume = {22}, number = {11}, pages = {1849--1853}}
-
Images, Videos, and Bigdata
Mathematical Problems in Data Science
Springer, 2015
DOI: 10.1007/978-3-319-25127-1_5
BibTeX@incollection{Chen2015c, author = {Chen, Li M.}, title = {Images, Videos, and Bigdata}, booktitle = {Mathematical Problems in Data Science}, publisher = {Springer}, year = {2015}}
-
Automatic Detection of Object-based Forgery in Advanced Video
IEEE Transactions on Circuits and Systems for Video Technology, Institute of Electrical and Electronics Engineers (IEEE), 2015, Vol. PP(11), pp. 2138-2151
DOI: 10.1109/TCSVT.2015.2473436
BibTeX@article{Chen2015d, author = {Chen, Shengda and Tan, Shunquan and Li, Bin and Huang, Jiwu}, title = {Automatic Detection of Object-based Forgery in Advanced Video}, journal = {IEEE Transactions on Circuits and Systems for Video Technology}, publisher = {Institute of Electrical and Electronics Engineers (IEEE)}, year = {2015}, volume = {PP}, number = {11}, pages = {2138--2151}}
-
Digital Wavelet Transform Based Image Forgery Detection Using Post -processing
Proc of SDPS 2015, 2015
BibTeX@article{Chiluka2015, author = {Chiluka, Praveen K. and Das, Sunil R. and Assaf, Mansour H. and Biswas, Satyendra N. and Morton, Scott and Petriu, Emil M. and Groza, Voicu}, title = {Digital Wavelet Transform Based Image Forgery Detection Using Post -processing}, journal = {Proc of SDPS 2015}, year = {2015}}
-
Who’s behind the Camera? Identifying the Authorship of a Photograph
arXiv, 2015
BibTeX@article{Christopher2015, author = {Christopher and Kovashka, Thomas Adriana}, title = {Who’s behind the Camera? Identifying the Authorship of a Photograph}, journal = {arXiv}, year = {2015}}
-
Fundamental Limits in Multimedia Forensics and Anti-forensics
Faculty of the Graduate School of the University of Maryland, Department of Electrical and Computer Engineering University of Maryland, 2015
BibTeX@phdthesis{Chu2015a, author = {Chu, X.}, title = {Fundamental Limits in Multimedia Forensics and Anti-forensics}, school = {Faculty of the Graduate School of the University of Maryland}, year = {2015}}
-
Information Theoretical Limit of Media Forensics: The Forensicability
IEEE Transactions on Information Forensics and Security, 2015, Vol. PP(99), pp. 1
DOI: 10.1109/TIFS.2015.2510820
BibTeX@article{Chu2015e, author = {Chu, X. and Chen, Y. and Stamm, M. and Liu, K.}, title = {Information Theoretical Limit of Media Forensics: The Forensicability}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2015}, volume = {PP}, number = {99}, pages = {1}}
-
On Antiforensic Concealability with Rate-distortion Tradeoff
Image Processing, IEEE Transactions on, 2015, Vol. 24(3), pp. 1087-1100
DOI: 10.1109/TIP.2015.2390137
BibTeX@article{Chu2015, author = {Chu, X. and Stamm, M. C. and Chen, Y. and Liu, K. J. R.}, title = {On Antiforensic Concealability with Rate-distortion Tradeoff}, journal = {Image Processing, IEEE Transactions on}, year = {2015}, volume = {24}, number = {3}, pages = {1087--1100}}
-
Video Spatio-Temporal Filtering Based on Cameras and Target Objects Trajectories -- Videosurveillance Forensic Framework
Proc. 10th Int Availability, Reliability and Security (ARES) Conf
2015, pp. 611-617
DOI: 10.1109/ARES.2015.102
BibTeX@inproceedings{Codreanu2015, author = {Codreanu, D. and Peninou, A. and Sedes, F.}, title = {Video Spatio-Temporal Filtering Based on Cameras and Target Objects Trajectories -- Videosurveillance Forensic Framework}, booktitle = {Proc. 10th Int Availability, Reliability and Security (ARES) Conf}, year = {2015}, pages = {611--617}}
-
Forensic Detection of Processing Operator Chains: Recovering the History of Filtered JPEG Images
Information Forensics and Security, IEEE Transactions on, 2015(99)
DOI: 10.1109/TIFS.2015.2424195
BibTeX@article{Conotter2015, author = {Conotter, V. and Comesana, P. and Perez-Gonzalez, F.}, title = {Forensic Detection of Processing Operator Chains: Recovering the History of Filtered JPEG Images}, journal = {Information Forensics and Security, IEEE Transactions on}, year = {2015}, number = {99}}
-
Forensic Detection of Processing Operator Chains: Recovering the History of Filtered JPEG Images
IEEE Transactions on Information Forensics and Security, 2015, Vol. 10(11), pp. 2257-2269
DOI: 10.1109/TIFS.2015.2424195
BibTeX@article{Conotter2015a, author = {Conotter, V. and Comesaña, P. and Pérez-González, F.}, title = {Forensic Detection of Processing Operator Chains: Recovering the History of Filtered JPEG Images}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2015}, volume = {10}, number = {11}, pages = {2257--2269}}
-
Richtlinien Zur «erklärung Der Pflichten Und Rechte Der Journalistinnen Und Journalisten»
2015
BibTeX@electronic{SchweizerPresserat2015, author = {suisse de la presse Consiglio svizzero della stampa and Conseil, Schweizer Presserat}, title = {Richtlinien Zur «erklärung Der Pflichten Und Rechte Der Journalistinnen Und Journalisten»}, year = {2015}}
-
Unsupervised Classification of Mobile Device Images
ICIT 2015 The 7th International Conference on Information Technology
2015
DOI: 10.15849/icit.2015.0014
BibTeX@inproceedings{Corripio2015, author = {Corripio, Jocelin Rosales and Orozco, Ana Lucila Sandoval and Villalba, Luis Javier García}, title = {Unsupervised Classification of Mobile Device Images}, booktitle = {ICIT 2015 The 7th International Conference on Information Technology}, year = {2015}}
-
New Technique of Forensic Analysis for Digital Cameras in Mobile Devices
Proc of the 7th International Conference on Information Technology ICIT
2015
DOI: 10.15849/icit.2015.0105
BibTeX@inproceedings{Corripio2015a, author = {Corripio, Jocelin Rosales and Orozco, Ana Lucila Sandoval and Villalba, Luis Javier García}, title = {New Technique of Forensic Analysis for Digital Cameras in Mobile Devices}, booktitle = {Proc of the 7th International Conference on Information Technology ICIT}, year = {2015}}
-
Splicebuster: A New Blind Image Splicing Detector
Information Forensics and Security (WIFS), 2015 IEEE International Workshop on
2015, pp. 1-6
DOI: 10.1109/WIFS.2015.7368565
BibTeX@inproceedings{Cozzolino2015, author = {Cozzolino, D. and Poggi, G. and Verdoliva, L.}, title = {Splicebuster: A New Blind Image Splicing Detector}, booktitle = {Information Forensics and Security (WIFS), 2015 IEEE International Workshop on}, year = {2015}, pages = {1--6}}
-
Efficient Dense-field Copy-move Forgery Detection
IEEE Transactions on Information Forensics and Security, 2015
DOI: 10.1109/TIFS.2015.2455334
BibTeX@article{Cozzolino2015a, author = {Cozzolino, D. and Poggi, G. and Verdoliva, L.}, title = {Efficient Dense-field Copy-move Forgery Detection}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2015}}
-
Video Forgery Detection and Localization Based on 3D Patchmatch
Proc. IEEE Int Multimedia & Expo Workshops (ICMEW) Conf
2015, pp. 1-6
DOI: 10.1109/ICMEW.2015.7169805
BibTeX@inproceedings{DAmiano2015, author = {D'Amiano, L. and Cozzolino, D. and Poggi, G. and Verdoliva, L.}, title = {Video Forgery Detection and Localization Based on 3D Patchmatch}, booktitle = {Proc. IEEE Int Multimedia & Expo Workshops (ICMEW) Conf}, year = {2015}, pages = {1--6}}
-
Video Forgery Detection and Localization Based on 3D Patchmatch
Proc. IEEE Int Multimedia & Expo Workshops (ICMEW) Conf, 2015
DOI: 10.1109/icmew.2015.7169805
BibTeX@article{D’Amiano2015, author = {D’Amiano, L. and Cozzolino, D. and Poggi, G. and Verdoliva, L.}, title = {Video Forgery Detection and Localization Based on 3D Patchmatch}, journal = {Proc. IEEE Int Multimedia & Expo Workshops (ICMEW) Conf}, year = {2015}}
-
Image Validation by Demosaicing
International Journal of Advanced Research in Computer and Communication Engineering, 2015, Vol. 4(4), pp. 118-121
DOI: 10.17148/ijarcce.2015.4329
BibTeX@article{Dangale2015, author = {Dangale, P. and Amage, P. and Ubale, S. and Jadhav, D. and Gaikwad, G. M.}, title = {Image Validation by Demosaicing}, journal = {International Journal of Advanced Research in Computer and Communication Engineering}, year = {2015}, volume = {4}, number = {4}, pages = {118--121}}
-
Raise: A Raw Images Dataset for Digital Image Forensics
Proceedings of the 6th ACM Multimedia Systems Conference
ACM, 2015, pp. 219-224
DOI: 10.1145/2713168.2713194
BibTeX@inproceedings{Dang-Nguyen2015, author = {Dang-Nguyen, Duc-Tien and Pasquini, Cecilia and Conotter, Valentina and Boato, Giulia}, title = {Raise: A Raw Images Dataset for Digital Image Forensics}, booktitle = {Proceedings of the 6th ACM Multimedia Systems Conference}, publisher = {ACM}, year = {2015}, pages = {219--224}}
-
Image Authentication Using LBP-based Perceptual Image Hashing
Journal of AI and Data Mining, 2015
BibTeX@article{Davarzani2015, author = {Davarzani, R. and Mozaffari, S. and Kh.Yaghmaie}, title = {Image Authentication Using LBP-based Perceptual Image Hashing}, journal = {Journal of AI and Data Mining}, year = {2015}}
-
Second-order Statistics Analysis to Cope with Contrast Enhancement Counter-forensics
Signal Processing Letters, IEEE, 2015, Vol. 22(8), pp. 1132-1136
DOI: 10.1109/LSP.2015.2389241
BibTeX@article{DeRosa2015, author = {De Rosa, A. and Fontani, M. and Massai, M. and Piva, A. and Barni, Mauro}, title = {Second-order Statistics Analysis to Cope with Contrast Enhancement Counter-forensics}, journal = {Signal Processing Letters, IEEE}, year = {2015}, volume = {22}, number = {8}, pages = {1132--1136}}
-
A Forensic Analysis of the CASIA-iris V4 Database
Inst f. Angewandte Informatik an der Paris-Lodron-Universität Salzburg, Inst f. Angewandte Informatik an der Paris-Lodron-Universität Salzburg, 2015
BibTeX@mastersthesis{Debiasi2015b, author = {Debiasi, Luca}, title = {A Forensic Analysis of the CASIA-iris V4 Database}, school = {Inst f. Angewandte Informatik an der Paris-Lodron-Universität Salzburg}, year = {2015}}
-
Blind Biometric Source Sensor Recognition Using Advanced PRNU Fingerprints
Proc. of the 23rd European Signal Processing Conference (EUSIPCO) 2015
2015
DOI: 10.1109/eusipco.2015.7362489
BibTeX@inproceedings{Debiasi2015, author = {Debiasi, Luca and Uhl, Andreas}, title = {Blind Biometric Source Sensor Recognition Using Advanced PRNU Fingerprints}, booktitle = {Proc. of the 23rd European Signal Processing Conference (EUSIPCO) 2015}, year = {2015}}
-
Techniques for a Forensic Analysis of the CASia-IRis V4 Database
Proc. Int Biometrics and Forensics (IWBF) Workshop
2015, pp. 1-6
DOI: 10.1109/IWBF.2015.7110236
BibTeX@inproceedings{Debiasi2015a, author = {Debiasi, L. and Uhl, A.}, title = {Techniques for a Forensic Analysis of the CASia-IRis V4 Database}, booktitle = {Proc. Int Biometrics and Forensics (IWBF) Workshop}, year = {2015}, pages = {1--6}}
-
A Bayesian Classifier Approach for Glcm Based Image Forgery Detection
International Journal of Engineering Research & Technology, 2015, Vol. 4(2)
BibTeX@article{Dhevana2015, author = {Dhevana, S. and Jayasri, C.}, title = {A Bayesian Classifier Approach for Glcm Based Image Forgery Detection}, journal = {International Journal of Engineering Research & Technology}, year = {2015}, volume = {4}, number = {2}}
-
Edge Perpendicular Binary Coding for USM Sharpening Detection
IEEE Signal Processing Letters, 2015, Vol. 22(3), pp. 327-331
DOI: 10.1109/LSP.2014.2359033
BibTeX@article{Ding2015, author = {Ding, F. and Zhu, G. and Yang, J. and Xie, J. and Shi, Y. Q.}, title = {Edge Perpendicular Binary Coding for USM Sharpening Detection}, journal = {IEEE Signal Processing Letters}, year = {2015}, volume = {22}, number = {3}, pages = {327--331}}
-
Paint-doctored JPEG Image Forensics Based on Blocking Artifacts
Proc. Int Computing and Communication (IEMCON) Conf. and Workshop
2015, pp. 1-5
DOI: 10.1109/IEMCON.2015.7344427
BibTeX@inproceedings{Ebrahimi2015, author = {Ebrahimi, Ali and Ibrahim, Subariah and Ghazizadeh, Eghbal and Alizadeh, Mojtaba}, title = {Paint-doctored JPEG Image Forensics Based on Blocking Artifacts}, booktitle = {Proc. Int Computing and Communication (IEMCON) Conf. and Workshop}, year = {2015}, pages = {1--5}}
-
Paint-doctored JPEG image forensics based on blocking artifacts
Proc. Int. Conf. and Workshop Computing and Communication (IEMCON)
2015, pp. 1-5
DOI: 10.1109/IEMCON.2015.7344427
BibTeX@inproceedings{Ebrahimi2015a, author = {Ebrahimi, A. and Ibrahim, S. and Ghazizadeh, E. and Alizadeh, M.}, title = {Paint-doctored JPEG image forensics based on blocking artifacts}, booktitle = {Proc. Int. Conf. and Workshop Computing and Communication (IEMCON)}, year = {2015}, pages = {1--5}}
-
Image Forgery Detection Using Multidimensional Spectral Hashing Based Polar Cosine Transform
Indian Journal of Science and Technology, 2015, Vol. 8(S9), pp. 128-139
DOI: 10.17485/ijst/2015/v8is9/54344
BibTeX@article{Elwin2015, author = {Elwin, J. Granty Regina and Kousalya, G.}, title = {Image Forgery Detection Using Multidimensional Spectral Hashing Based Polar Cosine Transform}, journal = {Indian Journal of Science and Technology}, year = {2015}, volume = {8}, number = {S9}, pages = {128--139}}
-
PCET Based Copy-move Forgery Detection in Images under Geometric Transforms
Multimedia Tools and Applications, Springer US, 2015, pp. 1-15
DOI: 10.1007/s11042-015-2872-2
BibTeX@article{Emam2015a, author = {Emam, Mahmoud and Han, Qi and Niu, Xiamu}, title = {PCET Based Copy-move Forgery Detection in Images under Geometric Transforms}, journal = {Multimedia Tools and Applications}, publisher = {Springer US}, year = {2015}, pages = {1--15}}
-
A Passive Technique for Detecting Copy-move Forgery with Rotation Based on Polar Complex Exponential Transform
Proc. SPIE 9631, Seventh International Conference on Digital Image Processing (ICDIP 2015)
Proc. SPIE, 2015, Vol. 9631, pp. 963104-963104-6
DOI: 10.1117/12.2196997
BibTeX@inproceedings{Emam2015, author = {Emam, Mahmoud and Han, Qi and Yu, Liyang and Zhang, Ye and Niu, Xiamu}, title = {A Passive Technique for Detecting Copy-move Forgery with Rotation Based on Polar Complex Exponential Transform}, booktitle = {Proc. SPIE 9631, Seventh International Conference on Digital Image Processing (ICDIP 2015)}, journal = {Proc. SPIE}, year = {2015}, volume = {9631}, pages = {963104-963104-6}}
-
Integer DCT Convergence for JPEG-75 Forensics for Images
Journal of Information Assurance and Security, 2015, Vol. 10, pp. 80-88
BibTeX@article{Fahmy2015a, author = {Fahmy, Gamal}, title = {Integer DCT Convergence for JPEG-75 Forensics for Images}, journal = {Journal of Information Assurance and Security}, year = {2015}, volume = {10}, pages = {80--88}}
-
Phase based detection of JPEG counter forensics
Proc. and Systems (ICECS) 2015 IEEE Int. Conf. Electronics, Circuits
2015, pp. 37-40
DOI: 10.1109/ICECS.2015.7440243
BibTeX@inproceedings{Fahmy2015b, author = {Fahmy, G. and Alqallaf, A. and Wurtz, R.}, title = {Phase based detection of JPEG counter forensics}, booktitle = {Proc. and Systems (ICECS) 2015 IEEE Int. Conf. Electronics, Circuits}, year = {2015}, pages = {37--40}}
-
An Efficient Clustering Technique for Cameras Identification Using Sensor Pattern Noise
Proc. Int Systems, Signals and Image Processing (IWSSIP) Conf
2015, pp. 249-252
DOI: 10.1109/IWSSIP.2015.7314223
BibTeX@inproceedings{Fahmy2015, author = {Fahmy, O. M.}, title = {An Efficient Clustering Technique for Cameras Identification Using Sensor Pattern Noise}, booktitle = {Proc. Int Systems, Signals and Image Processing (IWSSIP) Conf}, year = {2015}, pages = {249--252}}
-
Image Tampering Detection Using Noise Histogram Features
Proc. IEEE Int Digital Signal Processing (DSP) Conf
2015, pp. 1044-1048
DOI: 10.1109/ICDSP.2015.7252037
BibTeX@inproceedings{Fan2015b, author = {Fan, Jiayuan and Chen, Tao and Cao, Jiuwen}, title = {Image Tampering Detection Using Noise Histogram Features}, booktitle = {Proc. IEEE Int Digital Signal Processing (DSP) Conf}, year = {2015}, pages = {1044--1048}}
-
Towards Digital Image Anti-Forensics via Image RestorationVers l’anti-criminalistique en images numériques via la restauration d’images
Université Grenoble Alpes, Université Grenoble Alpes, 2015
BibTeX@phdthesis{Fan2015a, author = {Fan, Wei}, title = {Towards Digital Image Anti-Forensics via Image RestorationVers l’anti-criminalistique en images numériques via la restauration d’images}, school = {Université Grenoble Alpes}, year = {2015}}
-
General-purpose Image Forensics Using Patch Likelihood under Image Statistical Models
Proc. IEEE Int Information Forensics and Security (WIFS) Workshop
Institute of Electrical & Electronics Engineers (IEEE), 2015, pp. 1-6
DOI: 10.1109/WIFS.2015.7368606
BibTeX@inproceedings{Fan2015e, author = {Fan, W. and Wang, K. and Cayre, F.}, title = {General-purpose Image Forensics Using Patch Likelihood under Image Statistical Models}, booktitle = {Proc. IEEE Int Information Forensics and Security (WIFS) Workshop}, publisher = {Institute of Electrical & Electronics Engineers (IEEE)}, year = {2015}, pages = {1--6}}
-
General-purpose image forensics using patch likelihood under image statistical models
Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)
2015, pp. 1-6
DOI: 10.1109/WIFS.2015.7368606
BibTeX@inproceedings{Fan2015f, author = {Fan, W. and Wang, K. and Cayre, F.}, title = {General-purpose image forensics using patch likelihood under image statistical models}, booktitle = {Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)}, year = {2015}, pages = {1--6}}
-
Median Filtered Image Quality Enhancement and Anti-forensics Via Variational Deconvolution
Information Forensics and Security, IEEE Transactions on, 2015, Vol. 10(99), pp. 1076-1091
DOI: 10.1109/TIFS.2015.2398362
BibTeX@article{Fan2015, author = {Fan, W. and Wang, K. and Cayre, F. and Xiong, Z.}, title = {Median Filtered Image Quality Enhancement and Anti-forensics Via Variational Deconvolution}, journal = {Information Forensics and Security, IEEE Transactions on}, year = {2015}, volume = {10}, number = {99}, pages = {1076--1091}}
-
Median Filtered Image Quality Enhancement and Anti-Forensics via Variational Deconvolution
#IEEE_J_IFS#, 2015, Vol. 10(5), pp. 1076-1091
DOI: 10.1109/TIFS.2015.2398362
BibTeX@article{Fan2015c, author = {Fan, W. and Wang, K. and Cayre, F. and Xiong, Z.}, title = {Median Filtered Image Quality Enhancement and Anti-Forensics via Variational Deconvolution}, journal = {#IEEE_J_IFS#}, year = {2015}, volume = {10}, number = {5}, pages = {1076--1091}}
-
Image Splicing Detection with Local Illumination Estimation
Proc. IEEE Int Image Processing (ICIP) Conf
2015, pp. 2940-2944
DOI: 10.1109/ICIP.2015.7351341
BibTeX@inproceedings{Fan2015d, author = {Fan, Yu and Carre, Philippe and Fernandez-Maloigne, Christine}, title = {Image Splicing Detection with Local Illumination Estimation}, booktitle = {Proc. IEEE Int Image Processing (ICIP) Conf}, year = {2015}, pages = {2940--2944}}
-
Chapter 65. Detecting Image Authenticity Based on Lambert Illumination Model and Shadows
Network Security and Communication Engineering
Network Security and Communication Engineering, Informa UK Limited, 2015, pp. 313-316
DOI: 10.1201/b18660-70
BibTeX@incollection{Fang2015, author = {Fang, S. . J. . and Ge, H. . Y. .}, title = {Chapter 65. Detecting Image Authenticity Based on Lambert Illumination Model and Shadows}, booktitle = {Network Security and Communication Engineering}, journal = {Network Security and Communication Engineering}, publisher = {Informa UK Limited}, year = {2015}, pages = {313--316}}
-
On Blind Source Camera Identification
Battiato, S., Blanc-Talon, J., Gallo, G., Philips, W., Popescu, D. & Scheunders, P. (ed.)
Advanced Concepts for Intelligent Vision Systems
Advanced Concepts for Intelligent Vision Systems, Springer International Publishing, 2015, Vol. 9386, pp. 464-473
DOI: 10.1007/978-3-319-25903-1_40
BibTeX@incollection{Farinella2015, author = {Farinella, Giovanni Maria and Giuffrida, M. V. and Digiacomo, V. and Battiato, Sebastiano}, title = {On Blind Source Camera Identification}, booktitle = {Advanced Concepts for Intelligent Vision Systems}, journal = {Advanced Concepts for Intelligent Vision Systems}, publisher = {Springer International Publishing}, year = {2015}, volume = {9386}, pages = {464--473}}
-
Unsupervised Fusion for Forgery Localization Exploiting Background Information
Proc. IEEE Int Multimedia & Expo Workshops (ICMEW) Conf
2015, pp. 1-6
DOI: 10.1109/ICMEW.2015.7169770
BibTeX@inproceedings{Ferrara2015, author = {Ferrara, P. and Fontani, M. and Bianchi, T. and De Rosa, A. and Piva, A. and Barni, Mauro}, title = {Unsupervised Fusion for Forgery Localization Exploiting Background Information}, booktitle = {Proc. IEEE Int Multimedia & Expo Workshops (ICMEW) Conf}, year = {2015}, pages = {1--6}}
-
Laser Printer Attribution: Exploring New Features and Beyond
Forensic Science International, Elsevier BV, 2015, Vol. 247(0), pp. 105-125
DOI: 10.1016/j.forsciint.2014.11.030
BibTeX@article{Ferreira2015, author = {Ferreira, Anselmo and Navarro, Luiz C. and Pinheiro, Giuliano and dos Santos, Jefersson A. and Rocha, Anderson}, title = {Laser Printer Attribution: Exploring New Features and Beyond}, journal = {Forensic Science International}, publisher = {Elsevier BV}, year = {2015}, volume = {247}, number = {0}, pages = {105--125}}
-
A Novel Image Splicing Forensic Algorithm Based on Generalized DCT Coefficient-pair Histogram
Tan, T., Ruan, Q., Wang, S., Ma, H. & Di, K. (ed.)
Advances in Image and Graphics Technologies
Springer Berlin Heidelberg, 2015, Vol. 525, pp. 63-71
DOI: 10.1007/978-3-662-47791-5_8
BibTeX@incollection{Fusheng2015, author = {Fusheng, Yang and Gao, Tiegang}, title = {A Novel Image Splicing Forensic Algorithm Based on Generalized DCT Coefficient-pair Histogram}, booktitle = {Advances in Image and Graphics Technologies}, publisher = {Springer Berlin Heidelberg}, year = {2015}, volume = {525}, pages = {63--71}}
-
A Hybrid Approach for Camera-model Detection
International Journal of Security and Its Applications, 2015, Vol. 9(8)
DOI: 10.14257/ijsia.2015.9.8.24
BibTeX@article{Gao2015, author = {Gao, Shang}, title = {A Hybrid Approach for Camera-model Detection}, journal = {International Journal of Security and Its Applications}, year = {2015}, volume = {9}, number = {8}}
-
A Neural Algorithm of Artistic Style
arXiv, 2015
BibTeX@article{Gatys2015, author = {Gatys, Leon A. and Ecker, Alexander S. and Bethge, Matthias}, title = {A Neural Algorithm of Artistic Style}, journal = {arXiv}, year = {2015}}
-
Detecting Image Forgery Using Linear Constraints Based on Shading and Shadows
Proceedings of the International Conference on Informative and Cybernetics for Computational Social Systems (ICCSS) 2015
2015, pp. 116-121
DOI: 10.1109/iccss.2015.7281160
BibTeX@inproceedings{Ge2015, author = {Ge, Huayong and Fang, Shujuan}, title = {Detecting Image Forgery Using Linear Constraints Based on Shading and Shadows}, booktitle = {Proceedings of the International Conference on Informative and Cybernetics for Computational Social Systems (ICCSS) 2015}, year = {2015}, pages = {116--121}}
-
Algorithms for Detection of Plain Copy-move Regions in Digital Images
Pattern Recognition and Image Analysis, Pleiades Publishing, 2015, Vol. 25(3), pp. 423-429
DOI: 10.1134/S1054661815030074
BibTeX@article{Glumov2015, author = {Glumov, N. I. and Kuznetsov, A. V. and Myasnikov, V. V.}, title = {Algorithms for Detection of Plain Copy-move Regions in Digital Images}, journal = {Pattern Recognition and Image Analysis}, publisher = {Pleiades Publishing}, year = {2015}, volume = {25}, number = {3}, pages = {423--429}}
-
The Effect of Image Preprocessing Techniques and Varying JPEG Quality on the Identifiability of Digital Image Splicing Forgery
Arizona State University, Arizona State University, 2015
BibTeX@mastersthesis{Gubrud2015, author = {Gubrud, Aaron}, title = {The Effect of Image Preprocessing Techniques and Varying JPEG Quality on the Identifiability of Digital Image Splicing Forgery}, school = {Arizona State University}, year = {2015}}
-
Video Authentication in Digital Forensic
Proc. Int Futuristic Trends Computational Analysis and Knowledge Management (ABLAZE) Conf
2015, pp. 659-663
DOI: 10.1109/ABLAZE.2015.7154945
BibTeX@inproceedings{Gupta2015, author = {Gupta, A. and Gupta, S. and Mehra, A.}, title = {Video Authentication in Digital Forensic}, booktitle = {Proc. Int Futuristic Trends Computational Analysis and Knowledge Management (ABLAZE) Conf}, year = {2015}, pages = {659--663}}
-
Rotation invariant copy move forgery detection method
Proc. 9th Int. Conf. Electrical and Electronics Engineering (ELECO)
2015, pp. 202-206
DOI: 10.1109/ELECO.2015.7394451
BibTeX@inproceedings{Guerbuez2015, author = {Gürbüz, E. and Ulutaş, G. and Ulutaş, M.}, title = {Rotation invariant copy move forgery detection method}, booktitle = {Proc. 9th Int. Conf. Electrical and Electronics Engineering (ELECO)}, year = {2015}, pages = {202--206}}
-
Image - Splicing Forgery Detection Based on Improved LBP and K-nearest Neighbors Algorithm
Electronics Information & Planning, 2015
BibTeX@article{Hakimi2015, author = {Hakimi, Fahime and Hariri, Mahdi}, title = {Image - Splicing Forgery Detection Based on Improved LBP and K-nearest Neighbors Algorithm}, journal = {Electronics Information & Planning}, year = {2015}}
-
Image Splicing Forgery Detection Using Local Binary Pattern and Discrete Wavelet Transform
Proc. 2nd Int. Conf. Knowledge-Based Engineering and Innovation (KBEI)
2015, pp. 1074-1077
DOI: 10.1109/KBEI.2015.7436195
BibTeX@inproceedings{Hakimi2015a, author = {Hakimi, F. and Hariri, M. and GharehBaghi, F.}, title = {Image Splicing Forgery Detection Using Local Binary Pattern and Discrete Wavelet Transform}, booktitle = {Proc. 2nd Int. Conf. Knowledge-Based Engineering and Innovation (KBEI)}, year = {2015}, pages = {1074--1077}}
-
Tamper detection based on the consistency of quantization error caused by multiple JPEG compression
Proc. IEEE 16th Int. Conf. Communication Technology (ICCT)
2015, pp. 314-319
DOI: 10.1109/ICCT.2015.7399850
BibTeX@inproceedings{Han2015, author = {Han, Hongli and Li, Yezhou and Niu, Shaozhang and Gong, Zhenzhen}, title = {Tamper detection based on the consistency of quantization error caused by multiple JPEG compression}, booktitle = {Proc. IEEE 16th Int. Conf. Communication Technology (ICCT)}, year = {2015}, pages = {314--319}}
-
Passive Aproaches for Detecting Image Tampering: A Review
Jurnal Teknologi, 2015, Vol. 73(2), pp. 31-36
DOI: 10.11113/jt.v73.4189
BibTeX@article{Hashem2015, author = {Hashem, Fatma Salman and Sulong, Ghazali}, title = {Passive Aproaches for Detecting Image Tampering: A Review}, journal = {Jurnal Teknologi}, year = {2015}, volume = {73}, number = {2}, pages = {31--36}}
-
Fast and Robust Copy-move Forgery Detection Using SURF and Wavelets
2015
BibTeX@electronic{Hashmi2015a, author = {Hashmi, M. F. and Hambarde, A. and Keskar, A.}, title = {Fast and Robust Copy-move Forgery Detection Using SURF and Wavelets}, year = {2015}}
-
Block and Fuzzy Techniques Based Forensic Tool for Detection Classification of Image Forgery
J Electr Eng Technol., 2015, pp. 709-718
DOI: 10.5370/jeet.2015.10.4.1886
BibTeX@article{Hashmi2015, author = {Hashmi, Mohammad Farukh and Keskar, Avinash G.}, title = {Block and Fuzzy Techniques Based Forensic Tool for Detection Classification of Image Forgery}, journal = {J Electr Eng Technol.}, year = {2015}, pages = {709--718}}
-
Camera-based Image Forgery Detection
Ho, A. T. S. & Li, S. (ed.)
Handbook of Digital Forensics of Multimedia Data and Devices
Wiley-IEEE Press, 2015, pp. 704-
DOI: 10.1002/9781118705773.ch14
BibTeX@inbook{Hel-Or2015, author = {Hel-Or, Hagit and Yerushalmy, Ido}, title = {Camera-based Image Forgery Detection}, booktitle = {Handbook of Digital Forensics of Multimedia Data and Devices}, publisher = {Wiley-IEEE Press}, year = {2015}, pages = {704-}}
-
Digital Image Forensics with Statistical Analysis
Handbook of Digital Forensics of Multimedia Data and Devices
Wiley-IEEE Press, 2015, pp. 704-
DOI: 10.1002/9781118705773.ch13
BibTeX@inbook{Ho2015, author = {Ho, Anthony T. S. and Li, Shujun}, title = {Digital Image Forensics with Statistical Analysis}, booktitle = {Handbook of Digital Forensics of Multimedia Data and Devices}, publisher = {Wiley-IEEE Press}, year = {2015}, pages = {704-}}
-
Printer and Scanner Forensics
Handbook of Digital Forensics of Multimedia Data and Devices
Wiley-IEEE Press, 2015, pp. 704-
DOI: 10.1002/9781118705773.ch10
BibTeX@inbook{Ho2015a, author = {Ho, Anthony T. S. and Li, Shujun}, title = {Printer and Scanner Forensics}, booktitle = {Handbook of Digital Forensics of Multimedia Data and Devices}, publisher = {Wiley-IEEE Press}, year = {2015}, pages = {704-}}
-
Digital Image Forensics with Statistical Analysis
Handbook of Digital Forensics of Multimedia Data and Devices
Wiley-IEEE Press, 2015, pp. 704-
DOI: 10.1002/9781118705773.ch13
BibTeX@inbook{Ho2015b, author = {Ho, Anthony T. S. and Li, Shujun}, title = {Digital Image Forensics with Statistical Analysis}, booktitle = {Handbook of Digital Forensics of Multimedia Data and Devices}, publisher = {Wiley-IEEE Press}, year = {2015}, pages = {704-}}
-
Multimedia Analytics for Image Collection Forensics
Handbook of Digital Forensics of Multimedia Data and Devices
Wiley-IEEE Press, 2015, pp. 704-
DOI: 10.1002/9781118705773.ch8
BibTeX@inbook{Ho2015c, author = {Ho, Anthony T. S. and Li, Shujun}, title = {Multimedia Analytics for Image Collection Forensics}, booktitle = {Handbook of Digital Forensics of Multimedia Data and Devices}, publisher = {Wiley-IEEE Press}, year = {2015}, pages = {704-}}
-
Photogrammetry in Digital Forensics
Ho, A. T. S. & Li, S. (ed.)
Handbook of Digital Forensics of Multimedia Data and Devices
Wiley-IEEE Press, 2015, pp. 704-
DOI: 10.1002/9781118705773.ch5
BibTeX@inbook{Hoogeboom2015, author = {Hoogeboom, Bart and Alberink, Ivo and Vrijdag, Derk}, title = {Photogrammetry in Digital Forensics}, booktitle = {Handbook of Digital Forensics of Multimedia Data and Devices}, publisher = {Wiley-IEEE Press}, year = {2015}, pages = {704-}}
-
Expose Spliced Photographic Basing on Boundary and Noise Features
IEICE TRANSACTIONS on Information and Systems, 2015, Vol. E98-D(7)
DOI: 10.1587/transinf.2014edl8232
BibTeX@article{Hou2015, author = {Hou, Jun and Cheng, Yan}, title = {Expose Spliced Photographic Basing on Boundary and Noise Features}, journal = {IEICE TRANSACTIONS on Information and Systems}, year = {2015}, volume = {E98-D}, number = {7}}
-
An Efficient Detection Algorithm for Copy-move Forgery
Proc. 10th Asia Joint Conf. Information Security (AsiaJCIS)
2015, pp. 33-36
DOI: 10.1109/AsiaJCIS.2015.16
BibTeX@inproceedings{Hsu2015, author = {Hsu, Chen-Ming and Lee, Jen-Chun and Chen, Wei-Kuei}, title = {An Efficient Detection Algorithm for Copy-move Forgery}, booktitle = {Proc. 10th Asia Joint Conf. Information Security (AsiaJCIS)}, year = {2015}, pages = {33--36}}
-
Effective Composite Image Detection Method Based on Feature Inconsistency of Image Components
Digital Signal Processing, 2015, Vol. 39(0), pp. 50-62
DOI: 10.1016/j.dsp.2015.01.006
BibTeX@article{Hu2015, author = {Hu, Wu-Chih and Dai, Jing-Siou and Jian, Jhih-Syuan}, title = {Effective Composite Image Detection Method Based on Feature Inconsistency of Image Components}, journal = {Digital Signal Processing}, year = {2015}, volume = {39}, number = {0}, pages = {50--62}}
-
Robustness of Copy-move Forgery Detection under High JPEG Compression Artifacts
Multimedia Tools and Applications, Springer, 2015, pp. 1
DOI: 10.1007/s11042-015-3152-x
BibTeX@article{Huang2015a, author = {Huang, Deng-Yuan and Huang, Ching-Ning and Hu, Wu-Chih and Chou, Chih-Hung}, title = {Robustness of Copy-move Forgery Detection under High JPEG Compression Artifacts}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2015}, pages = {1}}
-
Camera Model Identification with Unknown Models
IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers (IEEE), 2015, Vol. 10(12), pp. 2692-2704
DOI: 10.1109/TIFS.2015.2474836
BibTeX@article{Huang2015, author = {Huang, Y. and Zhang, J. and Huang, H.}, title = {Camera Model Identification with Unknown Models}, journal = {IEEE Transactions on Information Forensics and Security}, publisher = {Institute of Electrical and Electronics Engineers (IEEE)}, year = {2015}, volume = {10}, number = {12}, pages = {2692--2704}}
-
A Survey on Image Forgery Detection Techniques
Computing & Communication Technologies - Research, Innovation, and Vision for the Future (RIVF), 2015 IEEE RIVF International Conference on
2015, pp. 71-76
DOI: 10.1109/RIVF.2015.7049877
BibTeX@inproceedings{Huynh2015, author = {Huynh, Tu K. and Huynh, Khoa V. and Le-Tien, Thuong and Nguyen, Sy C.}, title = {A Survey on Image Forgery Detection Techniques}, booktitle = {Computing & Communication Technologies - Research, Innovation, and Vision for the Future (RIVF), 2015 IEEE RIVF International Conference on}, year = {2015}, pages = {71--76}}
-
The efficiency of applying DWT and feature extraction into copy-move images detection
Proc. Int. Conf. Advanced Technologies for Communications (ATC)
2015, pp. 44-49
DOI: 10.1109/ATC.2015.7388368
BibTeX@inproceedings{Huynh-Kha2015, author = {Huynh-Kha, T. and Le-Tien, T. and Viet-Uyen, S. Ha and Huynh-Van, K.}, title = {The efficiency of applying DWT and feature extraction into copy-move images detection}, booktitle = {Proc. Int. Conf. Advanced Technologies for Communications (ATC)}, year = {2015}, pages = {44--49}}
-
Fractional Differential Texture Descriptors Based on the Machado Entropy for Image Splicing Detection
Entropy, 2015, Vol. 17(7), pp. 4775
DOI: 10.3390/e17074775
BibTeX@article{Ibrahim2015, author = {Ibrahim, Rabha W. and Moghaddasi, Zahra and Jalab, Hamid A. and Noor, Rafidah Md}, title = {Fractional Differential Texture Descriptors Based on the Machado Entropy for Image Splicing Detection}, journal = {Entropy}, year = {2015}, volume = {17}, number = {7}, pages = {4775}}
-
Copy-move Forgery Detection Based on Harris Corner Points and BRISK
Proceedings of the Third International Symposium on Women in Computing and Informatics
ACM, 2015, pp. 394-399
DOI: 10.1145/2791405.2791453
BibTeX@inproceedings{Isaac2015, author = {Isaac, Meera Mary and Wilscy, M.}, title = {Copy-move Forgery Detection Based on Harris Corner Points and BRISK}, booktitle = {Proceedings of the Third International Symposium on Women in Computing and Informatics}, publisher = {ACM}, year = {2015}, pages = {394--399}}
-
Image Forgery Detection Based on Gabor Wavelets and Local Phase Quantization
Procedia Computer Science, 2015, Vol. 58, pp. 76-83
DOI: 10.1016/j.procs.2015.08.016
BibTeX@article{Isaac2015a, author = {Isaac, Meera Mary and Wilscy, M.}, title = {Image Forgery Detection Based on Gabor Wavelets and Local Phase Quantization}, journal = {Procedia Computer Science}, year = {2015}, volume = {58}, pages = {76--83}}
-
Image Splicing Detection Based on General Perspective Constraints
Information Forensics and Security (WIFS), 2015 IEEE International Workshop on
2015, pp. 1-6
DOI: 10.1109/WIFS.2015.7368598
BibTeX@inproceedings{Iuliani2015, author = {Iuliani, M. and Fabbri, G. and Piva, A.}, title = {Image Splicing Detection Based on General Perspective Constraints}, booktitle = {Information Forensics and Security (WIFS), 2015 IEEE International Workshop on}, year = {2015}, pages = {1--6}}
-
Blind Identification of Image Manipulation Type Using Mixed Statistical Moments
Journal of Electronic Imaging, 2015, Vol. 24(1), pp. 013029
DOI: 10.1117/1.JEI.24.1.013029
BibTeX@article{Jeong2015, author = {Jeong, Bo Gyu and Moon, Yong Ho and Eom, Il Kyu}, title = {Blind Identification of Image Manipulation Type Using Mixed Statistical Moments}, journal = {Journal of Electronic Imaging}, year = {2015}, volume = {24}, number = {1}, pages = {013029}}
-
Tampering Detection in Digital Video - a Review of Temporal Fingerprints Based Techniques
Proc. 2nd Int Computing for Sustainable Global Development (INDIACom) Conf
2015, pp. 1121-1124
BibTeX@inproceedings{Joshi2015, author = {Joshi, V. and Jain, S.}, title = {Tampering Detection in Digital Video - a Review of Temporal Fingerprints Based Techniques}, booktitle = {Proc. 2nd Int Computing for Sustainable Global Development (INDIACom) Conf}, year = {2015}, pages = {1121--1124}}
-
Automated Image Splicing Detection from Noise Estimation in Raw Images
Proc. th Int Imaging for Crime Prevention and Detection (ICDP-15) Conf
2015, pp. 1-6
DOI: 10.1049/ic.2015.0111
BibTeX@inproceedings{Julliand2015, author = {Julliand, T. and Nozick, V. and Talbot, H.}, title = {Automated Image Splicing Detection from Noise Estimation in Raw Images}, booktitle = {Proc. th Int Imaging for Crime Prevention and Detection (ICDP-15) Conf}, year = {2015}, pages = {1--6}}
-
Image Noise and Digital Image Forensics
IWDW
2015
DOI: 10.1007/978-3-319-31960-5_1
BibTeX@inproceedings{Julliand2015a, author = {Julliand, Thibaut and Nozick, Vincent and Talbot, Hugues}, title = {Image Noise and Digital Image Forensics}, booktitle = {IWDW}, year = {2015}}
-
Recaptured Video Detection Based on Sensor Pattern Noise
EURASIP Journal on Image and Video Processing, Springer, 2015, Vol. 2015(1), pp. 1
DOI: 10.1186/s13640-015-0096-z
BibTeX@article{Jung2015, author = {Jung, Dae-Jin and Hyun, Dai-Kyung and Lee, Heung-Kyu}, title = {Recaptured Video Detection Based on Sensor Pattern Noise}, journal = {EURASIP Journal on Image and Video Processing}, publisher = {Springer}, year = {2015}, volume = {2015}, number = {1}, pages = {1}}
-
A Preliminary Study on Identifying Sensors from Iris Images
2015 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)
Institute of Electrical & Electronics Engineers (IEEE), 2015
DOI: 10.1109/CVPRW.2015.7301319
BibTeX@inproceedings{Kalka2015, author = {Kalka, Nathan and Bartlow, Nick and Cukic, Bojan and Ross, Arun}, title = {A Preliminary Study on Identifying Sensors from Iris Images}, booktitle = {2015 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)}, publisher = {Institute of Electrical & Electronics Engineers (IEEE)}, year = {2015}}
-
Forensics and Counter Anti-forensics of Video Inter-frame Forgery
Multimedia Tools and Applications, 2015, pp. 1-21
DOI: 10.1007/s11042-015-2762-7
BibTeX@article{Kang2015a, author = {Kang, Xiangui and Liu, Jingxian and Liu, Hongmei and Wang, Z. Jane}, title = {Forensics and Counter Anti-forensics of Video Inter-frame Forgery}, journal = {Multimedia Tools and Applications}, year = {2015}, pages = {1--21}}
-
Countering Median Filtering Anti-forensics and Performance Evaluation of Forensics against Intentional Attacks
Proc. IEEE China Summit and Int Signal and Information Processing (ChinaSIP) Conf
2015, pp. 483-487
DOI: 10.1109/ChinaSIP.2015.7230449
BibTeX@inproceedings{Kang2015, author = {Kang, Xiangui and Qin, Tengfei and Zeng, Hui}, title = {Countering Median Filtering Anti-forensics and Performance Evaluation of Forensics against Intentional Attacks}, booktitle = {Proc. IEEE China Summit and Int Signal and Information Processing (ChinaSIP) Conf}, year = {2015}, pages = {483--487}}
-
Adaptive Photo-response Non-uniformity Noise Removal against Image Source Attribution
Digital Investigation, 2015, Vol. 12(0), pp. 66-76
DOI: 10.1016/j.diin.2015.01.017
BibTeX@article{Karakuecuek2015, author = {Karaküçük, Ahmet and Dirik, Ahmet Emir}, title = {Adaptive Photo-response Non-uniformity Noise Removal against Image Source Attribution}, journal = {Digital Investigation}, year = {2015}, volume = {12}, number = {0}, pages = {66--76}}
-
Recent Advances in Counter PRNU Based Source Attribution and Beyond
IS&T/SPIE Electronic Imaging
Proc. SPIE, 2015, Vol. 9409, pp. 94090N-94090N-11
DOI: 10.1117/12.2182458
BibTeX@inproceedings{Karakuecuek2015a, author = {Karaküçük, Ahmet and Dirik, Ahmet E. and Sencar, Hüsrev T. and Memon, Nasir D.}, title = {Recent Advances in Counter PRNU Based Source Attribution and Beyond}, booktitle = {IS&T/SPIE Electronic Imaging}, journal = {Proc. SPIE}, year = {2015}, volume = {9409}, pages = {94090N-94090N-11}}
-
Detection of Splicing Forgery Using Wavelet Decomposition
Proc. Int Computing, Communication Automation (ICCCA) Conf
2015, pp. 843-848
DOI: 10.1109/CCAA.2015.7148492
BibTeX@inproceedings{Kashyap2015, author = {Kashyap, A. and Suresh, B. and Agrawal, M. and Gupta, H. and Joshi, S. D.}, title = {Detection of Splicing Forgery Using Wavelet Decomposition}, booktitle = {Proc. Int Computing, Communication Automation (ICCCA) Conf}, year = {2015}, pages = {843--848}}
-
Fingerprint Recognition under the Influence of Image Sensor Ageing
Department of Computer Sciences, University of Salzburg, Department of Computer Sciences, University of Salzburg, 2015
DOI: 10.1109/iwbf.2016.7449683
BibTeX@techreport{Kauba2015, author = {Kauba, Christof and Uhl, Andreas}, title = {Fingerprint Recognition under the Influence of Image Sensor Ageing}, school = {Department of Computer Sciences, University of Salzburg}, year = {2015}}
-
Passive Image Forensic Method to Detect Resampling Forgery in Digital Images
IOSR Journal of Computer Engineering (IOSR-JCE), 2015, Vol. 17(3), pp. 47-52
BibTeX@article{Kaur2015, author = {Kaur, Amaninder and Malhotra, Sheenam}, title = {Passive Image Forensic Method to Detect Resampling Forgery in Digital Images}, journal = {IOSR Journal of Computer Engineering (IOSR-JCE)}, year = {2015}, volume = {17}, number = {3}, pages = {47--52}}
-
Evaluation of image forensic cues for fusion
Proc. Third Int. Conf. Image Information Processing (ICIIP)
2015, pp. 301-305
DOI: 10.1109/ICIIP.2015.7414785
BibTeX@inproceedings{Kaur2015a, author = {Kaur, M. and Gupta, S.}, title = {Evaluation of image forensic cues for fusion}, booktitle = {Proc. Third Int. Conf. Image Information Processing (ICIIP)}, year = {2015}, pages = {301--305}}
-
On Image Forgery Detection Using Two Dimensional Discrete Cosine Transform and Statistical Moments
Procedia Computer Science, 2015, Vol. 70, pp. 130-136
DOI: 10.1016/j.procs.2015.10.058
BibTeX@article{Kaushik2015, author = {Kaushik, Rajeev and Bajaj, Rakesh Kumar and Mathew, Jimson}, title = {On Image Forgery Detection Using Two Dimensional Discrete Cosine Transform and Statistical Moments}, journal = {Procedia Computer Science}, year = {2015}, volume = {70}, pages = {130--136}}
-
An Efficient Blind Detection Algorithm of Median Filtered Image
International Journal of Hybrid Information Technology, 2015, Vol. 8(1), pp. 181-192
DOI: 10.14257/ijhit.2015.8.1.16
BibTeX@article{Ke2015, author = {Ke}, title = {An Efficient Blind Detection Algorithm of Median Filtered Image}, journal = {International Journal of Hybrid Information Technology}, year = {2015}, volume = {8}, number = {1}, pages = {181--192}}
-
Improving Sensor Noise Analysis for CT-scanner Identification
Proc. of the 23rd European Signal Processing Conference (EUSIPCO) 2015
2015
DOI: 10.1109/eusipco.2015.7362817
BibTeX@inproceedings{Kharboutly2015, author = {Kharboutly, Anas and , William Puech and Subsol, Gerard and Hoa, Denis}, title = {Improving Sensor Noise Analysis for CT-scanner Identification}, booktitle = {Proc. of the 23rd European Signal Processing Conference (EUSIPCO) 2015}, year = {2015}}
-
Advanced Sensor Noise Analysis for CT-scanner Identification from Its 3D Images
Image Processing Theory, Tools and Applications (IPTA), 2015 International Conference on
2015, pp. 325-330
DOI: 10.1109/IPTA.2015.7367158
BibTeX@inproceedings{Kharboutly2015a, author = {Kharboutly, A. and Puech, W. and Subsol, G. and Hoa, D.}, title = {Advanced Sensor Noise Analysis for CT-scanner Identification from Its 3D Images}, booktitle = {Image Processing Theory, Tools and Applications (IPTA), 2015 International Conference on}, year = {2015}, pages = {325--330}}
-
Robust Image Forgery Localization and Recognition in Copy-move Using Bag of Features and SVM
Communication, Information & Computing Technology (ICCICT), 2015 International Conference on
2015, pp. 1-5
DOI: 10.1109/ICCICT.2015.7045718
BibTeX@inproceedings{Khuspe2015, author = {Khuspe, Kalyani and Mane, Vanita}, title = {Robust Image Forgery Localization and Recognition in Copy-move Using Bag of Features and SVM}, booktitle = {Communication, Information & Computing Technology (ICCICT), 2015 International Conference on}, year = {2015}, pages = {1--5}}
-
Thinking beyond the Block: Block Matching for Copy--move Forgery Detection Revisited
Alattar, A. M., Memon, N. D. & Heitzenrater, C. D. (ed.)
IS&T/SPIE Electronic Imaging
2015, Vol. 9409, pp. 940903-940903-12
DOI: 10.1117/12.2082789
BibTeX@inproceedings{Kirchner2015, author = {Kirchner, Matthias}, title = {Thinking beyond the Block: Block Matching for Copy--move Forgery Detection Revisited}, booktitle = {IS&T/SPIE Electronic Imaging}, year = {2015}, volume = {9409}, pages = {940903-940903-12}}
-
Forgery of Copy Move Image Detection Technique by Integrating Block and Feature Based Method
International Journal of Advanced Research in Computer and Communication Engineering, 2015, Vol. 4(1)
DOI: 10.17148/ijarcce.2015.4129
BibTeX@article{Kohale2015, author = {Kohale, Tushant A. and Chede, S. D. and Lakhe, P. R.}, title = {Forgery of Copy Move Image Detection Technique by Integrating Block and Feature Based Method}, journal = {International Journal of Advanced Research in Computer and Communication Engineering}, year = {2015}, volume = {4}, number = {1}}
-
Dictionary Learning and Sparse Coding for Third-order Super-symmetric Tensors
arxiv, 2015
BibTeX@article{Koniuz2015, author = {Koniusz, Piotr and Cherian, Anoop}, title = {Dictionary Learning and Sparse Coding for Third-order Super-symmetric Tensors}, journal = {arxiv}, year = {2015}}
-
Exposing Image Forgery through Contrast Enhancement
International Journal of Science and Research (IJSR), 2015, Vol. 4(12), pp. 1044-1048
DOI: 10.21275/v4i12.nov152185
BibTeX@article{Koshy2015, author = {Koshy, Priya Ann and Nair, Kavitha N.}, title = {Exposing Image Forgery through Contrast Enhancement}, journal = {International Journal of Science and Research (IJSR)}, year = {2015}, volume = {4}, number = {12}, pages = {1044--1048}}
-
Good Colour Maps: How to Design Them
arXiv:1509.03700, 2015
BibTeX@article{Kovesi2015, author = {Kovesi, Peter}, title = {Good Colour Maps: How to Design Them}, journal = {arXiv:1509.03700}, year = {2015}}
-
Considerations on the Benchmarking of Media Forensics
Proc. 23rd European Signal Processing Conf. (EUSIPCO)
2015, pp. 61-65
DOI: 10.1109/EUSIPCO.2015.7362345
BibTeX@inproceedings{Kraetzer2015, author = {Kraetzer, C. and Dittmann, J.}, title = {Considerations on the Benchmarking of Media Forensics}, booktitle = {Proc. 23rd European Signal Processing Conf. (EUSIPCO)}, year = {2015}, pages = {61--65}}
-
Microphone Forensics
Ho/Handbook of Digital Forensics of Multimedia Data and Devices
Wiley-Blackwell, 2015, pp. 411-441
DOI: 10.1002/9781118705773.ch11
BibTeX@incollection{Kraetzer2015a, author = {Kraetzer, Christian and Dittmann, Jana}, title = {Microphone Forensics}, booktitle = {Ho/Handbook of Digital Forensics of Multimedia Data and Devices}, publisher = {Wiley-Blackwell}, year = {2015}, pages = {411--441}}
-
Source Camera Identification Using GLCM
Proc. IEEE Int. Advance Computing Conf. (IACC)
2015, pp. 1242-1246
DOI: 10.1109/IADCC.2015.7154900
BibTeX@inproceedings{Kulkarni2015, author = {Kulkarni, Nilambari and Mane, Vanita}, title = {Source Camera Identification Using GLCM}, booktitle = {Proc. IEEE Int. Advance Computing Conf. (IACC)}, year = {2015}, pages = {1242--1246}}
-
Copy Move Forgery Detection in Contrast Variant Environment Using Binary DCT Vectors
I.J. Image, Graphics and Signal Processing, 2015(6), pp. 38-44
DOI: 10.5815/ijigsp.2015.06.05
BibTeX@article{Kumar2015, author = {Kumar, Sunil and Desai, J. V. and Mukherjee, Shaktidev}, title = {Copy Move Forgery Detection in Contrast Variant Environment Using Binary DCT Vectors}, journal = {I.J. Image, Graphics and Signal Processing}, year = {2015}, number = {6}, pages = {38--44}}
-
Forensic Detection of Median Filtering in Digital Images Using the Coefficient-pair Histogram of DCT Value and LBP Pattern
Huang, D.-S., Bevilacqua, V. & Premaratne, P. (ed.)
Intelligent Computing Theories and Methodologies
Springer International Publishing, 2015, Vol. 9225, pp. 421-432
DOI: 10.1007/978-3-319-22180-9_41
BibTeX@incollection{Lai2015, author = {Lai, Yun-Ni and Gao, Tie-Gang and Li, Jia-Xin and Sheng, Guo-Rui}, title = {Forensic Detection of Median Filtering in Digital Images Using the Coefficient-pair Histogram of DCT Value and LBP Pattern}, booktitle = {Intelligent Computing Theories and Methodologies}, publisher = {Springer International Publishing}, year = {2015}, volume = {9225}, pages = {421--432}}
-
Use of Sensor Noise for Source Identification
Proc. Int Noise and Fluctuations (ICNF) Conf
Institute of Electrical and Electronics Engineers (IEEE), 2015, pp. 1-6
DOI: 10.1109/ICNF.2015.7288548
BibTeX@inproceedings{Lau2015, author = {Lau, Kwun-fung and Law, Ngai-fong and Siu, Wan-chi}, title = {Use of Sensor Noise for Source Identification}, booktitle = {Proc. Int Noise and Fluctuations (ICNF) Conf}, publisher = {Institute of Electrical and Electronics Engineers (IEEE)}, year = {2015}, pages = {1--6}}
-
Copy-move Image Forgery Detection Based on Gabor Magnitude
Journal of Visual Communication and Image Representation, 2015, Vol. 31, pp. 320-334
DOI: 10.1016/j.jvcir.2015.07.007
BibTeX@article{Lee2015b, author = {Lee, Jen-Chun}, title = {Copy-move Image Forgery Detection Based on Gabor Magnitude}, journal = {Journal of Visual Communication and Image Representation}, year = {2015}, volume = {31}, pages = {320--334}}
-
Detection of Copy--move Image Forgery Using Histogram of Orientated Gradients
Information Sciences, 2015(0), pp. -
DOI: 10.1016/j.ins.2015.03.009
BibTeX@article{Lee2015, author = {Lee, Jen-Chun and Chang, Chien-Ping and Chen, Wei-Kuei}, title = {Detection of Copy--move Image Forgery Using Histogram of Orientated Gradients}, journal = {Information Sciences}, year = {2015}, number = {0}, pages = {-}}
-
Digital Camera Identification Using Sensor Pattern Noise
Proceedings of the Second International Conference on Information Security and Digital Forensics (ISDF2015)
2015, pp. 30-35
BibTeX@inproceedings{Lee2015a, author = {Lee, Sang-Hyeong and Oh, Tae-Woo and Kim, Kibom and Lee, Hae-Yeoun}, title = {Digital Camera Identification Using Sensor Pattern Noise}, booktitle = {Proceedings of the Second International Conference on Information Security and Digital Forensics (ISDF2015)}, year = {2015}, pages = {30--35}}
-
Forensic Collection and Analysis of Thumbnails in Android
Proc. IEEE Trustcom/BigDataSE/ISPA
2015, Vol. 1, pp. 1059-1066
DOI: 10.1109/Trustcom.2015.483
BibTeX@inproceedings{Leom2015, author = {Leom, M. D. and DOrazio, C. J. and Deegan, G. and Choo, K. K. R.}, title = {Forensic Collection and Analysis of Thumbnails in Android}, booktitle = {Proc. IEEE Trustcom/BigDataSE/ISPA}, year = {2015}, volume = {1}, pages = {1059--1066}}
-
Metadata protection scheme for JPEG privacy security using hierarchical and group-based models
Proc. 5th Int. Conf. Information Communication Technology and Accessibility (ICTA)
2015, pp. 1-5
DOI: 10.1109/ICTA.2015.7426905
BibTeX@inproceedings{Lepsoy2015, author = {Lepsoy, J. and Kim, S. and Atnafu, D. and Kim, H. J.}, title = {Metadata protection scheme for JPEG privacy security using hierarchical and group-based models}, booktitle = {Proc. 5th Int. Conf. Information Communication Technology and Accessibility (ICTA)}, year = {2015}, pages = {1--5}}
-
Zernike Moment-based Approach for Detecting Duplicated Image Regions by a Modified Method to Reduce Geometrical and Numerical Errors
Gervasi, O., Murgante, B., Misra, S., Gavrilova, M. L., Rocha, A. M. A. C., Torre, C., Taniar, D. & Apduhan, B. O. (ed.)
Computational Science and Its Applications -- ICCSA 2015
Springer International Publishing, 2015, Vol. 9158, pp. 458-475
DOI: 10.1007/978-3-319-21410-8_36
BibTeX@incollection{Le-Tien2015, author = {Le-Tien, Thuong and Huynh-Ngoc, Tan and Huynh-Kha, Tu and Marie, Luong}, title = {Zernike Moment-based Approach for Detecting Duplicated Image Regions by a Modified Method to Reduce Geometrical and Numerical Errors}, booktitle = {Computational Science and Its Applications -- ICCSA 2015}, publisher = {Springer International Publishing}, year = {2015}, volume = {9158}, pages = {458--475}}
-
Statistical Model of JPEG Noises and Its Application in Quantization Step Estimation
IEEE Transactions on Image Processing, 2015, Vol. 24(5), pp. 1471-1484
DOI: 10.1109/TIP.2015.2405477
BibTeX@article{Li2015g, author = {Li, B. and Ng, T. T. and Li, X. and Tan, S. and Huang, J.}, title = {Statistical Model of JPEG Noises and Its Application in Quantization Step Estimation}, journal = {IEEE Transactions on Image Processing}, year = {2015}, volume = {24}, number = {5}, pages = {1471--1484}}
-
Revealing the Trace of High-quality JPEG Compression through Quantization Noise Analysis
Information Forensics and Security, IEEE Transactions on, 2015, Vol. 10(3), pp. 558-573
DOI: 10.1109/TIFS.2015.2389148
BibTeX@article{Li2015a, author = {Li, Bin and Ng, Tian-Tsong and Li, Xiaolong and Tan, Shunquan and Huang, Jiwu}, title = {Revealing the Trace of High-quality JPEG Compression through Quantization Noise Analysis}, journal = {Information Forensics and Security, IEEE Transactions on}, year = {2015}, volume = {10}, number = {3}, pages = {558--573}}
-
Image Splicing Detection Based on Markov Features in Qdct Domain
Huang, D.-S., Jo, K.-H. & Hussain, A. (ed.)
Intelligent Computing Theories and Methodologies
Advanced Intelligent Computing Theories and Applications, Springer International Publishing, 2015, Vol. 9226, pp. 170-176
DOI: 10.1007/978-3-319-22186-1_17
BibTeX@incollection{Li2015c, author = {Li, Ce and Ma, Qiang and Xiao, Limei and Li, Ming and Zhang, Aihua}, title = {Image Splicing Detection Based on Markov Features in Qdct Domain}, booktitle = {Intelligent Computing Theories and Methodologies}, journal = {Advanced Intelligent Computing Theories and Applications}, publisher = {Springer International Publishing}, year = {2015}, volume = {9226}, pages = {170--176}}
-
Segmentation-based Image Copy-move Forgery Detection Scheme
Information Forensics and Security, IEEE Transactions on, 2015, Vol. 10(3), pp. 507-518
DOI: 10.1109/TIFS.2014.2381872
BibTeX@article{Li2015, author = {Li, Jian and Li, Xiaolong and Yang, Bin and Sun, Xingming}, title = {Segmentation-based Image Copy-move Forgery Detection Scheme}, journal = {Information Forensics and Security, IEEE Transactions on}, year = {2015}, volume = {10}, number = {3}, pages = {507--518}}
-
Detection of Seam Carving and Contrast Enhancement Operation Chain
Proc. Int. Conf. Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP)
2015, pp. 235-238
DOI: 10.1109/IIH-MSP.2015.89
BibTeX@inproceedings{Li2015i, author = {Li, J. and Zhao, Y. and Ni, R.}, title = {Detection of Seam Carving and Contrast Enhancement Operation Chain}, booktitle = {Proc. Int. Conf. Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP)}, year = {2015}, pages = {235--238}}
-
Random Subspace Method for Source Camera Identification
Proc. IEEE 25th Int. Workshop Machine Learning for Signal Processing (MLSP)
2015, pp. 1-5
DOI: 10.1109/MLSP.2015.7324339
BibTeX@inproceedings{Li2015f, author = {Li, R. and Kotropoulos, C. and Li, C. T. and Guan, Y.}, title = {Random Subspace Method for Source Camera Identification}, booktitle = {Proc. IEEE 25th Int. Workshop Machine Learning for Signal Processing (MLSP)}, year = {2015}, pages = {1--5}}
-
A Compact Representation of Sensor Fingerprint for Camera Identification and Fingerprint Matching
Proc. IEEE Int Acoustics, Speech and Signal Processing (ICASSP) Conf
2015, pp. 1777-1781
DOI: 10.1109/ICASSP.2015.7178276
BibTeX@inproceedings{Li2015d, author = {Li, Ruizhe and Li, Chang-Tsun and Guan, Yu}, title = {A Compact Representation of Sensor Fingerprint for Camera Identification and Fingerprint Matching}, booktitle = {Proc. IEEE Int Acoustics, Speech and Signal Processing (ICASSP) Conf}, year = {2015}, pages = {1777--1781}}
-
Incremental Update of Feature Extractor for Camera Identification
Proc. IEEE Int Image Processing (ICIP) Conf
2015, pp. 324-328
DOI: 10.1109/ICIP.2015.7350813
BibTeX@inproceedings{Li2015e, author = {Li, Ruizhe and Li, Chang-Tsun and Guan, Yu}, title = {Incremental Update of Feature Extractor for Camera Identification}, booktitle = {Proc. IEEE Int Image Processing (ICIP) Conf}, year = {2015}, pages = {324--328}}
-
Standards and Best Practices in Digital and Multimedia Forensics
Ho, A. T. S. & Li, S. (ed.)
Ho/Handbook of Digital Forensics of Multimedia Data and Devices
Chapter 2
Wiley-IEEE Press, 2015, pp. 38-93
DOI: 10.1002/9781118705773.ch2
BibTeX@inbook{Li2015j, author = {Li, Shujun and Dhami, Mandeep K. and Ho, Anthony T. S.}, title = {Standards and Best Practices in Digital and Multimedia Forensics}, booktitle = {Ho/Handbook of Digital Forensics of Multimedia Data and Devices}, publisher = {Wiley-IEEE Press}, year = {2015}, pages = {38--93}}
-
Digital Forensics Laboratories in Operation
Ho/Handbook of Digital Forensics of Multimedia Data and Devices
Chapter 1
Wiley-IEEE Press, 2015, pp. 1-37
DOI: 10.1002/9781118705773.ch1
BibTeX@inbook{Li2015k, author = {Li, Shujun and Ho, Anthony T. S.}, title = {Digital Forensics Laboratories in Operation}, booktitle = {Ho/Handbook of Digital Forensics of Multimedia Data and Devices}, publisher = {Wiley-IEEE Press}, year = {2015}, pages = {1--37}}
-
Anti-forensics of Lossy Predictive Image Compression
Signal Processing Letters, IEEE, 2015, Vol. 22(12), pp. 2219-2223
DOI: 10.1109/LSP.2015.2472561
BibTeX@article{Li2015b, author = {Li, Yuanman and Zhou, Jiantao}, title = {Anti-forensics of Lossy Predictive Image Compression}, journal = {Signal Processing Letters, IEEE}, year = {2015}, volume = {22}, number = {12}, pages = {2219--2223}}
-
Anti-Forensics of Lossy Predictive Image Compression
#IEEE_J_SPL#, 2015, Vol. 22(12), pp. 2219-2223
DOI: 10.1109/LSP.2015.2472561
BibTeX@article{Li2015h, author = {Li, Y. and Zhou, J.}, title = {Anti-Forensics of Lossy Predictive Image Compression}, journal = {#IEEE_J_SPL#}, year = {2015}, volume = {22}, number = {12}, pages = {2219--2223}}
-
An Efficient Forgery Detection Algorithm for Object Removal by Exemplar-based Image Inpainting
Journal of Visual Communication and Image Representation, 2015(0), pp. -
DOI: 10.1016/j.jvcir.2015.03.004
BibTeX@article{Liang2015, author = {Liang, Zaoshan and Yang, Gaobo and Ding, Xiangling and Li, Leida}, title = {An Efficient Forgery Detection Algorithm for Object Removal by Exemplar-based Image Inpainting}, journal = {Journal of Visual Communication and Image Representation}, year = {2015}, number = {0}, pages = {-}}
-
An Efficiency Enhanced Cluster Expanding Block Algorithm for Copy-move Forgery Detection
Proc. Int Intelligent Networking and Collaborative Systems (INCOS) Conf
2015, pp. 228-231
DOI: 10.1109/INCoS.2015.90
BibTeX@inproceedings{Lin2015, author = {Lin, C. S. and Chen, C. C. and Chang, Y. C.}, title = {An Efficiency Enhanced Cluster Expanding Block Algorithm for Copy-move Forgery Detection}, booktitle = {Proc. Int Intelligent Networking and Collaborative Systems (INCOS) Conf}, year = {2015}, pages = {228--231}}
-
Splicing Forgery Exposure in Digital Image by Detecting Noise Discrepancies
International Journal of Computer and Communication Engineering, 2015, Vol. 4(1), pp. 33-38
DOI: 10.7763/IJCCE.2015.V4.378
BibTeX@article{Liu2015, author = {Liu, Bo and Pun, Chi-Man}, title = {Splicing Forgery Exposure in Digital Image by Detecting Noise Discrepancies}, journal = {International Journal of Computer and Communication Engineering}, year = {2015}, volume = {4}, number = {1}, pages = {33--38}}
-
Enhancing Sensor Pattern Noise for Source Camera Identification: An Empirical Evaluation
Proc. of the The 3rd ACM Workshop on Information Hiding and Multimedia Security, 2015
DOI: 10.1145/2756601.2756614
BibTeX@article{Liu2015b, author = {Liu, Bei-bei and Wei, Xingjie and Yan, Jeff}, title = {Enhancing Sensor Pattern Noise for Source Camera Identification: An Empirical Evaluation}, journal = {Proc. of the The 3rd ACM Workshop on Information Hiding and Multimedia Security}, year = {2015}}
-
Exposing Image Tampering with the Same Quantization Matrix
Baughman, A. K., Gao, J., Pan, J.-Y. & Petrushin, V. A. (ed.)
Multimedia Data Mining and Analytics
Springer International Publishing, 2015, pp. 327-343
DOI: 10.1007/978-3-319-14998-1_15
BibTeX@incollection{Liu2015a, author = {Liu, Qingzhong and Sung, AndrewH. and Chen, Zhongxue and Chen, Lei}, title = {Exposing Image Tampering with the Same Quantization Matrix}, booktitle = {Multimedia Data Mining and Analytics}, publisher = {Springer International Publishing}, year = {2015}, pages = {327--343}}
-
Exposing Video Inter-frame Forgery by Zernike Opponent Chromaticity Moments and Coarseness Analysis
Multimedia Systems, Springer Berlin Heidelberg, 2015, pp. 1-16
DOI: 10.1007/s00530-015-0478-1
BibTeX@article{Liu2015c, author = {Liu, Yuqing and Huang, Tianqiang}, title = {Exposing Video Inter-frame Forgery by Zernike Opponent Chromaticity Moments and Coarseness Analysis}, journal = {Multimedia Systems}, publisher = {Springer Berlin Heidelberg}, year = {2015}, pages = {1--16}}
-
Detecting Cyclostationarity in Re-captured LCD Screens
Forensic Research, 2015
DOI: 10.1109/icip.2015.7350872
BibTeX@article{Mahdian2015a, author = {Mahdian, Babak and Novozamsky, Adam and Saic, Stanislav}, title = {Detecting Cyclostationarity in Re-captured LCD Screens}, journal = {Forensic Research}, year = {2015}}
-
Determination of Stop-criterion for Incremental Methods Constructing Camera Sensor Fingerprint
Shi, Y.-Q., Kim, H. J., Pérez-González, F. & Yang, C.-N. (ed.)
Digital-Forensics and Watermarking
Springer International Publishing, 2015, Vol. 9023, pp. 47-59
DOI: 10.1007/978-3-319-19321-2_4
BibTeX@incollection{Mahdian2015, author = {Mahdian, Babak and Novozámský, Adam and Saic, Stanislav}, title = {Determination of Stop-criterion for Incremental Methods Constructing Camera Sensor Fingerprint}, booktitle = {Digital-Forensics and Watermarking}, publisher = {Springer International Publishing}, year = {2015}, volume = {9023}, pages = {47--59}}
-
Identification of Aliasing-based Patterns in Re-captured LCD Screens
ICIP
2015
BibTeX@inproceedings{Mahdian2015b, author = {Mahdian, Babak and Novozámský, Adam and Saic, Stanislav}, title = {Identification of Aliasing-based Patterns in Re-captured LCD Screens}, booktitle = {ICIP}, year = {2015}}
-
Determination of Stop-criterion for Incremental Methods Constructing Camera Sensor Fingerprint
Digital-Forensics and Watermarking
Digital-Forensics and Watermarking, Springer, 2015, pp. 47-59
DOI: 10.1007/978-3-319-19321-2_4
BibTeX@article{Mahdian2015c, author = {Mahdian, Babak and Novozámský, Adam and Saic, Stanislav}, title = {Determination of Stop-criterion for Incremental Methods Constructing Camera Sensor Fingerprint}, booktitle = {Digital-Forensics and Watermarking}, journal = {Digital-Forensics and Watermarking}, publisher = {Springer}, year = {2015}, pages = {47--59}}
-
A Survey on Block Based Copy Move Image Forgery Detection Techniques
Emerging Technologies (ICET), 2015 International Conference on
2015, pp. 1-6
DOI: 10.1109/ICET.2015.7389169
BibTeX@inproceedings{Mahmood2015, author = {Mahmood, T. and Nawaz, T. and Ashraf, R. and Shah, M. and Khan, Z. and Irtaza, A. and Mehmood, Z.}, title = {A Survey on Block Based Copy Move Image Forgery Detection Techniques}, booktitle = {Emerging Technologies (ICET), 2015 International Conference on}, year = {2015}, pages = {1--6}}
-
Detection of Purple Fringing Aberration Patterns and Its Application to Forensic Analysis of Spliced Images
Proc. Int Advances in Computing, Communications and Informatics (ICACCI) Conf
2015, pp. 1421-1427
DOI: 10.1109/ICACCI.2015.7275812
BibTeX@inproceedings{Malik2015, author = {Malik, Parveen and Karthik, Kannan}, title = {Detection of Purple Fringing Aberration Patterns and Its Application to Forensic Analysis of Spliced Images}, booktitle = {Proc. Int Advances in Computing, Communications and Informatics (ICACCI) Conf}, year = {2015}, pages = {1421--1427}}
-
Copy move forgery detection using low complexity feature extraction
Proc. IEEE UP Section Conf. Electrical Computer and Electronics (UPCON)
2015, pp. 1-5
DOI: 10.1109/UPCON.2015.7456688
BibTeX@inproceedings{Malviya2015, author = {Malviya, A. V. and Ladhake, S. A.}, title = {Copy move forgery detection using low complexity feature extraction}, booktitle = {Proc. IEEE UP Section Conf. Electrical Computer and Electronics (UPCON)}, year = {2015}, pages = {1--5}}
-
Visual Artifacts Based Image Splicing Detection in Uncompressed Images
Proc. Vision and Information Security (CGVIS) 2015 IEEE Int. Conf. Computer Graphics
2015, Vol. 11/16, pp. 145-150
DOI: 10.1109/CGVIS.2015.7449911
BibTeX@inproceedings{Manu2015, author = {Manu, V. T. and Mehtre, B. M.}, title = {Visual Artifacts Based Image Splicing Detection in Uncompressed Images}, booktitle = {Proc. Vision and Information Security (CGVIS) 2015 IEEE Int. Conf. Computer Graphics}, year = {2015}, volume = {11/16}, pages = {145--150}}
-
Counter-forensics in Machine Learning Based Forgery Detection
Alattar, A. M., Memon, N. D. & Heitzenrater, C. D. (ed.)
IS&T/SPIE Electronic Imaging
Proc. SPIE, 2015, Vol. 9409, pp. 94090L-94090L-11
DOI: 10.1117/12.2182173
BibTeX@inproceedings{Marra2015, author = {Marra, Francesco and Poggi, Giovanni and Roli, Fabio and Sansone, Carlo and Verdoliva, Luisa}, title = {Counter-forensics in Machine Learning Based Forgery Detection}, booktitle = {IS&T/SPIE Electronic Imaging}, journal = {Proc. SPIE}, year = {2015}, volume = {9409}, pages = {94090L-94090L-11}}
-
Evaluation of Residual-based Local Features for Camera Model Identification
New Trends in Image Analysis and Processing -- ICIAP 2015 Workshops
New Trends in Image Analysis and Processing, Springer Science + Business Media, 2015, pp. 11-18
DOI: 10.1007/978-3-319-23222-5_2
BibTeX@incollection{Marra2015a, author = {Marra, Francesco and Poggi, Giovanni and Sansone, Carlo and Verdoliva, Luisa}, title = {Evaluation of Residual-based Local Features for Camera Model Identification}, booktitle = {New Trends in Image Analysis and Processing -- ICIAP 2015 Workshops}, journal = {New Trends in Image Analysis and Processing}, publisher = {Springer Science + Business Media}, year = {2015}, pages = {11--18}}
-
Evaluation of Residual-based Local Features for Camera Model Identification
New Trends in Image Analysis and Processing -- ICIAP 2015 Workshops, Springer, 2015
DOI: 10.1007/978-3-319-23222-5_2
BibTeX@article{Marra2015b, author = {Marra, Francesco and Poggi, Giovanni and Sansone, Carlo and Verdoliva, Luisa}, title = {Evaluation of Residual-based Local Features for Camera Model Identification}, journal = {New Trends in Image Analysis and Processing -- ICIAP 2015 Workshops}, publisher = {Springer}, year = {2015}}
-
A Machine Learning-Based Approach to Digital Triage
Ho/Handbook of Digital Forensics of Multimedia Data and Devices
Wiley-IEEE Press, 2015, pp. 94-132
DOI: 10.1002/9781118705773.ch3
BibTeX@inbook{Marturana2015, author = {Marturana, Fabio and Tacconi, Simone and Italiano, Giuseppe F.}, title = {A Machine Learning-Based Approach to Digital Triage}, booktitle = {Ho/Handbook of Digital Forensics of Multimedia Data and Devices}, publisher = {Wiley-IEEE Press}, year = {2015}, pages = {94--132}}
-
Anti-forensics of Chromatic Aberration
IS&T/SPIE Electronic Imaging
Proc. SPIE, 2015, Vol. 9409, pp. 94090M-94090M-9
DOI: 10.1117/12.2182457
BibTeX@inproceedings{Mayer2015, author = {Mayer, Owen and Stamm, Matthew C.}, title = {Anti-forensics of Chromatic Aberration}, booktitle = {IS&T/SPIE Electronic Imaging}, journal = {Proc. SPIE}, year = {2015}, volume = {9409}, pages = {94090M-94090M-9}}
-
CBFD: Coherence Based Forgery Detection technique in image forensics analysis
Proc. Computer Science and Technology (ICERECT) 2015 Int. Conf. Emerging Research in Electronics
2015, pp. 192-197
DOI: 10.1109/ERECT.2015.7499011
BibTeX@inproceedings{MeenakshiSundaram2015, author = {Meenakshi Sundaram, A. and Nandini, C.}, title = {CBFD: Coherence Based Forgery Detection technique in image forensics analysis}, booktitle = {Proc. Computer Science and Technology (ICERECT) 2015 Int. Conf. Emerging Research in Electronics}, year = {2015}, pages = {192--197}}
-
CBFD: Coherence Based Forgery Detection technique in image forensics analysis
Proc. Computer Science and Technology (ICERECT) 2015 Int. Conf. Emerging Research in Electronics
2015, pp. 192-197
DOI: 10.1109/ERECT.2015.7499011
BibTeX@inproceedings{MeenakshiSundaram2015a, author = {Meenakshi Sundaram, A. and Nandini, C.}, title = {CBFD: Coherence Based Forgery Detection technique in image forensics analysis}, booktitle = {Proc. Computer Science and Technology (ICERECT) 2015 Int. Conf. Emerging Research in Electronics}, year = {2015}, pages = {192--197}}
-
Factor Histogram Based Forgery Localization in Double Compressed JPEG\ Images
Procedia Computer Science, 2015, Vol. 54, pp. 690-696
DOI: 10.1016/j.procs.2015.06.081
BibTeX@article{Mire2015, author = {Mire, Archana V. and Dhok, S. B. and Mistry, N. J. and Porey, P. D.}, title = {Factor Histogram Based Forgery Localization in Double Compressed JPEG\ Images}, journal = {Procedia Computer Science}, year = {2015}, volume = {54}, pages = {690--696}}
-
A Comparison Study on SVD-based Features in Different Transforms for Image Splicing Detection
Proc. IEEE Int Consumer Electronics - Taiwan (ICCE-TW) Conf
2015, pp. 13-14
DOI: 10.1109/ICCE-TW.2015.7216815
BibTeX@inproceedings{Moghaddasi2015, author = {Moghaddasi, Z. and Jalab, H. A. and Noor, R. M.}, title = {A Comparison Study on SVD-based Features in Different Transforms for Image Splicing Detection}, booktitle = {Proc. IEEE Int Consumer Electronics - Taiwan (ICCE-TW) Conf}, year = {2015}, pages = {13--14}}
-
Increase the efficiency of DCT method for detection of copy-move forgery in complex and smooth images
Proc. 2nd Int. Conf. Knowledge-Based Engineering and Innovation (KBEI)
2015, pp. 436-440
DOI: 10.1109/KBEI.2015.7436084
BibTeX@inproceedings{Mohebbian2015, author = {Mohebbian, E. and Hariri, M.}, title = {Increase the efficiency of DCT method for detection of copy-move forgery in complex and smooth images}, booktitle = {Proc. 2nd Int. Conf. Knowledge-Based Engineering and Innovation (KBEI)}, year = {2015}, pages = {436--440}}
-
Image Manipulation on Facebook for Forensics Evidence
Image Processing Laboratory Dipartimento di Matematica e Informatica Universita degli Studi di Catania, Image Processing Laboratory Dipartimento di Matematica e Informatica Universita degli Studi di Catania, 2015
BibTeX@techreport{Moltisanti2015, author = {Moltisanti, Marco and Paratore, Antonino and Battiato, Sebastiano and Saravo, Luigi}, title = {Image Manipulation on Facebook for Forensics Evidence}, school = {Image Processing Laboratory Dipartimento di Matematica e Informatica Universita degli Studi di Catania}, year = {2015}}
-
Image Manipulation on Facebook for Forensics Evidence
Image Analysis and Processing — ICIAP 2015
Springer, 2015, pp. 506-517
DOI: 10.1007/978-3-319-23234-8_47
BibTeX@incollection{Moltisanti2015a, author = {Moltisanti, Marco and Paratore, Antonino and Battiato, Sebastiano and Saravo, Luigi}, title = {Image Manipulation on Facebook for Forensics Evidence}, booktitle = {Image Analysis and Processing — ICIAP 2015}, publisher = {Springer}, year = {2015}, pages = {506--517}}
-
Detecting Image Forgery Using XOR and Determinant of Pixels for Image Forensics
Proc. 11th Int. Conf. Signal-Image Technology Internet-Based Systems (SITIS)
2015, pp. 613-616
DOI: 10.1109/SITIS.2015.78
BibTeX@inproceedings{Mookdarsanit2015, author = {Mookdarsanit, P. and Soimart, L. and Ketcham, M. and Hnoohom, N.}, title = {Detecting Image Forgery Using XOR and Determinant of Pixels for Image Forensics}, booktitle = {Proc. 11th Int. Conf. Signal-Image Technology Internet-Based Systems (SITIS)}, year = {2015}, pages = {613--616}}
-
Detecting Image Forgery Using XOR and Determinant of Pixels for Image Forensics
Proc. 11th Int. Conf. Signal-Image Technology Internet-Based Systems (SITIS)
2015, pp. 613-616
DOI: 10.1109/SITIS.2015.78
BibTeX@inproceedings{Mookdarsanit2015a, author = {Mookdarsanit, P. and Soimart, L. and Ketcham, M. and Hnoohom, N.}, title = {Detecting Image Forgery Using XOR and Determinant of Pixels for Image Forensics}, booktitle = {Proc. 11th Int. Conf. Signal-Image Technology Internet-Based Systems (SITIS)}, year = {2015}, pages = {613--616}}
-
A Fast and Accurate Algorithm for Copy-move Forgery Detection
Computer Engineering Systems (ICCES), 2015 Tenth International Conference on
2015, pp. 281-285
DOI: 10.1109/ICCES.2015.7393060
BibTeX@inproceedings{Moussa2015, author = {Moussa, A. M.}, title = {A Fast and Accurate Algorithm for Copy-move Forgery Detection}, booktitle = {Computer Engineering Systems (ICCES), 2015 Tenth International Conference on}, year = {2015}, pages = {281--285}}
-
Recaptured Images Forensics Based on Color Moments and DCT Coefficients Features
Journal of Information Hiding and Multimedia Signal Processing, 2015, Vol. 6(2), pp. 323-333
BibTeX@article{Ni2015, author = {Ni, Rongrong and Zhao, Yao and Zhai, Xiaobo}, title = {Recaptured Images Forensics Based on Color Moments and DCT Coefficients Features}, journal = {Journal of Information Hiding and Multimedia Signal Processing}, year = {2015}, volume = {6}, number = {2}, pages = {323--333}}
-
A Review of Image Forgery Techniques and Their Detection
Proc. Int Innovations in Information, Embedded and Communication Systems (ICIIECS) Conf
2015, pp. 1-5
DOI: 10.1109/ICIIECS.2015.7193177
BibTeX@inproceedings{Nirmalkar2015, author = {Nirmalkar, N. and Kamble, S. and Kakde, S.}, title = {A Review of Image Forgery Techniques and Their Detection}, booktitle = {Proc. Int Innovations in Information, Embedded and Communication Systems (ICIIECS) Conf}, year = {2015}, pages = {1--5}}
-
Double JPEG Compression Detection Using Statistical Analysis
dvances in Computer Science: an International Journal, 2015, Vol. 4(15), pp. 70-76
BibTeX@article{Nowroozi2015, author = {Nowroozi, Ehsan and Zakerolhosseini, Ali}, title = {Double JPEG Compression Detection Using Statistical Analysis}, journal = {dvances in Computer Science: an International Journal}, year = {2015}, volume = {4}, number = {15}, pages = {70--76}}
-
A photo composite detection based on eye specular highlights using pixel-based approach
Proc. 3rd Int Information and Communication Technology (ICoICT ) Conf
2015, pp. 195-200
DOI: 10.1109/ICoICT.2015.7231421
BibTeX@inproceedings{Nugraha2015, author = {Nugraha, P. A. and Ciptasari, R. W. and Pudjoatmojo, B.}, title = {A photo composite detection based on eye specular highlights using pixel-based approach}, booktitle = {Proc. 3rd Int Information and Communication Technology (ICoICT ) Conf}, year = {2015}, pages = {195--200}}
-
Smartphone Image Acquisition Forensics Using Sensor Fingerprint
IET Computer Vision, 2015
DOI: 10.1049/iet-cvi.2014.0243
BibTeX@article{Orozco2015, author = {Orozco, Ana Lucila Sandoval and Villalba, Luis Javier García and González, David Manuel Arenas and Corripio, Jocelin Rosales and Hernandez-Castro, Julio and Gibson, Stuart James}, title = {Smartphone Image Acquisition Forensics Using Sensor Fingerprint}, journal = {IET Computer Vision}, year = {2015}}
-
Smartphone image acquisition forensics using sensor fingerprint
IET Comput Vision, 2015, Vol. 9(5), pp. 723-731
DOI: 10.1049/iet-cvi.2014.0243
BibTeX@article{Orozco2015a, author = {Orozco, A. L. Sandoval and Villalba, L. J. García and González, D. M. Arenas and Corripio, J. R. and Hernandez-Castro, J. and Gibson, S. J.}, title = {Smartphone image acquisition forensics using sensor fingerprint}, journal = {IET Comput Vision}, year = {2015}, volume = {9}, number = {5}, pages = {723--731}}
-
Blind Estimation of Affine Transformation Using 2D Cyclostationarity of Resampled Images
Proc. SPIE, 2015, Vol. 9811, pp. 98110L-98110L-9
DOI: 10.1117/12.2205468
BibTeX@article{Ou2015, author = {Ou, Junhai and Ni, Jiangqun}, title = {Blind Estimation of Affine Transformation Using 2D Cyclostationarity of Resampled Images}, journal = {Proc. SPIE}, year = {2015}, volume = {9811}, pages = {98110L-98110L-9}}
-
Digital Image Forensics with Statistical Analysis
Ho, A. T. S. & Li, S. (ed.)
Handbook of Digital Forensics of Multimedia Data and Devices
Wiley-IEEE Press, 2015, pp. 704-
DOI: 10.1002/9781118705773.ch13
BibTeX@inbook{Pan2015, author = {Pan, Xunyu}, title = {Digital Image Forensics with Statistical Analysis}, booktitle = {Handbook of Digital Forensics of Multimedia Data and Devices}, publisher = {Wiley-IEEE Press}, year = {2015}, pages = {704-}}
-
Passive Copy Move Forgery Detection Using SURF, HOG and SIFT Features
Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014
Springer, 2015
DOI: 10.1007/978-3-319-11933-5_74
BibTeX@incollection{Pandey2015, author = {Pandey, Ramesh Chand and Agrawal, Rishabh and Singh, Sanjay Kumar and Shukla, K. K.}, title = {Passive Copy Move Forgery Detection Using SURF, HOG and SIFT Features}, booktitle = {Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014}, publisher = {Springer}, year = {2015}}
-
Towards an Image Blurring Detection Approach Based on Color Filter Array
Proc. of the International Conference on Mechatronics, Electronic, Industrial and Control Engineering (MEIC 2015)
2015
DOI: 10.2991/meic-15.2015.55
BibTeX@inproceedings{Peng2015, author = {Peng}, title = {Towards an Image Blurring Detection Approach Based on Color Filter Array}, booktitle = {Proc. of the International Conference on Mechatronics, Electronic, Industrial and Control Engineering (MEIC 2015)}, year = {2015}}
-
Countering Anti-forensics of Image Resampling
Proc. IEEE Int Image Processing (ICIP) Conf
2015, pp. 3595-3599
DOI: 10.1109/ICIP.2015.7351474
BibTeX@inproceedings{Peng2015b, author = {Peng, Anjie and Zeng, Hui and Lin, Xiaodan and Kang, Xiangui}, title = {Countering Anti-forensics of Image Resampling}, booktitle = {Proc. IEEE Int Image Processing (ICIP) Conf}, year = {2015}, pages = {3595--3599}}
-
Countering anti-forensics of image resampling
Proc. IEEE Int. Conf. Image Processing (ICIP)
2015, pp. 3595-3599
DOI: 10.1109/ICIP.2015.7351474
BibTeX@inproceedings{Peng2015e, author = {Peng, A. and Zeng, H. and Lin, X. and Kang, X.}, title = {Countering anti-forensics of image resampling}, booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)}, year = {2015}, pages = {3595--3599}}
-
Detection of Computer Generated Faces in Videos Based on Pulse Signal
Proc. IEEE China Summit and Int Signal and Information Processing (ChinaSIP) Conf
2015, pp. 841-845
DOI: 10.1109/ChinaSIP.2015.7230523
BibTeX@inproceedings{Peng2015a, author = {Peng, Bo and Wang, Wei and Dong, Jing and Tan, Tieniu}, title = {Detection of Computer Generated Faces in Videos Based on Pulse Signal}, booktitle = {Proc. IEEE China Summit and Int Signal and Information Processing (ChinaSIP) Conf}, year = {2015}, pages = {841--845}}
-
Improved 3D Lighting Environment Estimation for Image Forgery Detection
Information Forensics and Security (WIFS), 2015 IEEE International Workshop on
2015, pp. 1-6
DOI: 10.1109/WIFS.2015.7368587
BibTeX@inproceedings{Peng2015d, author = {Peng, Bo and Wang, Wei and Dong, Jing and Tan, Tieniu}, title = {Improved 3D Lighting Environment Estimation for Image Forgery Detection}, booktitle = {Information Forensics and Security (WIFS), 2015 IEEE International Workshop on}, year = {2015}, pages = {1--6}}
-
Identification of Natural Images and Computer Generated Graphics Using Multi-fractal Differences of PRNU
Algorithms and Architectures for Parallel Processing, Springer, 2015
DOI: 10.1007/978-3-319-27122-4_15
BibTeX@article{Peng2015c, author = {Peng, Fei and Zhu, Yin and Long, Min}, title = {Identification of Natural Images and Computer Generated Graphics Using Multi-fractal Differences of PRNU}, journal = {Algorithms and Architectures for Parallel Processing}, publisher = {Springer}, year = {2015}}
-
Fast Sequential Forensic Camera Identification
arxiv, 2015
BibTeX@article{Perez-Gonzalez2015, author = {Perez-Gonzalez, F. and Gonzalez-Iglesias, I. and Masciopinto, M. and Comesana, P.}, title = {Fast Sequential Forensic Camera Identification}, journal = {arxiv}, year = {2015}}
-
A 3-D Stability Analysis of Lee Harvey Oswald in the Backyard Photo
JDFSL, 2015, Vol. 10(3), pp. 87-98
BibTeX@article{Pittala2015, author = {Pittala, Srivamshi and Whiting, Emily and Farid, Hany}, title = {A 3-D Stability Analysis of Lee Harvey Oswald in the Backyard Photo}, journal = {JDFSL}, year = {2015}, volume = {10}, number = {3}, pages = {87--98}}
-
Forensic Identification of Printed Documents
Ho/Handbook of Digital Forensics of Multimedia Data and Devices
Wiley-Blackwell, 2015, pp. 442-479
DOI: 10.1002/9781118705773.ch12
BibTeX@incollection{Pollard2015, author = {Pollard, Stephen and Adams, Guy and Simske, Steven}, title = {Forensic Identification of Printed Documents}, booktitle = {Ho/Handbook of Digital Forensics of Multimedia Data and Devices}, publisher = {Wiley-Blackwell}, year = {2015}, pages = {442--479}}
-
Automatic Reflection Removal Using Reflective Layer Image Information
Consumer Electronics (ICCE), 2015 IEEE International Conference on
2015, pp. 548-551
DOI: 10.1109/ICCE.2015.7066520
BibTeX@inproceedings{Prakash2015, author = {Prakash, Divya and Kalwad, Pramati and Peddigari, Venkat and Srinivasa, Phanish}, title = {Automatic Reflection Removal Using Reflective Layer Image Information}, booktitle = {Consumer Electronics (ICCE), 2015 IEEE International Conference on}, year = {2015}, pages = {548--551}}
-
Detection of Duplicate Region and Hybrid Non-local Means Filtering for Denoising with Quantization Matrix Estimation for JPEG Error Analysis
Indian Journal of Science and Technology, 2015, Vol. 8(28)
DOI: 10.17485/ijst/2015/v8i28/70923
BibTeX@article{Priyan2015, author = {Priyan, S. Vishnu and Srivatsa, S. K.}, title = {Detection of Duplicate Region and Hybrid Non-local Means Filtering for Denoising with Quantization Matrix Estimation for JPEG Error Analysis}, journal = {Indian Journal of Science and Technology}, year = {2015}, volume = {8}, number = {28}}
-
Image Forgery Detection Using Adaptive Over-segmentation and Feature Points Matching
Information Forensics and Security, IEEE Transactions on, 2015(99)
DOI: 10.1109/TIFS.2015.2423261
BibTeX@article{Pun2015, author = {Pun, Chi-Man and Yuan, Xiao-Chen and Bi, Xiu-Li}, title = {Image Forgery Detection Using Adaptive Over-segmentation and Feature Points Matching}, journal = {Information Forensics and Security, IEEE Transactions on}, year = {2015}, number = {99}}
-
Image Splicing Detection Based on Demosaicking and Wavelet Transformation
Jurnal Ilmu Komputer dan Informasi, 2015
BibTeX@article{Purwandari2015, author = {Purwandari, Endina Putri}, title = {Image Splicing Detection Based on Demosaicking and Wavelet Transformation}, journal = {Jurnal Ilmu Komputer dan Informasi}, year = {2015}}
-
Source Camera Device Identification Based on Raw Images
2015
DOI: 10.1109/icip.2015.7351518
BibTeX@electronic{Qiao2015, author = {Qiao, Tong and Retraint, Florent and Cogranne, Rémi and Thai, Thanh Hai}, title = {Source Camera Device Identification Based on Raw Images}, year = {2015}}
-
Fragile Sensor Fingerprint Camera Identification
Proc. of the 7th IEEE International Workshop on Information Forensics and Security 2015 (WIFS)
2015
DOI: 10.1109/wifs.2015.7368580
BibTeX@inproceedings{Quiring2015, author = {Quiring, Erwin and Kirchner, Matthias}, title = {Fragile Sensor Fingerprint Camera Identification}, booktitle = {Proc. of the 7th IEEE International Workshop on Information Forensics and Security 2015 (WIFS)}, year = {2015}}
-
A Bibliography of Pixel-based Blind Image Forgery Detection Techniques
Signal Processing: Image Communication, 2015, Vol. 39, Part A, pp. 46-74
DOI: 10.1016/j.image.2015.08.008
BibTeX@article{Qureshi2015, author = {Qureshi, Muhammad Ali and Deriche, Mohamed}, title = {A Bibliography of Pixel-based Blind Image Forgery Detection Techniques}, journal = {Signal Processing: Image Communication}, year = {2015}, volume = {39, Part A}, pages = {46--74}}
-
Digital Image Forgery Detection by Edge Analysis
Proc. IEEE Int Consumer Electronics - Taiwan (ICCE-TW) Conf
2015, pp. 19-20
DOI: 10.1109/ICCE-TW.2015.7216848
BibTeX@inproceedings{Rad2015, author = {Rad, R. M. and Wong, Koksheik}, title = {Digital Image Forgery Detection by Edge Analysis}, booktitle = {Proc. IEEE Int Consumer Electronics - Taiwan (ICCE-TW) Conf}, year = {2015}, pages = {19--20}}
-
Digital Image Forgery Detection Using SIFT Feature
Proc. Int Advanced Computing and Communication (ISACC) Symp
2015, pp. 186-191
DOI: 10.1109/ISACC.2015.7377340
BibTeX@inproceedings{Rajkumar2015, author = {Rajkumar, R. and Singh, K. M.}, title = {Digital Image Forgery Detection Using SIFT Feature}, booktitle = {Proc. Int Advanced Computing and Communication (ISACC) Symp}, year = {2015}, pages = {186--191}}
-
Forensic Analysis of Linear and Non Linear Image Filtering Using Quantization Noise
2015 IEEE International Conference on Image Processing (ICIP)
Institute of Electrical & Electronics Engineers (IEEE), 2015
DOI: 10.1109/icip.2015.7350986
BibTeX@inproceedings{Ravi2015, author = {Ravi, Hareesh and Subramanyam, A. V. and Emmanuel, Sabu}, title = {Forensic Analysis of Linear and Non Linear Image Filtering Using Quantization Noise}, booktitle = {2015 IEEE International Conference on Image Processing (ICIP)}, publisher = {Institute of Electrical & Electronics Engineers (IEEE)}, year = {2015}}
-
Novel Video Camera Authentication Based on Peak to Correlation Energy of Clustered Sensor Pattern Noise
Proc. IEEE Int Engineering and Technology (ICETECH) Conf
2015, pp. 1-5
DOI: 10.1109/ICETECH.2015.7274998
BibTeX@inproceedings{Remya2015, author = {Remya, R. S. and Beevi, A. B.}, title = {Novel Video Camera Authentication Based on Peak to Correlation Energy of Clustered Sensor Pattern Noise}, booktitle = {Proc. IEEE Int Engineering and Technology (ICETECH) Conf}, year = {2015}, pages = {1--5}}
-
Image Forgery Detection Using SVM Classifier
Proc. Int Innovations in Information, Embedded and Communication Systems (ICIIECS) Conf
2015, pp. 1-5
DOI: 10.1109/ICIIECS.2015.7193202
BibTeX@inproceedings{Reshma2015, author = {Reshma, P. D. and Arunvinodh, C.}, title = {Image Forgery Detection Using SVM Classifier}, booktitle = {Proc. Int Innovations in Information, Embedded and Communication Systems (ICIIECS) Conf}, year = {2015}, pages = {1--5}}
-
Median Filtering Detection Using Latent Growth Modeling
Journal of the Institute of Electrolnic Engineers of Korea, 2015(1), pp. 61-68
BibTeX@article{Rhee2015, author = {Rhee, Kang Hyeon}, title = {Median Filtering Detection Using Latent Growth Modeling}, journal = {Journal of the Institute of Electrolnic Engineers of Korea}, year = {2015}, number = {1}, pages = {61--68}}
-
Median Filtering Detection of Digital Images Using Pixel Gradients
IEIE Transactions on Smart Processing & Computing, 2015, Vol. 4(4), pp. 195-201
DOI: 10.5573/ieiespc.2015.4.4.195
BibTeX@article{Rhee2015a, author = {Rhee, Kang Hyeon}, title = {Median Filtering Detection of Digital Images Using Pixel Gradients}, journal = {IEIE Transactions on Smart Processing & Computing}, year = {2015}, volume = {4}, number = {4}, pages = {195--201}}
-
Reflectance Normalization in Illumination-based Image Manipulation Detection
New Trends in Image Analysis and Processing, 2015
BibTeX@article{Riess2015, author = {Riess, Christian and Pfaller, Sven and Angelopoulou, Elli}, title = {Reflectance Normalization in Illumination-based Image Manipulation Detection}, journal = {New Trends in Image Analysis and Processing}, year = {2015}}
-
Use of Specialized Security Techniques to Enhance the Authenticity of Surveillance
Book of Abstracts, Presentations and Papers of the 12 th Symposium on International Safeguards: Linking Strategy, Implementation and People, Vienna (Austria), 20-24 Oct 2014
2015, pp. 491
BibTeX@inproceedings{Rocchi2015, author = {Rocchi, S. and Simlinger, R. and Moeslinger, M. and Murray, J. and Hadfi, G. and John, M.}, title = {Use of Specialized Security Techniques to Enhance the Authenticity of Surveillance}, booktitle = {Book of Abstracts, Presentations and Papers of the 12 th Symposium on International Safeguards: Linking Strategy, Implementation and People, Vienna (Austria), 20-24 Oct 2014}, year = {2015}, pages = {491}}
-
Practical implementation of a methodology for digital images authentication using forensics techniques
CSIJ Advances in Computer Science: an International Journal, 2015, Vol. 4(18)
BibTeX@article{Rodriguez-Santos2015, author = {Rodríguez-Santos, Francisco and Delgado-Gutierréz, Guillermo and Palacios-Luengas, Leonardo and Vazquéz-Medina, Rubén}, title = {Practical implementation of a methodology for digital images authentication using forensics techniques}, journal = {CSIJ Advances in Computer Science: an International Journal}, year = {2015}, volume = {4}, number = {18}}
-
The MAVEN Project: Management and Authenticity Verification of Multimedia Contents
Proc. IEEE Int Multimedia Expo Workshops (ICMEW) Conf
Institute of Electrical & Electronics Engineers (IEEE), 2015, pp. 1-4
DOI: 10.1109/icmew.2015.7169825
BibTeX@inproceedings{Ruiz2015, author = {Ruiz, C. and Arroyo, S. and Krsteski, I. and Dago, P. and Sanchez, J. and Perez-Freire, L. and De Rosa, A. and Fontani, M. and Costanzo, A. and Piva, A. and Ariu, D. and Piras, L. and Ahumada, R. and Jerian, M.}, title = {The MAVEN Project: Management and Authenticity Verification of Multimedia Contents}, booktitle = {Proc. IEEE Int Multimedia Expo Workshops (ICMEW) Conf}, publisher = {Institute of Electrical & Electronics Engineers (IEEE)}, year = {2015}, pages = {1--4}}
-
Forensic Examination of Computer-manipulated Documents Using Image Processing Techniques
Egyptian Journal of Forensic Sciences, 2015(0), pp. -
DOI: 10.1016/j.ejfs.2015.03.001
BibTeX@article{Saini2015, author = {Saini, Komal and Shabnampreet Kaur, Forensic document examination, Image processing Computer manipulated documents Alterations of documents}, title = {Forensic Examination of Computer-manipulated Documents Using Image Processing Techniques}, journal = {Egyptian Journal of Forensic Sciences}, year = {2015}, number = {0}, pages = {-}}
-
Region Duplication Forgery Detection in Digital Images Using 2D-DWT and SVD
Proc. Int. Conf. Applied and Theoretical Computing and Communication Technology (iCATccT)
2015, pp. 599-604
DOI: 10.1109/ICATCCT.2015.7456955
BibTeX@inproceedings{Sanap2015, author = {Sanap, V. K. and Mane, V. M.}, title = {Region Duplication Forgery Detection in Digital Images Using 2D-DWT and SVD}, booktitle = {Proc. Int. Conf. Applied and Theoretical Computing and Communication Technology (iCATccT)}, year = {2015}, pages = {599--604}}
-
Image Recapture Discovery Algorithms: A Survey
IJSR, International Journal of Science and Research, 2015, Vol. 4(11), pp. 926-929
DOI: 10.21275/v4i11.nov151302
BibTeX@article{Sanas2015, author = {Sanas, P. and Gupta, P.}, title = {Image Recapture Discovery Algorithms: A Survey}, journal = {IJSR}, publisher = {International Journal of Science and Research}, year = {2015}, volume = {4}, number = {11}, pages = {926--929}}
-
Image Source Acquisition Identification of Mobile Devices Based on the Use of Features
Multimedia Tools and Applications, Springer US, 2015, pp. 1-25
DOI: 10.1007/s11042-015-2633-2
BibTeX@article{SandovalOrozco2015, author = {Sandoval Orozco, AnaLucila and Corripio, JocelinRosales and García Villalba, LuisJavier and Hernández Castro, JulioCésar}, title = {Image Source Acquisition Identification of Mobile Devices Based on the Use of Features}, journal = {Multimedia Tools and Applications}, publisher = {Springer US}, year = {2015}, pages = {1--25}}
-
Analysis of Errors in EXIF Metadata on Mobile Devices
Multimedia Tools and Applications, Springer, 2015, Vol. 74(13), pp. 4735
DOI: 10.1007/s11042-013-1837-6
BibTeX@article{SandovalOrozco2015a, author = {Sandoval Orozco, Ana Lucila and Arenas González, David Manuel and GarcÃa Villalba, Luis Javier and Hernández-Castro, Julio}, title = {Analysis of Errors in EXIF Metadata on Mobile Devices}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2015}, volume = {74}, number = {13}, pages = {4735}}
-
Super-resolution of facial images in forensics scenarios
Proc. Tools and Applications (IPTA) 2015 Int. Conf. Image Processing Theory
2015, pp. 55-60
DOI: 10.1109/IPTA.2015.7367096
BibTeX@inproceedings{Satiro2015, author = {Satiro, J. and Nasrollahi, K. and Correia, P. L. and Moeslund, T. B.}, title = {Super-resolution of facial images in forensics scenarios}, booktitle = {Proc. Tools and Applications (IPTA) 2015 Int. Conf. Image Processing Theory}, year = {2015}, pages = {55--60}}
-
Sensor Pattern Noise Matching Based on Reliability Map for Source Camera Identification
electronic, 2015
BibTeX@misc{Satta2015, author = {Satta, Riccardo}, title = {Sensor Pattern Noise Matching Based on Reliability Map for Source Camera Identification}, year = {2015}}
-
Sensor Pattern Noise and Image Similarity for Picture-to-identity Linking
IET Comput Vision, 2015, Vol. 9(5), pp. 711-722
DOI: 10.1049/iet-cvi.2014.0320
BibTeX@article{Satta2015a, author = {Satta, R. and Ciardulli, A.}, title = {Sensor Pattern Noise and Image Similarity for Picture-to-identity Linking}, journal = {IET Comput Vision}, year = {2015}, volume = {9}, number = {5}, pages = {711--722}}
-
Video Inpainting Detection Using Inconsistencies in Optical Flow
Indraprastha Institute of Information Technology, Delhi (IIIT-D), India, Indraprastha Institute of Information Technology, Delhi (IIIT-D), India, 2015
BibTeX@mastersthesis{Saxena2015, author = {Saxena, Shobhita}, title = {Video Inpainting Detection Using Inconsistencies in Optical Flow}, school = {Indraprastha Institute of Information Technology, Delhi (IIIT-D), India}, year = {2015}}
-
Humans Are Easily Fooled by Digital Images
arxiv, 2015
BibTeX@article{Schetinger2015, author = {Schetinger, Victor and MM Oliveira, R da Silva, T. J. Carvalho}, title = {Humans Are Easily Fooled by Digital Images}, journal = {arxiv}, year = {2015}}
-
The Imagej Ecosystem: An Open Platform for Biomedical Image Analysis.
Mol Reprod Dev, Laboratory for Optical and Computational Instrumentation, University of Wisconsin at Madison, Madison, Wisconsin., Laboratory for Optical and Computational Instrumentation, University of Wisconsin at Madison, Madison, Wisconsin., 2015, Vol. 82(7-8), pp. 518-529
DOI: 10.1002/mrd.22489
BibTeX@article{Schindelin2015, author = {Schindelin, Johannes and Rueden, Curtis T. and Hiner, Mark C. and Eliceiri, Kevin W.}, title = {The Imagej Ecosystem: An Open Platform for Biomedical Image Analysis.}, journal = {Mol Reprod Dev}, school = {Laboratory for Optical and Computational Instrumentation, University of Wisconsin at Madison, Madison, Wisconsin.}, year = {2015}, volume = {82}, number = {7-8}, pages = {518--529}}
-
A Study on Segmentation-based Copy-move Forgery Detection Using DAISY Descriptor
Proceedings of the International Conference on Soft Computing Systems
Springer Science mathplus Business Media, 2015, pp. 223-233
DOI: 10.1007/978-81-322-2674-1_23
BibTeX@incollection{Sekhar2015, author = {Sekhar, Resmi and Shaji, R. S.}, title = {A Study on Segmentation-based Copy-move Forgery Detection Using DAISY Descriptor}, booktitle = {Proceedings of the International Conference on Soft Computing Systems}, publisher = {Springer Science mathplus Business Media}, year = {2015}, pages = {223--233}}
-
Detection of Geometric Transformations in Copy-move Forgery of Digital Images
Proc. Annual IEEE India Conf. (INDICON)
2015, pp. 1-6
DOI: 10.1109/INDICON.2015.7443141
BibTeX@inproceedings{Shandilya2015, author = {Shandilya, M. and Naskar, R. and Dixit, R.}, title = {Detection of Geometric Transformations in Copy-move Forgery of Digital Images}, booktitle = {Proc. Annual IEEE India Conf. (INDICON)}, year = {2015}, pages = {1--6}}
-
Printer and Scanner Forensics
Ho, A. T. S. & Li, S. (ed.)
Handbook of Digital Forensics of Multimedia Data and Devices
Chapter 10
Wiley-IEEE Press, 2015, pp. 704-
DOI: 10.1002/9781118705773.ch10
BibTeX@inbook{Shang2015, author = {Shang, Shize and Kong, Xiangwei}, title = {Printer and Scanner Forensics}, booktitle = {Handbook of Digital Forensics of Multimedia Data and Devices}, publisher = {Wiley-IEEE Press}, year = {2015}, pages = {704-}}
-
A Comparative Study of Frequency Domain Based Approaches for Image Tamper Detection
Proc. TENCON 2015 - 2015 IEEE Region 10 Conf
2015, pp. 1-4
DOI: 10.1109/TENCON.2015.7372903
BibTeX@inproceedings{Sharma2015a, author = {Sharma, A. and Singh, P.}, title = {A Comparative Study of Frequency Domain Based Approaches for Image Tamper Detection}, booktitle = {Proc. TENCON 2015 - 2015 IEEE Region 10 Conf}, year = {2015}, pages = {1--4}}
-
A Rotationally Invariant Texture Descriptor to Detect Copy Move Forgery in Medical Images
Computational Intelligence & Communication Technology (CICT), 2015 IEEE International Conference on
2015, pp. 795-798
DOI: 10.1109/CICT.2015.88
BibTeX@inproceedings{Sharma2015, author = {Sharma, Surbhi and Ghanekar, Umesh}, title = {A Rotationally Invariant Texture Descriptor to Detect Copy Move Forgery in Medical Images}, booktitle = {Computational Intelligence & Communication Technology (CICT), 2015 IEEE International Conference on}, year = {2015}, pages = {795--798}}
-
Blind Detection of Image Splicing Based on Fuzzy Run-length
Proc. IEEE Int Computer and Information Technology, Ubiquitous Computing and Communications, Dependable, Autonomic and Secure Computing, Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM) Conf
2015, pp. 915-920
DOI: 10.1109/CIT/IUCC/DASC/PICOM.2015.137
BibTeX@inproceedings{Shi2015, author = {Shi, Z. and Shen, X. and Chen, H. and Li, X.}, title = {Blind Detection of Image Splicing Based on Fuzzy Run-length}, booktitle = {Proc. IEEE Int Computer and Information Technology, Ubiquitous Computing and Communications, Dependable, Autonomic and Secure Computing, Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM) Conf}, year = {2015}, pages = {915--920}}
-
Copy-cover Image Forgery Detection in Parallel Processing
Int. J. Patt. Recogn. Artif. Intell., 2015
BibTeX@article{Shih2015a, author = {Shih, Frank Y. and Jackson, Jason K.}, title = {Copy-cover Image Forgery Detection in Parallel Processing}, journal = {Int. J. Patt. Recogn. Artif. Intell.}, year = {2015}}
-
Reflection Removal Using Ghosting Cues
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2015
The IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2015
BibTeX@inproceedings{Shih2015, author = {Shih, YiChang and Krishnan, Dilip and Durand, Fredo and Freeman, William T.}, title = {Reflection Removal Using Ghosting Cues}, booktitle = {Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2015}, journal = {The IEEE Conference on Computer Vision and Pattern Recognition (CVPR)}, year = {2015}}
-
Survey on Recapture Detection Algorithms
International Journal of Advanced Research in Computer and Communication Engineering, 2015, Vol. 4(12)
BibTeX@article{Shingote2015a, author = {Shingote, Mr Vinayak K. and Kumar, Ashish}, title = {Survey on Recapture Detection Algorithms}, journal = {International Journal of Advanced Research in Computer and Communication Engineering}, year = {2015}, volume = {4}, number = {12}}
-
Image Authentication by Detecting Demosaicing
International Journal of Advanced Research in Computer and Communication Engineering, 2015, Vol. 4(5), pp. 256-259
BibTeX@article{Shingote2015, author = {Shingote, Vinayak K. and Kabara, Ruhi}, title = {Image Authentication by Detecting Demosaicing}, journal = {International Journal of Advanced Research in Computer and Communication Engineering}, year = {2015}, volume = {4}, number = {5}, pages = {256--259}}
-
Going Deeper into Copy-move Forgery Detection: Exploring Image Telltales Via Multi-scale Analysis and Voting Processes
Journal of Visual Communication and Image Representation, Elsevier BV, 2015, Vol. 29(0), pp. 16-32
DOI: 10.1016/j.jvcir.2015.01.016
BibTeX@article{Silva2015, author = {Silva, Ewerton and Carvalho, Tiago and Ferreira, Anselmo and Rocha, Anderson}, title = {Going Deeper into Copy-move Forgery Detection: Exploring Image Telltales Via Multi-scale Analysis and Voting Processes}, journal = {Journal of Visual Communication and Image Representation}, publisher = {Elsevier BV}, year = {2015}, volume = {29}, number = {0}, pages = {16--32}}
-
Analysis of Benford´s Law in Digital Image Forensics
Proc. Int Signal Processing and Communication (ICSC) Conf
2015, pp. 413-418
DOI: 10.1109/ICSPCom.2015.7150688
BibTeX@inproceedings{Singh2015b, author = {Singh, N. and Bansal, R.}, title = {Analysis of Benford´s Law in Digital Image Forensics}, booktitle = {Proc. Int Signal Processing and Communication (ICSC) Conf}, year = {2015}, pages = {413--418}}
-
Analysis of Benford's law in digital image forensics
Proc. Int. Conf. Signal Processing and Communication (ICSC)
2015, pp. 413-418
DOI: 10.1109/ICSPCom.2015.7150688
BibTeX@inproceedings{Singh2015c, author = {Singh, N. and Bansal, R.}, title = {Analysis of Benford's law in digital image forensics}, booktitle = {Proc. Int. Conf. Signal Processing and Communication (ICSC)}, year = {2015}, pages = {413--418}}
-
Detection of Frame Duplication Type of Forgery in Digital Video Using Sub-block Based Features
James, J. & Breitinger, F. (ed.)
Digital Forensics and Cyber Crime
Springer International Publishing, 2015, Vol. 157, pp. 29-38
DOI: 10.1007/978-3-319-25512-5_3
BibTeX@incollection{Singh2015, author = {Singh, VivekKumar and Pant, Pallav and Tripathi, RameshChandra}, title = {Detection of Frame Duplication Type of Forgery in Digital Video Using Sub-block Based Features}, booktitle = {Digital Forensics and Cyber Crime}, publisher = {Springer International Publishing}, year = {2015}, volume = {157}, pages = {29--38}}
-
Fast Rotation Invariant Detection of Region Duplication Attacks Even on Uniform Background Containing Digital Images
Procedia Computer Science, 2015, Vol. 54, pp. 772-780
DOI: 10.1016/j.procs.2015.06.091
BibTeX@article{Singh2015a, author = {Singh, Vivek Kumar and Tripathi, R. C.}, title = {Fast Rotation Invariant Detection of Region Duplication Attacks Even on Uniform Background Containing Digital Images}, journal = {Procedia Computer Science}, year = {2015}, volume = {54}, pages = {772--780}}
-
Revealing Image Forgery on Digital Images by a Pplying Contrast Enhancement
International Journal of Computer Applications, 2015
BibTeX@article{Sonu2015, author = {Sonu, John Jacob and Krishnalal, G. and Jagathy, Raj V. P.}, title = {Revealing Image Forgery on Digital Images by a Pplying Contrast Enhancement}, journal = {International Journal of Computer Applications}, year = {2015}}
-
Mobile Camera Source Identification with SVD
Innovations and Advances in Computing, Informatics, Systems Sciences, Networking and Engineering
Springer, 2015
DOI: 10.1007/978-3-319-06773-5_18
BibTeX@incollection{Soobhany2015, author = {Soobhany, A. R. and Lam, K. P. and Fletcher, P. and Collins, D. J.}, title = {Mobile Camera Source Identification with SVD}, booktitle = {Innovations and Advances in Computing, Informatics, Systems Sciences, Networking and Engineering}, publisher = {Springer}, year = {2015}}
-
Detecting Contrast Enhancement Based Image Forgeries by Parallel Approach
Proc. 2nd Int Electronics and Communication Systems (ICECS) Conf
2015, pp. 1162-1167
DOI: 10.1109/ECS.2015.7124767
BibTeX@inproceedings{Sornalatha2015, author = {Sornalatha, S. T. S. and Mahalakshmi, S. D. and Vijayalakshmi, K.}, title = {Detecting Contrast Enhancement Based Image Forgeries by Parallel Approach}, booktitle = {Proc. 2nd Int Electronics and Communication Systems (ICECS) Conf}, year = {2015}, pages = {1162--1167}}
-
Soziale Medien Und Journalistische Berichterstattung
Digitale Politikvermittlung, Springer, 2015
DOI: 10.1007/978-3-658-06571-3_8
BibTeX@article{Spangenberg2015, author = {Spangenberg, Jochen}, title = {Soziale Medien Und Journalistische Berichterstattung}, journal = {Digitale Politikvermittlung}, publisher = {Springer}, year = {2015}}
-
Advanced Multimedia File Carving
Ho/Handbook of Digital Forensics of Multimedia Data and Devices
Wiley-Blackwell, 2015, pp. 219-269
DOI: 10.1002/9781118705773.ch6
BibTeX@incollection{Steinebach2015, author = {Steinebach, Martin and Yannikos, York and Zmudzinski, Sascha and Winter, Christian}, title = {Advanced Multimedia File Carving}, booktitle = {Ho/Handbook of Digital Forensics of Multimedia Data and Devices}, publisher = {Wiley-Blackwell}, year = {2015}, pages = {219--269}}
-
Forensic and Anti-forensic Techniques for Video Shot Editing in H.264/AVC
Journal of Visual Communication and Image Representation, 2015(0), pp. -
DOI: 10.1016/j.jvcir.2015.02.006
BibTeX@article{Su2015, author = {Su, Po-Chyi and Suei, Pei-Lun and Chang, Min-Kuan and Lain, Jie}, title = {Forensic and Anti-forensic Techniques for Video Shot Editing in H.264/AVC}, journal = {Journal of Visual Communication and Image Representation}, year = {2015}, number = {0}, pages = {-}}
-
The Detecting System of Image Forgeries with Noise Features and EXIF Information
Journal of Systems Science and Complexity, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, 2015, Vol. 28(5), pp. 1164-1176
DOI: 10.1007/s11424-015-4023-2
BibTeX@article{Sun2015, author = {Sun, Xiaoting and Li, Yezhou and Niu, Shaozhang and Huang, Yanli}, title = {The Detecting System of Image Forgeries with Noise Features and EXIF Information}, journal = {Journal of Systems Science and Complexity}, publisher = {Academy of Mathematics and Systems Science, Chinese Academy of Sciences}, year = {2015}, volume = {28}, number = {5}, pages = {1164--1176}}
-
Measuring the Noise of Digital Imaging Sensors by Stacking Raw Images Affected by Vibrations and Illumination Flickering
SIAM Journal on Imaging Sciences, 2015, Vol. 8(1), pp. 611-643
DOI: 10.1137/140977035
BibTeX@article{Sur2015, author = {Sur, Frédéric and Grédiac, Michel}, title = {Measuring the Noise of Digital Imaging Sensors by Stacking Raw Images Affected by Vibrations and Illumination Flickering}, journal = {SIAM Journal on Imaging Sciences}, year = {2015}, volume = {8}, number = {1}, pages = {611--643}}
-
Forensic Methods for Detecting Image Manipulation - Copy Move
Electrical Engineering and Computer Sciences University of California at Berkeley, Electrical Engineering and Computer Sciences University of California at Berkeley, 2015
BibTeX@techreport{Sutardja2015, author = {Sutardja, Anthony and Ramadan, Omar and Zhao, Yan}, title = {Forensic Methods for Detecting Image Manipulation - Copy Move}, school = {Electrical Engineering and Computer Sciences University of California at Berkeley}, year = {2015}}
-
Digital Image Manipulation Forensics
Electrical Engineering and Computer Sciences University of California at Berkeley, Electrical Engineering and Computer Sciences University of California at Berkeley, 2015
BibTeX@techreport{Sutardja2015a, author = {Sutardja, Anthony and Zhao, Yan}, title = {Digital Image Manipulation Forensics}, school = {Electrical Engineering and Computer Sciences University of California at Berkeley}, year = {2015}}
-
Quantization-unaware Double JPEG Compression Detection
Journal of Mathematical Imaging and Vision, Springer US, 2015, pp. 1-18
DOI: 10.1007/s10851-015-0602-z
BibTeX@article{Taimori2015, author = {Taimori, Ali and Razzazi, Farbod and Behrad, Alireza and Ahmadi, Ali and Babaie-Zadeh, Massoud}, title = {Quantization-unaware Double JPEG Compression Detection}, journal = {Journal of Mathematical Imaging and Vision}, publisher = {Springer US}, year = {2015}, pages = {1--18}}
-
Patch-based Sensor Pattern Noise for Camera Source Identification
School of Information and Communication Engineering Dalian University of Technology Dalian, Liaoning, 116024, P. R. China, School of Information and Communication Engineering Dalian University of Technology Dalian, Liaoning, 116024, P. R. China, 2015
DOI: 10.1109/chinasip.2015.7230528
BibTeX@techreport{Tan2015, author = {Tan, Yue and Wang, Bo and Zhao, Meijuan and Kong, Xiangwei and Li, Ming}, title = {Patch-based Sensor Pattern Noise for Camera Source Identification}, school = {School of Information and Communication Engineering Dalian University of Technology Dalian, Liaoning, 116024, P. R. China}, year = {2015}}
-
Fusion of SIFT and Hue Moments Features for Cloning Tamper Detection
Proc. Int. Conf. Applied and Theoretical Computing and Communication Technology (iCATccT)
2015, pp. 409-414
DOI: 10.1109/ICATCCT.2015.7456918
BibTeX@inproceedings{Tatkare2015, author = {Tatkare, K. A. and Mane, V.}, title = {Fusion of SIFT and Hue Moments Features for Cloning Tamper Detection}, booktitle = {Proc. Int. Conf. Applied and Theoretical Computing and Communication Technology (iCATccT)}, year = {2015}, pages = {409--414}}
-
Enhancment of Image Tampering Detection Using JPEG's Quantization and Re-interpolation Processes
Proc. IEEE 39th Annual Computer Software and Applications Conf. (COMPSAC)
2015, Vol. 3, pp. 35-39
DOI: 10.1109/COMPSAC.2015.167
BibTeX@inproceedings{Teerakanok2015, author = {Teerakanok, S. and Tetsutaro, U.}, title = {Enhancment of Image Tampering Detection Using JPEG's Quantization and Re-interpolation Processes}, booktitle = {Proc. IEEE 39th Annual Computer Software and Applications Conf. (COMPSAC)}, year = {2015}, volume = {3}, pages = {35--39}}
-
Generalized Signal-dependent Noise Model and Parameter Estimation for Natural Images
Signal Processing, 2015(0), pp. -
DOI: 10.1016/j.sigpro.2015.02.020
BibTeX@article{Thai2015, author = {Thai, Thanh Hai and Retraint, Florent and Cogranne, Rémi}, title = {Generalized Signal-dependent Noise Model and Parameter Estimation for Natural Images}, journal = {Signal Processing}, year = {2015}, number = {0}, pages = {-}}
-
Camera Model Identification Based on DCT\ Coefficient Statistics
Digital Signal Processing, 2015(0), pp. -
DOI: 10.1016/j.dsp.2015.01.002
BibTeX@article{Thai2015a, author = {Thai, Thanh Hai and Retraint, Florent and Cogranne, Rémi}, title = {Camera Model Identification Based on DCT\ Coefficient Statistics}, journal = {Digital Signal Processing}, year = {2015}, number = {0}, pages = {-}}
-
An Image Recapture Detection Algorithm Based on Learning Dictionaries of Edge Profiles
IEEE Transactions on Information Forensics and Security, 2015, Vol. 10(5), pp. 953-968
DOI: 10.1109/TIFS.2015.2392566
BibTeX@article{Thongkamwitoon2015, author = {Thongkamwitoon, T. and Muammar, H. and Dragotti, P. L.}, title = {An Image Recapture Detection Algorithm Based on Learning Dictionaries of Edge Profiles}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2015}, volume = {10}, number = {5}, pages = {953--968}}
-
Reducing Forged Features Using Tampered and Inconsistent Image Detection Techniques in Digital Image Processing
Proc. Fifth Int Communication Systems and Network Technologies (CSNT) Conf
2015, pp. 564-567
DOI: 10.1109/CSNT.2015.286
BibTeX@inproceedings{Tiwari2015, author = {Tiwari, N. and Dubey, D. and Goyal, A.}, title = {Reducing Forged Features Using Tampered and Inconsistent Image Detection Techniques in Digital Image Processing}, booktitle = {Proc. Fifth Int Communication Systems and Network Technologies (CSNT) Conf}, year = {2015}, pages = {564--567}}
-
Combining Cellular Automata and Local Binary Patterns for Copy-move Forgery Detection
Multimedia Tools and Applications, Springer, 2015, pp. 1
DOI: 10.1007/s11042-015-2961-2
BibTeX@article{Tralic2015, author = {Tralic, Dijana and Grgic, Sonja and Sun, Xianfang and Rosin, Paul L.}, title = {Combining Cellular Automata and Local Binary Patterns for Copy-move Forgery Detection}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2015}, pages = {1}}
-
Source Camera Model Identification Using Features from Contaminated Sensor Noise
The 14th International Workshop on Digital-forensics and Watermarking IWDW 2015, 2015
BibTeX@article{Tuama2015, author = {Tuama, Amel and Comby, Frederic and Chaumont, Marc}, title = {Source Camera Model Identification Using Features from Contaminated Sensor Noise}, journal = {The 14th International Workshop on Digital-forensics and Watermarking IWDW 2015}, year = {2015}}
-
Detection of Copy-move Forgery Using Dogcode
Proc. 23th Signal Processing and Communications Applications Conf. (SIU)
2015, pp. 2366-2369
DOI: 10.1109/SIU.2015.7130356
BibTeX@inproceedings{Turk2015, author = {Turk, Salih and Bingol, Ozkan and Ulutas, Guzin}, title = {Detection of Copy-move Forgery Using Dogcode}, booktitle = {Proc. 23th Signal Processing and Communications Applications Conf. (SIU)}, year = {2015}, pages = {2366--2369}}
-
Copy Move Image Forgery Detection Using Hessian and Center Symmetric Local Binary Pattern
Proc. IEEE Confernece Open Systems (ICOS)
2015, pp. 7-11
DOI: 10.1109/ICOS.2015.7377269
BibTeX@inproceedings{Uliyan2015, author = {Uliyan, D. M. and Jalab, H. A. and Wahab, A. W. A.}, title = {Copy Move Image Forgery Detection Using Hessian and Center Symmetric Local Binary Pattern}, booktitle = {Proc. IEEE Confernece Open Systems (ICOS)}, year = {2015}, pages = {7--11}}
-
Image Forgery Detection Based on Colour SIFT
Proc. 23th Signal Processing and Communications Applications Conf. (SIU)
2015, pp. 1741-1744
DOI: 10.1109/SIU.2015.7130189
BibTeX@inproceedings{Ustubioglu2015, author = {Ustubioglu, Beste and Ayas, Selen and Dogan, Hulya and Ulutas, Guzin}, title = {Image Forgery Detection Based on Colour SIFT}, booktitle = {Proc. 23th Signal Processing and Communications Applications Conf. (SIU)}, year = {2015}, pages = {1741--1744}}
-
A novel keypoint based forgery detection method based on local phase quantization and SIFT
Proc. 9th Int. Conf. Electrical and Electronics Engineering (ELECO)
2015, pp. 185-189
DOI: 10.1109/ELECO.2015.7394438
BibTeX@inproceedings{Ustubioglu2015c, author = {Ustubioglu, B. and Muzaffer, G. and Ulutas, G. and Nabiyev, V. and Ulutas, M.}, title = {A novel keypoint based forgery detection method based on local phase quantization and SIFT}, booktitle = {Proc. 9th Int. Conf. Electrical and Electronics Engineering (ELECO)}, year = {2015}, pages = {185--189}}
-
Image Forgery Detection Using Colour Moments
Proc. 38th Int Telecommunications and Signal Processing (TSP) Conf
2015, pp. 540-544
DOI: 10.1109/TSP.2015.7296321
BibTeX@inproceedings{Ustubioglu2015b, author = {Ustubioglu, B. and Nabiyev, V. and Ulutas, G. and Ulutas, M.}, title = {Image Forgery Detection Using Colour Moments}, booktitle = {Proc. 38th Int Telecommunications and Signal Processing (TSP) Conf}, year = {2015}, pages = {540--544}}
-
Image Forgery Detection Based on Energy Probability
Proc. 23th Signal Processing and Communications Applications Conf. (SIU)
2015, pp. 919-922
DOI: 10.1109/SIU.2015.7129980
BibTeX@inproceedings{Ustubioglu2015a, author = {Ustubioglu, Beste and Ulutas, Guzin and Nabiyev, Vasif and Ulutas, Mustafa}, title = {Image Forgery Detection Based on Energy Probability}, booktitle = {Proc. 23th Signal Processing and Communications Applications Conf. (SIU)}, year = {2015}, pages = {919--922}}
-
Anti-Forensics of Multimedia Data and Countermeasures
Ho/Handbook of Digital Forensics of Multimedia Data and Devices
Wiley-Blackwell, 2015, pp. 612-651
DOI: 10.1002/9781118705773.ch16
BibTeX@incollection{Valenzise2015, author = {Valenzise, Giuseppe and Tubaro, Stefano and Tagliasacchi, Marco}, title = {Anti-Forensics of Multimedia Data and Countermeasures}, booktitle = {Ho/Handbook of Digital Forensics of Multimedia Data and Devices}, publisher = {Wiley-Blackwell}, year = {2015}, pages = {612--651}}
-
Compressed Fingerprint Matching and Camera Identification Via Random Projections
IEEE Transactions on Information Forensics and Security, 2015, Vol. 10(7), pp. 1472-1485
DOI: 10.1109/TIFS.2015.2415461
BibTeX@article{Valsesia2015, author = {Valsesia, D. and Coluccia, G. and Bianchi, T. and Magli, E.}, title = {Compressed Fingerprint Matching and Camera Identification Via Random Projections}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2015}, volume = {10}, number = {7}, pages = {1472--1485}}
-
Image Retrieval Based on Compressed Camera Sensor Fingerprints
Proc. IEEE Int Multimedia and Expo (ICME) Conf
2015, pp. 1-6
DOI: 10.1109/ICME.2015.7177454
BibTeX@inproceedings{Valsesia2015a, author = {Valsesia, D. and Coluccia, G. and Bianchi, T. and Magli, E.}, title = {Image Retrieval Based on Compressed Camera Sensor Fingerprints}, booktitle = {Proc. IEEE Int Multimedia and Expo (ICME) Conf}, year = {2015}, pages = {1--6}}
-
Large-scale Image Retrieval Based on Compressed Camera Identification
IEEE Transactions on Multimedia, 2015, Vol. 17(9), pp. 1439-1449
DOI: 10.1109/TMM.2015.2455417
BibTeX@article{Valsesia2015b, author = {Valsesia, D. and Coluccia, G. and Bianchi, T. and Magli, E.}, title = {Large-scale Image Retrieval Based on Compressed Camera Identification}, journal = {IEEE Transactions on Multimedia}, year = {2015}, volume = {17}, number = {9}, pages = {1439--1449}}
-
Scale-robust Compressive Camera Fingerprint Matching with Random Projections
Proc. IEEE Int Acoustics, Speech and Signal Processing (ICASSP) Conf
2015, pp. 1697-1701
DOI: 10.1109/ICASSP.2015.7178260
BibTeX@inproceedings{Valsesia2015c, author = {Valsesia, D. and Coluccia, G. and Bianchi, T. and Magli, E.}, title = {Scale-robust Compressive Camera Fingerprint Matching with Random Projections}, booktitle = {Proc. IEEE Int Acoustics, Speech and Signal Processing (ICASSP) Conf}, year = {2015}, pages = {1697--1701}}
-
Detection of Image Resampling and Video Encoding Footprints for Forensic Applications
University of Vigo, Universida de Vigo, 2015
BibTeX@phdthesis{Vazquez-Padin2015a, author = {Vázquez-Padín, David}, title = {Detection of Image Resampling and Video Encoding Footprints for Forensic Applications}, school = {University of Vigo}, year = {2015}}
-
An SVD Approach to Forensic Image Resampling Detection
Proceedings of the 23th European Signal Processing Conference (EUSIPCO 2015)
Proceedings of the 16th European Signal Processing Conference (EUSIPCO 2008), 2015
DOI: 10.1109/eusipco.2015.7362748
BibTeX@inproceedings{Vazquez-Padin2015, author = {Vazquez-Padın, David and Comesana, Pedro and Perez-Gonzalez, Fernando}, title = {An SVD Approach to Forensic Image Resampling Detection}, booktitle = {Proceedings of the 23th European Signal Processing Conference (EUSIPCO 2015)}, journal = {Proceedings of the 16th European Signal Processing Conference (EUSIPCO 2008)}, year = {2015}}
-
Brightness Distribution Based Image Tampering Detection
Signal Processing, Informatics, Communication and Energy Systems (SPICES), 2015 IEEE International Conference on
2015, pp. 1-5
DOI: 10.1109/SPICES.2015.7091555
BibTeX@inproceedings{Vidyadharan2015, author = {Vidyadharan, D. S. and Thampi, S. M.}, title = {Brightness Distribution Based Image Tampering Detection}, booktitle = {Signal Processing, Informatics, Communication and Energy Systems (SPICES), 2015 IEEE International Conference on}, year = {2015}, pages = {1--5}}
-
Image classifier based digital image forensic detection-a review and simulations
Proc. Computer Science and Technology (ICERECT) 2015 Int. Conf. Emerging Research in Electronics
2015, pp. 23-28
DOI: 10.1109/ERECT.2015.7498981
BibTeX@inproceedings{VijayalakshmiV2015, author = {Vijayalakshmi V, S. and Shwetha, B. and Sathyanarayana, S. V.}, title = {Image classifier based digital image forensic detection-a review and simulations}, booktitle = {Proc. Computer Science and Technology (ICERECT) 2015 Int. Conf. Emerging Research in Electronics}, year = {2015}, pages = {23--28}}
-
Classifier Combination Based Source Identification for Cell Phone Images
KSII Transactions on Internet and Information Systems (TIIS), 2015, Vol. 9(12), pp. 5087-5102
DOI: 10.1109/chinasip.2015.7230528
BibTeX@article{Wang2015b, author = {Wang, Bo and Tan, Yue and Zhao, Meijuan and Guo, Yanqing and Kong, Xiangwei}, title = {Classifier Combination Based Source Identification for Cell Phone Images}, journal = {KSII Transactions on Internet and Information Systems (TIIS)}, year = {2015}, volume = {9}, number = {12}, pages = {5087--5102}}
-
A Survey of Digital Image Blind Detection Based on Tampering Trace
Electronic Science and Technology, 2015
BibTeX@article{Wang2015, author = {Wang, Chenlu and Zhu, Tingge}, title = {A Survey of Digital Image Blind Detection Based on Tampering Trace}, journal = {Electronic Science and Technology}, year = {2015}}
-
Blind Detection of JPEG Composite Images Based on Quantization Noise Analysis
Information, Computer and Application Engineering, 2015
BibTeX@article{Wang2015a, author = {Wang, Zhi Hong}, title = {Blind Detection of JPEG Composite Images Based on Quantization Noise Analysis}, journal = {Information, Computer and Application Engineering}, year = {2015}}
-
An Evaluation of Error Level Analysis in Image Forensics
Proc. 5th IEEE Int. Conf. System Engineering and Technology (ICSET)
2015, pp. 23-28
DOI: 10.1109/ICSEngT.2015.7412439
BibTeX@inproceedings{Warif2015, author = {Warif, N. B. A. and Idris, M. Y. I. and Wahab, A. W. A. and Salleh, R.}, title = {An Evaluation of Error Level Analysis in Image Forensics}, booktitle = {Proc. 5th IEEE Int. Conf. System Engineering and Technology (ICSET)}, year = {2015}, pages = {23--28}}
-
An evaluation of Error Level Analysis in image forensics
Proc. 5th IEEE Int. Conf. System Engineering and Technology (ICSET)
2015, pp. 23-28
DOI: 10.1109/ICSEngT.2015.7412439
BibTeX@inproceedings{Warif2015a, author = {Warif, N. B. A. and Idris, M. Y. I. and Wahab, A. W. A. and Salleh, R.}, title = {An evaluation of Error Level Analysis in image forensics}, booktitle = {Proc. 5th IEEE Int. Conf. System Engineering and Technology (ICSET)}, year = {2015}, pages = {23--28}}
-
Multimedia Analytics for Image Collection Forensics
Ho/Handbook of Digital Forensics of Multimedia Data and Devices
Wiley-Blackwell, 2015, pp. 305-327
DOI: 10.1002/9781118705773.ch8
BibTeX@incollection{Worring2015, author = {Worring, Marcel}, title = {Multimedia Analytics for Image Collection Forensics}, booktitle = {Ho/Handbook of Digital Forensics of Multimedia Data and Devices}, publisher = {Wiley-Blackwell}, year = {2015}, pages = {305--327}}
-
A Printer Forensics Method Using Halftone Dot Arrangement Model
Proc. IEEE China Summit and Int Signal and Information Processing (ChinaSIP) Conf
2015, pp. 861-865
DOI: 10.1109/ChinaSIP.2015.7230527
BibTeX@inproceedings{Wu2015, author = {Wu, Han and Kong, Xiangwei and Shang, Shize}, title = {A Printer Forensics Method Using Halftone Dot Arrangement Model}, booktitle = {Proc. IEEE China Summit and Int Signal and Information Processing (ChinaSIP) Conf}, year = {2015}, pages = {861--865}}
-
Active tamper detection of digital images using VQ compression
Proc. IEEE Int Consumer Electronics - Taiwan (ICCE-TW) Conf
2015, pp. 508-509
DOI: 10.1109/ICCE-TW.2015.7217025
BibTeX@inproceedings{Wu2015b, author = {Wu, W. C. and Hsu, H. F. and Lin, P. Y.}, title = {Active tamper detection of digital images using VQ compression}, booktitle = {Proc. IEEE Int Consumer Electronics - Taiwan (ICCE-TW) Conf}, year = {2015}, pages = {508--509}}
-
New Developments in Image Tampering Detection
Digital-Forensics and Watermarking, Springer, 2015
DOI: 10.1007/978-3-319-19321-2_1
BibTeX@article{Xu2015, author = {Xu, Guanshuo and Ye, Jingyu and Shi, Yun-Qing}, title = {New Developments in Image Tampering Detection}, journal = {Digital-Forensics and Watermarking}, publisher = {Springer}, year = {2015}}
-
Forensic Detection of Gaussian Low-pass Filtering in Digital Images
Proc. 8th Int. Congress Image and Signal Processing (CISP)
2015, pp. 819-823
DOI: 10.1109/CISP.2015.7407990
BibTeX@inproceedings{Xu2015a, author = {Xu, J. and Ling, Y. and Zheng, X.}, title = {Forensic Detection of Gaussian Low-pass Filtering in Digital Images}, booktitle = {Proc. 8th Int. Congress Image and Signal Processing (CISP)}, year = {2015}, pages = {819--823}}
-
Copy move forgery detection using SIFT and GMM
Proc. 5th Nirma University Int. Conf. Engineering (NUiCONE)
2015, pp. 1-4
DOI: 10.1109/NUICONE.2015.7449647
BibTeX@inproceedings{Yadav2015, author = {Yadav, N. and Kapdi, R.}, title = {Copy move forgery detection using SIFT and GMM}, booktitle = {Proc. 5th Nirma University Int. Conf. Engineering (NUiCONE)}, year = {2015}, pages = {1--4}}
-
Exposing Photographic Splicing by Detecting the Inconsistencies in Shadows
The Computer Journal, 2015, Vol. 58(4), pp. 588-600
DOI: 10.1093/comjnl/bxu146
BibTeX@article{Yang2015e, author = {Yang, B. and Sun, X. and Chen, X. and Zhang, J. and Li, X.}, title = {Exposing Photographic Splicing by Detecting the Inconsistencies in Shadows}, journal = {The Computer Journal}, year = {2015}, volume = {58}, number = {4}, pages = {588--600}}
-
Image Copy-move Forgery Detection Based on Sped-up Robust Features Descriptor and Adaptive Minimal-maximal Suppression
Journal of Electronic Imaging, 2015, Vol. 24(6), pp. 063016
DOI: 10.1117/1.JEI.24.6.063016
BibTeX@article{Yang2015d, author = {Yang, Bin and Sun, Xingming and Xin, Xiangyang and Hu, Weifeng and Wu, Youxin}, title = {Image Copy-move Forgery Detection Based on Sped-up Robust Features Descriptor and Adaptive Minimal-maximal Suppression}, journal = {Journal of Electronic Imaging}, year = {2015}, volume = {24}, number = {6}, pages = {063016}}
-
Erratum to: A Novel Image Splicing Forensic Algorithm Based on Generalized Dct Coefficient-pair Histogram
Advances in Image and Graphics Technologies
Springer, 2015
DOI: 10.1007/978-3-662-47791-5_51
BibTeX@incollection{Yang2015c, author = {Yang, Fusheng and Gao, Tiegang}, title = {Erratum to: A Novel Image Splicing Forensic Algorithm Based on Generalized Dct Coefficient-pair Histogram}, booktitle = {Advances in Image and Graphics Technologies}, publisher = {Springer}, year = {2015}}
-
Estimating JPEG Compression History of Bitmaps Based on Factor Histogram
Digital Signal Processing, 2015, Vol. 41, pp. 90-97
DOI: 10.1016/j.dsp.2015.03.014
BibTeX@article{Yang2015b, author = {Yang, Jianquan and Zhu, Guopu and Huang, Jiwu and Zhao, Xi}, title = {Estimating JPEG Compression History of Bitmaps Based on Factor Histogram}, journal = {Digital Signal Processing}, year = {2015}, volume = {41}, pages = {90--97}}
-
Image Tamper Detection Based on Noise Estimation and Lacunarity Texture
Multimedia Tools and Applications, Springer, 2015, pp. 1
DOI: 10.1007/s11042-015-3079-2
BibTeX@article{Yang2015a, author = {Yang, Qiuwei and Peng, Fei and Li, Jiao-Ting and Long, Min}, title = {Image Tamper Detection Based on Noise Estimation and Lacunarity Texture}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2015}, pages = {1}}
-
Detecting of Copy-move Forgery in Digital Images Using Fractional Fourier Transform
Falco, C. M. & Jiang, X. (ed.)
Proc. of the Seventh International Conference on Digital Image Processing: ICDIP 2015
Proc. SPIE, SPIE-Intl Soc Optical Eng, 2015, Vol. 9631, pp. 96310B-96310B-6
DOI: 10.1117/12.2197146
BibTeX@inproceedings{Yang2015, author = {Yang, Renqing and Bai, Zhengyao and Yin, Liguo and Gao, Hao}, title = {Detecting of Copy-move Forgery in Digital Images Using Fractional Fourier Transform}, booktitle = {Proc. of the Seventh International Conference on Digital Image Processing: ICDIP 2015}, journal = {Proc. SPIE}, publisher = {SPIE-Intl Soc Optical Eng}, year = {2015}, volume = {9631}, pages = {96310B-96310B-6}}
-
Detecting Seam Carving Based Image Resizing Using Local Binary Patterns
Computers & Security, Elsevier BV, 2015, Vol. 55, pp. 130-141
DOI: 10.1016/j.cose.2015.09.003
BibTeX@article{Yin2015, author = {Yin, Ting and Yang, Gaobo and Li, Leida and Zhang, Dengyong and Sun, Xingming}, title = {Detecting Seam Carving Based Image Resizing Using Local Binary Patterns}, journal = {Computers & Security}, publisher = {Elsevier BV}, year = {2015}, volume = {55}, pages = {130--141}}
-
Pixel and Edge Based Illuminant Color Estimation for Image Forgery Detection
Procedia Computer Science, 2015, Vol. 46(0), pp. 1635-1642
DOI: 10.1016/j.procs.2015.02.099
BibTeX@article{Youseph2015, author = {Youseph, Shahana N. and Cherian, Rajesh Roy}, title = {Pixel and Edge Based Illuminant Color Estimation for Image Forgery Detection}, journal = {Procedia Computer Science}, year = {2015}, volume = {46}, number = {0}, pages = {1635--1642}}
-
An Improved Parameter Estimation Scheme for Image Modification Detection Based on DCT Coefficient Analysis
Forensic Science International, 2015
DOI: 10.1016/j.forsciint.2015.10.024
BibTeX@article{Yu2015, author = {Yu, Liyang and Han, Qi and Yao, S. M. and Fang, Junbin}, title = {An Improved Parameter Estimation Scheme for Image Modification Detection Based on DCT Coefficient Analysis}, journal = {Forensic Science International}, year = {2015}}
-
Detecting Image Splicing in the Wild (web)
Proc. IEEE Int Multimedia & Expo Workshops (ICMEW) Conf
2015, pp. 1-6
DOI: 10.1109/ICMEW.2015.7169839
BibTeX@inproceedings{Zampoglou2015, author = {Zampoglou, M. and Papadopoulos, S. and Kompatsiaris, Y.}, title = {Detecting Image Splicing in the Wild (web)}, booktitle = {Proc. IEEE Int Multimedia & Expo Workshops (ICMEW) Conf}, year = {2015}, pages = {1--6}}
-
Exposing Blurred Image Forgeries through Blind Image Restoration
Proc. Cloud and Internet Computing (3PGCIC) 2015 10th Int. Conf. P2P, Parallel, Grid
2015, pp. 466-469
DOI: 10.1109/3PGCIC.2015.50
BibTeX@inproceedings{Zeng2015b, author = {Zeng, F. and Wang, W. and Tang, M. and Cao, Z.}, title = {Exposing Blurred Image Forgeries through Blind Image Restoration}, booktitle = {Proc. Cloud and Internet Computing (3PGCIC) 2015 10th Int. Conf. P2P, Parallel, Grid}, year = {2015}, pages = {466--469}}
-
Rebuilding the Credibility of Sensor-based Camera Source Identification
Multimedia Tools and Applications, Springer, 2015, pp. 1
DOI: 10.1007/s11042-015-3072-9
BibTeX@article{Zeng2015a, author = {Zeng, Hui}, title = {Rebuilding the Credibility of Sensor-based Camera Source Identification}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2015}, pages = {1}}
-
Removing Camera Fingerprint to Disguise Photograph Source
Proc. IEEE Int Image Processing (ICIP) Conf
2015, pp. 1687-1691
DOI: 10.1109/ICIP.2015.7351088
BibTeX@inproceedings{Zeng2015, author = {Zeng, Hui and Chen, Jiansheng and Kang, Xiangui and Zeng, Wenjun}, title = {Removing Camera Fingerprint to Disguise Photograph Source}, booktitle = {Proc. IEEE Int Image Processing (ICIP) Conf}, year = {2015}, pages = {1687--1691}}
-
Passive Forensics for Image Splicing Based on PCA Noise Estimation
Proc. 10th Int. Conf. for Internet Technology and Secured Transactions (ICITST)
2015, pp. 78-83
DOI: 10.1109/ICITST.2015.7412062
BibTeX@inproceedings{Zhan2015, author = {Zhan, L. and Zhu, Y.}, title = {Passive Forensics for Image Splicing Based on PCA Noise Estimation}, booktitle = {Proc. 10th Int. Conf. for Internet Technology and Secured Transactions (ICITST)}, year = {2015}, pages = {78--83}}
-
Passive forensics for image splicing based on PCA noise estimation
Proc. 10th Int. Conf. for Internet Technology and Secured Transactions (ICITST)
2015, pp. 78-83
DOI: 10.1109/ICITST.2015.7412062
BibTeX@inproceedings{Zhan2015a, author = {Zhan, L. and Zhu, Y.}, title = {Passive forensics for image splicing based on PCA noise estimation}, booktitle = {Proc. 10th Int. Conf. for Internet Technology and Secured Transactions (ICITST)}, year = {2015}, pages = {78--83}}
-
Identifying Image Splicing Based on Local Statistical Features in DCT and DWT Domain
Mu, J., Liang, Q., Wang, W., Zhang, B. & Pi, Y. (ed.)
The Proceedings of the Third International Conference on Communications, Signal Processing, and Systems
Springer International Publishing, 2015, Vol. 322, pp. 723-731
DOI: 10.1007/978-3-319-08991-1_75
BibTeX@incollection{Zhang2015, author = {Zhang, Yujin and Li, Shenghong and Wang, Shilin and Zhao, Xudong}, title = {Identifying Image Splicing Based on Local Statistical Features in DCT and DWT Domain}, booktitle = {The Proceedings of the Third International Conference on Communications, Signal Processing, and Systems}, publisher = {Springer International Publishing}, year = {2015}, volume = {322}, pages = {723--731}}
-
Effective Digital Image Copy-move Location Algorithm Robust to Geometric Transformations
Proc. IEEE Int Signal Processing, Communications and Computing (ICSPCC) Conf
2015, pp. 1-5
DOI: 10.1109/ICSPCC.2015.7338958
BibTeX@inproceedings{Zhao2015c, author = {Zhao, Fuxing and Zhang, Rong and Guo, Haolong and Zhang, Yanhua}, title = {Effective Digital Image Copy-move Location Algorithm Robust to Geometric Transformations}, booktitle = {Proc. IEEE Int Signal Processing, Communications and Computing (ICSPCC) Conf}, year = {2015}, pages = {1--5}}
-
Research on Image Passive Forensics Based on ASIFT and Circle Projection Features
JSCUT(Natural Science Edition), 2015, Vol. 42(3)
BibTeX@article{Zhao2015, author = {Zhao, Jun-Hong}, title = {Research on Image Passive Forensics Based on ASIFT and Circle Projection Features}, journal = {JSCUT(Natural Science Edition)}, year = {2015}, volume = {42}, number = {3}}
-
Passive Image-splicing Detection by a 2-D Noncausal Markov Model
Circuits and Systems for Video Technology, IEEE Transactions on, 2015, Vol. 25(2), pp. 185-199
DOI: 10.1109/TCSVT.2014.2347513
BibTeX@article{Zhao2015a, author = {Zhao, Xudong and Wang, Shilin and Li, Shenghong and Li, Jianhua}, title = {Passive Image-splicing Detection by a 2-D Noncausal Markov Model}, journal = {Circuits and Systems for Video Technology, IEEE Transactions on}, year = {2015}, volume = {25}, number = {2}, pages = {185--199}}
-
Exposing Image Sharpen Forgeries Based on Dyadic Contrast Contourlet
nternational Journal of Multimedia and Ubiquitous Engineering, 2015, Vol. 10(7)
DOI: 10.14257/ijmue.2015.10.7.25
BibTeX@article{Zhen2015, author = {Zhen, Hua and Jinjiang, Li}, title = {Exposing Image Sharpen Forgeries Based on Dyadic Contrast Contourlet}, journal = {nternational Journal of Multimedia and Ubiquitous Engineering}, year = {2015}, volume = {10}, number = {7}}
-
Exposing Image Forgery by Detecting Traces of Feather Operation
Journal of Visual Languages & Computing, 2015, Vol. 27, pp. 9-18
DOI: 10.1016/j.jvlc.2015.02.002
BibTeX@article{Zheng2015, author = {Zheng, Jiangbin and Zhu, Tingge and Li, Zhe and Xing, Weiwei and Ren, JinChang}, title = {Exposing Image Forgery by Detecting Traces of Feather Operation}, journal = {Journal of Visual Languages & Computing}, year = {2015}, volume = {27}, pages = {9--18}}
-
Detection of Copy--move Forgery Using Discrete Analytical Fourier--mellin Transform
Nonlinear Dynamics, Springer Netherlands, 2015, pp. 1-14
DOI: 10.1007/s11071-015-2374-9
BibTeX@article{Zhong2015a, author = {Zhong, Junliu and Gan, Yanfen}, title = {Detection of Copy--move Forgery Using Discrete Analytical Fourier--mellin Transform}, journal = {Nonlinear Dynamics}, publisher = {Springer Netherlands}, year = {2015}, pages = {1--14}}
-
Discrete Polar Complex Exponential Transform for Image Rotation Duplication Detection
Advanced Science and Technology Letters, 2015
DOI: 10.14257/astl.2015.81.05
BibTeX@article{Zhong2015b, author = {Zhong, Junliu and Gan, Yanfen}, title = {Discrete Polar Complex Exponential Transform for Image Rotation Duplication Detection}, journal = {Advanced Science and Technology Letters}, year = {2015}}
-
Radon Odd Radial Harmonic Fourier Moments in Detecting Cloned Forgery Image
Chaos, Solitons & Fractals, 2015, pp. -
DOI: 10.1016/j.chaos.2015.10.010
BibTeX@article{Zhong2015, author = {Zhong, Junliu and Gan, Yanfen and Xie, Shuai}, title = {Radon Odd Radial Harmonic Fourier Moments in Detecting Cloned Forgery Image}, journal = {Chaos, Solitons & Fractals}, year = {2015}, pages = {-}}
-
Mobile Camera Source Identification Based on CFA Interpolation and Large Components of Sensor Pattern Noise
Zheng, D. (ed.)
Proceedings of the International Conference on Control, Mechatronics and Automation Technology (ICCMAT 2014)
Control, Mechatronics and Automation Technology, 2015, pp. 239243
BibTeX@inproceedings{Zhou2015, author = {Zhou, Z. . P. . and Hu, C. . Y. . and Zhou, C. . J. .}, title = {Mobile Camera Source Identification Based on CFA Interpolation and Large Components of Sensor Pattern Noise}, booktitle = {Proceedings of the International Conference on Control, Mechatronics and Automation Technology (ICCMAT 2014)}, journal = {Control, Mechatronics and Automation Technology}, year = {2015}, pages = {239243}}
-
Digital-Forensics and Watermarking
Shi, Y.-Q., Kim, H. J., Pérez-González, F. & Yang, C.-N. (ed.)
Springer International Publishing, 2015
BibTeX@book{Shi2015a,, title = {Digital-Forensics and Watermarking}, publisher = {Springer International Publishing}, year = {2015}}
2014
-
Image Forgery Detection Exploiting Image Randomness
King Saud University College of Computer & Information Sciences Department of Computer Science, King Saud University College of Computer & Information Sciences Department of Computer Science, 2014
DOI: 10.1109/cisp.2014.7003901
BibTeX@mastersthesis{AlAhmadi2014, author = {Al-Ahmadi, Amani, Ahmad}, title = {Image Forgery Detection Exploiting Image Randomness}, school = {King Saud University College of Computer & Information Sciences Department of Computer Science}, year = {2014}}
-
A Review on Copy Move Image Forgery Detection Techniques
Multi-Conference on Systems, Signals & Devices (SSD), 2014 11th International
2014, pp. 1-5
DOI: 10.1109/SSD.2014.6808907
BibTeX@inproceedings{AliQureshi2014, author = {Ali Qureshi, M. and Deriche, M.}, title = {A Review on Copy Move Image Forgery Detection Techniques}, booktitle = {Multi-Conference on Systems, Signals & Devices (SSD), 2014 11th International}, year = {2014}, pages = {1--5}}
-
Exploiting Perceptual Quality Issues in Countering SIFT-based Forensic Methods
Acoustics, Speech and Signal Processing (ICASSP), 2014 IEEE International Conference on
2014, pp. 2664-2668
DOI: 10.1109/ICASSP.2014.6854083
BibTeX@inproceedings{Amerini2014b, author = {Amerini, Irene and Battisti, F. and Caldelli, R. and Carli, M. and Costanzo, A.}, title = {Exploiting Perceptual Quality Issues in Countering SIFT-based Forensic Methods}, booktitle = {Acoustics, Speech and Signal Processing (ICASSP), 2014 IEEE International Conference on}, year = {2014}, pages = {2664--2668}}
-
Splicing Forgeries Localization through the Use of First Digit Features
2014 IEEE International Workshop on Information Forensics and Security (WIFS)
Institute of Electrical & Electronics Engineers (IEEE), 2014, pp. 143-148
DOI: 10.1109/WIFS.2014.7084318
BibTeX@inproceedings{Amerini2014c, author = {Amerini, Irene and Becarelli, Rudy and Caldelli, Roberto and Mastio, Andrea Del}, title = {Splicing Forgeries Localization through the Use of First Digit Features}, booktitle = {2014 IEEE International Workshop on Information Forensics and Security (WIFS)}, publisher = {Institute of Electrical & Electronics Engineers (IEEE)}, year = {2014}, pages = {143--148}}
-
Blind Image Clustering Based on the Normalized Cuts Criterion for Camera Identification
Signal Processing: Image Communication, 2014(0), pp. -
DOI: 10.1016/j.image.2014.07.003
BibTeX@article{Amerini2014a, author = {Amerini, Irene and Caldelli, R. and Crescenzi, P. and Mastio, A. Del and Marino, A.}, title = {Blind Image Clustering Based on the Normalized Cuts Criterion for Camera Identification}, journal = {Signal Processing: Image Communication}, year = {2014}, number = {0}, pages = {-}}
-
Copy-move Forgery Detection from Printed Images
Alattar, A. M., Memon, N. D. & Heitzenrater, C. D. (ed.)
Proc. SPIE 9028, Media Watermarking, Security, and Forensics 2014
Proc. SPIE, 2014, Vol. 9028, pp. 90280Y-90280Y-10
DOI: 10.1117/12.2039509
BibTeX@inproceedings{Amerini2014, author = {Amerini, Irene and Caldelli, Roberto and Del Bimbo, Alberto and Di Fuccia, Andrea and Saravo, Luigi and Rizzo, Anna Paola}, title = {Copy-move Forgery Detection from Printed Images}, booktitle = {Proc. SPIE 9028, Media Watermarking, Security, and Forensics 2014}, journal = {Proc. SPIE}, year = {2014}, volume = {9028}, pages = {90280Y-90280Y-10}}
-
Passive Image Forensic Method to Detect Copy Move Forgery in Digital Images
IOSR Journal of Computer Engineering (IOSR-JCE), 2014, Vol. 16(2), pp. 96-104
DOI: 10.9790/0661-1621296104
BibTeX@article{Amtullah2014, author = {Amtullah, Salma and Koul, Ajay}, title = {Passive Image Forensic Method to Detect Copy Move Forgery in Digital Images}, journal = {IOSR Journal of Computer Engineering (IOSR-JCE)}, year = {2014}, volume = {16}, number = {2}, pages = {96--104}}
-
A Copy Move Forgery Detection to Overcome Sustained Attacks Using Dyadic Wavelet Transform and SIFT Methods
Nguyen, N., Attachoo, B., Trawiński, B. & Somboonviwat, K. (ed.)
Intelligent Information and Database Systems
Springer International Publishing, 2014, Vol. 8397, pp. 530-542
DOI: 10.1007/978-3-319-05476-6_54
BibTeX@incollection{Anand2014, author = {Anand, Vijay and Hashmi, Mohammad Farukh and Keskar, Avinash G.}, title = {A Copy Move Forgery Detection to Overcome Sustained Attacks Using Dyadic Wavelet Transform and SIFT Methods}, booktitle = {Intelligent Information and Database Systems}, publisher = {Springer International Publishing}, year = {2014}, volume = {8397}, pages = {530--542}}
-
Exposing Digital Image Forgeries by Illumination Color Classification
International Journal of Engineering Trends and Technology, 2014, Vol. 18(6), pp. 269-271
DOI: 10.14445/22315381/IJETT-V18P255
BibTeX@article{Asati2014, author = {Asati, Ms. Shraddha R. and P.R.Pardhi, Mr.}, title = {Exposing Digital Image Forgeries by Illumination Color Classification}, journal = {International Journal of Engineering Trends and Technology}, year = {2014}, volume = {18}, number = {6}, pages = {269--271}}
-
JPEG Copy Paste Forgery Detection Using Bag Optimized for Complex Images
Advanced Communication Technology (ICACT), 2014 16th International Conference on
2014, pp. 181-185
DOI: 10.1109/ICACT.2014.6778945
BibTeX@inproceedings{Ayalneh2014, author = {Ayalneh, Dessalegn Atnafu and Kim, Hyoung Joong and Choi, Yong Soo}, title = {JPEG Copy Paste Forgery Detection Using Bag Optimized for Complex Images}, booktitle = {Advanced Communication Technology (ICACT), 2014 16th International Conference on}, year = {2014}, pages = {181--185}}
-
Image Tampering Detection by Exposing Blur Type Inconsistency
Acoustics, Speech and Signal Processing (ICASSP), 2014 IEEE International Conference on
Institute of Electrical & Electronics Engineers (IEEE), 2014, pp. 2654-2658
DOI: 10.1109/ICASSP.2014.6854081
BibTeX@inproceedings{Bahrami2014, author = {Bahrami, K. and Kot, A. C.}, title = {Image Tampering Detection by Exposing Blur Type Inconsistency}, booktitle = {Acoustics, Speech and Signal Processing (ICASSP), 2014 IEEE International Conference on}, publisher = {Institute of Electrical & Electronics Engineers (IEEE)}, year = {2014}, pages = {2654--2658}}
-
Image Forgery Detection Using Feature Based Clustering in JPEG Images
Industrial and Information Systems (ICIIS), 2014 9th International Conference on
2014, pp. 1-5
DOI: 10.1109/ICIINFS.2014.7036583
BibTeX@inproceedings{Bhartiya2014, author = {Bhartiya, Gunjan and Jalal, Anand Singh}, title = {Image Forgery Detection Using Feature Based Clustering in JPEG Images}, booktitle = {Industrial and Information Systems (ICIIS), 2014 9th International Conference on}, year = {2014}, pages = {1--5}}
-
Blind Method for Rescaling Detection and Rescale Factor Estimation in Digital Images Using Periodic Properties of Interpolation
AEU - International Journal of Electronics and Communications, 2014(0), pp. -
DOI: 10.1016/j.aeue.2014.01.013
BibTeX@article{Birajdar2014, author = {Birajdar, Gajanan K. and Mankar, Vijay H.}, title = {Blind Method for Rescaling Detection and Rescale Factor Estimation in Digital Images Using Periodic Properties of Interpolation}, journal = {AEU - International Journal of Electronics and Communications}, year = {2014}, number = {0}, pages = {-}}
-
Image Splicing Detection Based on Improved Markov Model
Zhang, B., Mu, J., Wang, W., Liang, Q. & Pi, Y. (ed.)
The Proceedings of the Second International Conference on Communications, Signal Processing, and Systems
Springer International Publishing, 2014, Vol. 246, pp. 127-135
DOI: 10.1007/978-3-319-00536-2_15
BibTeX@incollection{Bo2014, author = {Bo, Su and Quan-qiao, Yuan and Shi-lin, Wang and Cheng-lin, Zhao and Shen-ghong, Li}, title = {Image Splicing Detection Based on Improved Markov Model}, booktitle = {The Proceedings of the Second International Conference on Communications, Signal Processing, and Systems}, publisher = {Springer International Publishing}, year = {2014}, volume = {246}, pages = {127--135}}
-
Mobile Device Identification Via Sensor Fingerprinting
2014
BibTeX@electronic{Bojinov2014, author = {Bojinov, Hristo and Boneh, Dan and Michakevsky, Yan and Nakibly, Gabi}, title = {Mobile Device Identification Via Sensor Fingerprinting}, year = {2014}}
-
Contrast Enhancement Based Forensics in Digital Images
Information Forensics and Security, IEEE Transactions on, Institute of Electrical & Electronics Engineers (IEEE), 2014, Vol. 9(99), pp. 515-525
DOI: 10.1109/TIFS.2014.2300937
BibTeX@article{Cao2014a, author = {Cao, G. and Zhao, Y. and Ni, R. and Li, X.}, title = {Contrast Enhancement Based Forensics in Digital Images}, journal = {Information Forensics and Security, IEEE Transactions on}, publisher = {Institute of Electrical & Electronics Engineers (IEEE)}, year = {2014}, volume = {9}, number = {99}, pages = {515--525}}
-
Contrast Enhancement-Based Forensics in Digital Images
#IEEE_J_IFS#, 2014, Vol. 9(3), pp. 515-525
DOI: 10.1109/TIFS.2014.2300937
BibTeX@article{Cao2014c, author = {Cao, G. and Zhao, Y. and Ni, R. and Li, X.}, title = {Contrast Enhancement-Based Forensics in Digital Images}, journal = {#IEEE_J_IFS#}, year = {2014}, volume = {9}, number = {3}, pages = {515--525}}
-
Forensic Detection of Noise Addition in Digital Images
Journal of Electronic Imaging, SPIE-Intl Soc Optical Eng, 2014, Vol. 23(2), pp. 023004
DOI: 10.1117/1.JEI.23.2.023004
BibTeX@article{Cao2014b, author = {Cao, Gang and Zhao, Yao and Ni, Rongrong and Ou, Bo and Wang, Yongbin}, title = {Forensic Detection of Noise Addition in Digital Images}, journal = {Journal of Electronic Imaging}, publisher = {SPIE-Intl Soc Optical Eng}, year = {2014}, volume = {23}, number = {2}, pages = {023004}}
-
Attacking Contrast Enhancement Forensics in Digital Images
Science China Information Sciences, Springer Berlin Heidelberg, 2014, Vol. 57(5), pp. 1-13
DOI: 10.1007/s11432-013-4928-0
BibTeX@article{Cao2014, author = {Cao, Gang and Zhao, Yao and Ni, RongRong and Tian, HuaWei and Yu, LiFang}, title = {Attacking Contrast Enhancement Forensics in Digital Images}, journal = {Science China Information Sciences}, publisher = {Springer Berlin Heidelberg}, year = {2014}, volume = {57}, number = {5}, pages = {1--13}}
-
A Possible Pitfall in the Experimental Analysis of Tampering Detection Algorithms
Network-Based Information Systems (NBiS), 2014 17th International Conference on
2014, pp. 279-286
DOI: 10.1109/NBiS.2014.82
BibTeX@inproceedings{Cattaneo2014a, author = {Cattaneo, G. and Roscigno, G.}, title = {A Possible Pitfall in the Experimental Analysis of Tampering Detection Algorithms}, booktitle = {Network-Based Information Systems (NBiS), 2014 17th International Conference on}, year = {2014}, pages = {279--286}}
-
A Scalable Approach to Source Camera Identification Over Hadoop
Advanced Information Networking and Applications (AINA), 2014 IEEE 28th International Conference on
2014, pp. 366-373
DOI: 10.1109/AINA.2014.47
BibTeX@inproceedings{Cattaneo2014, author = {Cattaneo, G. and Roscigno, G. and Petrillo, U. F.}, title = {A Scalable Approach to Source Camera Identification Over Hadoop}, booktitle = {Advanced Information Networking and Applications (AINA), 2014 IEEE 28th International Conference on}, year = {2014}, pages = {366--373}}
-
A Passive Multi-purpose Scheme Based on Periodicity Analysis of CFA Artifacts for Image Forensics
Journal of Visual Communication and Image Representation, 2014(0), pp. -
DOI: 10.1016/j.jvcir.2014.04.010
BibTeX@article{Chang2014, author = {Chang, Tang-You and Tai, Shen-Chuan and Lin, Guo-Shiang}, title = {A Passive Multi-purpose Scheme Based on Periodicity Analysis of CFA Artifacts for Image Forensics}, journal = {Journal of Visual Communication and Image Representation}, year = {2014}, number = {0}, pages = {-}}
-
Digital Forgery
The Encyclopedia of Criminology and Criminal Justice
Blackwell Publishing Ltd, 2014
DOI: 10.1002/9781118517383.wbeccj132
BibTeX@inbook{Cheddad2014, author = {Cheddad, Abbas}, title = {Digital Forgery}, booktitle = {The Encyclopedia of Criminology and Criminal Justice}, publisher = {Blackwell Publishing Ltd}, year = {2014}}
-
Anti-forensics of JPEG Detectors Via Adaptive Quantization Table Replacement
Proc. 22nd Int Pattern Recognition (ICPR) Conf
2014, pp. 672-677
DOI: 10.1109/ICPR.2014.126
BibTeX@inproceedings{Chen2014a, author = {Chen, C. and Li, H. and Luo, W. and Yang, R. and Huang, J.}, title = {Anti-forensics of JPEG Detectors Via Adaptive Quantization Table Replacement}, booktitle = {Proc. 22nd Int Pattern Recognition (ICPR) Conf}, year = {2014}, pages = {672--677}}
-
Effective Estimation of Image Rotation Angle Using Spectral Method
IEEE Signal Processing Letters, 2014, Vol. 21(7), pp. 890-894
DOI: 10.1109/LSP.2014.2320503
BibTeX@article{Chen2014b, author = {Chen, C. and Ni, J. and Shen, Z.}, title = {Effective Estimation of Image Rotation Angle Using Spectral Method}, journal = {IEEE Signal Processing Letters}, year = {2014}, volume = {21}, number = {7}, pages = {890--894}}
-
Detecting the operation chain in digital images by type and order fingerprint
Proc. 12th Int. Conf. Signal Processing (ICSP)
2014, pp. 1837-1842
DOI: 10.1109/ICOSP.2014.7015310
BibTeX@inproceedings{Chen2014, author = {Chen, Z. and Zhao, Y. and Ni, R.}, title = {Detecting the operation chain in digital images by type and order fingerprint}, booktitle = {Proc. 12th Int. Conf. Signal Processing (ICSP)}, year = {2014}, pages = {1837--1842}}
-
Guided Filtering for PRNU-based Localization of Small-size Image Forgeries
2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Institute of Electrical & Electronics Engineers (IEEE), 2014
DOI: 10.1109/icassp.2014.6854802
BibTeX@article{Chierchia2014a, author = {Chierchia, G. and Cozzolino, D. and Poggi, G. and Sansone, C. and Verdoliva, L.}, title = {Guided Filtering for PRNU-based Localization of Small-size Image Forgeries}, booktitle = {2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)}, journal = {International Conference on Acoustics, Speech, and Signal Processing (ICASSP)}, publisher = {Institute of Electrical & Electronics Engineers (IEEE)}, year = {2014}}
-
Guided Filtering for PRNU-based Localization of Small-size Image Forgeries
Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics
2014, pp. 6231-6235
DOI: 10.1109/ICASSP.2014.6854802
BibTeX@inproceedings{Chierchia2014b, author = {Chierchia, G. and Cozzolino, D. and Poggi, G. and Sansone, C. and Verdoliva, L.}, title = {Guided Filtering for PRNU-based Localization of Small-size Image Forgeries}, booktitle = {Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics}, year = {2014}, pages = {6231--6235}}
-
A Bayesian-mrf Approach for PRNU-based Image Forgery Detection
IEEE Trans.Inform.Forensic Secur., Institute of Electrical & Electronics Engineers (IEEE), 2014, Vol. 9(4), pp. 554-567
DOI: 10.1109/TIFS.2014.2302078
BibTeX@article{Chierchia2014, author = {Chierchia, Giovanni and Poggi, Giovanni and Sansone, Carlo and Verdoliva, Luisa}, title = {A Bayesian-mrf Approach for PRNU-based Image Forgery Detection}, journal = {IEEE Trans.Inform.Forensic Secur.}, publisher = {Institute of Electrical & Electronics Engineers (IEEE)}, year = {2014}, volume = {9}, number = {4}, pages = {554--567}}
-
Copy-move Image Forgery Detection Based on SIFT Descriptors and SVD-matching
Advanced Technologies for Signal and Image Processing (ATSIP), 2014 1st International Conference on
2014, pp. 125-129
DOI: 10.1109/ATSIP.2014.6834590
BibTeX@inproceedings{Chihaoui2014, author = {Chihaoui, T. and Bourouis, S. and Hamrouni, K.}, title = {Copy-move Image Forgery Detection Based on SIFT Descriptors and SVD-matching}, booktitle = {Advanced Technologies for Signal and Image Processing (ATSIP), 2014 1st International Conference on}, year = {2014}, pages = {125--129}}
-
Exposing Digital Forgery in Video by Mean Frame Comparison Techniques
Emerging Research in Electronics, Computer Science and Technology
Springer, 2014
DOI: 10.1007/978-81-322-1157-0_57
BibTeX@incollection{Chittapur2014, author = {Chittapur, Govindraj B. and Murali, S. and Prabhakara, H. S. and Anami, Basavaraj S.}, title = {Exposing Digital Forgery in Video by Mean Frame Comparison Techniques}, booktitle = {Emerging Research in Electronics, Computer Science and Technology}, publisher = {Springer}, year = {2014}}
-
Information theoretical limit of compression forensics
Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics
2014, pp. 2689-2693
DOI: 10.1109/ICASSP.2014.6854088
BibTeX@inproceedings{Chu2014, author = {Chu, X. and Chen, Y. and Stamm, M. C. and Liu, K. J. R.}, title = {Information theoretical limit of compression forensics}, booktitle = {Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics}, year = {2014}, pages = {2689--2693}}
-
Physiologically-based Detection of Computer Generated Faces in Video
Proc. IEEE Int Image Processing (ICIP) Conf
2014, pp. 248-252
DOI: 10.1109/ICIP.2014.7025049
BibTeX@inproceedings{Conotter2014, author = {Conotter, V. and Bodnari, E. and Boato, G. and Farid, H.}, title = {Physiologically-based Detection of Computer Generated Faces in Video}, booktitle = {Proc. IEEE Int Image Processing (ICIP) Conf}, year = {2014}, pages = {248--252}}
-
Techniques for Digital Image Forensics and Counter-forensics
Università degli studi di siena, Università degli studi di siena, 2014
BibTeX@phdthesis{Costanzo2014a, author = {Costanzo Piccinnano, Andrea}, title = {Techniques for Digital Image Forensics and Counter-forensics}, school = {Università degli studi di siena}, year = {2014}}
-
Forensic Analysis of SIFT Keypoint Removal and Injection
Information Forensics and Security, IEEE Transactions on, 2014, Vol. 9(9), pp. 1450-1464
DOI: 10.1109/TIFS.2014.2337654
BibTeX@article{Costanzo2014, author = {Costanzo, A. and Amerini, Irene and Caldelli, R. and Barni, Mauro}, title = {Forensic Analysis of SIFT Keypoint Removal and Injection}, journal = {Information Forensics and Security, IEEE Transactions on}, year = {2014}, volume = {9}, number = {9}, pages = {1450--1464}}
-
Image Forgery Detection through Residual-based Local Descriptors and Block-matching
Image Processing (ICIP), 2014 IEEE International Conference on
2014, pp. 5297-5301
DOI: 10.1109/ICIP.2014.7026072
BibTeX@inproceedings{Cozzolino2014a, author = {Cozzolino, D. and Gragnaniello, D. and Verdoliva, L.}, title = {Image Forgery Detection through Residual-based Local Descriptors and Block-matching}, booktitle = {Image Processing (ICIP), 2014 IEEE International Conference on}, year = {2014}, pages = {5297--5301}}
-
Image Forgery Localization through the Fusion of Camera-based, Feature-based and Pixel-based Techniques
Image Processing (ICIP), 2014 IEEE International Conference on
2014, pp. 5302-5306
DOI: 10.1109/ICIP.2014.7026073
BibTeX@inproceedings{Cozzolino2014b, author = {Cozzolino, D. and Gragnaniello, D. and Verdoliva, L.}, title = {Image Forgery Localization through the Fusion of Camera-based, Feature-based and Pixel-based Techniques}, booktitle = {Image Processing (ICIP), 2014 IEEE International Conference on}, year = {2014}, pages = {5302--5306}}
-
Copy-move Forgery Detection Based on Patchmatch
Image Processing (ICIP), 2014 IEEE International Conference on
2014, pp. 5312-5316
DOI: 10.1109/ICIP.2014.7026075
BibTeX@inproceedings{Cozzolino2014, author = {Cozzolino, D. and Poggi, G. and Verdoliva, L.}, title = {Copy-move Forgery Detection Based on Patchmatch}, booktitle = {Image Processing (ICIP), 2014 IEEE International Conference on}, year = {2014}, pages = {5312--5316}}
-
Efficient Image Authentication and Tamper Localization Algorithm Using Active Watermarking
Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations
Springer, 2014
DOI: 10.1007/978-3-662-43616-5_5
BibTeX@incollection{Dadkhah2014, author = {Dadkhah, Sajjad and Manaf, Azizah Abd and Sadeghi, Somayeh}, title = {Efficient Image Authentication and Tamper Localization Algorithm Using Active Watermarking}, booktitle = {Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations}, publisher = {Springer}, year = {2014}}
-
Video forensics based on expression dynamics
Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)
2014, pp. 161-166
DOI: 10.1109/WIFS.2014.7084321
BibTeX@inproceedings{Dang-Nguyen2014a, author = {Dang-Nguyen, D. T. and Conotter, V. and Boato, G. and Natale, F. G. B. De}, title = {Video forensics based on expression dynamics}, booktitle = {Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)}, year = {2014}, pages = {161--166}}
-
Discrimination of Computer Generated Versus Natural Human Faces
University of Trento, UNITN, University of Trento, UNITN, 2014
BibTeX@phdthesis{Dang-Nguyen2014, author = {Dang-Nguyen, Duc-Tien}, title = {Discrimination of Computer Generated Versus Natural Human Faces}, school = {University of Trento, UNITN}, year = {2014}}
-
Investigating Multimedia Contents
Security Technology (ICCST), 2014 International Carnahan Conference on
2014, pp. 1-6
DOI: 10.1109/CCST.2014.6986976
BibTeX@inproceedings{DeRosa2014, author = {De Rosa, A. and Piva, A. and Fontani, M. and Iuliani, M.}, title = {Investigating Multimedia Contents}, booktitle = {Security Technology (ICCST), 2014 International Carnahan Conference on}, year = {2014}, pages = {1--6}}
-
Keypoints Based Copy-move Forgery Detection of Digital Images
Proc. Int Informatics, Electronics Vision (ICIEV) Conf
2014, pp. 1-5
DOI: 10.1109/ICIEV.2014.7135994
BibTeX@inproceedings{Debbarma2014, author = {Debbarma, S. and Singh, A. B. and Singh, K. M.}, title = {Keypoints Based Copy-move Forgery Detection of Digital Images}, booktitle = {Proc. Int Informatics, Electronics Vision (ICIEV) Conf}, year = {2014}, pages = {1--5}}
-
Generation of Iris Sensor PRNU Fingerprints from Uncorrelated Data
Biometrics and Forensics (IWBF), 2014 International Workshop on
2014, pp. 1-6
DOI: 10.1109/IWBF.2014.6914262
BibTeX@inproceedings{Debiasi2014, author = {Debiasi, Luca and Uhl, Andreas and Sun, Zhenan}, title = {Generation of Iris Sensor PRNU Fingerprints from Uncorrelated Data}, booktitle = {Biometrics and Forensics (IWBF), 2014 International Workshop on}, year = {2014}, pages = {1--6}}
-
A Survey of Partition-based Techniques for Copy-move Forgery Detection
The Scientific World Journal, 2014
DOI: 10.1155/2014/975456
BibTeX@article{Diane2014, author = {Diane, Wandji Nanda Nathalie and Xingming, Sun and KueMoise, Fah}, title = {A Survey of Partition-based Techniques for Copy-move Forgery Detection}, journal = {The Scientific World Journal}, year = {2014}}
-
Out-of-focus Point Spread Functions
Proc. SPIE 9023, Digital Photography X, 90230J (March 7, 2014)
Proc. SPIE, 2014, Vol. 9023, pp. 90230J-90230J-11
DOI: 10.1117/12.2040490
BibTeX@inproceedings{Dietz2014, author = {Dietz, Henry Gordon}, title = {Out-of-focus Point Spread Functions}, booktitle = {Proc. SPIE 9023, Digital Photography X, 90230J (March 7, 2014)}, journal = {Proc. SPIE}, year = {2014}, volume = {9023}, pages = {90230J-90230J-11}}
-
A Novel Method for Detecting Image Sharpening Based on Local Binary Pattern
Digital-Forensics and Watermarking, Springer, 2014
DOI: 10.1007/978-3-662-43886-2_13
BibTeX@article{Ding2014, author = {Ding, Feng and Zhu, Guopu and Shi, Yun Qing}, title = {A Novel Method for Detecting Image Sharpening Based on Local Binary Pattern}, journal = {Digital-Forensics and Watermarking}, publisher = {Springer}, year = {2014}}
-
Forensic Use of Photo Response Non-uniformity of Imaging Sensors and a Counter Method
Optics Express, 2014, Vol. 22(1), pp. -
DOI: 10.1364/oe.22.000470
BibTeX@article{Dirik2014, author = {Dirik, Ahmet Emir and Karakücük, Ahmet}, title = {Forensic Use of Photo Response Non-uniformity of Imaging Sensors and a Counter Method}, journal = {Optics Express}, year = {2014}, volume = {22}, number = {1}, pages = {-}}
-
Analysis of Seam-carving-based Anonymization of Images against PRNU Noise Pattern-based Source Attribution
Information Forensics and Security, IEEE Transactions on, 2014, Vol. 9(12), pp. 2277-2290
DOI: 10.1109/TIFS.2014.2361200
BibTeX@article{Dirik2014a, author = {Dirik, A. E. and Sencar, H. T. and Memon, N.}, title = {Analysis of Seam-carving-based Anonymization of Images against PRNU Noise Pattern-based Source Attribution}, journal = {Information Forensics and Security, IEEE Transactions on}, year = {2014}, volume = {9}, number = {12}, pages = {2277--2290}}
-
Robust Copy-move Forgery Detection Based on Dual-transform
Digital Forensics and Cyber Crime
Digital Forensics and Cyber Crime, Springer, 2014
DOI: 10.1007/978-3-319-14289-0_1
BibTeX@incollection{Doyoddorj2014, author = {Doyoddorj, Munkhbaatar and Rhee, Kyung-Hyune}, title = {Robust Copy-move Forgery Detection Based on Dual-transform}, booktitle = {Digital Forensics and Cyber Crime}, journal = {Digital Forensics and Cyber Crime}, publisher = {Springer}, year = {2014}}
-
Information Extraction from Multimedia Web Documents: An Open-source Platform and Testbed
International Journal of Multimedia Information Retrieval, Springer London, 2014, pp. 1-15
DOI: 10.1007/s13735-014-0051-2
BibTeX@article{Dupplaw2014, author = {Dupplaw, DavidPaul and Matthews, Michael and Johansson, Richard and Boato, Giulia and Costanzo, Andrea and Fontani, Marco and Minack, Enrico and Demidova, Elena and Blanco, Roi and Griffiths, Thomas and Lewis, Paul and Hare, Jonathon and Moschitti, Alessandro}, title = {Information Extraction from Multimedia Web Documents: An Open-source Platform and Testbed}, journal = {International Journal of Multimedia Information Retrieval}, publisher = {Springer London}, year = {2014}, pages = {1--15}}
-
Combining Spatial and DCT Based Markov Features for Enhanced Blind Detection of Image Splicing
Pattern Analysis and Applications, Springer London, 2014, pp. 1-11
DOI: 10.1007/s10044-014-0396-4
BibTeX@article{El-Alfy2014, author = {El-Alfy, E.-Sayed M. and Qureshi, Muhammad Ali}, title = {Combining Spatial and DCT Based Markov Features for Enhanced Blind Detection of Image Splicing}, journal = {Pattern Analysis and Applications}, publisher = {Springer London}, year = {2014}, pages = {1--11}}
-
Printer Identification Using Supervised Learning for Document Forgery Detection
2014
DOI: 10.1109/das.2014.48
BibTeX@misc{Elkasrawi2014, author = {Elkasrawi, Sara and Shafait, Faisal}, title = {Printer Identification Using Supervised Learning for Document Forgery Detection}, year = {2014}}
-
A Proposed Accelerated Image Copy-move Forgery Detection
Visual Communications and Image Processing Conference, 2014 IEEE
2014, pp. 253-257
DOI: 10.1109/VCIP.2014.7051552
BibTeX@inproceedings{Fadl2014a, author = {Fadl, S. M. and Semary, N. A.}, title = {A Proposed Accelerated Image Copy-move Forgery Detection}, booktitle = {Visual Communications and Image Processing Conference, 2014 IEEE}, year = {2014}, pages = {253--257}}
-
Copy-rotate-move Forgery Detection Based on Spatial Domain
Computer Engineering & Systems (ICCES), 2014 9th International Conference on
2014, pp. 136-141
DOI: 10.1109/ICCES.2014.7030944
BibTeX@inproceedings{Fadl2014, author = {Fadl, S. M. and Semary, N. A. and Hadhoud, M. M.}, title = {Copy-rotate-move Forgery Detection Based on Spatial Domain}, booktitle = {Computer Engineering & Systems (ICCES), 2014 9th International Conference on}, year = {2014}, pages = {136--141}}
-
Fan Search for Image Copy-move Forgery Detection
Advanced Machine Learning Technologies and Applications
Springer, 2014
DOI: 10.1007/978-3-319-13461-1_18
BibTeX@incollection{Fadl2014b, author = {Fadl, Sondos M. and Semary, Noura A. and Hadhoud, Mohiy M.}, title = {Fan Search for Image Copy-move Forgery Detection}, booktitle = {Advanced Machine Learning Technologies and Applications}, publisher = {Springer}, year = {2014}}
-
Nonorthogonal DCT Implementation for JPEG Forensics
Hybrid Intelligent Systems (HIS), 2014 14th International Conference on
2014, pp. 7-11
DOI: 10.1109/HIS.2014.7086195
BibTeX@inproceedings{Fahmy2014, author = {Fahmy, G.}, title = {Nonorthogonal DCT Implementation for JPEG Forensics}, booktitle = {Hybrid Intelligent Systems (HIS), 2014 14th International Conference on}, year = {2014}, pages = {7--11}}
-
Nonorthogonal DCT Block Convergence for JPEG-75 Forensics
Proc. IEEE Int. Symp. Signal Processing and Information Technology (ISSPIT)
2014, pp. 000349-000353
DOI: 10.1109/ISSPIT.2014.7300613
BibTeX@inproceedings{Fahmy2014a, author = {Fahmy, G.}, title = {Nonorthogonal DCT Block Convergence for JPEG-75 Forensics}, booktitle = {Proc. IEEE Int. Symp. Signal Processing and Information Technology (ISSPIT)}, year = {2014}, pages = {000349--000353}}
-
JPEG Anti-forensics with Improved Tradeoff between Forensic Undetectability and Image Quality
Information Forensics and Security, IEEE Transactions on, 2014, Vol. 9(8), pp. 1211-1226
DOI: 10.1109/TIFS.2014.2317949
BibTeX@article{Fan2014, author = {Fan, Wei and Wang, Kai and Cayre, F. and Xiong, Zhang}, title = {JPEG Anti-forensics with Improved Tradeoff between Forensic Undetectability and Image Quality}, journal = {Information Forensics and Security, IEEE Transactions on}, year = {2014}, volume = {9}, number = {8}, pages = {1211--1226}}
-
JPEG Anti-Forensics With Improved Tradeoff Between Forensic Undetectability and Image Quality
#IEEE_J_IFS#, 2014, Vol. 9(8), pp. 1211-1226
DOI: 10.1109/TIFS.2014.2317949
BibTeX@article{Fan2014a, author = {Fan, W. and Wang, K. and Cayre, F. and Xiong, Z.}, title = {JPEG Anti-Forensics With Improved Tradeoff Between Forensic Undetectability and Image Quality}, journal = {#IEEE_J_IFS#}, year = {2014}, volume = {9}, number = {8}, pages = {1211--1226}}
-
A Scheme for Copy-move Forgery Detection in Digital Images Based on 2D-DWT
Circuits and Systems (MWSCAS), 2014 IEEE 57th International Midwest Symposium on
2014, pp. 801-804
DOI: 10.1109/MWSCAS.2014.6908536
BibTeX@inproceedings{Fattah2014, author = {Fattah, S. A. and Ullah, M. M. I. and Ahmed, M. and Ahmmed, I. and Shahnaz, C.}, title = {A Scheme for Copy-move Forgery Detection in Digital Images Based on 2D-DWT}, booktitle = {Circuits and Systems (MWSCAS), 2014 IEEE 57th International Midwest Symposium on}, year = {2014}, pages = {801--804}}
-
A Multiscale and Multi-perturbation Blind Forensic Technique for Median Detecting
Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications
Springer Science mathplus Business Media, 2014, pp. 302-310
DOI: 10.1007/978-3-319-12568-8_37
BibTeX@incollection{Ferreira2014, author = {Ferreira, Anselmo and Rocha, Anderson}, title = {A Multiscale and Multi-perturbation Blind Forensic Technique for Median Detecting}, booktitle = {Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications}, publisher = {Springer Science mathplus Business Media}, year = {2014}, pages = {302--310}}
-
Digital Forensic Techniques for Splicing Detection in Multimedia Contents
UNIVERSITÀ DEGLI STUDI DI SIENA Dipartimento di Ingegneria dell'Informazione e Scienze Matematiche, UNIVERSITÀ DEGLI STUDI DI SIENA Dipartimento di Ingegneria dell'Informazione e Scienze Matematiche, 2014
BibTeX@phdthesis{Fontani2014a, author = {Fontani, Marco}, title = {Digital Forensic Techniques for Splicing Detection in Multimedia Contents}, school = {UNIVERSITÀ DEGLI STUDI DI SIENA Dipartimento di Ingegneria dell'Informazione e Scienze Matematiche}, year = {2014}}
-
Countering Anti-forensics by Means of Data Fusion
Alattar, A. M., Memon, N. D. & Heitzenrater, C. D. (ed.)
Proc. SPIE 9028, Media Watermarking, Security, and Forensics 2014
Proc. SPIE, 2014, Vol. 9028, pp. 90280Z-90280Z-15
DOI: 10.1117/12.2039569
BibTeX@inproceedings{Fontani2014, author = {Fontani, Marco and Bonchi, Alessandro and Piva, Alessandro and Barni, Mauro}, title = {Countering Anti-forensics by Means of Data Fusion}, booktitle = {Proc. SPIE 9028, Media Watermarking, Security, and Forensics 2014}, journal = {Proc. SPIE}, year = {2014}, volume = {9028}, pages = {90280Z-90280Z-15}}
-
Illuminant Colour Based Image Forensics Using Mismatch in Human Skin Highlights
Communications (NCC), 2014 Twentieth National Conference on
2014, pp. 1-6
DOI: 10.1109/NCC.2014.6811349
BibTeX@inproceedings{Francis2014, author = {Francis, Kiran and Gholap, Sandeep and Bora, P. K.}, title = {Illuminant Colour Based Image Forensics Using Mismatch in Human Skin Highlights}, booktitle = {Communications (NCC), 2014 Twentieth National Conference on}, year = {2014}, pages = {1--6}}
-
Illuminant colour based image forensics using mismatch in human skin highlights
Proc. Twentieth National Conf. Communications (NCC)
2014, pp. 1-6
DOI: 10.1109/NCC.2014.6811349
BibTeX@inproceedings{Francis2014a, author = {Francis, K. and Gholap, S. and Bora, P. K.}, title = {Illuminant colour based image forensics using mismatch in human skin highlights}, booktitle = {Proc. Twentieth National Conf. Communications (NCC)}, year = {2014}, pages = {1--6}}
-
Image Tampering Detection and Localization
Politecnico di Milano, Politecnico di Milano, 2014
BibTeX@mastersthesis{Gaborini2014, author = {Gaborini, Lorenzo}, title = {Image Tampering Detection and Localization}, school = {Politecnico di Milano}, year = {2014}}
-
Multi-clue Image Tampering Localization
Information Forensics and Security (WIFS), 2014 IEEE International Workshop on
2014, pp. 125-130
DOI: 10.1109/WIFS.2014.7084315
BibTeX@inproceedings{Gaborini2014a, author = {Gaborini, L. and Bestagini, P. and Milani, S. and Tagliasacchi, M. and Tubaro, S.}, title = {Multi-clue Image Tampering Localization}, booktitle = {Information Forensics and Security (WIFS), 2014 IEEE International Workshop on}, year = {2014}, pages = {125--130}}
-
First Quantization Matrix Estimation from Double Compressed JPEG Images
Information Forensics and Security, IEEE Transactions on, 2014, Vol. 9(8), pp. 1299-1310
DOI: 10.1109/TIFS.2014.2330312
BibTeX@article{Galvan2014, author = {Galvan, F. and Puglisi, Giovanni and Bruna, A. R. and Battiato, Sebastiano}, title = {First Quantization Matrix Estimation from Double Compressed JPEG Images}, journal = {Information Forensics and Security, IEEE Transactions on}, year = {2014}, volume = {9}, number = {8}, pages = {1299--1310}}
-
Image Copy-move Tamper Blind Detection Algorithm Based on Integrated Feature Vectors
Journal of Chemical and Pharmaceutical Research, 2014, Vol. 6(6), pp. 1584-1590
BibTeX@article{Gan2014, author = {Gan, Yanfen and Zhong, Junli}, title = {Image Copy-move Tamper Blind Detection Algorithm Based on Integrated Feature Vectors}, journal = {Journal of Chemical and Pharmaceutical Research}, year = {2014}, volume = {6}, number = {6}, pages = {1584--1590}}
-
A Hybrid Feature Based Method for Distinguishing Computer Graphics and Photographic Image
Digital-Forensics and Watermarking, Springer, 2014
DOI: 10.1007/978-3-662-43886-2_22
BibTeX@article{Gao2014, author = {Gao, Shang and Zhang, Cong and Wu, Chan-Le and Ye, Gang and Huang, Lei}, title = {A Hybrid Feature Based Method for Distinguishing Computer Graphics and Photographic Image}, journal = {Digital-Forensics and Watermarking}, publisher = {Springer}, year = {2014}}
-
Exposing image forgery using inconsistent reflection vanishing point
Proc. Int Audio, Language and Image Processing (ICALIP) Conf
2014, pp. 282-286
DOI: 10.1109/ICALIP.2014.7009801
BibTeX@inproceedings{Ge2014a, author = {Ge, H. and Malik, H.}, title = {Exposing image forgery using inconsistent reflection vanishing point}, booktitle = {Proc. Int Audio, Language and Image Processing (ICALIP) Conf}, year = {2014}, pages = {282--286}}
-
Image Perspective Invariant Features Algorithm Based on Particle Swarm Optimization
Journal of Multimedia, 2014, Vol. 9(3)
BibTeX@article{Ge2014, author = {Ge, Lu}, title = {Image Perspective Invariant Features Algorithm Based on Particle Swarm Optimization}, journal = {Journal of Multimedia}, year = {2014}, volume = {9}, number = {3}}
-
A Hybrid Image Authentication Method Robust to JPEG Attacks
Proc. 22nd Signal Processing and Communications Applications Conf. (SIU)
Institute of Electrical & Electronics Engineers (IEEE), 2014, pp. 1596-1599
DOI: 10.1109/SIU.2014.6830549
BibTeX@inproceedings{Gencturk2014, author = {Gencturk, Beste and Nabiyev, Vasif and Ulutas, Guzin and Ulutas, Mustafa}, title = {A Hybrid Image Authentication Method Robust to JPEG Attacks}, booktitle = {Proc. 22nd Signal Processing and Communications Applications Conf. (SIU)}, publisher = {Institute of Electrical & Electronics Engineers (IEEE)}, year = {2014}, pages = {1596--1599}}
-
Search Optimization through JPEG Quantization Tables
University of Amsterdam Faculty of Science, University of Amsterdam Faculty of Science, 2014
BibTeX@mastersthesis{Gieske2014, author = {Gieske, Shanron A.}, title = {Search Optimization through JPEG Quantization Tables}, school = {University of Amsterdam Faculty of Science}, year = {2014}}
-
A Video Forensic Technique for Detecting Frame Deletion and Insertion
Acoustics, Speech and Signal Processing (ICASSP), 2014 IEEE International Conference on
2014, pp. 6226-6230
DOI: 10.1109/ICASSP.2014.6854801
BibTeX@inproceedings{Gironi2014, author = {Gironi, A. and Fontani, M. and Bianchi, T. and Piva, A. and Barni, Mauro}, title = {A Video Forensic Technique for Detecting Frame Deletion and Insertion}, booktitle = {Acoustics, Speech and Signal Processing (ICASSP), 2014 IEEE International Conference on}, year = {2014}, pages = {6226--6230}}
-
Common Source Identification of Images in Large Databases
Forensic Science International, Elsevier BV, 2014, Vol. 244, pp. 222-230
DOI: 10.1016/j.forsciint.2014.08.034
BibTeX@article{Gisolf2014, author = {Gisolf, Floris and Barens, Pelle and Snel, Ewald and Malgoezar, Anwar and Vos, Mark and Mieremet, Arjan and Geradts, Zeno}, title = {Common Source Identification of Images in Large Databases}, journal = {Forensic Science International}, publisher = {Elsevier BV}, year = {2014}, volume = {244}, pages = {222--230}}
-
Forensic Analysis of Video File Formats
Digital Investigation, 2014, Vol. 11, Supplement 1(0), pp. 68-76
DOI: 10.1016/j.diin.2014.03.009
BibTeX@article{Gloe2014, author = {Gloe, Thomas and Fischer, André and Kirchner, Matthias}, title = {Forensic Analysis of Video File Formats}, journal = {Digital Investigation}, year = {2014}, volume = {11, Supplement 1}, number = {0}, pages = {68--76}}
-
Estimation of Lens Distortion Correction from Single Images
Department of ECE, SUNY Binghamton, NY, USA, Department of ECE, SUNY Binghamton, NY, USA, 2014
DOI: 10.1117/12.2036804
BibTeX@techreport{Goljan2014, author = {Goljan, Miroslav and Fridrich, Jessica}, title = {Estimation of Lens Distortion Correction from Single Images}, school = {Department of ECE, SUNY Binghamton, NY, USA}, year = {2014}}
-
Blind Median Filtering Detection Based on Histogram Features
Proc. Asia-Pacific Signal and Information Processing Association Annual Summit and Conf. (APSIPA)
2014, pp. 1-4
DOI: 10.1109/APSIPA.2014.7041536
BibTeX@inproceedings{Gui2014, author = {Gui, X. and Li, X. and Qi, W. and Yang, B.}, title = {Blind Median Filtering Detection Based on Histogram Features}, booktitle = {Proc. Asia-Pacific Signal and Information Processing Association Annual Summit and Conf. (APSIPA)}, year = {2014}, pages = {1--4}}
-
On Compensating Unknown Pixel Behaviors for Image Sensors with Embedded Processing
Signals, Systems and Computers, 2014 48th Asilomar Conference on
2014, pp. 933-937
DOI: 10.1109/ACSSC.2014.7094590
BibTeX@inproceedings{Guicquero2014, author = {Guicquero, W. and Benetti, M. and Peizerat, A. and Dupret, A. and Vandergheynst, P.}, title = {On Compensating Unknown Pixel Behaviors for Image Sensors with Embedded Processing}, booktitle = {Signals, Systems and Computers, 2014 48th Asilomar Conference on}, year = {2014}, pages = {933--937}}
-
A Copy-move Image Forgery Detection Based on Speeded up Robust Feature Transform and Wavelet Transforms
Computer and Communication Technology (ICCCT), 2014 International Conference on
2014, pp. 147-152
DOI: 10.1109/ICCCT.2014.7001483
BibTeX@inproceedings{Hashmi2014, author = {Hashmi, M. F. and Anand, V. and Keskar, A. G.}, title = {A Copy-move Image Forgery Detection Based on Speeded up Robust Feature Transform and Wavelet Transforms}, booktitle = {Computer and Communication Technology (ICCCT), 2014 International Conference on}, year = {2014}, pages = {147--152}}
-
Copy-move Image Forgery Detection Using an Efficient and Robust Method Combining Un-decimated Wavelet Transform and Scale Invariant Feature Transform
AASRI Procedia, Elsevier BV, 2014, Vol. 9, pp. 84-91
DOI: 10.1016/j.aasri.2014.09.015
BibTeX@article{Hashmi2014a, author = {Hashmi, Mohammad Farukh and Anand, Vijay and Keskar, Avinas G.}, title = {Copy-move Image Forgery Detection Using an Efficient and Robust Method Combining Un-decimated Wavelet Transform and Scale Invariant Feature Transform}, journal = {AASRI Procedia}, publisher = {Elsevier BV}, year = {2014}, volume = {9}, pages = {84--91}}
-
Hue Modification Estimation Using Sensor Pattern Noise
Image Processing (ICIP), 2014 IEEE International Conference on
2014, pp. 5287-5291
DOI: 10.1109/ICIP.2014.7026070
BibTeX@inproceedings{Hou2014, author = {Hou, Jong-Uk and Jang, Han-Ul and Lee, Heung-Kyu}, title = {Hue Modification Estimation Using Sensor Pattern Noise}, booktitle = {Image Processing (ICIP), 2014 IEEE International Conference on}, year = {2014}, pages = {5287--5291}}
-
Fast Source Camera Identification Using Matching Signs between Query and Reference Fingerprints
Multimedia Tools and Applications, Springer US, 2014, pp. 1-24
DOI: 10.1007/s11042-014-1985-3
BibTeX@article{Hu2014, author = {Hu, Yongjian and Li, Chang-Tsun and Lai, Zhimao}, title = {Fast Source Camera Identification Using Matching Signs between Query and Reference Fingerprints}, journal = {Multimedia Tools and Applications}, publisher = {Springer US}, year = {2014}, pages = {1--24}}
-
Boosting Scheme for Detecting Region Duplication Forgery in Digital Images
Pan, J.-S., Krömer, P. & Snášel, V. (ed.)
Genetic and Evolutionary Computing
Springer International Publishing, 2014, Vol. 238, pp. 125-133
DOI: 10.1007/978-3-319-01796-9_13
BibTeX@incollection{Huang2014, author = {Huang, Deng-Yuan and Lin, Ta-Wei and Hu, Wu-Chih and Chou, Chih-Hung}, title = {Boosting Scheme for Detecting Region Duplication Forgery in Digital Images}, booktitle = {Genetic and Evolutionary Computing}, publisher = {Springer International Publishing}, year = {2014}, volume = {238}, pages = {125--133}}
-
Evaluation of Image Forgery Detect Ion Using Multi - Scale Weber Local Descript Ors
International Journal on Artificial Intelligence Tools, 2014, Vol. XX(X), pp. 1-27
BibTeX@article{Hussain2014a, author = {Hussain, Muhammad and Qasem, Sahar and Bebis, George and Muhammad, Ghulam and Aboalsamh, Hatim and Mathkour, Hassan}, title = {Evaluation of Image Forgery Detect Ion Using Multi - Scale Weber Local Descript Ors}, journal = {International Journal on Artificial Intelligence Tools}, year = {2014}, volume = {XX}, number = {X}, pages = {1--27}}
-
Comparison between Wld and LBP Descriptors for Non-intrusive Image Forgery Detection
Innovations in Intelligent Systems and Applications (INISTA) Proceedings, 2014 IEEE International Symposium on
2014, pp. 197-204
DOI: 10.1109/INISTA.2014.6873618
BibTeX@inproceedings{Hussain2014, author = {Hussain, Muhammad and Saleh, Sahar Q. and Aboalsamh, Hatim and Muhammad, Ghulam and Bebis, George}, title = {Comparison between Wld and LBP Descriptors for Non-intrusive Image Forgery Detection}, booktitle = {Innovations in Intelligent Systems and Applications (INISTA) Proceedings, 2014 IEEE International Symposium on}, year = {2014}, pages = {197--204}}
-
State-of-the-art in Block Based Copy Move Forgery Detection
Proc of the itl. Conf. on Cryptography and Security 2014 (ICCS)
2014
BibTeX@inproceedings{Indumathi2014, author = {Indumathi, J. and Amala, S. P.}, title = {State-of-the-art in Block Based Copy Move Forgery Detection}, booktitle = {Proc of the itl. Conf. on Cryptography and Security 2014 (ICCS)}, year = {2014}}
-
Image Counter-forensics Based on Feature Injection
Alattar, A. M., Memon, N. D. & Heitzenrater, C. D. (ed.)
Proc. SPIE 9028, Media Watermarking, Security, and Forensics 2014
Proc. SPIE, 2014, Vol. 9028, pp. 902810-902810-15
DOI: 10.1117/12.2042234
BibTeX@inproceedings{Iuliani2014, author = {Iuliani, M. and Rossetto, S. and Bianchi, T. and De Rosa, Alessia and Piva, A. and Barni, Mauro}, title = {Image Counter-forensics Based on Feature Injection}, booktitle = {Proc. SPIE 9028, Media Watermarking, Security, and Forensics 2014}, journal = {Proc. SPIE}, year = {2014}, volume = {9028}, pages = {902810-902810-15}}
-
Image manipulation detection using Edge-based segmentation and statistical property of wavelet coefficients
Proc. Int Electronics, Information and Communications (ICEIC) Conf
2014, pp. 1-2
DOI: 10.1109/ELINFOCOM.2014.6914358
BibTeX@inproceedings{Jeong2014, author = {Jeong, B. G. and Eom, I. K.}, title = {Image manipulation detection using Edge-based segmentation and statistical property of wavelet coefficients}, booktitle = {Proc. Int Electronics, Information and Communications (ICEIC) Conf}, year = {2014}, pages = {1--2}}
-
Copy-paste Image Forgery Blind Detection Based on Mean Shift
Journal of Computer Applications, 2014, Vol. 34(3), pp. 806-809
BibTeX@article{Jiao2014, author = {Jiao, Lixin and Du, Zhenglong}, title = {Copy-paste Image Forgery Blind Detection Based on Mean Shift}, journal = {Journal of Computer Applications}, year = {2014}, volume = {34}, number = {3}, pages = {806--809}}
-
A Context-adaptive Spn Predictor for Trustworthy Source Camera Identification
EURASIP Journal on Image and Video Processing, 2014, Vol. 2014(1), pp. 19
DOI: 10.1186/1687-5281-2014-19
BibTeX@article{Kang2014, author = {Kang, Xiangui and Chen, Jiansheng and Lin, Kerui and Anjie, Peng}, title = {A Context-adaptive Spn Predictor for Trustworthy Source Camera Identification}, journal = {EURASIP Journal on Image and Video Processing}, year = {2014}, volume = {2014}, number = {1}, pages = {19}}
-
Boundary Detection of Altered Region by Differential Features on Camera Response Function
International Journal of Signal Processing Systems, 2014, Vol. 2(1), pp. 31-36
BibTeX@article{Kato2014, author = {Kato, Hirokazu and Nagao, Toshiyuki and Fujiwara, Hideaki and Kondo, Katsuya}, title = {Boundary Detection of Altered Region by Differential Features on Camera Response Function}, journal = {International Journal of Signal Processing Systems}, year = {2014}, volume = {2}, number = {1}, pages = {31--36}}
-
Image Forgery Detection Based on Semantics
International Journal of Hybrid Information Technology, 2014, Vol. 1(7), pp. 109-124
DOI: 10.14257/ijhit.2014.7.1.09
BibTeX@article{Ke2014, author = {Ke, Yongzhen and Min, Weidong and Qin, Fan and Shang, Junjun}, title = {Image Forgery Detection Based on Semantics}, journal = {International Journal of Hybrid Information Technology}, year = {2014}, volume = {1}, number = {7}, pages = {109--124}}
-
Exposing Image Forgery by Detecting Consistency of Shadow
The Scientific World Journal, 2014, Vol. 2014
DOI: 10.1155/2014/364501
BibTeX@article{Ke2014a, author = {Ke, Yongzhen and Qin, Fan and Min, Weidong and Zhangws, Guiling}, title = {Exposing Image Forgery by Detecting Consistency of Shadow}, journal = {The Scientific World Journal}, year = {2014}, volume = {2014}}
-
Exposing Photo Manipulation from Shading and Shadows
ACM Transactions on Graphics, Association for Computing Machinery (ACM), 2014, Vol. 33(5), pp. 1-21
DOI: 10.1145/2629646
BibTeX@article{Kee2014, author = {Kee, Eric and O'brien, James F. and Farid, Hany}, title = {Exposing Photo Manipulation from Shading and Shadows}, journal = {ACM Transactions on Graphics}, publisher = {Association for Computing Machinery (ACM)}, year = {2014}, volume = {33}, number = {5}, pages = {1--21}}
-
Replication Regions Detection in Images Based on Frequency Analysis of Blocks
Proc. 22nd Signal Processing and Communications Applications Conf. (SIU)
2014, pp. 461-464
DOI: 10.1109/SIU.2014.6830265
BibTeX@inproceedings{Ketenci2014a, author = {Ketenci, S. and Uluta&x015F, G.}, title = {Replication Regions Detection in Images Based on Frequency Analysis of Blocks}, booktitle = {Proc. 22nd Signal Processing and Communications Applications Conf. (SIU)}, year = {2014}, pages = {461--464}}
-
Replication Regions Detection in Images Based on Frequency Analysis of Blocks
Signal Processing and Communications Applications Conference (SIU), 2014 22nd
2014, pp. 461-464
DOI: 10.1109/SIU.2014.6830265
BibTeX@inproceedings{Ketenci2014b, author = {Ketenci, S. and Ulutas, G.}, title = {Replication Regions Detection in Images Based on Frequency Analysis of Blocks}, booktitle = {Signal Processing and Communications Applications Conference (SIU), 2014 22nd}, year = {2014}, pages = {461--464}}
-
Replication Regions Detection in Images Based on Frequency Analysis of Blocks
Proc. 22nd Signal Processing and Communications Applications Conf. (SIU)
2014, pp. 461-464
DOI: 10.1109/SIU.2014.6830265
BibTeX@inproceedings{Ketenci2014d, author = {Ketenci, S. and Ulutaş, G.}, title = {Replication Regions Detection in Images Based on Frequency Analysis of Blocks}, booktitle = {Proc. 22nd Signal Processing and Communications Applications Conf. (SIU)}, year = {2014}, pages = {461--464}}
-
Detection of Duplicated Regions in Images Using 1D-Fourier Transform
Systems, Signals and Image Processing (IWSSIP), 2014 International Conference on
2014, pp. 171-174
BibTeX@inproceedings{Ketenci2014, author = {Ketenci, S. and Ulutas, G. and Ulutas, M.}, title = {Detection of Duplicated Regions in Images Using 1D-Fourier Transform}, booktitle = {Systems, Signals and Image Processing (IWSSIP), 2014 International Conference on}, year = {2014}, pages = {171--174}}
-
Exposing Digital Image Forgeries from near Duplicate Images
Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on
2014, pp. 924-928
DOI: 10.1109/CSNT.2014.190
BibTeX@inproceedings{Khamankar2014, author = {Khamankar, S. M. and Madankar, M. S.}, title = {Exposing Digital Image Forgeries from near Duplicate Images}, booktitle = {Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on}, year = {2014}, pages = {924--928}}
-
CT-scanner Identification Based on Sensor Noise Analysis
Visual Information Processing (EUVIP), 2014 5th European Workshop on
2014, pp. 1-5
DOI: 10.1109/EUVIP.2014.7018385
BibTeX@inproceedings{Kharboutly2014, author = {Kharboutly, A. and Puech, W. and Subsol, G. and Hoa, D.}, title = {CT-scanner Identification Based on Sensor Noise Analysis}, booktitle = {Visual Information Processing (EUVIP), 2014 5th European Workshop on}, year = {2014}, pages = {1--5}}
-
Color Laser Printer Identification Using Photographed Halftone Images
Proceedings of the 17th European Signal Processing Conference (EUSIPCO 2014)
2014
BibTeX@inproceedings{Kim2014, author = {Kim, Do-Guk and Lee, Heung-Kyu}, title = {Color Laser Printer Identification Using Photographed Halftone Images}, booktitle = {Proceedings of the 17th European Signal Processing Conference (EUSIPCO 2014)}, year = {2014}}
-
Low-complexity Camera Tamper Detection Based on Edge Information
Consumer Electronics - Taiwan (ICCE-TW), 2014 IEEE International Conference on
2014, pp. 155-156
DOI: 10.1109/ICCE-TW.2014.6904034
BibTeX@inproceedings{Lee2014, author = {Lee, Gil-Beom and Shin, Youn-chul and Park, Joo-heon and Lee, Myeong-jin}, title = {Low-complexity Camera Tamper Detection Based on Edge Information}, booktitle = {Consumer Electronics - Taiwan (ICCE-TW), 2014 IEEE International Conference on}, year = {2014}, pages = {155--156}}
-
Blurred image region detection and segmentation
Proc. IEEE Int. Conf. Image Processing (ICIP)
2014, pp. 4427-4431
DOI: 10.1109/ICIP.2014.7025898
BibTeX@inproceedings{Lee2014a, author = {Lee, H. and Kim, C.}, title = {Blurred image region detection and segmentation}, booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)}, year = {2014}, pages = {4427--4431}}
-
JPEG Noises beyond the First Compression Cycle
arXiv:1405.7571, 2014
BibTeX@article{Li2014f, author = {Li, Bin and Ng, Tian-Tsong and Li, Xiaolong and Tan, Shunquan and Huang, Jiwu}, title = {JPEG Noises beyond the First Compression Cycle}, journal = {arXiv:1405.7571}, year = {2014}}
-
Video Copy-move Forgery Detection and Localization Based on Structural Similarity
Farag, A. A., Yang, J. & Jiao, F. (ed.)
Proceedings of the 3rd International Conference on Multimedia Technology (ICMT 2013)
Springer Berlin Heidelberg, 2014, Vol. 278, pp. 63-76
DOI: 10.1007/978-3-642-41407-7_7
BibTeX@incollection{Li2014, author = {Li, Fugui and Huang, Tianqiang}, title = {Video Copy-move Forgery Detection and Localization Based on Structural Similarity}, booktitle = {Proceedings of the 3rd International Conference on Multimedia Technology (ICMT 2013)}, publisher = {Springer Berlin Heidelberg}, year = {2014}, volume = {278}, pages = {63--76}}
-
Anti-forensics of Double JPEG Compression with the Same Quantization Matrix
Multimedia Tools and Applications, Springer US, 2014, pp. 1-16
DOI: 10.1007/s11042-014-1927-0
BibTeX@article{Li2014c, author = {Li, Haodong and Luo, Weiqi and Huang, Jiwu}, title = {Anti-forensics of Double JPEG Compression with the Same Quantization Matrix}, journal = {Multimedia Tools and Applications}, publisher = {Springer US}, year = {2014}, pages = {1--16}}
-
Detection of Image Forgery Based on Improved PCA-SIFT
Wong, W. E. & Zhu, T. (ed.)
Computer Engineering and Networking
Springer International Publishing, 2014, Vol. 277, pp. 679-686
DOI: 10.1007/978-3-319-01766-2_78
BibTeX@incollection{Li2014a, author = {Li, Kunlun and Li, Hexin and Yang, Bo and Meng, Qi and Luo, Shangzong}, title = {Detection of Image Forgery Based on Improved PCA-SIFT}, booktitle = {Computer Engineering and Networking}, publisher = {Springer International Publishing}, year = {2014}, volume = {277}, pages = {679--686}}
-
Detecting Copy-move Forgery under Affine Transforms for Image Forensics
Computers & Electrical Engineering, Elsevier BV, 2014, Vol. 40(6), pp. 1951-1962
DOI: 10.1016/j.compeleceng.2013.11.034
BibTeX@article{Li2014h, author = {Li, Leida and Li, Shushang and Zhu, Hancheng and Wu, Xiaoyue}, title = {Detecting Copy-move Forgery under Affine Transforms for Image Forensics}, journal = {Computers & Electrical Engineering}, publisher = {Elsevier BV}, year = {2014}, volume = {40}, number = {6}, pages = {1951--1962}}
-
PCA-based Denoising of Sensor Pattern Noise for Source Camera Identification
Signal and Information Processing (ChinaSIP), 2014 IEEE China Summit & International Conference on
2014, pp. 436-440
DOI: 10.1109/ChinaSIP.2014.6889280
BibTeX@inproceedings{Li2014d, author = {Li, Ruizhe and Guan, Yu and Li, Chang-Tsun}, title = {PCA-based Denoising of Sensor Pattern Noise for Source Camera Identification}, booktitle = {Signal and Information Processing (ChinaSIP), 2014 IEEE China Summit & International Conference on}, year = {2014}, pages = {436--440}}
-
A Reference Estimator Based on Composite Sensor Pattern Noise for Source Device Identification
Alattar, A. M., Memon, N. D. & Heitzenrater, C. D. (ed.)
Proc. SPIE 9028, Media Watermarking, Security, and Forensics 2014
Proc. SPIE, 2014, Vol. 9028, pp. 90280O-90280O-7
DOI: 10.1117/12.2038651
BibTeX@inproceedings{Li2014b, author = {Li, Ruizhe and Li, Chang-Tsun and Guan, Yu}, title = {A Reference Estimator Based on Composite Sensor Pattern Noise for Source Device Identification}, booktitle = {Proc. SPIE 9028, Media Watermarking, Security, and Forensics 2014}, journal = {Proc. SPIE}, year = {2014}, volume = {9028}, pages = {90280O-90280O-7}}
-
Exposing Photo Manipulation with Inconsistent Perspective Geometry
The Journal of China Universities of Posts and Telecommunications, 2014, Vol. 21(4), pp. 83-104
DOI: 10.1016/S1005-8885(14)60320-4
BibTeX@article{Li2014e, author = {Li, Yan and Zhou, Ya-jian and Yuan, Kai-guo and Guo, Yu-cui and Niu, Xin-xin}, title = {Exposing Photo Manipulation with Inconsistent Perspective Geometry}, journal = {The Journal of China Universities of Posts and Telecommunications}, year = {2014}, volume = {21}, number = {4}, pages = {83--104}}
-
Distinguishing Computer Graphics from Photographic Images Using a Multiresolution Approach Based on Local Binary Patterns
Security and Communication Networks, 2014
DOI: 10.1002/sec.929
BibTeX@article{Li2014g, author = {Li, Zhaohong and Zhang, Zhenzhen and Shi, Yunqing}, title = {Distinguishing Computer Graphics from Photographic Images Using a Multiresolution Approach Based on Local Binary Patterns}, journal = {Security and Communication Networks}, year = {2014}}
-
HSV Based Image Forgery Detection for Copy-move Attack
Material Science and Engeneering, 2014, Vol. 556-562, pp. 2825-2828
DOI: 10.4028/www.scientific.net/AMM.556-562.2825
BibTeX@article{Liu2014a, author = {Liu, Bo and Pun, Chi Man}, title = {HSV Based Image Forgery Detection for Copy-move Attack}, journal = {Material Science and Engeneering}, year = {2014}, volume = {556-562}, pages = {2825--2828}}
-
Digital Image Forgery Detection Using JPEG Features and Local Noise Discrepancies
The Scientific World Journal, 2014
BibTeX@article{Liu2014, author = {Liu, Bo and Pun, C.-M. and Yuan, Xiao-Chen}, title = {Digital Image Forgery Detection Using JPEG Features and Local Noise Discrepancies}, journal = {The Scientific World Journal}, year = {2014}}
-
Enhanced Perceptual Image Authentication with Tamper Localization and Self-restoration
Multimedia and Expo (ICME), 2014 IEEE International Conference on
2014, pp. 1-6
DOI: 10.1109/ICME.2014.6890128
BibTeX@inproceedings{Liu2014c, author = {Liu, Fang and Wang, Hui and Cheng, Lee-Ming and Ho, Anthony T. S. and Li, Shujun}, title = {Enhanced Perceptual Image Authentication with Tamper Localization and Self-restoration}, booktitle = {Multimedia and Expo (ICME), 2014 IEEE International Conference on}, year = {2014}, pages = {1--6}}
-
Anti-forensics of Video Frame Deletion
paper.edu.cn, 2014
BibTeX@electronic{Liu2014b, author = {Liu, Jingxian and Kang, Xiangui}, title = {Anti-forensics of Video Frame Deletion}, journal = {paper.edu.cn}, year = {2014}}
-
Improved SIFT-based Copy-move Detection Using Bfsn Clustering and CFA Features
Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2014 Tenth International Conference on
2014, pp. 626-629
DOI: 10.1109/IIH-MSP.2014.162
BibTeX@inproceedings{Liu2014d, author = {Liu, Lu and Ni, Rongrong and Zhao, Yao and Li, Siran}, title = {Improved SIFT-based Copy-move Detection Using Bfsn Clustering and CFA Features}, booktitle = {Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2014 Tenth International Conference on}, year = {2014}, pages = {626--629}}
-
Forensics of Image Blurring and Sharpening History Based on NSCT Domain
Proc. Asia-Pacific Signal and Information Processing Association Annual Summit and Conf. (APSIPA)
2014, pp. 1-4
DOI: 10.1109/APSIPA.2014.7041728
BibTeX@inproceedings{Liu2014e, author = {Liu, Y. and Zhao, Y. and Ni, R.}, title = {Forensics of Image Blurring and Sharpening History Based on NSCT Domain}, booktitle = {Proc. Asia-Pacific Signal and Information Processing Association Annual Summit and Conf. (APSIPA)}, year = {2014}, pages = {1--4}}
-
Forensics of image blurring and sharpening history based on NSCT domain
Proc. Asia-Pacific Signal and Information Processing Association Annual Summit and Conf. (APSIPA)
2014, pp. 1-4
DOI: 10.1109/APSIPA.2014.7041728
BibTeX@inproceedings{Liu2014f, author = {Liu, Y. and Zhao, Y. and Ni, R.}, title = {Forensics of image blurring and sharpening history based on NSCT domain}, booktitle = {Proc. Asia-Pacific Signal and Information Processing Association Annual Summit and Conf. (APSIPA)}, year = {2014}, pages = {1--4}}
-
Detecting double compressed AMR audio using deep learning
Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics
2014, pp. 2669-2673
DOI: 10.1109/ICASSP.2014.6854084
BibTeX@inproceedings{Luo2014, author = {Luo, D. and Yang, R. and Huang, J.}, title = {Detecting double compressed AMR audio using deep learning}, booktitle = {Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics}, year = {2014}, pages = {2669--2673}}
-
Harnessing Motion Blur to Unveil Splicing
Information Forensics and Security, IEEE Transactions on, 2014, Vol. PP(99), pp. 1-1
DOI: 10.1109/TIFS.2014.2302895
BibTeX@article{Makkena2014, author = {Makkena, P. and Rajagopalan, A. and Seetharaman, G.}, title = {Harnessing Motion Blur to Unveil Splicing}, journal = {Information Forensics and Security, IEEE Transactions on}, year = {2014}, volume = {PP}, number = {99}, pages = {1--1}}
-
Digital Forensic Technique for Double Compression Based JPEG Image Forgery Detection
Information Systems Security
Springer, 2014
DOI: 10.1007/978-3-319-13841-1_25
BibTeX@incollection{Malviya2014, author = {Malviya, Pankaj and Naskar, Ruchira}, title = {Digital Forensic Technique for Double Compression Based JPEG Image Forgery Detection}, booktitle = {Information Systems Security}, publisher = {Springer}, year = {2014}}
-
Attacking the Triangle Test in Sensor-based Camera Identification
Image Processing (ICIP), 2014 IEEE International Conference on
2014, pp. 5307-5311
DOI: 10.1109/ICIP.2014.7026074
BibTeX@inproceedings{Marra2014, author = {Marra, F. and Roli, F. and Cozzolino, D. and Sansone, C. and Verdoliva, L.}, title = {Attacking the Triangle Test in Sensor-based Camera Identification}, booktitle = {Image Processing (ICIP), 2014 IEEE International Conference on}, year = {2014}, pages = {5307--5311}}
-
Device Classification in Digital Forensics Triage
Universita Degli Studi Di Roma Tor Vergata Dipartimento Di Ingegneria Civile E Ingegneria Informatica, Universita Degli Studi Di Roma Tor Vergata Dipartimento Di Ingegneria Civile E Ingegneria Informatica, 2014
BibTeX@phdthesis{Marturana2014, author = {Marturana, Fabio}, title = {Device Classification in Digital Forensics Triage}, school = {Universita Degli Studi Di Roma Tor Vergata Dipartimento Di Ingegneria Civile E Ingegneria Informatica}, year = {2014}}
-
Image Phylogeny through Dissimilarity Metrics Fusion
Proc. 5th European Workshop Visual Information Processing (EUVIP)
2014, pp. 1-6
DOI: 10.1109/EUVIP.2014.7018370
BibTeX@inproceedings{Melloni2014, author = {Melloni, A. and Bestagini, P. and Milani, S. and Tagliasacchi, M. and Rocha, A. and Tubaro, S.}, title = {Image Phylogeny through Dissimilarity Metrics Fusion}, booktitle = {Proc. 5th European Workshop Visual Information Processing (EUVIP)}, year = {2014}, pages = {1--6}}
-
Demosaicing Strategy Identification Via Eigenalgorithms
2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Institute of Electrical and Electronics Engineers (IEEE), 2014
DOI: 10.1109/icassp.2014.6854082
BibTeX@inproceedings{Milani2014, author = {Milani, Simone and Bestagini, Paolo and Tagliasacchi, Marco and Tubaro, Stefano}, title = {Demosaicing Strategy Identification Via Eigenalgorithms}, booktitle = {2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)}, journal = {2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)}, publisher = {Institute of Electrical and Electronics Engineers (IEEE)}, year = {2014}}
-
Antiforensic synthesis of motion vectors using template algorithms
Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics
2014, pp. 2709-2713
DOI: 10.1109/ICASSP.2014.6854092
BibTeX@inproceedings{Milani2014c, author = {Milani, S. and Bestagini, P. and Tagliasacchi, M. and Tubaro, S.}, title = {Antiforensic synthesis of motion vectors using template algorithms}, booktitle = {Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics}, year = {2014}, pages = {2709--2713}}
-
Demosaicing strategy identification via eigenalgorithms
Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics
2014, pp. 2659-2663
DOI: 10.1109/ICASSP.2014.6854082
BibTeX@inproceedings{Milani2014d, author = {Milani, S. and Bestagini, P. and Tagliasacchi, M. and Tubaro, S.}, title = {Demosaicing strategy identification via eigenalgorithms}, booktitle = {Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics}, year = {2014}, pages = {2659--2663}}
-
Video Camera Identification Using Audio-visual Features
Visual Information Processing (EUVIP), 2014 5th European Workshop on
2014, pp. 1-6
DOI: 10.1109/EUVIP.2014.7018382
BibTeX@inproceedings{Milani2014a, author = {Milani, S. and Cuccovillo, L. and Tagliasacchi, M. and Tubaro, S. and Aichroth, P.}, title = {Video Camera Identification Using Audio-visual Features}, booktitle = {Visual Information Processing (EUVIP), 2014 5th European Workshop on}, year = {2014}, pages = {1--6}}
-
Discriminating Multiple JPEG Compressions Using First Digit Features
APSIPA Transactions on Signal and Information Processing, 2014, Vol. 3
DOI: 10.1017/atsip.2014.19
BibTeX@article{Milani2014b, author = {Milani, S. and Tagliasacchi, M. and Tubaro, S.}, title = {Discriminating Multiple JPEG Compressions Using First Digit Features}, journal = {APSIPA Transactions on Signal and Information Processing}, year = {2014}, volume = {3}}
-
Digital Forensic of JPEG Images
Signal and Image Processing (ICSIP), 2014 Fifth International Conference on
2014, pp. 131-136
DOI: 10.1109/ICSIP.2014.26
BibTeX@inproceedings{Mire2014, author = {Mire, A. V. and Dhok, S. B. and Porey, P. D. and Mistry, N. J.}, title = {Digital Forensic of JPEG Images}, booktitle = {Signal and Image Processing (ICSIP), 2014 Fifth International Conference on}, year = {2014}, pages = {131--136}}
-
Detection of Clones in Digital Images
International Journal of Computer Science and Business Informatics, 2014, Vol. 9(1)
BibTeX@article{Mishra2014, author = {Mishra, Minati and Adhikary, M. C.}, title = {Detection of Clones in Digital Images}, journal = {International Journal of Computer Science and Business Informatics}, year = {2014}, volume = {9}, number = {1}}
-
SVD-based Image Splicing Detection
Information Technology and Multimedia (ICIMU), 2014 International Conference on
2014, pp. 27-30
DOI: 10.1109/ICIMU.2014.7066598
BibTeX@inproceedings{Moghaddasi2014, author = {Moghaddasi, Zahra and Jalab, Hamid A. and Noor, Rafidah Md}, title = {SVD-based Image Splicing Detection}, booktitle = {Information Technology and Multimedia (ICIMU), 2014 International Conference on}, year = {2014}, pages = {27--30}}
-
Localization and Building Identification in Outdoor Environment for Smartphone Using Integrated GPS and Camera
Proc. Fourth Int Digital Information and Communication Technology and it's Applications (DICTAP) Conf
2014, pp. 327-332
DOI: 10.1109/DICTAP.2014.6821705
BibTeX@inproceedings{Moun2014, author = {Moun, C. and Netramai, C.}, title = {Localization and Building Identification in Outdoor Environment for Smartphone Using Integrated GPS and Camera}, booktitle = {Proc. Fourth Int Digital Information and Communication Technology and it's Applications (DICTAP) Conf}, year = {2014}, pages = {327--332}}
-
Forgery Detection Using Statistical Features
Computational Intelligence on Power, Energy and Controls with their impact on Humanity (CIPECH), 2014 Innovative Applications of
2014, pp. 92-97
DOI: 10.1109/CIPECH.2014.7019062
BibTeX@inproceedings{Mushtaq2014, author = {Mushtaq, S. and Mir, A. H.}, title = {Forgery Detection Using Statistical Features}, booktitle = {Computational Intelligence on Power, Energy and Controls with their impact on Humanity (CIPECH), 2014 Innovative Applications of}, year = {2014}, pages = {92--97}}
-
Novel Method for Image Splicing Detection
Advances in Computing, Communications and Informatics (ICACCI, 2014 International Conference on
2014, pp. 2398-2403
DOI: 10.1109/ICACCI.2014.6968386
BibTeX@inproceedings{Mushtaq2014a, author = {Mushtaq, S. and Mir, A. H.}, title = {Novel Method for Image Splicing Detection}, booktitle = {Advances in Computing, Communications and Informatics (ICACCI, 2014 International Conference on}, year = {2014}, pages = {2398--2403}}
-
Image Forgery Detection Based on Illumination Inconsistencies & Intrinsic Resampling Properties
Emerging Research Areas: Magnetics, Machines and Drives (AICERA/iCMMD), 2014 Annual International Conference on
2014, pp. 1-6
DOI: 10.1109/AICERA.2014.6908192
BibTeX@inproceedings{Neenu2014, author = {Neenu, H. U. and Cheriyan, J.}, title = {Image Forgery Detection Based on Illumination Inconsistencies & Intrinsic Resampling Properties}, booktitle = {Emerging Research Areas: Magnetics, Machines and Drives (AICERA/iCMMD), 2014 Annual International Conference on}, year = {2014}, pages = {1--6}}
-
A Novel Method for Detecting Double Compressed Facebook JPEG Images
Batten, L., Li, G., Niu, W. & Warren, M. (ed.)
Applications and Techniques in Information Security
Springer Science mathplus Business Media, 2014, Vol. 490, pp. 191-198
DOI: 10.1007/978-3-662-45670-5_18
BibTeX@incollection{Ng2014, author = {Ng, Allan and Pan, Lei and Xiang, Yang}, title = {A Novel Method for Detecting Double Compressed Facebook JPEG Images}, booktitle = {Applications and Techniques in Information Security}, publisher = {Springer Science mathplus Business Media}, year = {2014}, volume = {490}, pages = {191--198}}
-
Vorsicht Falle! Scripted Reality, Retouchierte Fotos, Pseudonyme -- Täuschung Als Medienethische Herausforderung
Communicatio Socialis, 2014, Vol. 46(3-4)
BibTeX@article{Nothelle2014, author = {Nothelle, Claudia}, title = {Vorsicht Falle! Scripted Reality, Retouchierte Fotos, Pseudonyme -- Täuschung Als Medienethische Herausforderung}, journal = {Communicatio Socialis}, year = {2014}, volume = {46}, number = {3--4}}
-
Image Phylogeny Forests Reconstruction
IEEE Transactions on Information Forensics and Security, 2014, Vol. 9(10), pp. 1533-1546
DOI: 10.1109/TIFS.2014.2340017
BibTeX@article{O.Costa2014, author = {de O. Costa, F. and Oikawa, M. A. and Dias, Z. and Goldenstein, S. and de Rocha, A. R.}, title = {Image Phylogeny Forests Reconstruction}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2014}, volume = {9}, number = {10}, pages = {1533--1546}}
-
Analysis of Errors in EXIF Metadata on Mobile Devices
Multimedia Tools and Applications, Springer US, 2014, pp. 1-29
DOI: 10.1007/s11042-013-1837-6
BibTeX@article{Orozco2014, author = {Orozco, Sandoval and AnaLucila and González, Arenas and DavidManuel and Villalba, García and Javier, Luis and Hernández-Castro, Julio}, title = {Analysis of Errors in EXIF Metadata on Mobile Devices}, journal = {Multimedia Tools and Applications}, publisher = {Springer US}, year = {2014}, pages = {1--29}}
-
Towards Detection of Image Tampering Over Diverse Information Security Schemata: A State of the art
International Journal of Information and Network Security (IJINS), 2014, Vol. 3(1)
BibTeX@article{Pande2014, author = {Pande, Deepali}, title = {Towards Detection of Image Tampering Over Diverse Information Security Schemata: A State of the art}, journal = {International Journal of Information and Network Security (IJINS)}, year = {2014}, volume = {3}, number = {1}}
-
Passive Copy-move Forgery Detection in Videos
Computer and Communication Technology (ICCCT), 2014 International Conference on
2014, pp. 301-306
DOI: 10.1109/ICCCT.2014.7001509
BibTeX@inproceedings{Pandey2014a, author = {Pandey, R. C. and Singh, S. K. and Shukla, K. K.}, title = {Passive Copy-move Forgery Detection in Videos}, booktitle = {Computer and Communication Technology (ICCCT), 2014 International Conference on}, year = {2014}, pages = {301--306}}
-
Fast and Robust Passive Copy-move Forgery Detection Using SURF and SIFT Image Features
Industrial and Information Systems (ICIIS), 2014 9th International Conference on
2014, pp. 1-6
DOI: 10.1109/ICIINFS.2014.7036519
BibTeX@inproceedings{Pandey2014, author = {Pandey, Ramesh Chand and Singh, Sanjay Kumar and Shukla, K. K. and Agrawal, Rishabh}, title = {Fast and Robust Passive Copy-move Forgery Detection Using SURF and SIFT Image Features}, booktitle = {Industrial and Information Systems (ICIIS), 2014 9th International Conference on}, year = {2014}, pages = {1--6}}
-
Multiple JPEG compression detection by means of Benford-Fourier coefficients
Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)
2014, pp. 113-118
DOI: 10.1109/WIFS.2014.7084313
BibTeX@inproceedings{Pasquini2014b, author = {Pasquini, C. and Boato, G. and Perez-Gonzalez, F.}, title = {Multiple JPEG compression detection by means of Benford-Fourier coefficients}, booktitle = {Proc. IEEE Int. Workshop Information Forensics and Security (WIFS)}, year = {2014}, pages = {113--118}}
-
Transportation-theoretic image counterforensics to First Significant Digit histogram forensics
Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics
2014, pp. 2699-2703
DOI: 10.1109/ICASSP.2014.6854090
BibTeX@inproceedings{Pasquini2014a, author = {Pasquini, C. and Comesaña-Alfaro, P. and Pérez-González, F. and Boato, G.}, title = {Transportation-theoretic image counterforensics to First Significant Digit histogram forensics}, booktitle = {Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics}, year = {2014}, pages = {2699--2703}}
-
Transportation-theoretic image counterforensics to First Significant Digit histogram forensics
Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics
2014, pp. 2699-2703
DOI: 10.1109/ICASSP.2014.6854090
BibTeX@inproceedings{Pasquini2014c, author = {Pasquini, C. and Comesaña-Alfaro, P. and Pérez-González, F. and Boato, G.}, title = {Transportation-theoretic image counterforensics to First Significant Digit histogram forensics}, booktitle = {Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics}, year = {2014}, pages = {2699--2703}}
-
A Benford-Fourier JPEG compression detector
Proc. IEEE Int. Conf. Image Processing (ICIP)
2014, pp. 5322-5326
DOI: 10.1109/ICIP.2014.7026077
BibTeX@inproceedings{Pasquini2014, author = {Pasquini, C. and Pérez-González, F. and Boato, G.}, title = {A Benford-Fourier JPEG compression detector}, booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)}, year = {2014}, pages = {5322--5326}}
-
A Robust Median Filtering Detector Based on Filter Residual
paper.edu.cn, 2014
BibTeX@electronic{Peng2014a, author = {Peng, Anjie and Kang, Xiangui}, title = {A Robust Median Filtering Detector Based on Filter Residual}, journal = {paper.edu.cn}, year = {2014}}
-
Identifying Photographic Images and Photorealistic Computer Graphics Using Multifractal Spectrum Features of PRNU
Multimedia and Expo (ICME), 2014 IEEE International Conference on
2014, pp. 1-6
DOI: 10.1109/ICME.2014.6890296
BibTeX@inproceedings{Peng2014b, author = {Peng, Fei and Shi, Jiaoling and Long, Min}, title = {Identifying Photographic Images and Photorealistic Computer Graphics Using Multifractal Spectrum Features of PRNU}, booktitle = {Multimedia and Expo (ICME), 2014 IEEE International Conference on}, year = {2014}, pages = {1--6}}
-
Discriminating Natural Images and Computer Generated Graphics Based on the Impact of CFA Interpolation on the Correlation of PRNU
Digital Investigation, 2014(0), pp. -
DOI: 10.1016/j.diin.2014.04.002
BibTeX@article{Peng2014, author = {Peng, Fei and Zhou, Die-lan}, title = {Discriminating Natural Images and Computer Generated Graphics Based on the Impact of CFA Interpolation on the Correlation of PRNU}, journal = {Digital Investigation}, year = {2014}, number = {0}, pages = {-}}
-
Video Analysis Tool Box for Digital Video Forensics
University of Moratuwa, University of Moratuwa, 2014
BibTeX@phdthesis{Perer2014, author = {Perera, Halloluwage Susinda Deemantha}, title = {Video Analysis Tool Box for Digital Video Forensics}, school = {University of Moratuwa}, year = {2014}}
-
Improved Anti-forensics of JPEG\ Compression
Journal of Systems and Software, 2014(0), pp. -
DOI: 10.1016/j.jss.2013.12.043
BibTeX@article{Qian2014, author = {Qian, Zhenxing and Zhang, Xinpeng}, title = {Improved Anti-forensics of JPEG\ Compression}, journal = {Journal of Systems and Software}, year = {2014}, number = {0}, pages = {-}}
-
A Universal Image Forensic Strategy Based on Steganalytic Model
Proceedings of the 2Nd ACM Workshop on Information Hiding and Multimedia Security
ACM, 2014, pp. 165-170
DOI: 10.1145/2600918.2600941
BibTeX@inproceedings{Qiu2014, author = {Qiu, Xiaoqing and Li, Haodong and Luo, Weiqi and Huang, Jiwu}, title = {A Universal Image Forensic Strategy Based on Steganalytic Model}, booktitle = {Proceedings of the 2Nd ACM Workshop on Information Hiding and Multimedia Security}, publisher = {ACM}, year = {2014}, pages = {165--170}}
-
A Framework for Identifying Shifted Double JPEG Compression Artifacts with Application to Non-intrusive Digital Image Forensics
Science China Information Sciences, Science China Press, 2014, Vol. 57(2), pp. 1-18
DOI: 10.1007/s11432-013-5046-8
BibTeX@article{Qu2014, author = {Qu, ZhenHua and Luo, WeiQi and Huang, JiWu}, title = {A Framework for Identifying Shifted Double JPEG Compression Artifacts with Application to Non-intrusive Digital Image Forensics}, journal = {Science China Information Sciences}, publisher = {Science China Press}, year = {2014}, volume = {57}, number = {2}, pages = {1--18}}
-
A Review on Copy Move Image Forgery Detection Techniques
Proc. 11th Int Systems, Signals Devices (SSD) Multi-Conf
2014, pp. 1-5
DOI: 10.1109/SSD.2014.6808907
BibTeX@inproceedings{Qureshi2014, author = {Qureshi, M. Ali and Deriche, M.}, title = {A Review on Copy Move Image Forgery Detection Techniques}, booktitle = {Proc. 11th Int Systems, Signals Devices (SSD) Multi-Conf}, year = {2014}, pages = {1--5}}
-
Harnessing Motion Blur to Unveil Splicing
Information Forensics and Security, IEEE Transactions on, 2014, Vol. 9(4), pp. 583-595
DOI: 10.1109/TIFS.2014.2302895
BibTeX@article{Rao2014, author = {Rao, M. P. and Rajagopalan, A. N. and Seetharaman, G.}, title = {Harnessing Motion Blur to Unveil Splicing}, journal = {Information Forensics and Security, IEEE Transactions on}, year = {2014}, volume = {9}, number = {4}, pages = {583--595}}
-
Detection of Object-based Manipulation by the Statistical Features of Object Contour
Forensic Science International, 2014
BibTeX@article{Richao2014, author = {Richao, Chen and Gaobo, Yang and Ningbo, Zhu}, title = {Detection of Object-based Manipulation by the Statistical Features of Object Contour}, journal = {Forensic Science International}, year = {2014}}
-
Estimation of Linear Transformation by Analyzing the Periodicity of Interpolation
Pattern Recognition Letters, 2014, Vol. 36(0), pp. 89-99
DOI: 10.1016/j.patrec.2013.09.028
BibTeX@article{Ryu2014, author = {Ryu, Seung-Jin and Lee, Heung-Kyu}, title = {Estimation of Linear Transformation by Analyzing the Periodicity of Interpolation}, journal = {Pattern Recognition Letters}, year = {2014}, volume = {36}, number = {0}, pages = {89--99}}
-
Detecting Trace of Seam Carving for Forensic Analysis
IEICE TRANSACTIONS on Information and Systems, 2014, Vol. E97-D(5), pp. 1304-1311
BibTeX@article{Ryu2014a, author = {Ryu, Seung-Jin and Lee, Hae-Yeoun and Lee, Heung-kyu}, title = {Detecting Trace of Seam Carving for Forensic Analysis}, journal = {IEICE TRANSACTIONS on Information and Systems}, year = {2014}, volume = {E97-D}, number = {5}, pages = {1304--1311}}
-
A Key-point Based Robust Algorithm for Detecting Cloning Forgery
International Journal of Current Engineering and Technology, 2014
BibTeX@article{Saleem2014, author = {Saleem, Mariam}, title = {A Key-point Based Robust Algorithm for Detecting Cloning Forgery}, journal = {International Journal of Current Engineering and Technology}, year = {2014}}
-
A Comparative Analysis on Pixel-based Blind Cloning Techniques
Control System, Computing and Engineering (ICCSCE), 2014 IEEE International Conference on
2014, pp. 130-135
DOI: 10.1109/ICCSCE.2014.7072702
BibTeX@inproceedings{Saleem2014a, author = {Saleem, M. and Altaf, M. Q. and Chaudry, Q.}, title = {A Comparative Analysis on Pixel-based Blind Cloning Techniques}, booktitle = {Control System, Computing and Engineering (ICCSCE), 2014 IEEE International Conference on}, year = {2014}, pages = {130--135}}
-
Source Identification for Mobile Devices, Based on Wavelet Transforms Combined with Sensor Imperfections
Computing, Springer, 2014, Vol. 96(9), pp. 829
DOI: 10.1007/s00607-013-0313-5
BibTeX@article{SandovalOrozco2014, author = {Sandoval Orozco, A. L. and Arenas González, D. M. and Rosales Corripio, J. and GarcÃa Villalba, L. J. and Hernandez-Castro, J. C.}, title = {Source Identification for Mobile Devices, Based on Wavelet Transforms Combined with Sensor Imperfections}, journal = {Computing}, publisher = {Springer}, year = {2014}, volume = {96}, number = {9}, pages = {829}}
-
Copy-move Forgery Detection Using Orthogonal Wavelet Transforms.
International Journal of Computer Applications, 2014, Vol. 88, pp. 41-45
BibTeX@article{Sarode2014, author = {Sarode, Tanuja K. and Vaswani, Naveen}, title = {Copy-move Forgery Detection Using Orthogonal Wavelet Transforms.}, journal = {International Journal of Computer Applications}, year = {2014}, volume = {88}, pages = {41--45}}
-
On the Usage of Sensor Pattern Noise for Picture-to-identity Linking through Social Network Accounts
Proceeding of the International Conference on Computer Vision Theory and Applications Lisbon, Portugal
2014
BibTeX@inproceedings{Satta2014, author = {Satta, Riccardo and Stirparo, Pasquale}, title = {On the Usage of Sensor Pattern Noise for Picture-to-identity Linking through Social Network Accounts}, booktitle = {Proceeding of the International Conference on Computer Vision Theory and Applications Lisbon, Portugal}, year = {2014}}
-
Detecting Documents Forged by Printing and Copying
EURASIP Journal on Advances in Signal Processing, Springer, 2014, Vol. 2014(1), pp. 140
BibTeX@article{Shang2014, author = {Shang, Shize and Memon, Nasir and Kong, Xiangwei}, title = {Detecting Documents Forged by Printing and Copying}, journal = {EURASIP Journal on Advances in Signal Processing}, publisher = {Springer}, year = {2014}, volume = {2014}, number = {1}, pages = {140}}
-
Digital Image Forensics Using Orthogonal 1-D Objects
Chinese Journal of Electronics, 2014, Vol. 23(3)
BibTeX@article{Shaozhang201, author = {Shaozhang, Niu and Xianzhe, Meng and Haoliang, Cui}, title = {Digital Image Forensics Using Orthogonal 1-D Objects}, journal = {Chinese Journal of Electronics}, year = {2014}, volume = {23}, number = {3}}
-
Computationally Efficient Copy-move Image Forgery Detection Based on DCT and SVD
Advanced Research in Electrical and Electronic Engineering, 2014, Vol. 1(3), pp. 79-81
BibTeX@article{Sharma2014, author = {Sharma, Kavya}, title = {Computationally Efficient Copy-move Image Forgery Detection Based on DCT and SVD}, journal = {Advanced Research in Electrical and Electronic Engineering}, year = {2014}, volume = {1}, number = {3}, pages = {79--81}}
-
Forgery Detection Based on Blur Inconsistencies: A Review
International Journal of Engineering and Technical Research (IJETR), 2014, Vol. 2(12), pp. 198-201
BibTeX@article{Shehnaz2014, author = {Shehnaz and Kaur, Mandeep}, title = {Forgery Detection Based on Blur Inconsistencies: A Review}, journal = {International Journal of Engineering and Technical Research (IJETR)}, year = {2014}, volume = {2}, number = {12}, pages = {198--201}}
-
Blind Detection of Median Filtering Using Linear and Nonlinear Descriptors
Multimedia Tools and Applications, Springer, 2014, pp. 1
DOI: 10.1007/s11042-014-2407-2
BibTeX@article{Shen2014, author = {Shen, Zhaoyi and Ni, Jiangqun and Chen, Chenglong}, title = {Blind Detection of Median Filtering Using Linear and Nonlinear Descriptors}, journal = {Multimedia Tools and Applications}, publisher = {Springer}, year = {2014}, pages = {1}}
-
Weighting Optimization with Neural Network for Photo-response-non-uniformity-based Source Camera Identification
Asia-Pacific Signal and Information Processing Association, 2014 Annual Summit and Conference (APSIPA)
2014, pp. 1-7
DOI: 10.1109/APSIPA.2014.7041642
BibTeX@inproceedings{Shi2014, author = {Shi, Chao and Law, Ngai-Fong and Leung, Hung-Fat and Siu, Wan-Chi}, title = {Weighting Optimization with Neural Network for Photo-response-non-uniformity-based Source Camera Identification}, booktitle = {Asia-Pacific Signal and Information Processing Association, 2014 Annual Summit and Conference (APSIPA)}, year = {2014}, pages = {1--7}}
-
Forgery Image Detection of Scale up and down Image Using Discrete Cosine Transform
Journal of Next Generation Information Technology (JNIT), 2014, Vol. 5(2)
BibTeX@article{Shin2014, author = {Shin, Yong-Dal}, title = {Forgery Image Detection of Scale up and down Image Using Discrete Cosine Transform}, journal = {Journal of Next Generation Information Technology (JNIT)}, year = {2014}, volume = {5}, number = {2}}
-
Natural Image Splicing Detection Based on Defocus Blur at Edges
Communications in China (ICCC), 2014 IEEE/CIC International Conference on
2014, pp. 225-230
DOI: 10.1109/ICCChina.2014.7008276
BibTeX@inproceedings{Song2014, author = {Song, Chunhe and Lin, Xiaodong}, title = {Natural Image Splicing Detection Based on Defocus Blur at Edges}, booktitle = {Communications in China (ICCC), 2014 IEEE/CIC International Conference on}, year = {2014}, pages = {225--230}}
-
Enhanced State Selection Markov Model for Image Splicing Detection
EURASIP Journal on Wireless Communications and Networking, 2014, Vol. 2014(1), pp. 7
DOI: 10.1186/1687-1499-2014-7
BibTeX@article{Su2014, author = {Su, Bo and Yuan, Quanqiao and Wang, Shilin and Zhao, Chenglin and Li, Shenghong}, title = {Enhanced State Selection Markov Model for Image Splicing Detection}, journal = {EURASIP Journal on Wireless Communications and Networking}, year = {2014}, volume = {2014}, number = {1}, pages = {7}}
-
A Video Forgery Detection Algorithm Based on Compressive Sensing
Multimedia Tools and Applications, Springer US, 2014, pp. 1-16
DOI: 10.1007/s11042-014-1915-4
BibTeX@article{Su2014a, author = {Su, Lichao and Huang, Tianqiang and Yang, Jianmei}, title = {A Video Forgery Detection Algorithm Based on Compressive Sensing}, journal = {Multimedia Tools and Applications}, publisher = {Springer US}, year = {2014}, pages = {1--16}}
-
Speeding-up SIFT Based Copy Move Forgery Detection Using Level Set Approach
Advances in Electronics, Computers and Communications (ICAECC), 2014 International Conference on
2014, pp. 1-6
DOI: 10.1109/ICAECC.2014.7002407
BibTeX@inproceedings{Sudhakar2014, author = {Sudhakar, K. and Sandeep, V. M. and Kulkarni, S.}, title = {Speeding-up SIFT Based Copy Move Forgery Detection Using Level Set Approach}, booktitle = {Advances in Electronics, Computers and Communications (ICAECC), 2014 International Conference on}, year = {2014}, pages = {1--6}}
-
Shape Based Copy Move Forgery Detection Using Level Set Approach
Signal and Image Processing (ICSIP), 2014 Fifth International Conference on
2014, pp. 213-217
DOI: 10.1109/ICSIP.2014.40
BibTeX@inproceedings{Sudhakar2014a, author = {Sudhakar, K. and Sandeep, V. M. and Kulkarni, S.}, title = {Shape Based Copy Move Forgery Detection Using Level Set Approach}, booktitle = {Signal and Image Processing (ICSIP), 2014 Fifth International Conference on}, year = {2014}, pages = {213--217}}
-
Processing Raw Images in Matlab
Department of Electrical Engineering, UC Santa Cruz, Department of Electrical Engineering, UC Santa Cruz, 2014
BibTeX@other{Sumner2014, author = {Sumner, Rob}, title = {Processing Raw Images in Matlab}, school = {Department of Electrical Engineering, UC Santa Cruz}, year = {2014}}
-
DCT-PCA Based Method for Copy-move Forgery Detection
Satapathy, S. C., Avadhani, P. S., Udgata, S. K. & Lakshminarayana, S. (ed.)
ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol II
Springer International Publishing, 2014, Vol. 249, pp. 577-583
DOI: 10.1007/978-3-319-03095-1_62
BibTeX@incollection{Sunil2014, author = {Sunil, Kumar and Jagan, Desai and Shaktidev, Mukherjee}, title = {DCT-PCA Based Method for Copy-move Forgery Detection}, booktitle = {ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol II}, publisher = {Springer International Publishing}, year = {2014}, volume = {249}, pages = {577--583}}
-
Statistical Modeling and Detection for Digital Image Forensics
University of Technology of Troyes, University of Technology of Troyes, 2014
BibTeX@phdthesis{Tai2014, author = {Tai, Than Hai}, title = {Statistical Modeling and Detection for Digital Image Forensics}, school = {University of Technology of Troyes}, year = {2014}}
-
Optimal Detector for Camera Model Identification Based on an Accurate Model of DCT Coefficients
Proc. IEEE 16th Int Multimedia Signal Processing (MMSP) Workshop
2014, pp. 1-6
DOI: 10.1109/MMSP.2014.6958810
BibTeX@inproceedings{Thai2014, author = {Thai, Thanh Hai and Cogranne, R. and Retraint, F.}, title = {Optimal Detector for Camera Model Identification Based on an Accurate Model of DCT Coefficients}, booktitle = {Proc. IEEE 16th Int Multimedia Signal Processing (MMSP) Workshop}, year = {2014}, pages = {1--6}}
-
Camera Model Identification Based on the Heteroscedastic Noise Model
IEEE Transactions on Image Processing, 2014, Vol. 23(1), pp. 250-263
DOI: 10.1109/TIP.2013.2290596
BibTeX@article{Thai2014b, author = {Thai, T. H. and Cogranne, R. and Retraint, F.}, title = {Camera Model Identification Based on the Heteroscedastic Noise Model}, journal = {IEEE Transactions on Image Processing}, year = {2014}, volume = {23}, number = {1}, pages = {250--263}}
-
Robust Image Recapture Detection Using a K-SVD Learning Approach to Train Dictionaries of Edge Profiles
Proc. IEEE Int. Conf. Image Processing (ICIP)
2014, pp. 5317-5321
DOI: 10.1109/ICIP.2014.7026076
BibTeX@inproceedings{Thongkamwitoon2014, author = {Thongkamwitoon, T. and Muammar, H. and Dragotti, P. L.}, title = {Robust Image Recapture Detection Using a K-SVD Learning Approach to Train Dictionaries of Edge Profiles}, booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)}, year = {2014}, pages = {5317--5321}}
-
Video Frame Copy-move Forgery Detection Based on Cellular Automata and Local Binary Patterns
Telecommunications (BIHTEL), 2014 X International Symposium on
2014, pp. 1-4
DOI: 10.1109/BIHTEL.2014.6987651
BibTeX@inproceedings{Tralic2014a, author = {Tralic, D. and Grgic, S. and Zovko-Cihlar, B.}, title = {Video Frame Copy-move Forgery Detection Based on Cellular Automata and Local Binary Patterns}, booktitle = {Telecommunications (BIHTEL), 2014 X International Symposium on}, year = {2014}, pages = {1--4}}
-
Copy-move Forgery Detection Using Cellular Automata
Rosin, P., Adamatzky, A. & Sun, X. (ed.)
Cellular Automata in Image Processing and Geometry
Chapter Copy-Move Forgery Detection Using Cellular Automata
Springer, 2014, pp. 105-125
DOI: 10.1007/978-3-319-06431-4_6
BibTeX@inbook{Tralic2014, author = {Tralic, Dijana and Rosin, Paul and Sun, Xianfang and Grgic, Sonja}, title = {Copy-move Forgery Detection Using Cellular Automata}, booktitle = {Cellular Automata in Image Processing and Geometry}, publisher = {Springer}, year = {2014}, pages = {105--125}}
-
Detection of Duplicated Image Regions Using Cellular Automata
Systems, Signals and Image Processing (IWSSIP), 2014 International Conference on
2014, pp. 167-170
BibTeX@inproceedings{Tralic2014b, author = {Tralic, D. and Rosin, P. L. and Sun, Xianfang and Grgic, S.}, title = {Detection of Duplicated Image Regions Using Cellular Automata}, booktitle = {Systems, Signals and Image Processing (IWSSIP), 2014 International Conference on}, year = {2014}, pages = {167--170}}
-
Blind Inpainting Forgery Detection
Signal and Information Processing (GlobalSIP), 2014 IEEE Global Conference on
2014, pp. 1019-1023
DOI: 10.1109/GlobalSIP.2014.7032275
BibTeX@inproceedings{Trung2014, author = {Trung, Dang Thanh and Beghdadi, A. and Larabi, M.-C.}, title = {Blind Inpainting Forgery Detection}, booktitle = {Signal and Information Processing (GlobalSIP), 2014 IEEE Global Conference on}, year = {2014}, pages = {1019--1023}}
-
Detectability-quality Trade-off in JPEG Counter-forensics
Proc. IEEE Int. Conf. Image Processing (ICIP)
2014, pp. 5337-5341
DOI: 10.1109/ICIP.2014.7026080
BibTeX@inproceedings{Valenzise2014, author = {Valenzise, G. and Tagliasacchi, M. and Tubaro, S.}, title = {Detectability-quality Trade-off in JPEG Counter-forensics}, booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)}, year = {2014}, pages = {5337--5341}}
-
Detectability-quality trade-off in JPEG counter-forensics
Proc. IEEE Int. Conf. Image Processing (ICIP)
2014, pp. 5337-5341
DOI: 10.1109/ICIP.2014.7026080
BibTeX@inproceedings{Valenzise2014a, author = {Valenzise, G. and Tagliasacchi, M. and Tubaro, S.}, title = {Detectability-quality trade-off in JPEG counter-forensics}, booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)}, year = {2014}, pages = {5337--5341}}
-
A Feature-based Approach for Image Tampering Detection and Localization
Information Forensics and Security (WIFS), 2014 IEEE International Workshop on
2014, pp. 149-154
DOI: 10.1109/WIFS.2014.7084319
BibTeX@inproceedings{Verdoliva2014, author = {Verdoliva, L. and Cozzolino, D. and Poggi, G.}, title = {A Feature-based Approach for Image Tampering Detection and Localization}, booktitle = {Information Forensics and Security (WIFS), 2014 IEEE International Workshop on}, year = {2014}, pages = {149--154}}
-
A Fast Plain Copy-move Detection Algorithm Based on Structural Pattern and 2d Rabin-karp Rolling Hash
Image Analysis and Recognition, Springer, 2014
DOI: 10.1007/978-3-319-11758-4_50
BibTeX@article{Vladimirovich2014, author = {Vladimirovich, Kuznetsov Andrey and Valerievich, Myasnikov Vladislav}, title = {A Fast Plain Copy-move Detection Algorithm Based on Structural Pattern and 2d Rabin-karp Rolling Hash}, journal = {Image Analysis and Recognition}, publisher = {Springer}, year = {2014}}
-
Passive Video Forgery Detection Techniques: A Survey
Information Assurance and Security (IAS), 2014 10th International Conference on
2014, pp. 29-34
DOI: 10.1109/ISIAS.2014.7064616
BibTeX@inproceedings{Wahab2014, author = {Wahab, Ainuddin Wahid Abdul and Bagiwa, Mustapha Aminu and Idris, Mohd Yamani Idna and Khan, Suleman and Razak, Zaidi and Ariffin, Muhammad Rezal Kamel}, title = {Passive Video Forgery Detection Techniques: A Survey}, booktitle = {Information Assurance and Security (IAS), 2014 10th International Conference on}, year = {2014}, pages = {29--34}}
-
Countering anti-forensics to wavelet-based compression
Proc. IEEE Int. Conf. Image Processing (ICIP)
2014, pp. 5382-5386
DOI: 10.1109/ICIP.2014.7026089
BibTeX@inproceedings{Wang2014c, author = {Wang, M. and Chen, Z. and Fan, W. and Xiong, Z.}, title = {Countering anti-forensics to wavelet-based compression}, booktitle = {Proc. IEEE Int. Conf. Image Processing (ICIP)}, year = {2014}, pages = {5382--5386}}
-
Detection of Shifted Double JPEG Compression by an Adaptive DCT Coefficient Model
EURASIP Journal on Advances in Signal Processing, 2014, Vol. 2014(1), pp. 101
DOI: 10.1186/1687-6180-2014-101
BibTeX@article{Wang2014, author = {Wang, Shi-Lin and Liew, Alan Wee-Chung and Li, Sheng-Hong and Zhang, Yu-Jin and Li, Jian-Hua}, title = {Detection of Shifted Double JPEG Compression by an Adaptive DCT Coefficient Model}, journal = {EURASIP Journal on Advances in Signal Processing}, year = {2014}, volume = {2014}, number = {1}, pages = {101}}
-
Exploring DCT Coefficient Quantization Effects for Local Tampering Detection
Information Forensics and Security, IEEE Transactions on, 2014, Vol. 9(10), pp. 1653-1666
DOI: 10.1109/TIFS.2014.2345479
BibTeX@article{Wang2014a, author = {Wang, Wei and Dong, Jing and Tan, Tieniu}, title = {Exploring DCT Coefficient Quantization Effects for Local Tampering Detection}, journal = {Information Forensics and Security, IEEE Transactions on}, year = {2014}, volume = {9}, number = {10}, pages = {1653--1666}}
-
Identifying Video Forgery Process Using Optical Flow
Digital-Forensics and Watermarking, Springer, 2014
DOI: 10.1007/978-3-662-43886-2_18
BibTeX@article{Wang2014b, author = {Wang, Wan and Jiang, Xinghao and Wang, Shilin and Wan, Meng and Sun, Tanfeng}, title = {Identifying Video Forgery Process Using Optical Flow}, journal = {Digital-Forensics and Watermarking}, publisher = {Springer}, year = {2014}}
-
A Patch Analysis Method to Detect Seam Carved Images
Pattern Recognition Letters, 2014, Vol. 36(0), pp. 100-106
DOI: 10.1016/j.patrec.2013.09.026
BibTeX@article{Wei2014, author = {Wei, Jyh-Da and Lin, Yu-Ju and Wu, Yi-Jing}, title = {A Patch Analysis Method to Detect Seam Carved Images}, journal = {Pattern Recognition Letters}, year = {2014}, volume = {36}, number = {0}, pages = {100--106}}
-
Dual Tree Complex Wavelet Transform Approach to Copy-rotate-move Forgery Detection
Science China Information Sciences, Springer Berlin Heidelberg, 2014, Vol. 57(1), pp. 1-12
DOI: 10.1007/s11432-013-4823-8
BibTeX@article{Wu2014, author = {Wu, YunJie and Deng, Yu and Duan, HaiBin and Zhou, LinNa}, title = {Dual Tree Complex Wavelet Transform Approach to Copy-rotate-move Forgery Detection}, journal = {Science China Information Sciences}, publisher = {Springer Berlin Heidelberg}, year = {2014}, volume = {57}, number = {1}, pages = {1--12}}
-
Exposing video inter-frame forgery based on velocity field consistency
Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics
2014, pp. 2674-2678
DOI: 10.1109/ICASSP.2014.6854085
BibTeX@inproceedings{Wu2014a, author = {Wu, Y. and Jiang, X. and Sun, T. and Wang, W.}, title = {Exposing video inter-frame forgery based on velocity field consistency}, booktitle = {Proc. Speech and Signal Processing (ICASSP) 2014 IEEE Int. Conf. Acoustics}, year = {2014}, pages = {2674--2678}}
-
Image Splicing Detection Based on Machine Learning Algorithm
Wong, W. E. & Zhu, T. (ed.)
Computer Engineering and Networking
Springer International Publishing, 2014, Vol. 277, pp. 601-608
DOI: 10.1007/978-3-319-01766-2_69
BibTeX@incollection{Xiao2014, author = {Xiao, Yan}, title = {Image Splicing Detection Based on Machine Learning Algorithm}, booktitle = {Computer Engineering and Networking}, publisher = {Springer International Publishing}, year = {2014}, volume = {277}, pages = {601--608}}
-
Digital Image Identification Based on Generalized Gaussian Model
Proc. SPIE 9233, International Symposium on Photonics and Optoelectronics 2014
Proc. SPIE, 2014, Vol. 9233, pp. 923303-923303-6
DOI: 10.1117/12.2069695
BibTeX@inproceedings{Xing2014, author = {Xing, Nan and Wang, Jing and Zhang, Xiaolei and Zhang, Jingbo}, title = {Digital Image Identification Based on Generalized Gaussian Model}, booktitle = {Proc. SPIE 9233, International Symposium on Photonics and Optoelectronics 2014}, journal = {Proc. SPIE}, year = {2014}, volume = {9233}, pages = {923303-923303-6}}
-
Detecting Image Splicing Using Merged Features in Chroma Space
The Scientific World Journal, 2014, Vol. 2014
DOI: 10.1155/2014/262356
BibTeX@article{Xu2014, author = {Xu, Bo and Liu, Guangjie and Dai, Yuewei}, title = {Detecting Image Splicing Using Merged Features in Chroma Space}, journal = {The Scientific World Journal}, year = {2014}, volume = {2014}}
-
Feature Fusion for Blurring Detection in Image Forensics
IEICE TRANSACTIONS on Information and Systems, 2014, Vol. E97-D(6), pp. 1690-1693
BibTeX@article{Yang2014a, author = {Yang, Benjuan and Liu, Benyong}, title = {Feature Fusion for Blurring Detection in Image Forensics}, journal = {IEICE TRANSACTIONS on Information and Systems}, year = {2014}, volume = {E97-D}, number = {6}, pages = {1690--1693}}
-
Hiding the Trace of JPEG Compression History
Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on
2014, pp. 909-913
DOI: 10.1109/CSNT.2014.187
BibTeX@inproceedings{Yang2014, author = {Yang, Hong and Zhou, Zhiping}, title = {Hiding the Trace of JPEG Compression History}, booktitle = {Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on}, year = {2014}, pages = {909--913}}
-
An Effective Method for Detecting Double JPEG Compression with the Same Quantization Matrix
Information Forensics and Security, IEEE Transactions on, 2014, Vol. 9(11), pp. 1933-1942
DOI: 10.1109/TIFS.2014.2359368
BibTeX@article{Yang2014b, author = {Yang, Jianquan and Xie, Jin and Zhu, Guopu and Kwong, Sam and Shi, Yun-Qing}, title = {An Effective Method for Detecting Double JPEG Compression with the Same Quantization Matrix}, journal = {Information Forensics and Security, IEEE Transactions on}, year = {2014}, volume = {9}, number = {11}, pages = {1933--1942}}
-
Additive Noise Detection and Its Application to Audio Forensics
Asia-Pacific Signal and Information Processing Association, 2014 Annual Summit and Conference (APSIPA)
2014, pp. 1-5
DOI: 10.1109/APSIPA.2014.7041688
BibTeX@inproceedings{Yang2014c, author = {Yang, Rui}, title = {Additive Noise Detection and Its Application to Audio Forensics}, booktitle = {Asia-Pacific Signal and Information Processing Association, 2014 Annual Summit and Conference (APSIPA)}, year = {2014}, pages = {1--5}}
-
Tampering Detection and Content Recovery for Digital Images Using Halftone Mechanism
Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2014 Tenth International Conference on
2014, pp. 130-133
DOI: 10.1109/IIH-MSP.2014.39
BibTeX@inproceedings{Yang2014d, author = {Yang, Shanshan and Qin, Chuan and Qian, Zhenxing and Xu, Boqing}, title = {Tampering Detection and Content Recovery for Digital Images Using Halftone Mechanism}, booktitle = {Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2014 Tenth International Conference on}, year = {2014}, pages = {130--133}}
-
Forensics of Image Tampering Based on the Consistency of Illuminant Chromaticity
Asia-Pacific Signal and Information Processing Association, 2014 Annual Summit and Conference (APSIPA)
2014, pp. 1-4
DOI: 10.1109/APSIPA.2014.7041551
BibTeX@inproceedings{Yan-Li2014, author = {Yan-Li, Huang and Shao-Zhang, Niu and Jian-Cheng, Zou and Lin-Na, Zhou}, title = {Forensics of Image Tampering Based on the Consistency of Illuminant Chromaticity}, booktitle = {Asia-Pacific Signal and Information Processing Association, 2014 Annual Summit and Conference (APSIPA)}, year = {2014}, pages = {1--4}}
-
Forensics of image tampering based on the consistency of illuminant chromaticity
Proc. Asia-Pacific Signal and Information Processing Association Annual Summit and Conf. (APSIPA)
2014, pp. 1-4
DOI: 10.1109/APSIPA.2014.7041551
BibTeX@inproceedings{Yan-li2014, author = {Yan-li, H. and Shao-Zhang, N. and Jian-Cheng, Z. and Lin-Na, Z.}, title = {Forensics of image tampering based on the consistency of illuminant chromaticity}, booktitle = {Proc. Asia-Pacific Signal and Information Processing Association Annual Summit and Conf. (APSIPA)}, year = {2014}, pages = {1--4}}
-
Simplification and Analysis of Counter-attack Algorithm for Image Source Identification
JSCUT(Natural Science Edition), 2014
BibTeX@article{Yongjian2014, author = {Yong-Jian, Hu and Hua, Guan and Jing, Zhao and Bei-Bei, Liu}, title = {Simplification and Analysis of Counter-attack Algorithm for Image Source Identification}, journal = {JSCUT(Natural Science Edition)}, year = {2014}}
-
Copy-rotation-move Forgery Detection Using the MROGH Descriptor
Cloud Engineering (IC2E), 2014 IEEE International Conference on
2014, pp. 510-513
DOI: 10.1109/IC2E.2014.54
BibTeX@inproceedings{Yu2014b, author = {Yu, Liyang and Han, Qi and Niu, Xiamu}, title = {Copy-rotation-move Forgery Detection Using the MROGH Descriptor}, booktitle = {Cloud Engineering (IC2E), 2014 IEEE International Conference on}, year = {2014}, pages = {510--513}}
-
Camera Identification for Very Low Bit Rate Time Varying Quantization Noise Videos
Communication Systems, Networks & Digital Signal Processing (CSNDSP), 2014 9th International Symposium on
2014, pp. 208-212
DOI: 10.1109/CSNDSP.2014.6923826
BibTeX@inproceedings{Yu2014a, author = {Yu, Zitong and Lin, Lianshi and Ling, B. W.-K. and Ho, C. Y.-F. and Qing, Chunmei and Xu, Hailiang and Dai, Weihang and Liang, Yuming and Chen, Jiameng and Dai, Qingyun}, title = {Camera Identification for Very Low Bit Rate Time Varying Quantization Noise Videos}, booktitle = {Communication Systems, Networks & Digital Signal Processing (CSNDSP), 2014 9th International Symposium on}, year = {2014}, pages = {208--212}}
-
Single-view Recaptured Photo Detection Based on Hsv Color Space
Journal of Computational Information Systems, 2014, Vol. 10(8), pp. 3229-3236
BibTeX@article{Yu2014, author = {Yu, Zan and Wang, Rangding and Xin, Shiqing and Li, Wei and Wang, Jiaji}, title = {Single-view Recaptured Photo Detection Based on Hsv Color Space}, journal = {Journal of Computational Information Systems}, year = {2014}, volume = {10}, number = {8}, pages = {3229--3236}}
-
Adaptive Matching for Copy-move Forgery Detection
Information Forensics and Security (WIFS), 2014 IEEE International Workshop on
2014, pp. 119-124
DOI: 10.1109/WIFS.2014.7084314
BibTeX@inproceedings{Zandi2014, author = {Zandi, M. and Mahmoudi-Aznaveh, A. and Mansouri, A.}, title = {Adaptive Matching for Copy-move Forgery Detection}, booktitle = {Information Forensics and Security (WIFS), 2014 IEEE International Workshop on}, year = {2014}, pages = {119--124}}
-
Camera Source Identification Game with Incomplete Information
Digital-Forensics and Watermarking, Springer, 2014
DOI: 10.1007/978-3-662-43886-2_14
BibTeX@article{Zeng2014a, author = {Zeng, Hui and Kang, Xiangui}, title = {Camera Source Identification Game with Incomplete Information}, journal = {Digital-Forensics and Watermarking}, publisher = {Springer}, year = {2014}}
-
Countering Anti-forensics of Median Filtering
Acoustics, Speech and Signal Processing (ICASSP), 2014 IEEE International Conference on
2014, pp. 2704-2708
DOI: 10.1109/ICASSP.2014.6854091
BibTeX@inproceedings{Zeng2014, author = {Zeng, Hui and Qin, Tengfei and Kang, Xiangui and Liu, Li}, title = {Countering Anti-forensics of Median Filtering}, booktitle = {Acoustics, Speech and Signal Processing (ICASSP), 2014 IEEE International Conference on}, year = {2014}, pages = {2704--2708}}
-
Combined SIFT and Bi-coherence Features to Detect Image Forgery
Signal Processing (ICSP), 2014 12th International Conference on
2014, pp. 1859-1863
DOI: 10.1109/ICOSP.2014.7015314
BibTeX@inproceedings{Zhang2014d, author = {Zhang, Ju and Ruan, Qiuqi and Jin, Yi}, title = {Combined SIFT and Bi-coherence Features to Detect Image Forgery}, booktitle = {Signal Processing (ICSP), 2014 12th International Conference on}, year = {2014}, pages = {1859--1863}}
-
In-camera JPEG Compression Detection for Doubly Compressed Images
Multimedia Tools and Applications, Springer US, 2014, pp. 1-19
DOI: 10.1007/s11042-014-1868-7
BibTeX@article{Zhang2014a, author = {Zhang, Rong and Wang, Rang-Ding}, title = {In-camera JPEG Compression Detection for Doubly Compressed Images}, journal = {Multimedia Tools and Applications}, publisher = {Springer US}, year = {2014}, pages = {1--19}}
-
Blind Detection of Copy-move Forgery in Digital Images Based on Dyadic Wavelet Transform
Cai, S. Z., Zhang, Q. F., Xu, X. P., Hu, D. H. & Qu, Y. M. (ed.)
Chapter Chapter 7: Communication, Signal and Image Processing, Data Acquisition and Recognation Technologies
Advanced Materials Research, Trans Tech Publications, 2014, Vol. 989-994, pp. 4127-4131
DOI: 10.4028/www.scientific.net/AMR.989-994.4127
BibTeX@article{Zhang2014c, author = {Zhang, Rui Fang and Ye, Han Min and Song, Zi Hang and Wang, Min}, title = {Blind Detection of Copy-move Forgery in Digital Images Based on Dyadic Wavelet Transform}, journal = {Advanced Materials Research}, publisher = {Trans Tech Publications}, year = {2014}, volume = {989-994}, pages = {4127--4131}}
-
Revealing the Traces of Median Filtering Using High-order Local Ternary Patterns
IEEE Signal Processing Letters, 2014, Vol. 21(3), pp. 275-279
DOI: 10.1109/LSP.2013.2295858
BibTeX@article{Zhang2014e, author = {Zhang, Y. and Li, S. and Wang, S. and Shi, Y. Q.}, title = {Revealing the Traces of Median Filtering Using High-order Local Ternary Patterns}, journal = {IEEE Signal Processing Letters}, year = {2014}, volume = {21}, number = {3}, pages = {275--279}}
-
Blind Forensics of Median Filtering Based on Markov Statistics in Median-filtered Residual Domain
Zhang, B., Mu, J., Wang, W., Liang, Q. & Pi, Y. (ed.)
The Proceedings of the Second International Conference on Communications, Signal Processing, and Systems
Springer International Publishing, 2014, Vol. 246, pp. 179-186
DOI: 10.1007/978-3-319-00536-2_21
BibTeX@incollection{Zhang2014, author = {Zhang, Yujin and Zhao, Chenglin and Zhao, Feng and Li, Shenghong}, title = {Blind Forensics of Median Filtering Based on Markov Statistics in Median-filtered Residual Domain}, booktitle = {The Proceedings of the Second International Conference on Communications, Signal Processing, and Systems}, publisher = {Springer International Publishing}, year = {2014}, volume = {246}, pages = {179--186}}
-
Efficient Video Frame Insertion and Deletion Detection Based on Inconsistency of Correlations between Local Binary Pattern Coded Frames
Security and Communication Networks, 2014, pp. n/a-n/a
DOI: 10.1002/sec.981
BibTeX@article{Zhang2014b, author = {Zhang, Zhenzhen and Hou, Jianjun and Ma, Qinglong and Li, Zhaohong}, title = {Efficient Video Frame Insertion and Deletion Detection Based on Inconsistency of Correlations between Local Binary Pattern Coded Frames}, journal = {Security and Communication Networks}, year = {2014}, pages = {n/a--n/a}}
-
A Distributed Local Margin Learning Based Scheme for High-dimensional Feature Processing in Image Tampering Detection
Multimedia and Expo (ICME), 2014 IEEE International Conference on
2014, pp. 1-6
DOI: 10.1109/ICME.2014.6890238
BibTeX@inproceedings{Zhao2014a, author = {Zhao, Xudong and Li, Jianhua and Wang, Shilin and Li, Shenghong}, title = {A Distributed Local Margin Learning Based Scheme for High-dimensional Feature Processing in Image Tampering Detection}, booktitle = {Multimedia and Expo (ICME), 2014 IEEE International Conference on}, year = {2014}, pages = {1--6}}
-
Passive Image Splicing Detection by 2-D Noncausal Markov Model
Circuits and Systems for Video Technology, IEEE Transactions on, 2014(99)
DOI: 10.1109/TCSVT.2014.2347513
BibTeX@article{Zhao2014, author = {Zhao, X. and Wang, S. and Li, S. and Li, J.}, title = {Passive Image Splicing Detection by 2-D Noncausal Markov Model}, journal = {Circuits and Systems for Video Technology, IEEE Transactions on}, year = {2014}, number = {99}}
-
A Distributed Scheme for Image Splicing Detection
Digital-Forensics and Watermarking, Springer, 2014
DOI: 10.1007/978-3-662-43886-2_23
BibTeX@article{Zhao2014b, author = {Zhao, Xudong and Wang, Shilin and Li, Shenghong and Li, Jianhua and Lin, Xiang}, title = {A Distributed Scheme for Image Splicing Detection}, journal = {Digital-Forensics and Watermarking}, publisher = {Springer}, year = {2014}}
-
Detection Technology of Tampering Image Based on Harris Corner Points
Journal of Computational Information Systems, 2014, Vol. 10(4), pp. 1481-1488
BibTeX@article{Zheng2014, author = {Zheng, Jiming and Chang, Liping}, title = {Detection Technology of Tampering Image Based on Harris Corner Points}, journal = {Journal of Computational Information Systems}, year = {2014}, volume = {10}, number = {4}, pages = {1481--1488}}
-
Detection of Region-duplication Forgery in Image Based on Key Points' Binary Descriptors
Journal of Information & Computational Scien, 2014, Vol. 11, pp. 3959-3966
BibTeX@article{Zheng2014c, author = {Zheng, Jiming and Chang, Liping}, title = {Detection of Region-duplication Forgery in Image Based on Key Points' Binary Descriptors}, journal = {Journal of Information & Computational Scien}, year = {2014}, volume = {11}, pages = {3959--3966}}
-
Exposing Photo Manipulation Using Geometry and Shadows
Proc. SPIE 9159, Sixth International Conference on Digital Image Processing (ICDIP 2014)
Proc. SPIE, 2014, Vol. 9159, pp. 91591W-91591W-6
DOI: 10.1117/12.2064531
BibTeX@inproceedings{Zheng2014a, author = {Zheng, Jiangbin and Song, Xuemei and Ren, Jinchang and Zhu, Tingge}, title = {Exposing Photo Manipulation Using Geometry and Shadows}, booktitle = {Proc. SPIE 9159, Sixth International Conference on Digital Image Processing (ICDIP 2014)}, journal = {Proc. SPIE}, year = {2014}, volume = {9159}, pages = {91591W-91591W-6}}
-
Exposing Image Forgery by Detecting Traces of Feather Operation
2014
BibTeX@misc{Zheng2014b, author = {Zheng, Jiangbin and Zhu, Tingge and Li, Zhe and Xing, Weiwei and Ren, JinChang}, title = {Exposing Image Forgery by Detecting Traces of Feather Operation}, year = {2014}}
-
Resampling Tamper Detection Based on JPEG Double Compression
Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on
2014, pp. 914-918
DOI: 10.1109/CSNT.2014.188
BibTeX@inproceedings{Zhu2014, author = {Zhu, Dan and Zhou, Zhiping}, title = {Resampling Tamper Detection Based on JPEG Double Compression}, booktitle = {Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on}, year = {2014}, pages = {914--918}}
-
Image scaling factor estimation based on normalized energy density and learning to rank
Proc. Int Security, Pattern Analysis, and Cybernetics (SPAC) Conf
2014, pp. 197-202
DOI: 10.1109/SPAC.2014.6982684
BibTeX@inproceedings{Zhu2014a, author = {Zhu, N. and Gao, X. and Deng, C.}, title = {Image scaling factor estimation based on normalized energy density and learning to rank}, booktitle = {Proc. Int Security, Pattern Analysis, and Cybernetics (SPAC) Conf}, year = {2014}, pages = {197--202}}
-
DWT-SATs Based Detection of Image Region Cloning
International Journal of Physical, Natural Science and Engineering, 2014, Vol. 8(2)
BibTeX@article{Zimba2014, author = {Zimba, Michael}, title = {DWT-SATs Based Detection of Image Region Cloning}, journal = {International Journal of Physical, Natural Science and Engineering}, year = {2014}, volume = {8}, number = {2}}
-
Digital-Forensics and Watermarking
Shi, Y. Q., Kim, H. J. & Pérez-González, F. (ed.)
Springer Berlin Heidelberg, 2014
BibTeX@book{Shi2014a,, title = {Digital-Forensics and Watermarking}, publisher = {Springer Berlin Heidelberg}, year = {2014}}
2013
-
How Bright Is the Moon? Recovering and Using Absolute Luminance Values from Internet Images
Tominaga, S., Schettini, R. & Trémeau, A. (ed.)
Computational Color Imaging
Springer Berlin Heidelberg, 2013, Vol. 7786, pp. 90-104
DOI: 10.1007/978-3-642-36700-7_8
BibTeX@incollection{Ackermann2013, author = {Ackermann, Jens and Goesele, Michael}, title = {How Bright Is the Moon? Recovering and Using Absolute Luminance Values from Internet Images}, booktitle = {Computational Color Imaging}, publisher = {Springer Berlin Heidelberg}, year = {2013}, volume = {7786}, pages = {90--104}}
-
Counter-forensics of SIFT-based copy-move detection by means of keypoint classification
EURASIP Journal on Image and Video Processing, 2013, Vol. 2013(1), pp. 18
DOI: 10.1186/1687-5281-2013-18
BibTeX@article{Amerini2013b, author = {Amerini, Irene and Barni, Mauro and Caldelli, Roberto and Costanzo, Andrea}, title = {Counter-forensics of SIFT-based copy-move detection by means of keypoint classification}, journal = {EURASIP Journal on Image and Video Processing}, year = {2013}, volume = {2013}, number = {1}, pages = {18}}
-
Blind Fake Image detection
IJCSI International Journal of Computer Science Issues, 2013, Vol. 10(4-1), pp. 180-186
DOI: 10.1093/ietcom/e89-b.5.1726
BibTeX@article{Abbadi2013, author = {Abbadi}, title = {Blind Fake Image detection}, journal = {IJCSI International Journal of Computer Science Issues}, year = {2013}, volume = {10}, number = {4-1}, pages = {180--186}}
-
Temporal ICA based source extraction from dynamic image sequences with visual interference under noise
Industrial and Information Systems (ICIIS), 2013 8th IEEE International Conference on
2013, pp. 671-675
DOI: 10.1109/ICIInfS.2013.6732065
BibTeX@inproceedings{Abcyrathne2013, author = {Abcyrathne, K.A.B.S. and Wijesinghe, W.V.D. and Godaliyadda, G.M.R.I. and Ekanayake, M.P.B. and Wijayakulasooriya, J.V.}, title = {Temporal ICA based source extraction from dynamic image sequences with visual interference under noise}, booktitle = {Industrial and Information Systems (ICIIS), 2013 8th IEEE International Conference on}, year = {2013}, pages = {671--675}}
-
Digital Camera Image Formation: Introduction and Hardware
Sencar, H. T. & Memon, N. (ed.)
Digital Image Forensics
Springer New York, 2013, pp. 3-44
DOI: 10.1007/978-1-4614-0757-7_1
BibTeX@incollection{AdamsJr2013, author = {Adams Jr, James E. and Pillman, Bruce}, title = {Digital Camera Image Formation: Introduction and Hardware}, booktitle = {Digital Image Forensics}, publisher = {Springer New York}, year = {2013}, pages = {3--44}}
-
A Forensic Method for Detecting Image Forgery Using Codebook
International Journal of Advanced Research in Computer Science and Software Engineering, 2013
DOI: 10.1109/ice-ccn.2013.6528568
BibTeX@article{Agnes2013, author = {E. Agnes and S. Devi Mahalakshmi and K. Vijayalakshmi}, title = {A Forensic Method for Detecting Image Forgery Using Codebook}, journal = {International Journal of Advanced Research in Computer Science and Software Engineering}, year = {2013}}
-
Splicing image forgery detection based on DCT and Local Binary Pattern
Global Conference on Signal and Information Processing (GlobalSIP), 2013 IEEE
2013, pp. 253-256
DOI: 10.1109/GlobalSIP.2013.6736863
BibTeX@inproceedings{AlAhmadi2013, author = {Al Ahmadi, A.A. and Hussain, M. and Aboalsamh, H. and Muhammad, G. and Bebis, G.}, title = {Splicing image forgery detection based on DCT and Local Binary Pattern}, booktitle = {Global Conference on Signal and Information Processing (GlobalSIP), 2013 IEEE}, year = {2013}, pages = {253--256}}
-
Copy-Move Image Forgery Detection Using Local Binary Pattern and Neighborhood Clustering
Proceedings of the European Modeling Symposium (EMS), Manchester, UK, November 2013.
2013
DOI: 10.1109/ems.2013.43
BibTeX@inproceedings{AlSawadi2013, author = {Al Sawadi, Motasem and Ghulam Muhammad and Muhammad Hussain}, title = {Copy-Move Image Forgery Detection Using Local Binary Pattern and Neighborhood Clustering}, booktitle = {Proceedings of the European Modeling Symposium (EMS), Manchester, UK, November 2013.}, year = {2013}}
-
Splicing image forgery detection based on DCT and Local Binary Pattern
Proc. IEEE Global Conf. Signal and Information Processing (GlobalSIP)
2013, pp. 253-256
DOI: 10.1109/GlobalSIP.2013.6736863
BibTeX@inproceedings{Alahmadi2013, author = {A. A. Alahmadi and M. Hussain and H. Aboalsamh and G. Muhammad and G. Bebis}, title = {Splicing image forgery detection based on DCT and Local Binary Pattern}, booktitle = {Proc. IEEE Global Conf. Signal and Information Processing (GlobalSIP)}, year = {2013}, pages = {253--256}}
-
Curvelet Transform and Local Texture Based Image Forgery Detection
Advances in Visual Computing, Springer, 2013
DOI: 10.1007/978-3-642-41939-3_49
BibTeX@article{Al-Hammadi2013, author = {Al-Hammadi, Muneer H. and Muhammad, Ghulam and Hussain, Muhammad and Bebis, George}, title = {Curvelet Transform and Local Texture Based Image Forgery Detection}, journal = {Advances in Visual Computing}, publisher = {Springer}, year = {2013}}
-
Passive detection of copy-move forgery in digital images: State-of-the-art
Forensic Science International, 2013, Vol. 231(1-3), pp. 284-295
DOI: 10.1016/j.forsciint.2013.05.027
BibTeX@article{Al-Qershi2013, author = {Osamah M. Al-Qershi and Bee Ee Khoo}, title = {Passive detection of copy-move forgery in digital images: State-of-the-art}, journal = {Forensic Science International}, year = {2013}, volume = {231}, number = {1--3}, pages = {284--295}}
-
Copy-move forgery detection and localization by means of robust clustering with J-linkage
Signal Processing: Image Communication, Elsevier, 2013
DOI: 10.1016/j.image.2013.03.006
BibTeX@article{Amerini2013, author = {Amerini, Irene and Ballan, Lamberto and Caldelli, Roberto and Del Bimbo, Alberto and Del Tongo, Luca and Serra, Giuseppe}, title = {Copy-move forgery detection and localization by means of robust clustering with J-linkage}, journal = {Signal Processing: Image Communication}, publisher = {Elsevier}, year = {2013}}
-
SIFT keypoint removal and injection for countering matching-based image forensics
Proceedings of the first ACM workshop on Information hiding and multimedia security
ACM, 2013, pp. 123-130
DOI: 10.1145/2482513.2482524
BibTeX@inproceedings{Amerini2013a, author = {Amerini, Irene and Barni, Mauro and Caldelli, Roberto and Costanzo, Andrea}, title = {SIFT keypoint removal and injection for countering matching-based image forensics}, booktitle = {Proceedings of the first ACM workshop on Information hiding and multimedia security}, publisher = {ACM}, year = {2013}, pages = {123--130}}
-
Removal and Injection of Keypoints for Sift-based Copy-move Counter-forensics
EURASIP Journal on Information Security, 2013
DOI: 10.1186/1687-417x-2013-8
BibTeX@article{Amerini2013c, author = {Irene Amerini and Mauro Barni and Roberto Caldelli and Andrea Costanzo}, title = {Removal and Injection of Keypoints for Sift-based Copy-move Counter-forensics}, journal = {EURASIP Journal on Information Security}, year = {2013}}
-
CHILD: A robust Computationally-Efficient Histogram-based Image Local Descriptor
Proc. Fourth National Conf. Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG)
2013, pp. 1-5
DOI: 10.1109/NCVPRIPG.2013.6776154
BibTeX@inproceedings{Anamandra2013, author = {S. H. Anamandra and V. Chandrasekaran}, title = {CHILD: A robust Computationally-Efficient Histogram-based Image Local Descriptor}, booktitle = {Proc. Fourth National Conf. Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG)}, year = {2013}, pages = {1--5}}
-
Auto White Balancing and comparison of Support Vector Machine and neural network classifiers in prediction of source camera
Control Communication and Computing (ICCC), 2013 International Conference on
2013, pp. 96-101
DOI: 10.1109/ICCC.2013.6731631
BibTeX@inproceedings{Arathy2013, author = {S Arathy and Vidyadharan, Divya S and Balan C and Sobha T}, title = {Auto White Balancing and comparison of Support Vector Machine and neural network classifiers in prediction of source camera}, booktitle = {Control Communication and Computing (ICCC), 2013 International Conference on}, year = {2013}, pages = {96--101}}
-
Method for detection of image tampering and partial recovery
Computer Science and Information Technologies (CSIT), 2013
2013, pp. 1-6
DOI: 10.1109/CSITechnol.2013.6710350
BibTeX@inproceedings{Asatryan2013, author = {Asatryan, D. and Asatryan, N. and Lanina, N. and Petrosyan, A.}, title = {Method for detection of image tampering and partial recovery}, booktitle = {Computer Science and Information Technologies (CSIT), 2013}, year = {2013}, pages = {1--6}}
-
AP News Values & Principles
2013
BibTeX@electronic{AssociatedPress2013, author = {Associated-Press, }, title = {AP News Values & Principles}, year = {2013}}
-
Analysis of DQT and DHT in JPEG Files
International Journal of Information Technology and Computer Science ( IJITCS ), 2013
BibTeX@article{Azhan2013, author = {Nor Amira Nor Azhan and Ikuesan R. Adeyemi and Shukor Abd Razak}, title = {Analysis of DQT and DHT in JPEG Files}, journal = {International Journal of Information Technology and Computer Science ( IJITCS )}, year = {2013}}
-
Counter-Forensics: Attacking Image Forensics
Sencar, H. T. & Memon, N. (ed.)
Digital Image Forensics
Springer Science mathplus Business Media, 2013, pp. 327-366
DOI: 10.1007/978-1-4614-0757-7_12
BibTeX@incollection{Boehme2013, author = {Rainer Böhme and Matthias Kirchner}, title = {Counter-Forensics: Attacking Image Forensics}, booktitle = {Digital Image Forensics}, publisher = {Springer Science mathplus Business Media}, year = {2013}, pages = {327--366}}
-
A jump patch-block match algorithm for multiple forgery detection
Automation, Computing, Communication, Control and Compressed Sensing (iMac4s), 2013 International Multi-Conference on
2013, pp. 723-728
DOI: 10.1109/iMac4s.2013.6526502
BibTeX@inproceedings{Department2013, author = {Bacchuwar, Ketan S and Ramakrishnan, K.R}, title = {A jump patch-block match algorithm for multiple forgery detection}, booktitle = {Automation, Computing, Communication, Control and Compressed Sensing (iMac4s), 2013 International Multi-Conference on}, year = {2013}, pages = {723--728}}
-
Splicing detection in out-of-focus blurred images
Information Forensics and Security (WIFS), 2013 IEEE International Workshop on
2013, pp. 144-149
DOI: 10.1109/WIFS.2013.6707809
BibTeX@inproceedings{Bahrami2013, author = {Bahrami, Khosro and Kot, Alex C. and Fan, Jiayuan}, title = {Splicing detection in out-of-focus blurred images}, booktitle = {Information Forensics and Security (WIFS), 2013 IEEE International Workshop on}, year = {2013}, pages = {144--149}}
-
A Universal Attack Against Histogram-Based Image Forensics
International Journal of Digital Crime and Forensics (IJDCF), 2013
DOI: 10.4018/jdcf.2013070103
BibTeX@article{Barni2013a, author = {Mauro Barni and Marco Fontani and Benedetta Tondi}, title = {A Universal Attack Against Histogram-Based Image Forensics}, journal = {International Journal of Digital Crime and Forensics (IJDCF)}, year = {2013}}
-
The Source Identification Game:an Information-Theoretic Perspective
IEEE Transactions on Information Forensics and Security, 2013
DOI: 10.1109/TIFS.2012.2237397
BibTeX@article{Barni2013, author = {Barni, Mauro and Tondi, Benedetta}, title = {The Source Identification Game:an Information-Theoretic Perspective}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2013}}
-
Detection of Temporal Interpolation In Video Sequences
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013, 2013
BibTeX@inproceedings{Bestagini2013, author = {Paolo Bestagini and Simone Battaglia and Simone Milani and Marco Tagliasacchi and Stefano Tubaro}, title = {Detection of Temporal Interpolation In Video Sequences}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013}, journal = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013}, year = {2013}}
-
Detecting video frame-rate up-conversion based on periodic properties of inter-frame similarity
Multimedia Tools and Applications, Springer US, 2013, Vol. -, pp. 1-15
DOI: 10.1007/s11042-013-1364-5
BibTeX@article{Bian2013, author = {Bian, Shan and Luo, Weiqi and Huang, Jiwu}, title = {Detecting video frame-rate up-conversion based on periodic properties of inter-frame similarity}, journal = {Multimedia Tools and Applications}, publisher = {Springer US}, year = {2013}, volume = {-}, pages = {1--15}}
-
Near optimal detection of quantized signals and application to JPEG forensics
Information Forensics and Security (WIFS), 2013 IEEE International Workshop on
2013, pp. 168-173
DOI: 10.1109/WIFS.2013.6707813
BibTeX@inproceedings{Bianchi2013, author = {Bianchi, Tiziano and Piva, Alessandro and Perez-Gonzalez, Fernando}, title = {Near optimal detection of quantized signals and application to JPEG forensics}, booktitle = {Information Forensics and Security (WIFS), 2013 IEEE International Workshop on}, year = {2013}, pages = {168--173}}
-
Analysis of Smartphone Model Identification using Digital Images
Proc. IEEE International Conference on Image Processing ICIP 2013
2013, pp. 4487-4491
BibTeX@inproceedings{Biney2013, author = {Akua Biney and Harin Sellahewa}, title = {Analysis of Smartphone Model Identification using Digital Images}, booktitle = {Proc. IEEE International Conference on Image Processing ICIP 2013}, year = {2013}, pages = {4487--4491}}
-
Digital image forgery detection using passive techniques: A survey
Digital Investigation, 2013, Vol. 10(3), pp. 226-245
DOI: 10.1016/j.diin.2013.04.007
BibTeX@article{Birajdar2013, author = {Gajanan K. Birajdar and Vijay H. Mankar}, title = {Digital image forgery detection using passive techniques: A survey}, journal = {Digital Investigation}, year = {2013}, volume = {10}, number = {3}, pages = {226--245}}
-
Blind Authentication of Resampled Images and Rescaling Factor Estimation
Cloud Ubiquitous Computing Emerging Technologies (CUBE), 2013 International Conference on
2013, pp. 112-116
DOI: 10.1109/CUBE.2013.28
BibTeX@inproceedings{Birajdar2013a, author = {Birajdar, Gajanan K. and Mankar, Vijay H.}, title = {Blind Authentication of Resampled Images and Rescaling Factor Estimation}, booktitle = {Cloud Ubiquitous Computing Emerging Technologies (CUBE), 2013 International Conference on}, year = {2013}, pages = {112--116}}
-
Camera Identification Algorithm Based on Sensor Pattern Noise Using Wavelet Transform, SVD / PCA and SVM Classifier
Journal of Information Systems and Telecommunication, 2013
BibTeX@article{Bolouri2013, author = {Kimia Bolouri and Mehdi Javanmard and Mohammad Firouzmand}, title = {Camera Identification Algorithm Based on Sensor Pattern Noise Using Wavelet Transform, SVD / PCA and SVM Classifier}, journal = {Journal of Information Systems and Telecommunication}, year = {2013}}
-
Bayesian learning of finite generalized inverted Dirichlet mixtures: Application to object classification and forgery detection
Expert Systems with Applications, 2013(0), pp. -
DOI: 10.1016/j.eswa.2013.09.030
BibTeX@article{Bourouis2013, author = {Sami Bourouis and Mohamed Al Mashrgy and Nizar Bouguila}, title = {Bayesian learning of finite generalized inverted Dirichlet mixtures: Application to object classification and forgery detection}, journal = {Expert Systems with Applications}, year = {2013}, number = {0}, pages = {-}}
-
Applied Image Processing Algorithms for Forensic Applications
Universita’ Degli Studi Di Catania, Universita’ Degli Studi Di Catania, 2013
BibTeX@phdthesis{Bruna2013, author = {Bruna, A.R.}, title = {Applied Image Processing Algorithms for Forensic Applications}, school = {Universita’ Degli Studi Di Catania}, year = {2013}}
-
Estimating EXIF Parameters Based on Noise Features for Image Manipulation Detection
IEEE Transactions on Information Forensics and Security, 2013, Vol. 8, pp. 608-618
DOI: 10.1109/TIFS.2013.2249064
BibTeX@article{Cao2013, author = {Cao, H. and Kot, A.C.}, title = {Estimating EXIF Parameters Based on Noise Features for Image Manipulation Detection}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2013}, volume = {8}, pages = {608--618}}
-
Exposing Digital Image Forgeries by Illumination Color Classification
IEEE Transactions on Information Forensics and Security, 2013, Vol. 8(7), pp. 1182-1194
DOI: 10.1109/TIFS.2013.2265677
BibTeX@article{Carvalho2013, author = {de Carvalho, T. and Riess, C. and Angelopoulou, E. and Pedrini, H. and Rocha, A. R.}, title = {Exposing Digital Image Forgeries by Illumination Color Classification}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2013}, volume = {8}, number = {7}, pages = {1182--1194}}
-
Copy move image forgery detection using mutual information
Computing, Communications and Networking Technologies (ICCCNT),2013 Fourth International Conference on
2013, pp. 1-4
DOI: 10.1109/ICCCNT.2013.6726743
BibTeX@inproceedings{Chakraborty2013, author = {Chakraborty, Somnath}, title = {Copy move image forgery detection using mutual information}, booktitle = {Computing, Communications and Networking Technologies (ICCCNT),2013 Fourth International Conference on}, year = {2013}, pages = {1--4}}
-
A confidence map and pixel-based weighted correlation for PRNU-based camera identification
Digital Investigation, Elsevier, 2013
BibTeX@article{Chan2013, author = {Chan, Lit-Hung and Law, Ngai-Fong and Siu, Wan-Chi}, title = {A confidence map and pixel-based weighted correlation for PRNU-based camera identification}, journal = {Digital Investigation}, publisher = {Elsevier}, year = {2013}}
-
Identifying Device Brand by Using Characteristics of Color Filter Array
Pan, J.-S., Yang, C.-N. & Lin, C.-C. (ed.)
Advances in Intelligent Systems and Applications - Volume 2
Springer Berlin Heidelberg, 2013, Vol. 21, pp. 349-358
DOI: 10.1007/978-3-642-35473-1_35
BibTeX@incollection{Chang2013, author = {Chang, Tang-You and Lin, Guo-Shiang and Tai, Shen-Chuan}, title = {Identifying Device Brand by Using Characteristics of Color Filter Array}, booktitle = {Advances in Intelligent Systems and Applications - Volume 2}, publisher = {Springer Berlin Heidelberg}, year = {2013}, volume = {21}, pages = {349--358}}
-
Blind Detection of Median Filtering in Digital Images: A Difference Domain Based Approach
Image Processing, IEEE Transactions on, 2013, Vol. PP(99), pp. 1-1
DOI: 10.1109/TIP.2013.2277814
BibTeX@article{Chen2013c, author = {Chen, C. and Ni, J. and Huang, J.}, title = {Blind Detection of Median Filtering in Digital Images: A Difference Domain Based Approach}, journal = {Image Processing, IEEE Transactions on}, year = {2013}, volume = {PP}, number = {99}, pages = {1--1}}
-
Blind Detection of Median Filtering in Digital Images: A Difference Domain Based Approach
IEEE_J_IP, 2013, Vol. 22(12), pp. 4699-4710
DOI: 10.1109/TIP.2013.2277814
BibTeX@article{Chen2013g, author = {C. Chen and J. Ni and J. Huang}, title = {Blind Detection of Median Filtering in Digital Images: A Difference Domain Based Approach}, journal = {IEEE_J_IP}, year = {2013}, volume = {22}, number = {12}, pages = {4699--4710}}
-
3 An Image region Description Method Based on Stap Sector Statistics and its Application in Image Copy-Rotate/Flip-Move Forgery Detection
Li, C.-T. (ed.)
Emerging Digital Forensics Application for Crime Detection, Prevention and Security
Chapter 3 An Image region Description Method Based on Stap Sector Statistics and its Application in Image Copy-Rotate/Flip-Move Forgery Detection
IGI Global, 2013, pp. 35-49
DOI: 10.4018/978-1-4666-4006-1.ch003
BibTeX@inbook{Chen2013d, author = {Likai Chen and Wei Lu and Jianqun Ni}, title = {3 An Image region Description Method Based on Stap Sector Statistics and its Application in Image Copy-Rotate/Flip-Move Forgery Detection}, booktitle = {Emerging Digital Forensics Application for Crime Detection, Prevention and Security}, publisher = {IGI Global}, year = {2013}, pages = {35--49}}
-
Region duplication detection based on Harris corner points and step sector statistics
Journal of Visual Communication and Image Representation, Elsevier, 2013, Vol. 24(3), pp. 244-254
DOI: 10.1016/j.jvcir.2013.01.008
BibTeX@article{Chen2013a, author = {Chen, Likai and Lu, Wei and Ni, Jiangqun and Sun, Wei and Huang, Jiwu}, title = {Region duplication detection based on Harris corner points and step sector statistics}, journal = {Journal of Visual Communication and Image Representation}, publisher = {Elsevier}, year = {2013}, volume = {24}, number = {3}, pages = {244--254}}
-
Countering Universal Image Tampering Detection with Histogram Restoration
Shi, Y., Kim, H.-J. & Pérez-González, F. (ed.)
Digital Forensics and Watermaking
Springer Berlin Heidelberg, 2013, Vol. 7809, pp. 282-289
DOI: 10.1007/978-3-642-40099-5_23
BibTeX@incollection{Chen2013b, author = {Chen, Luyi and Wang, Shilin and Li, Shenghong and Li, Jianhua}, title = {Countering Universal Image Tampering Detection with Histogram Restoration}, booktitle = {Digital Forensics and Watermaking}, publisher = {Springer Berlin Heidelberg}, year = {2013}, volume = {7809}, pages = {282--289}}
-
Video Source Identification in Lossy Wireless Networks
Department of Computer Science, University of California, Davis, CA 95616, Department of Computer Science, University of California, Davis, CA 95616, 2013
BibTeX@techreport{Chen2013, author = {Chen, S. and Pande, A. and Zeng, K. and Mohapatra, P.}, title = {Video Source Identification in Lossy Wireless Networks}, school = {Department of Computer Science, University of California, Davis, CA 95616}, year = {2013}}
-
What has been tampered? From a sparse manipulation perspective
Multimedia Signal Processing (MMSP), 2013 IEEE 15th International Workshop on
2013, pp. 123-128
DOI: 10.1109/MMSP.2013.6659275
BibTeX@inproceedings{Chen2013e, author = {Chen, Yi-Lei and Hsu, Chiou-Ting}, title = {What has been tampered? From a sparse manipulation perspective}, booktitle = {Multimedia Signal Processing (MMSP), 2013 IEEE 15th International Workshop on}, year = {2013}, pages = {123--128}}
-
Forensics of blurred images based on no-reference image quality assessment
Signal and Information Processing (ChinaSIP), 2013 IEEE China Summit & International Conference on
2013, pp. 437-441
DOI: 10.1109/ChinaSIP.2013.6625377
BibTeX@inproceedings{Chen2013f, author = {Zhipeng Chen and Yao Zhao and Rongrong Ni}, title = {Forensics of blurred images based on no-reference image quality assessment}, booktitle = {Signal and Information Processing (ChinaSIP), 2013 IEEE China Summit & International Conference on}, year = {2013}, pages = {437--441}}
-
PRNU-based forgery detection with regularity constraints and global optimization
Multimedia Signal Processing (MMSP), 2013 IEEE 15th International Workshop on
2013, pp. 236-241
DOI: 10.1109/MMSP.2013.6659294
BibTeX@inproceedings{Chierchia2013, author = {Giovann Chierchia and Poggi, Giovanni and Sansone, Carlo and Verdoliva, Luisa}, title = {PRNU-based forgery detection with regularity constraints and global optimization}, booktitle = {Multimedia Signal Processing (MMSP), 2013 IEEE 15th International Workshop on}, year = {2013}, pages = {236--241}}
-
Geo-positional Image Forensics through Scene-terrain Registration
Proceedings of the International Conference on Computer Vision Theory and Applications (VISIGRAPP 2013)
Scitepress, 2013
DOI: 10.5220/0004282300410047
BibTeX@conference{Chippendale2013, author = {Chippendale}, title = {Geo-positional Image Forensics through Scene-terrain Registration}, booktitle = {Proceedings of the International Conference on Computer Vision Theory and Applications (VISIGRAPP 2013)}, publisher = {Scitepress}, year = {2013}}
-
Estimation of color modification in digital images by CFA pattern change
Forensic Science International, 2013, Vol. -(0), pp. -
DOI: 10.1016/j.forsciint.2012.12.014
BibTeX@article{Choi2013, author = {Chang-Hee Choi and Hae-Yeoun Lee and Heung-Kyu Lee}, title = {Estimation of color modification in digital images by CFA pattern change}, journal = {Forensic Science International}, year = {2013}, volume = {-}, number = {0}, pages = {-}}
-
Concealability-rate-distortion Tradeoff In Image Compression Anti-forensics
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013
Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013, 2013, pp. 3063-3067
DOI: 10.1109/ICASSP.2013.6638221
BibTeX@inproceedings{Chu2013a, author = {Xiaoyu Chu and Matthew C. Stamm and Yan Chen, K. J. Ray Liu}, title = {Concealability-rate-distortion Tradeoff In Image Compression Anti-forensics}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013}, journal = {Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013}, year = {2013}, pages = {3063--3067}}
-
Exploiting reference images in exposing geometrical distortions
International Journal of Multimedia & Its Applications (IJMA), 2013, Vol. 5(3)
BibTeX@article{Ciptasari2013, author = {Ciptasari}, title = {Exploiting reference images in exposing geometrical distortions}, journal = {International Journal of Multimedia & Its Applications (IJMA)}, year = {2013}, volume = {5}, number = {3}}
-
Image Splicing Verification Based on Pixel-Based Alignment Method
Shi, Y., Kim, H.-J. & Pérez-González, F. (ed.)
Digital Forensics and Watermaking
Springer Berlin Heidelberg, 2013, Vol. 7809, pp. 198-212
DOI: 10.1007/978-3-642-40099-5_17
BibTeX@incollection{Ciptasari2013a, author = {Ciptasari, RimbaWhidiana and Rhee, Kyung-Hyune and Sakurai, Kouichi}, title = {Image Splicing Verification Based on Pixel-Based Alignment Method}, booktitle = {Digital Forensics and Watermaking}, publisher = {Springer Berlin Heidelberg}, year = {2013}, volume = {7809}, pages = {198--212}}
-
Quantization Lattice Estimation for Multimedia Forensics
Proc. IEEE International Conference on Image Processing ICIP 2013
2013, pp. 4462 - 4466
BibTeX@inproceedings{Comesana2013, author = {Pedro Comesana and Fernando Perez-Gonzalez and and Noelia Liste}, title = {Quantization Lattice Estimation for Multimedia Forensics}, booktitle = {Proc. IEEE International Conference on Image Processing ICIP 2013}, year = {2013}, pages = {4462 -- 4466}}
-
Optimal Counterforensics For Histogram-based Forensics
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013
Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013, 2013
DOI: 10.1109/icassp.2013.6638218
BibTeX@inproceedings{Comesana-Alfaro2013, author = {Pedro Comesaña-Alfaro and Fernando Pérez-González}, title = {Optimal Counterforensics For Histogram-based Forensics}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013}, journal = {Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013}, year = {2013}}
-
Joint detection of full-frame linear filtering and JPEG compression in digital images
2013
BibTeX@electronic{Conotter2013a, author = {Conotter, V and Comesana, P and Pérez-González, F}, title = {Joint detection of full-frame linear filtering and JPEG compression in digital images}, year = {2013}}
-
Forensic Analysis Of Full-frame Linearly Filtered Jpeg Images
Proc. IEEE International Conference on Image Processing ICIP 2013
2013, pp. 4517 - 4521
BibTeX@inproceedings{Conotter2013, author = {Valentina Conotter and Pedro Comesaña-Alfaro and Fernando Pérez-González}, title = {Forensic Analysis Of Full-frame Linearly Filtered Jpeg Images}, booktitle = {Proc. IEEE International Conference on Image Processing ICIP 2013}, year = {2013}, pages = {4517 -- 4521}}
-
Improved photo response non-uniformity (PRNU) based source camera identification
Forensic Science International, 2013, Vol. -(0), pp. -
DOI: 10.1016/j.forsciint.2012.12.018
BibTeX@article{Cooper2013, author = {Alan J. Cooper}, title = {Improved photo response non-uniformity (PRNU) based source camera identification}, journal = {Forensic Science International}, year = {2013}, volume = {-}, number = {0}, pages = {-}}
-
Source Smartphone Identification Using Sensor Pattern Noise and Wavelet Transform
The 5th International Conference on Imaging for Crime Detection and Prevention, 16th-17th December 2013, London, UK., 2013
BibTeX@article{Corripio2013, author = {Jocelin Rosales Corripio and Ana Lucila Sandoval Orozco and Luis Javier Garcıa Villalba and Julio Hernandez-Castro and Stuart James Gibson}, title = {Source Smartphone Identification Using Sensor Pattern Noise and Wavelet Transform}, journal = {The 5th International Conference on Imaging for Crime Detection and Prevention, 16th-17th December 2013, London, UK.}, year = {2013}}
-
Open Set Source Camera Attribution and Device Linking
Pattern Recognition Letters, 2013(0), pp. -
DOI: 10.1016/j.patrec.2013.09.006
BibTeX@article{deCosta2013, author = {Filipe O. de Costa and Ewerton Silva and Michael Eckmann and Walter J. Scheirer and Anderson Rocha}, title = {Open Set Source Camera Attribution and Device Linking}, journal = {Pattern Recognition Letters}, year = {2013}, number = {0}, pages = {-}}
-
Multiple Classifier Systems for Image Forgery Detection
Proc. of the International Conference on Image Analysis and Processing (ICIAP)
International Conference on Image Analysis and Processing (ICIAP), 2013
DOI: 10.1007/978-3-642-41184-7_27
BibTeX@inproceedings{Cozzolino2013, author = {D. Cozzolino and F. Gargiulo and C. Sansone and L. Verdoliva}, title = {Multiple Classifier Systems for Image Forgery Detection}, booktitle = {Proc. of the International Conference on Image Analysis and Processing (ICIAP)}, journal = {International Conference on Image Analysis and Processing (ICIAP)}, year = {2013}}
-
A novel framework for image forgery localization
arXiv.org, 2013
BibTeX@article{Cozzolino2013a, author = {Davide Cozzolino and Diego Gragnaniello and Luisa Verdoliva}, title = {A novel framework for image forgery localization}, journal = {arXiv.org}, year = {2013}}
-
Image forgery detection based on the fusion of machine learning and block-matching methods
arXiv.org, 2013
BibTeX@article{Cozzolino2013b, author = {Davide Cozzolino and Diego Gragnaniello and Luisa Verdoliva}, title = {Image forgery detection based on the fusion of machine learning and block-matching methods}, journal = {arXiv.org}, year = {2013}}
-
Rotation-Tolerant Camera Identification Using Optimal Tradeoff Circular Harmonic Function Correlation Filter
IEICE TRANSACTIONS on Information and Systems, 2013, Vol. E96-D(6), pp. 1394-1397
DOI: 10.1587/transinf.e96.d.1394
BibTeX@article{HYUN2013, author = {Dai-Kyung HYUN and Dae-Jin JUNG and Hae-Yeoun LEE and Heung-Kyu LEE}, title = {Rotation-Tolerant Camera Identification Using Optimal Tradeoff Circular Harmonic Function Correlation Filter}, journal = {IEICE TRANSACTIONS on Information and Systems}, year = {2013}, volume = {E96-D}, number = {6}, pages = {1394--1397}}
-
Counter-forensics of median filtering
Proc. IEEE 15th Int Multimedia Signal Processing (MMSP) Workshop
2013, pp. 260-265
DOI: 10.1109/MMSP.2013.6659298
BibTeX@inproceedings{Dang-Nguyen2013, author = {D. T. Dang-Nguyen and I. D. Gebru and V. Conotter and G. Boato and F. G. B. De Natale}, title = {Counter-forensics of median filtering}, booktitle = {Proc. IEEE 15th Int Multimedia Signal Processing (MMSP) Workshop}, year = {2013}, pages = {260--265}}
-
Analysis of Copy-Move Image Forgery Detection
IInternational Journal of Advanced Research in Computer Science and Electroic Engineering(IJARCSEE), 2013, Vol. 2(2)
BibTeX@article{Datta2013, author = {Unmukh Datta and Chetna Sharma}, title = {Analysis of Copy-Move Image Forgery Detection}, journal = {IInternational Journal of Advanced Research in Computer Science and Electroic Engineering(IJARCSEE)}, year = {2013}, volume = {2}, number = {2}}
-
Copy-move forgery detection using multiresolution local binary patterns
Forensic Science International, 2013, Vol. 231(1-3), pp. 61-72
DOI: 10.1016/j.forsciint.2013.04.023
BibTeX@article{Davarzani2013, author = {Reza Davarzani and Khashayar Yaghmaie and Saeed Mozaffari and Meysam Tapak}, title = {Copy-move forgery detection using multiresolution local binary patterns}, journal = {Forensic Science International}, year = {2013}, volume = {231}, number = {1--3}, pages = {61--72}}
-
Digital Camera Image Formation: Processing and Storage
Sencar, H. T. & Memon, N. (ed.)
Digital Image Forensics
Springer New York, 2013, pp. 45-78
BibTeX@incollection{Deever2013, author = {Aaron Deever and Mrityunjay Kumar and Bruce Pillman}, title = {Digital Camera Image Formation: Processing and Storage}, booktitle = {Digital Image Forensics}, publisher = {Springer New York}, year = {2013}, pages = {45--78}}
-
Image Splicing Detection via Demosaicking Inconsistency
2013
BibTeX@electronic{Deng2013, author = {Zhonghai Deng and Jingyuan Zhang and Yuguang Zeng}, title = {Image Splicing Detection via Demosaicking Inconsistency}, year = {2013}}
-
Digital Forensic Trends and Future
International Journal of Cyber-Security and Digital Forensics (IJCSDF), 2013, Vol. 2(2), pp. 48-76
BibTeX@article{Dezfoli2013, author = {Farhood Norouzizadeh Dezfoli and Ali Dehghantanha and Ramlan Mahmoud and Nor Fazlida Binti Mohd Sani and Farid Daryaba}, title = {Digital Forensic Trends and Future}, journal = {International Journal of Cyber-Security and Digital Forensics (IJCSDF)}, year = {2013}, volume = {2}, number = {2}, pages = {48--76}}
-
CASIA Image Tampering Detection Evaluation Database
2013 IEEE China Summit and International Conference on Signal and Information Processing
Institute of Electrical and Electronics Engineers (IEEE), 2013, pp. 422-426
DOI: 10.1109/chinasip.2013.6625374
BibTeX@inproceedings{Dong2013, author = {Jing Dong and Wei Wang}, title = {CASIA Image Tampering Detection Evaluation Database}, booktitle = {2013 IEEE China Summit and International Conference on Signal and Information Processing}, publisher = {Institute of Electrical and Electronics Engineers (IEEE)}, year = {2013}, pages = {422--426}}
-
A blind forgery detection scheme using image compatibility metrics
Industrial Electronics (ISIE), 2013 IEEE International Symposium on
2013, pp. 1-6
DOI: 10.1109/ISIE.2013.6563873
BibTeX@inproceedings{Doyoddorj2013, author = {M. Doyoddorj and Rhee, Kyung-Hyune}, title = {A blind forgery detection scheme using image compatibility metrics}, booktitle = {Industrial Electronics (ISIE), 2013 IEEE International Symposium on}, year = {2013}, pages = {1--6}}
-
Accurate and Robust Identifying Forged Region Method in Scanned Images
International Journal of Computer Applications, 2013, Vol. 83, pp. 40-47
BibTeX@article{Elsharkawy2013, author = {Elsharkawy, Zeinab F., Abdelwahab, Safey A., Elaraby, Sayed M., Dessouky, Moawad I., Abd El-Samie, Fathi E.}, title = {Accurate and Robust Identifying Forged Region Method in Scanned Images}, journal = {International Journal of Computer Applications}, year = {2013}, volume = {83}, pages = {40--47}}
-
Estimating EXIF Parameters Based on Noise Features for Image Manipulation Detection
Information Forensics and Security, IEEE Transactions on, IEEE, 2013, Vol. 8(4), pp. 608-618
DOI: 10.1109/TIFS.2013.2249064
BibTeX@article{Fan2013a, author = {Fan, Jiayuan and Cao, Hong and Kot, A}, title = {Estimating EXIF Parameters Based on Noise Features for Image Manipulation Detection}, journal = {Information Forensics and Security, IEEE Transactions on}, publisher = {IEEE}, year = {2013}, volume = {8}, number = {4}, pages = {608--618}}
-
A variational approach to JPEG anti-forensics
2013 IEEE International Conference on Acoustics, Speech and Signal Processing
Institute of Electrical & Electronics Engineers (IEEE), 2013
DOI: 10.1109/ICASSP.2013.6638220
BibTeX@inproceedings{Fan2013, author = {Fan, Wei and Wang, Kai and Cayre, François and Xiong, Zhang}, title = {A variational approach to JPEG anti-forensics}, booktitle = {2013 IEEE International Conference on Acoustics, Speech and Signal Processing}, publisher = {Institute of Electrical & Electronics Engineers (IEEE)}, year = {2013}}
-
Active Content Fingerprinting: Shrinkage And Lattice Based Modulations
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013
Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013, 2013
DOI: 10.1109/icassp.2013.6638223
BibTeX@inproceedings{Farhadzadeh2013, author = {Farzad Farhadzadeh and Sviatoslav Voloshynovskiy and Taras Holotyak and Fokko Beekhof}, title = {Active Content Fingerprinting: Shrinkage And Lattice Based Modulations}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013}, journal = {Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013}, year = {2013}}
-
Detection and estimation of contrast enhancement in double compressed images
Proceedings of the 2013 IEEE International Workshop on Multimedia Signal Processing (MMSP 2013)
2013
BibTeX@inproceedings{Ferrara2013, author = {Ferrara, Pasquale and Bianchi, Tiziano and De Rosa, Alessia and Piva, Alessandro}, title = {Detection and estimation of contrast enhancement in double compressed images}, booktitle = {Proceedings of the 2013 IEEE International Workshop on Multimedia Signal Processing (MMSP 2013)}, year = {2013}}
-
Reverse engineering of double compressed images in the presence of contrast enhancement
Multimedia Signal Processing (MMSP), 2013 IEEE 15th International Workshop on
2013, pp. 141-146
DOI: 10.1109/MMSP.2013.6659278
BibTeX@inproceedings{Ferrara2013a, author = {Ferrara, Pasquale and Bianchi, Tiziano and De Rosa, Alessia and Piva, Alessandro}, title = {Reverse engineering of double compressed images in the presence of contrast enhancement}, booktitle = {Multimedia Signal Processing (MMSP), 2013 IEEE 15th International Workshop on}, year = {2013}, pages = {141--146}}
-
Forensic analysis of interdependencies between vignetting and radial lens distortion
IS&T/SPIE Electronic Imaging
2013, pp. 86650D-86650D
BibTeX@inproceedings{Fischer2013, author = {Fischer, André and Gloe, Thomas}, title = {Forensic analysis of interdependencies between vignetting and radial lens distortion}, booktitle = {IS&T/SPIE Electronic Imaging}, year = {2013}, pages = {86650D--86650D}}
-
A Forensic Tool for Investigating Image Forgeries
International Journal of Digital Crime and Forensics (IJDCF), IGI Global, 2013, Vol. 5(4), pp. 15-33
DOI: 10.4018/ijdcf.2013100102
BibTeX@article{Fontani2013a, author = {Marco Fontani}, title = {A Forensic Tool for Investigating Image Forgeries}, journal = {International Journal of Digital Crime and Forensics (IJDCF)}, publisher = {IGI Global}, year = {2013}, volume = {5}, number = {4}, pages = {15--33}}
-
The watchful forensic analyst: Multi-clue information fusion with background knowledge
Information Forensics and Security (WIFS), 2013 IEEE International Workshop on
2013, pp. 120-125
DOI: 10.1109/WIFS.2013.6707805
BibTeX@inproceedings{Fontani2013b, author = {Fontani, M. and Argones-Rua, E. and Troncoso, C. and Barni, M.}, title = {The watchful forensic analyst: Multi-clue information fusion with background knowledge}, booktitle = {Information Forensics and Security (WIFS), 2013 IEEE International Workshop on}, year = {2013}, pages = {120--125}}
-
A Framework for Decision Fusion in Image Forensics based on Dempster-Shafer Theory of Evidence
IEEE Transactions on Information Forensics and Security, 2013, Vol. -, pp. -
DOI: 10.1109/TIFS.2013.2248727
BibTeX@article{Fontani2013, author = {Fontani, M and Bianchi, Tiziano and De Rosa, Alessia and Piva, Alessandro and Barni, M.}, title = {A Framework for Decision Fusion in Image Forensics based on Dempster-Shafer Theory of Evidence}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2013}, volume = {-}, pages = {-}}
-
Sensor Defects in Digital Image Forensic
Sencar, H. T. & Memon, N. (ed.)
Digital Image Forensics
Springer Science mathplus Business Media, 2013, pp. 179-218
DOI: 10.1007/978-1-4614-0757-7_6
BibTeX@incollection{Fridrich2013, author = {Jessica Fridrich}, title = {Sensor Defects in Digital Image Forensic}, booktitle = {Digital Image Forensics}, publisher = {Springer Science mathplus Business Media}, year = {2013}, pages = {179--218}}
-
First Quantization Coefficient Extraction from Double Compressed JPEG Images
Petrosino, A. (ed.)
Image Analysis and Processing -- ICIAP 2013
Springer Berlin Heidelberg, 2013, Vol. 8156, pp. 783-792
DOI: 10.1007/978-3-642-41181-6_79
BibTeX@incollection{Galvan2013, author = {Galvan, Fausto and Puglisi, Giovanni and Bruna, ArcangeloR. and Battiato, Sebastiano}, title = {First Quantization Coefficient Extraction from Double Compressed JPEG Images}, booktitle = {Image Analysis and Processing -- ICIAP 2013}, publisher = {Springer Berlin Heidelberg}, year = {2013}, volume = {8156}, pages = {783--792}}
-
A Detection Algorithm for Image Copy-move Forgery Based on Improved Circular Projection Matching and PCA
Sensors & Transducers, 2013, Vol. 159(11), pp. 19-25
BibTeX@article{Gan2013, author = {Yanfen Gan and Jing Cang}, title = {A Detection Algorithm for Image Copy-move Forgery Based on Improved Circular Projection Matching and PCA}, journal = {Sensors & Transducers}, year = {2013}, volume = {159}, number = {11}, pages = {19--25}}
-
Automatic Tampering Detection in Spliced Images with Different Compression Levels
Sanches, J., Micó, L. & Cardoso, J. (ed.)
Pattern Recognition and Image Analysis
Springer Science mathplus Business Media, 2013, Vol. 7887, pp. 416-423
DOI: 10.1007/978-3-642-38628-2_49
BibTeX@incollection{Garcia-Ordas2013, author = {Diego Garc\ia-Ordás and Laura Fernández-Robles and Enrique Alegre and Mar\ia Teresa Garc\ia-Ordás and Oscar Garc\ia-Olalla}, title = {Automatic Tampering Detection in Spliced Images with Different Compression Levels}, booktitle = {Pattern Recognition and Image Analysis}, publisher = {Springer Science mathplus Business Media}, year = {2013}, volume = {7887}, pages = {416--423}}
-
Automatic Tampering Detection in Spliced Images with Different Compression Levels
Pattern Recognition and Image Analysis
Springer, 2013, pp. 416-423
DOI: 10.1007/978-3-642-38628-2_49
BibTeX@incollection{Garcia-Ordas2013a, author = {Diego Garc\ia-Ordás and Laura Fernández-Robles and Enrique Alegre and Mar\ia Teresa Garc\ia-Ordás and Oscar Garc\ia-Olalla}, title = {Automatic Tampering Detection in Spliced Images with Different Compression Levels}, booktitle = {Pattern Recognition and Image Analysis}, publisher = {Springer}, year = {2013}, pages = {416--423}}
-
Automatic Tampering Detection in Spliced Images with Different Compression Levels
Pattern Recognition and Image Analysis
Pattern Recognition and Image Analysis, Springer, 2013, pp. 416-423
DOI: 10.1007/978-3-642-38628-2_49
BibTeX@article{Garcia-Ordas2013b, author = {Diego Garc\ia-Ordás and Laura Fernández-Robles and Enrique Alegre and Mar\ia Teresa Garc\ia-Ordás and Oscar Garc\ia-Olalla}, title = {Automatic Tampering Detection in Spliced Images with Different Compression Levels}, booktitle = {Pattern Recognition and Image Analysis}, journal = {Pattern Recognition and Image Analysis}, publisher = {Springer}, year = {2013}, pages = {416--423}}
-
The effects of switching the camera module from BlackBerry Curve 9360 devices
Digital Investigation, 2013, Vol. -(0), pp. -
DOI: 10.1016/j.diin.2013.01.007
BibTeX@article{Gisolf2013a, author = {Floris Gisolf and Zeno Geradts and Dennie Verhoeven and Coert Klaver}, title = {The effects of switching the camera module from BlackBerry Curve 9360 devices}, journal = {Digital Investigation}, year = {2013}, volume = {-}, number = {0}, pages = {-}}
-
Improving source camera identification using a simplified total variation based noise removal algorithm
Digital Investigation, 2013(0), pp. -
DOI: 10.1016/j.diin.2013.08.002
BibTeX@article{Gisolf2013, author = {Floris Gisolf and Anwar Malgoezar and Teun Baar and Zeno Geradts}, title = {Improving source camera identification using a simplified total variation based noise removal algorithm}, journal = {Digital Investigation}, year = {2013}, number = {0}, pages = {-}}
-
Noise Estimation Using Filtering and SVD for Image Tampering Detection
International Journal of Engineering Science and Innovative Technology (IJESIT), 2013
BibTeX@article{Gokhale2013, author = {U. M. Gokhale and Y.V.Joshi}, title = {Noise Estimation Using Filtering and SVD for Image Tampering Detection}, journal = {International Journal of Engineering Science and Innovative Technology (IJESIT)}, year = {2013}}
-
Sensor Fingerprint Digests for Fast Camera Identification from Geometrically Distorted Images
Department of ECE, SUNY Binghamton, NY, USA, Department of ECE, SUNY Binghamton, NY, USA, 2013
BibTeX@techreport{Goljan2013, author = {Goljan, Miroslav and Fridrich, Jessica}, title = {Sensor Fingerprint Digests for Fast Camera Identification from Geometrically Distorted Images}, school = {Department of ECE, SUNY Binghamton, NY, USA}, year = {2013}}
-
Forensic Video Analysis
Proceedings of the17th Interpol International Forensic Science Managers Symposium, Lyon
2013, pp. 638-651
BibTeX@inproceedings{Graves2013, author = {Matthew E. Graves}, title = {Forensic Video Analysis}, booktitle = {Proceedings of the17th Interpol International Forensic Science Managers Symposium, Lyon}, year = {2013}, pages = {638--651}}
-
Detecting Copy Move Forgery In Digital Images
International Journal of Engineering Research and Applications (IJERA), 2013, Vol. 3(4), pp. 94-97
BibTeX@article{Gupta2013, author = {Ashima Gupta and Nisheeth Saxena and S.K. Vasistha}, title = {Detecting Copy Move Forgery In Digital Images}, journal = {International Journal of Engineering Research and Applications (IJERA)}, year = {2013}, volume = {3}, number = {4}, pages = {94--97}}
-
Detecting Copy move Forgery using DCT
International Journal of Scientific and Research Publications, 2013
BibTeX@article{Gupta2013a, author = {Ashima Gupta and Nisheeth Saxena and S.K Vasistha}, title = {Detecting Copy move Forgery using DCT}, journal = {International Journal of Scientific and Research Publications}, year = {2013}}
-
Document Forgery: The State of Art
International Journal of Research in Engineering and Technology (IJRET), 2013
BibTeX@article{Gupta2013b, author = {Surbhi Gupta and Parvinder S. Sandhu}, title = {Document Forgery: The State of Art}, journal = {International Journal of Research in Engineering and Technology (IJRET)}, year = {2013}}
-
Generalized Mixture Ratio Based Blind Image Separation
Signal Processing Letters, IEEE, 2013, Vol. 20(8), pp. 743-746
DOI: 10.1109/LSP.2013.2265274
BibTeX@article{Hara2013, author = {Hara, K. and Inoue, K. and Urahama, K.}, title = {Generalized Mixture Ratio Based Blind Image Separation}, journal = {Signal Processing Letters, IEEE}, year = {2013}, volume = {20}, number = {8}, pages = {743--746}}
-
Copy move forgery detection using DWT and SIFT features
Intelligent Systems Design and Applications (ISDA), 2013 13th International Conference on
2013, pp. 188-193
DOI: 10.1109/ISDA.2013.6920733
BibTeX@inproceedings{Hashmi2013, author = {Hashmi, M.F. and Hambarde, A.R. and Keskar, A.G.}, title = {Copy move forgery detection using DWT and SIFT features}, booktitle = {Intelligent Systems Design and Applications (ISDA), 2013 13th International Conference on}, year = {2013}, pages = {188--193}}
-
Exposing Copy-move Forgeries Based on a Dimension-reduced Sift Method
Information Technology Journal, 2013, Vol. 12(14), pp. 2975-2979
BibTeX@article{He2013, author = {He}, title = {Exposing Copy-move Forgeries Based on a Dimension-reduced Sift Method}, journal = {Information Technology Journal}, year = {2013}, volume = {12}, number = {14}, pages = {2975--2979}}
-
Measuring Luminance with a Digital Camera: Case History
Syscomp Electronic Design Limited, Syscomp Electronic Design Limited, 2013
BibTeX@techreport{Hiscocks2013, author = {Peter D. Hiscocks}, title = {Measuring Luminance with a Digital Camera: Case History}, school = {Syscomp Electronic Design Limited}, year = {2013}}
-
Fogery image splicing detection by abnormal prediction features
Mechatronics and Automation (ICMA), 2013 IEEE International Conference on
2013, pp. 1394-1398
DOI: 10.1109/ICMA.2013.6618117
BibTeX@inproceedings{Hou2013a, author = {Jun Hou and Shi, Haojie and Cheng, Yan and Li, Ran}, title = {Fogery image splicing detection by abnormal prediction features}, booktitle = {Mechatronics and Automation (ICMA), 2013 IEEE International Conference on}, year = {2013}, pages = {1394--1398}}
-
Image resampling detection based on texture classification
Multimedia Tools and Applications, Springer US, 2013, pp. 1-28
DOI: 10.1007/s11042-013-1466-0
BibTeX@article{Hou2013, author = {Hou, Xiaodan and Zhang, Tao and Xiong, Gang and Zhang, Yan and Ping, Xin}, title = {Image resampling detection based on texture classification}, journal = {Multimedia Tools and Applications}, publisher = {Springer US}, year = {2013}, pages = {1--28}}
-
Digital image forgery detection on artificially blurred images
Emerging Trends in Communication, Control, Signal Processing & Computing Applications (C2SPCA), 2013 International Conference on
2013, pp. 1-5
DOI: 10.1109/C2SPCA.2013.6749392
BibTeX@inproceedings{Hrudya2013, author = {Hrudya, P. and Nair, L.S. and Adithya, S.M. and Unni, R. and Priya, V.H. and Poornachandran, P.}, title = {Digital image forgery detection on artificially blurred images}, booktitle = {Emerging Trends in Communication, Control, Signal Processing & Computing Applications (C2SPCA), 2013 International Conference on}, year = {2013}, pages = {1--5}}
-
JPEG forensics scheme for signature embedding and packet-level detection
International Journal of Communication Systems, 2013, pp. n/a-n/a
DOI: 10.1002/dac.2547
BibTeX@article{Hsieh2013, author = {Hsieh, Che-Jen and Weng, Chi-Tien and Li, Jung-Shian}, title = {JPEG forensics scheme for signature embedding and packet-level detection}, journal = {International Journal of Communication Systems}, year = {2013}, pages = {n/a--n/a}}
-
An Improved RANSAC Algorithm of Color Image Stitching
Proceedings of 2013 Chinese Intelligent Automation Conference
Springer, 2013
DOI: 10.1007/978-3-642-38466-0_3
BibTeX@incollection{Huang2013, author = {Huang, Weijie and Han, Xiaowei}, title = {An Improved RANSAC Algorithm of Color Image Stitching}, booktitle = {Proceedings of 2013 Chinese Intelligent Automation Conference}, publisher = {Springer}, year = {2013}}
-
Image forgery detection using multi-resolution Weber local descriptors
EUROCON, 2013 IEEE
2013, pp. 1570-1577
DOI: 10.1109/EUROCON.2013.6625186
BibTeX@inproceedings{Hussain2013, author = {Hussain, M. and Muhammad, G. and Saleh, S. Q. and Mirza, A. M. and Bebis, G.}, title = {Image forgery detection using multi-resolution Weber local descriptors}, booktitle = {EUROCON, 2013 IEEE}, year = {2013}, pages = {1570--1577}}
-
Source camera identification based on interpolation via lens distortion correction
Australian Journal of Forensic Sciences, 2013, Vol. 0(0), pp. 1-13
DOI: 10.1080/00450618.2013.804946
BibTeX@article{Hwang2013, author = {Hwang, Min Gu and Park, Hyung Ju and Har, Dong Hwan}, title = {Source camera identification based on interpolation via lens distortion correction}, journal = {Australian Journal of Forensic Sciences}, year = {2013}, volume = {0}, number = {0}, pages = {1--13}}
-
Forgery Detection for Surveillance Video
The Era of Interactive Media
Springer New York, 2013, pp. 25-36
DOI: 10.1007/978-1-4614-3501-3_3
BibTeX@incollection{Hyun2013, author = {Hyun, Dai-Kyung and Lee, Min-Jeong and Ryu, Seung-Jin and Lee, Hae-Yeoun and Lee, Heung-Kyu}, title = {Forgery Detection for Surveillance Video}, booktitle = {The Era of Interactive Media}, publisher = {Springer New York}, year = {2013}, pages = {25--36}}
-
Detection of Upscale-Crop and Partial Manipulation in Surveillance Video Based on Sensor Pattern Noise
Sensors, 2013, pp. 12605-12631
DOI: 10.3390/s130912605
BibTeX@article{Hyun2013a, author = {Dai-Kyung Hyun and Seung-Jin Ryu and Hae-Yeoun Lee and Heung-Kyu Lee}, title = {Detection of Upscale-Crop and Partial Manipulation in Surveillance Video Based on Sensor Pattern Noise}, journal = {Sensors}, year = {2013}, pages = {12605--12631}}
-
Detection of copy-move forgery using Krawtchouk moment
Electrical and Electronics Engineering (ELECO), 2013 8th International Conference on
2013, pp. 311-314
DOI: 10.1109/ELECO.2013.6713851
BibTeX@inproceedings{Imamoglu2013, author = {Imamoglu, Mustafa Bilgehan and Ulutas, Guzin and Ulutas, Mustafa}, title = {Detection of copy-move forgery using Krawtchouk moment}, booktitle = {Electrical and Electronics Engineering (ELECO), 2013 8th International Conference on}, year = {2013}, pages = {311--314}}
-
Accurate and Robust Localization of Duplicated Region In Copy-move Image Forgery
Machine Vision and Applications, 2013, Vol. 25(2), pp. 451-457
DOI: 10.1007/s00138-013-0522-0
BibTeX@article{Jaberi2013, author = {Maryam Jaberi and George Bebis and Muhammad Hussain and Ghulam Muhammad}, title = {Accurate and Robust Localization of Duplicated Region In Copy-move Image Forgery}, journal = {Machine Vision and Applications}, year = {2013}, volume = {25}, number = {2}, pages = {451--457}}
-
Improving the detection and localization of duplicated regions in copy-move image forgery
Digital Signal Processing (DSP), 2013 18th International Conference on
2013, pp. 1-6
DOI: 10.1109/ICDSP.2013.6622700
BibTeX@inproceedings{Jaberi2013a, author = {Jaberi, M. and Bebis, G. and Hussain, M. and Muhammad, G.}, title = {Improving the detection and localization of duplicated regions in copy-move image forgery}, booktitle = {Digital Signal Processing (DSP), 2013 18th International Conference on}, year = {2013}, pages = {1--6}}
-
The Game of Countering JPEG Anti-forensics Based on the Noise Level Estimation
Proceedings of the APSIPA
2013
BibTeX@inproceedings{Jiang2013, author = {Yunwen Jiang and Hui Zeng and Xiangui Kang and Li Liu}, title = {The Game of Countering JPEG Anti-forensics Based on the Noise Level Estimation}, booktitle = {Proceedings of the APSIPA}, year = {2013}}
-
Detecting Doctored Images
Sencar, H. T. & Memon, N. (ed.)
Digital Image Forensics
Springer New York, 2013, pp. 257-274
BibTeX@incollection{Johnson2013, author = {Johnson, Micah K}, title = {Detecting Doctored Images}, booktitle = {Digital Image Forensics}, publisher = {Springer New York}, year = {2013}, pages = {257--274}}
-
Fuzzy based Image Forgery Localization Using Blocking Artifacts
International Journal of New Trends in Electronics and Communication (IJNTEC), 2013, Vol. 1(1), pp. 18 - 20
BibTeX@article{Karthikeyan2013, author = {K.Karthikeyan and R.Sowmya Lakshmi}, title = {Fuzzy based Image Forgery Localization Using Blocking Artifacts}, journal = {International Journal of New Trends in Electronics and Communication (IJNTEC)}, year = {2013}, volume = {1}, number = {1}, pages = {18 -- 20}}
-
A modified anti-forensic technique for removing detectable traces from digital images
Proc. Int Computer Communication and Informatics (ICCCI) Conf
2013, pp. 1-4
DOI: 10.1109/ICCCI.2013.6466109
BibTeX@inproceedings{Kaimal2013, author = {Kaimal, Athira B. and Manimurugan, S. and Anitha, J.}, title = {A modified anti-forensic technique for removing detectable traces from digital images}, booktitle = {Proc. Int Computer Communication and Informatics (ICCCI) Conf}, year = {2013}, pages = {1--4}}
-
A new technique for removing forensically detectable traces from digital images
Proc. 7th Int Intelligent Systems and Control (ISCO) Conf
2013, pp. 321-324
DOI: 10.1109/ISCO.2013.6481171
BibTeX@inproceedings{Kaimal2013a, author = {Kaimal, Athira B. and Manimurugan, S. and Rajivkumar, J. and Anitha}, title = {A new technique for removing forensically detectable traces from digital images}, booktitle = {Proc. 7th Int Intelligent Systems and Control (ISCO) Conf}, year = {2013}, pages = {321--324}}
-
Robust Median Filtering Forensics Using an Autoregressive Model
Information Forensics and Security, IEEE Transactions on, 2013, Vol. 8(9), pp. 1456-1468
DOI: 10.1109/TIFS.2013.2273394
BibTeX@article{Kang2013, author = {Kang, X. and Stamm, M.C. and Peng, A. and Liu, K.J.R.}, title = {Robust Median Filtering Forensics Using an Autoregressive Model}, journal = {Information Forensics and Security, IEEE Transactions on}, year = {2013}, volume = {8}, number = {9}, pages = {1456--1468}}
-
Detection of copy-move forgery using wavelet decomposition
Signal Processing and Communication (ICSC), 2013 International Conference on
2013, pp. 396-400
DOI: 10.1109/ICSPCom.2013.6719820
BibTeX@inproceedings{Kashyap2013, author = {Kashyap, Abhishek and Joshi, Shiv Dutt}, title = {Detection of copy-move forgery using wavelet decomposition}, booktitle = {Signal Processing and Communication (ICSC), 2013 International Conference on}, year = {2013}, pages = {396--400}}
-
Image Recapture Detection Using Multiple Features
International Journal of Multimedia and Ubiquitous Engineering, 2013
BibTeX@article{Ke2013, author = {Yongzhen Ke and Qingqing Shan and Fan Qin and Weidong Min}, title = {Image Recapture Detection Using Multiple Features}, journal = {International Journal of Multimedia and Ubiquitous Engineering}, year = {2013}}
-
Exposing photo manipulation with inconsistent shadows
ACM Trans. Graph., ACM, 2013, Vol. 32(3), pp. 28:1-28:12
DOI: 10.1145/2487228.2487236
BibTeX@article{Kee2013, author = {Kee, Eric and O'brien, James and Farid, Hany}, title = {Exposing photo manipulation with inconsistent shadows}, journal = {ACM Trans. Graph.}, publisher = {ACM}, year = {2013}, volume = {32}, number = {3}, pages = {28:1--28:12}}
-
Copy-move forgery detection in images via 2D-Fourier Transform
Telecommunications and Signal Processing (TSP), 2013 36th International Conference on
2013, pp. 813-816
DOI: 10.1109/TSP.2013.6614051
BibTeX@inproceedings{Ketenci2013, author = {Ketenci, S. and Ulutas, G.}, title = {Copy-move forgery detection in images via 2D-Fourier Transform}, booktitle = {Telecommunications and Signal Processing (TSP), 2013 36th International Conference on}, year = {2013}, pages = {813--816}}
-
Impeding forgers at photo inception
IS&T/SPIE Electronic Imaging
2013, pp. 866504-866504
BibTeX@inproceedings{Kirchner2013, author = {Kirchner, Matthias and Winkler, Peter and Farid, Hany}, title = {Impeding forgers at photo inception}, booktitle = {IS&T/SPIE Electronic Imaging}, year = {2013}, pages = {866504--866504}}
-
Image and Video Source Class Identi�?cation
Sencar, H. T. & Memon, N. (ed.)
Digital Image Forensics
Springer New York, 2013, pp. 157-179
BibTeX@incollection{Kot2013, author = {Alex C. Kot and Hong Cao}, title = {Image and Video Source Class Identi�?cation}, booktitle = {Digital Image Forensics}, publisher = {Springer New York}, year = {2013}, pages = {157--179}}
-
A fast DCT based method for copy move forgery detection
Image Information Processing (ICIIP), 2013 IEEE Second International Conference on
2013, pp. 649-654
DOI: 10.1109/ICIIP.2013.6707675
BibTeX@inproceedings{Kumar2013a, author = {Kumar, Sunil and Desai, Jagannath and Mukherjee, Shaktidev}, title = {A fast DCT based method for copy move forgery detection}, booktitle = {Image Information Processing (ICIIP), 2013 IEEE Second International Conference on}, year = {2013}, pages = {649--654}}
-
Suitability of Independent Component Analysis in Digital Image Forgery Detection
International Journal of Engineering and Technology, 2013, Vol. 5, pp. -
BibTeX@article{Kumar2013, author = {Kumar, Sunil and Desai, JV and Mukherjee, S and Das, PK}, title = {Suitability of Independent Component Analysis in Digital Image Forgery Detection}, journal = {International Journal of Engineering and Technology}, year = {2013}, volume = {5}, pages = {-}}
-
Image forgery detection for region duplication tampering
Multimedia and Expo (ICME), 2013 IEEE International Conference on
2013, pp. 1-6
DOI: 10.1109/ICME.2013.6607452
BibTeX@inproceedings{Kuo2013, author = {Tien-Ying Kuo and Yi-Chung Lo and Ssu-Neng Huang}, title = {Image forgery detection for region duplication tampering}, booktitle = {Multimedia and Expo (ICME), 2013 IEEE International Conference on}, year = {2013}, pages = {1--6}}
-
Case studies and further improvements on source camera identification
IS&T/SPIE Electronic Imaging
2013, pp. 86650C-86650C
BibTeX@inproceedings{Kurosawa2013, author = {Kurosawa, Kenji and Kuroki, Kenro and Tsuchiya, Ken�ichi and Igarashi, Naoaki and Akiba, Norimitsu}, title = {Case studies and further improvements on source camera identification}, booktitle = {IS&T/SPIE Electronic Imaging}, year = {2013}, pages = {86650C--86650C}}
-
Localization of Forgeries in MPEG-2 Video through GOP Size and DQ Analysis
Proceedings of the 2013 IEEE International Workshop on Multimedia Signal Processing (MMSP 2013)
2013
DOI: 10.1109/mmsp.2013.6659338
BibTeX@inproceedings{Labartino2013, author = {D. Labartino and T. Bianchi and A. De Rosa and M. Fontani and D. Vazquez-Padın and A. Piva and M. Barni}, title = {Localization of Forgeries in MPEG-2 Video through GOP Size and DQ Analysis}, booktitle = {Proceedings of the 2013 IEEE International Workshop on Multimedia Signal Processing (MMSP 2013)}, year = {2013}}
-
Block convergence in repeated transform coding: jpeg-100 forensics, carbon dating, and tamper detection
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013
Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013, 2013, pp. 3028-3032
DOI: 10.1109/icassp.2013.6638214
BibTeX@inproceedings{Lai2013, author = {Lai, ShiYue and Böhme, Rainer}, title = {Block convergence in repeated transform coding: jpeg-100 forensics, carbon dating, and tamper detection}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013}, journal = {Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013}, year = {2013}, pages = {3028--3032}}
-
Anti-Forensics for Unsharp Masking Sharpening in Digital Images
International Journal of Digital Crime and Forensics (IJDCF), 2013, Vol. 5(3)
DOI: 10.4018/jdcf.2013070104
BibTeX@article{Laijie2013, author = {Lu Laijie and Yang Gaobo and Xia Ming}, title = {Anti-Forensics for Unsharp Masking Sharpening in Digital Images}, journal = {International Journal of Digital Crime and Forensics (IJDCF)}, year = {2013}, volume = {5}, number = {3}}
-
A classifier framework for the detection of doctored images
Proc. Fourth National Conf. Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG)
2013, pp. 1-4
DOI: 10.1109/NCVPRIPG.2013.6776155
BibTeX@inproceedings{Lalitha2013a, author = {Lalitha M and H. Holalad and S. Rajput and Muktanidhi S D and U. Mudenagudi}, title = {A classifier framework for the detection of doctored images}, booktitle = {Proc. Fourth National Conf. Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG)}, year = {2013}, pages = {1--4}}
-
A classifier framework for the detection of doctored images
Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG), 2013 Fourth National Conference on
2013, pp. 1-4
DOI: 10.1109/NCVPRIPG.2013.6776155
BibTeX@inproceedings{Lalitha2013, author = {Lalitha, M. and Holalad, H. and Rajput, S. and Muktanidhi, S.D. and Mudenagudi, U.}, title = {A classifier framework for the detection of doctored images}, booktitle = {Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG), 2013 Fourth National Conference on}, year = {2013}, pages = {1--4}}
-
Image Sharpening for Efficient Source Camera Identification Based on Sensor Pattern Noise Estimation
Emerging Security Technologies (EST), 2013 Fourth International Conference on
2013, pp. 113-116
DOI: 10.1109/EST.2013.25
BibTeX@inproceedings{Lawgaly2013, author = {Lawgaly, A. and Khelifi, F. and Bouridane, A.}, title = {Image Sharpening for Efficient Source Camera Identification Based on Sensor Pattern Noise Estimation}, booktitle = {Emerging Security Technologies (EST), 2013 Fourth International Conference on}, year = {2013}, pages = {113--116}}
-
An Efficient Scheme for Detecting Copy-move Forged Images by Local Binary Patterns
Journal of Information Hiding and Multimedia Signal Processing, 2013, Vol. 4(1)
BibTeX@article{Li2013e, author = {Leida Li and Shushang Li and Hancheng Zhu and Shu-Chuan Chu and John F. Roddick and Jeng-Shyang Pan}, title = {An Efficient Scheme for Detecting Copy-move Forged Images by Local Binary Patterns}, journal = {Journal of Information Hiding and Multimedia Signal Processing}, year = {2013}, volume = {4}, number = {1}}
-
A robust approach to detect digital forgeries by exploring correlation patterns
Pattern Analysis and Applications, Springer-Verlag, 2013, Vol. -, pp. 1-15
DOI: 10.1007/s10044-013-0319-9
BibTeX@article{Li2013, author = {Li, Lu and Xue, Jianru and Wang, Xiaofeng and Tian, Lihua}, title = {A robust approach to detect digital forgeries by exploring correlation patterns}, journal = {Pattern Analysis and Applications}, publisher = {Springer-Verlag}, year = {2013}, volume = {-}, pages = {1--15}}
-
Detection of Region Duplication Forgery in Images under Affine Transforms
Proc. Ninth Int Intelligent Information Hiding and Multimedia Signal Processing Conf
2013, pp. 543-546
DOI: 10.1109/IIH-MSP.2013.140
BibTeX@inproceedings{Li2013f, author = {L. Li and W. Zhang and S. Li and J. S. Pan}, title = {Detection of Region Duplication Forgery in Images under Affine Transforms}, booktitle = {Proc. Ninth Int Intelligent Information Hiding and Multimedia Signal Processing Conf}, year = {2013}, pages = {543--546}}
-
Searching and Extracting Digital Image Evidence
Sencar, H. T. & Memon, N. (ed.)
Digital Image Forensics
Springer New York, 2013, pp. 123-156
BibTeX@incollection{Li2013a, author = {Qiming Li}, title = {Searching and Extracting Digital Image Evidence}, booktitle = {Digital Image Forensics}, publisher = {Springer New York}, year = {2013}, pages = {123--156}}
-
Visual Saliency and Extended Hidden Markov Model Based Approach for Image Splicing Detection
Applied Mechanics and Materials, 2013, Vol. 385 - 386, pp. 1466-1469
BibTeX@article{Li2013c, author = {Xiang Li and Xuan Jing Shen and Ying Da Lv and Hai Peng Chen}, title = {Visual Saliency and Extended Hidden Markov Model Based Approach for Image Splicing Detection}, journal = {Applied Mechanics and Materials}, year = {2013}, volume = {385 - 386}, pages = {1466--1469}}
-
Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching
Forensic Science International, Elsevier BV, 2013, Vol. 224(1-3), pp. 59-67
DOI: 10.1016/j.forsciint.2012.10.031
BibTeX@article{Li2013d, author = {Yuenan Li}, title = {Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching}, journal = {Forensic Science International}, publisher = {Elsevier BV}, year = {2013}, volume = {224}, number = {1-3}, pages = {59--67}}
-
Distinguishing Computer Graphics from Photographic Images Using Local Binary Patterns
Shi, Y., Kim, H.-J. & Pérez-González, F. (ed.)
Digital Forensics and Watermaking
Springer Berlin Heidelberg, 2013, Vol. 7809, pp. 228-241
DOI: 10.1007/978-3-642-40099-5_19
BibTeX@incollection{Li2013b, author = {Li, Zhaohong and Ye, Jingyu and Shi, YunQing}, title = {Distinguishing Computer Graphics from Photographic Images Using Local Binary Patterns}, booktitle = {Digital Forensics and Watermaking}, publisher = {Springer Berlin Heidelberg}, year = {2013}, volume = {7809}, pages = {228--241}}
-
A splicing image detecting metheod based on original image estimation
Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013)
2013
DOI: 10.2991/iccsee.2013.143
BibTeX@inproceedings{Liang2013, author = {Yun Yi Liang and Ying Wang}, title = {A splicing image detecting metheod based on original image estimation}, booktitle = {Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013)}, year = {2013}}
-
Video copy-move forgery detection and localization based on Tamura texture features
Image and Signal Processing (CISP), 2013 6th International Congress on
2013, Vol. 2, pp. 864-868
DOI: 10.1109/CISP.2013.6745286
BibTeX@inproceedings{Liao2013, author = {Sheng-Yang Liao and Tian-Qiang Huang}, title = {Video copy-move forgery detection and localization based on Tamura texture features}, booktitle = {Image and Signal Processing (CISP), 2013 6th International Congress on}, year = {2013}, volume = {2}, pages = {864--868}}
-
Passive Approach for Video Forgery Detection and Localization
Proc of the second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec2013) - Xianggang/Hong Kong
2013, pp. 107-112
BibTeX@inproceedings{Lin2013, author = {Cheng-Shain Lin and Jyh-Jong Tsay}, title = {Passive Approach for Video Forgery Detection and Localization}, booktitle = {Proc of the second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec2013) - Xianggang/Hong Kong}, year = {2013}, pages = {107--112}}
-
Exposing Image Forgery Through the Detection of Contrast Enhancement
ICIP
2013
BibTeX@inproceedings{Lin2013a, author = {X Lin and CT Li and Y Hu}, title = {Exposing Image Forgery Through the Detection of Contrast Enhancement}, booktitle = {ICIP}, year = {2013}}
-
A SIFT and local features based integrated method for copy-move attack detection in digital image
Information and Automation (ICIA), 2013 IEEE International Conference on
2013, pp. 865-869
DOI: 10.1109/ICInfA.2013.6720415
BibTeX@inproceedings{Liu2013b, author = {Bo Liu and Chi-Man Pun}, title = {A SIFT and local features based integrated method for copy-move attack detection in digital image}, booktitle = {Information and Automation (ICIA), 2013 IEEE International Conference on}, year = {2013}, pages = {865--869}}
-
Detection of JPEG double compression and identification of smartphone image source and post-capture manipulation
Applied Intelligence, Springer US, 2013, pp. 1-22
DOI: 10.1007/s10489-013-0430-z
BibTeX@article{Liu2013a, author = {Liu, Qingzhong and Cooper, PeterA. and Chen, Lei and Cho, Hyuk and Chen, Zhongxue and Qiao, Mengyu and Su, Yuting and Wei, Mingzhen and Sung, AndrewH.}, title = {Detection of JPEG double compression and identification of smartphone image source and post-capture manipulation}, journal = {Applied Intelligence}, publisher = {Springer US}, year = {2013}, pages = {1--22}}
-
Copy-Move Forgery Detection Using the MROGH
Journal of Computational Information Systems, 2013, Vol. 9(3), pp. 1071-1078
BibTeX@article{Liu2013, author = {Liu, Xiaoxia and Li, Feng and Xiang, Lingyun}, title = {Copy-Move Forgery Detection Using the MROGH}, journal = {Journal of Computational Information Systems}, year = {2013}, volume = {9}, number = {3}, pages = {1071--1078}}
-
Multiple Light Source Estimation in a Single Image
Computer Graphics Forum, 2013, pp. n/a-n/a
DOI: 10.1111/cgf.12195
BibTeX@article{Lopez-Moreno2013, author = {Lopez-Moreno, Jorge and Garces, Elena and Hadap, Sunil and Reinhard, Erik and Gutierrez, Diego}, title = {Multiple Light Source Estimation in a Single Image}, journal = {Computer Graphics Forum}, year = {2013}, pages = {n/a--n/a}}
-
An Efficient Expanding Block Algorithm for Image Copy-Move Forgery Detection
Information Sciences, 2013(0), pp. -
DOI: 10.1016/j.ins.2013.03.028
BibTeX@article{Lynch2013, author = {Gavin Lynch and Frank Y. Shih and Hong-Yuan Mark Liao}, title = {An Efficient Expanding Block Algorithm for Image Copy-Move Forgery Detection}, journal = {Information Sciences}, year = {2013}, number = {0}, pages = {-}}
-
Natural Image Statistics in Digital Image Forensics
Sencar, H. T. & Memon, N. (ed.)
Digital Image Forensics
Springer New York, 2013, pp. 239-256
BibTeX@incollection{Lyu2013, author = {Siwei Lyu}, title = {Natural Image Statistics in Digital Image Forensics}, booktitle = {Digital Image Forensics}, publisher = {Springer New York}, year = {2013}, pages = {239--256}}
-
Exposing Region Splicing Forgeries with Blind Local Noise Estimation
International Journal of Computer Vision, Springer US, 2013, pp. 1-20
DOI: 10.1007/s11263-013-0688-y
BibTeX@article{Lyu2013a, author = {Lyu, Siwei and Pan, Xunyu and Zhang, Xing}, title = {Exposing Region Splicing Forgeries with Blind Local Noise Estimation}, journal = {International Journal of Computer Vision}, publisher = {Springer US}, year = {2013}, pages = {1--20}}
-
A forensic method for detecting image forgery
Emerging Trends in Computing, Communication and Nanotechnology (ICE-CCN), 2013 International Conference on
2013, pp. 590-594
DOI: 10.1109/ICE-CCN.2013.6528568
BibTeX@inproceedings{Mahalakshmi2013, author = {Devi Mahalakshmi and Vijayalakshmi, K. and Agnes, E.}, title = {A forensic method for detecting image forgery}, booktitle = {Emerging Trends in Computing, Communication and Nanotechnology (ICE-CCN), 2013 International Conference on}, year = {2013}, pages = {590--594}}
-
Blind Verification of Digital Image Originality: A Statistical Approach
Information Forensics and Security, IEEE Transactions on, 2013, Vol. 8(9), pp. 1531-1540
DOI: 10.1109/TIFS.2013.2276000
BibTeX@article{Mahdian2013, author = {Mahdian, B. and Nedbal, R. and Saic, S.}, title = {Blind Verification of Digital Image Originality: A Statistical Approach}, journal = {Information Forensics and Security, IEEE Transactions on}, year = {2013}, volume = {8}, number = {9}, pages = {1531--1540}}
-
A Novel Method for Identifying Exact Sensor Using Multiplicative Noise Component
Multimedia (ISM), 2013 IEEE International Symposium on
2013, pp. 241-247
DOI: 10.1109/ISM.2013.46
BibTeX@inproceedings{Mahdian2013a, author = {Mahdian, B. and Saic, S.}, title = {A Novel Method for Identifying Exact Sensor Using Multiplicative Noise Component}, booktitle = {Multimedia (ISM), 2013 IEEE International Symposium on}, year = {2013}, pages = {241--247}}
-
Robust Image Copy Move Forgery Detection
IJAIR, 2013
BibTeX@article{Maind2013, author = {Rohini R. Maind and Alka Khade and D.K. Chitre}, title = {Robust Image Copy Move Forgery Detection}, journal = {IJAIR}, year = {2013}}
-
Methodology for Evidence Reconstruction in Digital Image Forensics
International Journal of Engineering Research & Technology (IJERT), 2013, Vol. 2(11), pp. 1311-1318
BibTeX@article{Manudhane2013, author = {Kalpana Manudhane and M.M. Bartere}, title = {Methodology for Evidence Reconstruction in Digital Image Forensics}, journal = {International Journal of Engineering Research & Technology (IJERT)}, year = {2013}, volume = {2}, number = {11}, pages = {1311--1318}}
-
Detecting Photographic Cropping Based on Vanishing Points
Chinese Journal of Electronics, 2013
BibTeX@article{Meng2013, author = {Meng, X.. and Niu, S. and Yan, R. and Li, Y.}, title = {Detecting Photographic Cropping Based on Vanishing Points}, journal = {Chinese Journal of Electronics}, year = {2013}}
-
Research on Image Detection Algorithm with Markov Process
Intelligent Information Hiding and Multimedia Signal Processing, 2013 Ninth International Conference on
2013, pp. 238-241
DOI: 10.1109/IIH-MSP.2013.68
BibTeX@inproceedings{Meng-Jiao2013, author = {Li Meng-Jiao and Niu Shao-Zhang and Zou Jian-Cheng}, title = {Research on Image Detection Algorithm with Markov Process}, booktitle = {Intelligent Information Hiding and Multimedia Signal Processing, 2013 Ninth International Conference on}, year = {2013}, pages = {238--241}}
-
Courtroom Considerations in Digital Image Forensics
Sencar, H. T. & Memon, N. (ed.)
Digital Image Forensics
Springer New York, 2013, pp. 313-326
BibTeX@incollection{Mercuri2013, author = {Rebecca Mercuri}, title = {Courtroom Considerations in Digital Image Forensics}, booktitle = {Digital Image Forensics}, publisher = {Springer New York}, year = {2013}, pages = {313--326}}
-
Partial sharpness index for classifying digital camera and scanned images
Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON), 2013 10th International Conference on
2013, pp. 1-5
DOI: 10.1109/ECTICon.2013.6559643
BibTeX@inproceedings{Mettripun2013, author = {Mettripun, Narong and Khanna, Nitin and Amornraksa, Thumrongrat and Delp, Edward J.}, title = {Partial sharpness index for classifying digital camera and scanned images}, booktitle = {Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON), 2013 10th International Conference on}, year = {2013}, pages = {1--5}}
-
Antiforensics attacks to benford´s law for the detection of double compressed images
2013 IEEE International Conference on Acoustics, Speech and Signal Processing
Institute of Electrical & Electronics Engineers (IEEE), 2013
DOI: 10.1109/ICASSP.2013.6638219
BibTeX@inproceedings{Milani2013, author = {Milani, Simone and Tagliasacchi, Marco and Tubaro, Stefano}, title = {Antiforensics attacks to benford´s law for the detection of double compressed images}, booktitle = {2013 IEEE International Conference on Acoustics, Speech and Signal Processing}, publisher = {Institute of Electrical & Electronics Engineers (IEEE)}, year = {2013}}
-
Automation of JPEG Ghost Detection using Graph Based Segmentation
International Journal Of Computational Engineering Research, 2013, Vol. 3(12)
BibTeX@article{Mire2013, author = {AV Mire and SB Dhok and PD Porey and NJ Mistry}, title = {Automation of JPEG Ghost Detection using Graph Based Segmentation}, journal = {International Journal Of Computational Engineering Research}, year = {2013}, volume = {3}, number = {12}}
-
Digital Image Tamper Detection Techniques - A Comprehensive Study
International Journal of Computer Science and Business Informatics, 2013
BibTeX@article{Mishra2013a, author = {Minati Mishra and Flt. Lt. Dr. M. C. Adhikary}, title = {Digital Image Tamper Detection Techniques - A Comprehensive Study}, journal = {International Journal of Computer Science and Business Informatics}, year = {2013}}
-
Region Duplication Forgery Detection Technique based on SURF and HAC
International Journal of Computer Science and Business Informatics, 2013, Vol. 2(1), pp. 1 - 12
BibTeX@article{Mishra2013, author = {Minati Mishra and M. C. Adhikary}, title = {Region Duplication Forgery Detection Technique based on SURF and HAC}, journal = {International Journal of Computer Science and Business Informatics}, year = {2013}, volume = {2}, number = {1}, pages = {1 -- 12}}
-
Detection of Duplication Forgery in Digital Images in Uniform and Non-uniform Regions
Computer Modelling and Simulation (UKSim), 2013 UKSim 15th International Conference on
2013, pp. 455-460
DOI: 10.1109/UKSim.2013.94
BibTeX@inproceedings{Mohamadian2013, author = {Mohamadian, Z. and Pouyan, A. A.}, title = {Detection of Duplication Forgery in Digital Images in Uniform and Non-uniform Regions}, booktitle = {Computer Modelling and Simulation (UKSim), 2013 UKSim 15th International Conference on}, year = {2013}, pages = {455--460}}
-
An investigation into aliasing in images recaptured from an LCD monitor using a digital camera
Proc. Speech and Signal Processing 2013 IEEE Int. Conf. Acoustics
2013, pp. 2242-2246
DOI: 10.1109/ICASSP.2013.6638053
BibTeX@inproceedings{Muammar2013, author = {H. Muammar and P. L. Dragotti}, title = {An investigation into aliasing in images recaptured from an LCD monitor using a digital camera}, booktitle = {Proc. Speech and Signal Processing 2013 IEEE Int. Conf. Acoustics}, year = {2013}, pages = {2242--2246}}
-
Multi-scale local texture descriptor for image forgery detection
Industrial Technology (ICIT), 2013 IEEE International Conference on
2013, pp. 1146-1151
DOI: 10.1109/ICIT.2013.6505834
BibTeX@inproceedings{Muhammad2013, author = {Muhammad, Ghulam}, title = {Multi-scale local texture descriptor for image forgery detection}, booktitle = {Industrial Technology (ICIT), 2013 IEEE International Conference on}, year = {2013}, pages = {1146--1151}}
-
Image forgery detection using steerable pyramid transform and local binary pattern
Machine Vision and Applications, Springer Berlin Heidelberg, 2013, pp. 1-11
DOI: 10.1007/s00138-013-0547-4
BibTeX@article{Muhammad2013a, author = {Muhammad, Ghulam and Al-Hammadi, MunnerH. and Hussain, Muhammad and Bebis, George}, title = {Image forgery detection using steerable pyramid transform and local binary pattern}, journal = {Machine Vision and Applications}, publisher = {Springer Berlin Heidelberg}, year = {2013}, pages = {1--11}}
-
Copy move image forgery detection method using steerable pyramid transform and texture descriptor
EUROCON, 2013 IEEE
2013, pp. 1586-1592
DOI: 10.1109/EUROCON.2013.6625188
BibTeX@inproceedings{Muhammad2013b, author = {Muhammad, G and Al-Hammadi, M. H. and Hussain, M. and Mirza, A. M. and Bebis, G.}, title = {Copy move image forgery detection method using steerable pyramid transform and texture descriptor}, booktitle = {EUROCON, 2013 IEEE}, year = {2013}, pages = {1586--1592}}
-
Passive Detection of Copy - Move Image Forgery using Undecimated Wavelets and Zernike Moments
INFORMATION, 2013, Vol. 16(5), pp. 2957-2964
BibTeX@article{Muhammad2013c, author = {Ghulam Muhammad and Muhammad Hussain}, title = {Passive Detection of Copy - Move Image Forgery using Undecimated Wavelets and Zernike Moments}, journal = {INFORMATION}, year = {2013}, volume = {16}, number = {5}, pages = {2957--2964}}
-
Detection of Digital Photo Image Forgery Using Copy-Create Techniques
Mohan, S. & Kumar, S. S. (ed.)
Proceedings of the Fourth International Conference on Signal and Image Processing 2012 (ICSIP 2012)
Springer India, 2013, Vol. 221, pp. 281-290
DOI: 10.1007/978-81-322-0997-3_26
BibTeX@incollection{Murali2013, author = {Murali, S. and Chittapur, GovndrajB. and Prabhakara, H.S.}, title = {Detection of Digital Photo Image Forgery Using Copy-Create Techniques}, booktitle = {Proceedings of the Fourth International Conference on Signal and Image Processing 2012 (ICSIP 2012)}, publisher = {Springer India}, year = {2013}, volume = {221}, pages = {281--290}}
-
Comparision and analysis of photo image forgery detection techniques
International Journal on Computational Sciences & Applications (IJCSA), 2013, Vol. 2(6), pp. 45-56
BibTeX@article{Murali2013a, author = {Murali, S and Chittapur, Govindraj B and Anami, Basavaraj S and others}, title = {Comparision and analysis of photo image forgery detection techniques}, journal = {International Journal on Computational Sciences & Applications (IJCSA)}, year = {2013}, volume = {2}, number = {6}, pages = {45--56}}
-
Exposing copy-move image tampering using forensic method based on SURF
Electronics, Computers and Artificial Intelligence (ECAI), 2013 International Conference on
2013, pp. 1-4
DOI: 10.1109/ECAI.2013.6636173
BibTeX@inproceedings{Neamtu2013, author = {Neamtu, C. and Barca, C. and Achimescu, E. and Gavriloaia, B.}, title = {Exposing copy-move image tampering using forensic method based on SURF}, booktitle = {Electronics, Computers and Artificial Intelligence (ECAI), 2013 International Conference on}, year = {2013}, pages = {1--4}}
-
Towards Fast, Generic Video Inpainting
Proceedings of the 10th European Conference on Visual Media Production
ACM, 2013, pp. 7:1-7:8
DOI: 10.1145/2534008.2534019
BibTeX@inproceedings{Newson2013, author = {Newson, Alasdair and Almansa, Andrés and Fradet, Matthieu and Gousseau, Yann and Pérez, Patrick}, title = {Towards Fast, Generic Video Inpainting}, booktitle = {Proceedings of the 10th European Conference on Visual Media Production}, publisher = {ACM}, year = {2013}, pages = {7:1--7:8}}
-
Discrimination of Computer Synthesized or Recaptured Images from Real Images
Sencar, H. T. & Memon, N. (ed.)
Digital Image Forensics
Springer New York, 2013, pp. 275-312
BibTeX@incollection{Ng2013, author = {Tian-Tsong Ng and Shih-Fu Chang}, title = {Discrimination of Computer Synthesized or Recaptured Images from Real Images}, booktitle = {Digital Image Forensics}, publisher = {Springer New York}, year = {2013}, pages = {275--312}}
-
Security of Forensic Techniques for Digital Images
Technische Universität Darmstadt, Technische Universität Darmstadt, 2013
BibTeX@phdthesis{Nguyen2013, author = {Hieu Cuong Nguyen}, title = {Security of Forensic Techniques for Digital Images}, school = {Technische Universität Darmstadt}, year = {2013}}
-
Detecting Resized Double JPEG Compressed Images – Using Support Vector Machine
Communications and Multimedia Security
Springer, 2013
DOI: 10.1007/978-3-642-40779-6_9
BibTeX@incollection{Nguyen2013a, author = {Nguyen, Hieu Cuong and Katzenbeisser, Stefan}, title = {Detecting Resized Double JPEG Compressed Images – Using Support Vector Machine}, booktitle = {Communications and Multimedia Security}, publisher = {Springer}, year = {2013}}
-
NPPA Code of Ethics
2013
BibTeX@electronic{NPPA2013, author = {NPPA}, title = {NPPA Code of Ethics}, year = {2013}}
-
Techniques for Source Camera Identification
Proceedings of the ICIT 2013 -- The 6th International Conference on Information Technology
ICIT, 2013
BibTeX@inproceedings{Orozco2013, author = {Ana Lucila Sandoval Orozco and Jocelin Rosales Corripio and David Manuel Arenas González and Luis Javier García Villalba and Julio César Hernández Castro}, title = {Techniques for Source Camera Identification}, booktitle = {Proceedings of the ICIT 2013 -- The 6th International Conference on Information Technology}, journal = {ICIT}, year = {2013}}
-
Compact analog counting SPAD pixel with 1.9% PRNU and 530ps time gating
Proc. ESSCIRC (ESSCIRC)
2013, pp. 295-298
DOI: 10.1109/ESSCIRC.2013.6649131
BibTeX@inproceedings{Pancheri2013, author = {L. Pancheri and E. Panina and G. F. Dalla Betta and L. Gasparini and D. Stoppa}, title = {Compact analog counting SPAD pixel with 1.9% PRNU and 530ps time gating}, booktitle = {Proc. ESSCIRC (ESSCIRC)}, year = {2013}, pages = {295--298}}
-
Hardware Architecture for Video Authentication using Sensor Pattern Noise
Circuits and Systems for Video Technology, IEEE Transactions on, 2013, Vol. PP(99), pp. 1-1
DOI: 10.1109/TCSVT.2013.2276869
BibTeX@article{Pande2013, author = {Pande, A. and Chen, S. and Mohapatra, P. and Zambreno, J.}, title = {Hardware Architecture for Video Authentication using Sensor Pattern Noise}, journal = {Circuits and Systems for Video Technology, IEEE Transactions on}, year = {2013}, volume = {PP}, number = {99}, pages = {1--1}}
-
JPEG compression anti-forensics based on first significant digit distribution
Multimedia Signal Processing (MMSP), 2013 IEEE 15th International Workshop on
2013, pp. 500-505
DOI: 10.1109/MMSP.2013.6659339
BibTeX@inproceedings{Pasquini2013, author = {Pasquini, Cecilia and Boato, Giulia}, title = {JPEG compression anti-forensics based on first significant digit distribution}, booktitle = {Multimedia Signal Processing (MMSP), 2013 IEEE 15th International Workshop on}, year = {2013}, pages = {500--505}}
-
Robust Median Filtering Detection Based on Filtered Residual
Shi, Y., Kim, H.-J. & Pérez-González, F. (ed.)
Digital Forensics and Watermaking
Springer Berlin Heidelberg, 2013, Vol. 7809, pp. 344-357
DOI: 10.1007/978-3-642-40099-5_29
BibTeX@incollection{Peng2013b, author = {Peng, Anjie and Kang, Xiangui}, title = {Robust Median Filtering Detection Based on Filtered Residual}, booktitle = {Digital Forensics and Watermaking}, publisher = {Springer Berlin Heidelberg}, year = {2013}, volume = {7809}, pages = {344--357}}
-
Discriminating Natural Images and Computer Generated Graphics Based on Compound Fractal Features
Journal of Computational Information Systems, 2013, Vol. 9(13), pp. 101-5108
BibTeX@article{Peng2013a, author = {Fei Peng and Jiaoting Li and Min Long}, title = {Discriminating Natural Images and Computer Generated Graphics Based on Compound Fractal Features}, journal = {Journal of Computational Information Systems}, year = {2013}, volume = {9}, number = {13}, pages = {101--5108}}
-
Comparison and Analysis of the Performance of PRNU Extraction Methods in Source Camera Identification
Journal of Computational Information Systems, 2013, Vol. 9(14), pp. 585-5592
BibTeX@article{Peng2013, author = {Fei Peng and Jiaoling Shi and Min Long}, title = {Comparison and Analysis of the Performance of PRNU Extraction Methods in Source Camera Identification}, journal = {Journal of Computational Information Systems}, year = {2013}, volume = {9}, number = {14}, pages = {585--5592}}
-
Accurate estimation of primary quantisation table with applications to tampering detection
Institution of Engineering and Technology, Electronics Letters, 2013
DOI: 10.1049/el.2013.2218
BibTeX@article{Peng2013c, author = {Yuanyuan Peng and Benyong Liu}, title = {Accurate estimation of primary quantisation table with applications to tampering detection}, journal = {Institution of Engineering and Technology, Electronics Letters}, year = {2013}}
-
An Overview on Image Forensics
ISRN Signal Processing, 2013, Vol. 2013, pp. 1-22
DOI: 10.1155/2013/496701
BibTeX@article{Piva2013, author = {Piva, Alessandro}, title = {An Overview on Image Forensics}, journal = {ISRN Signal Processing}, year = {2013}, volume = {2013}, pages = {1--22}}
-
Publizistische Grundsätze (Pressekodex) -- Richtlinien für die publizistische Arbeit nach den Empfehlungen des Deutschen Presserats
2013
BibTeX@electronic{Presserat2013, author = {Presserat}, title = {Publizistische Grundsätze (Pressekodex) -- Richtlinien für die publizistische Arbeit nach den Empfehlungen des Deutschen Presserats}, year = {2013}}
-
First JPEG Quantization Matrix Estimation Based On Histogram Analysis
Proc. IEEE International Conference on Image Processing ICIP 2013
2013, pp. 4502 - 4506
BibTeX@inproceedings{Puglisi2013, author = {Giovanni Puglisi and Arcangelo Bruna and Fausto Galvan and Sebastiano Battiato}, title = {First JPEG Quantization Matrix Estimation Based On Histogram Analysis}, booktitle = {Proc. IEEE International Conference on Image Processing ICIP 2013}, year = {2013}, pages = {4502 -- 4506}}
-
Survey on blind image forgery detection
IET Image Processing, 2013
DOI: 10.1049/iet-ipr.2012.0388
BibTeX@article{Qazi2013, author = {Tanzeela Qazi and Khizar Hayat and Samee U. Khan and Sajjad A. Madani and Imran A. Khan and Joanna Kołodziej and Hongxiang Li and Weiyao Lin and Kin Choong Yow and Cheng-Zhong Xu}, title = {Survey on blind image forgery detection}, journal = {IET Image Processing}, year = {2013}}
-
High precision rotation angle estimation for rotated images
Multimedia and Expo Workshops (ICMEW), 2013 IEEE International Conference on
2013, pp. 1-4
DOI: 10.1109/ICMEW.2013.6618298
BibTeX@inproceedings{Qian2013a, author = {Ruohan Qian and Weihai Li and Nenghai Yu}, title = {High precision rotation angle estimation for rotated images}, booktitle = {Multimedia and Expo Workshops (ICMEW), 2013 IEEE International Conference on}, year = {2013}, pages = {1--4}}
-
High Precision Image Rotation Angle Estimation with Periodicity of Pixel Variance
Image and Graphics (ICIG), 2013 Seventh International Conference on
2013, pp. 106-111
DOI: 10.1109/ICIG.2013.27
BibTeX@inproceedings{Qian2013, author = {Ruohan Qian and Weihai Li and Nenghai Yu and Bin Liu}, title = {High Precision Image Rotation Angle Estimation with Periodicity of Pixel Variance}, booktitle = {Image and Graphics (ICIG), 2013 Seventh International Conference on}, year = {2013}, pages = {106--111}}
-
Simplified Anti-Forensics of JPEG Compression
Journal of Computers, ACADEMY PUBLISHER, 2013, Vol. 8(10), pp. 2483-2488
DOI: 10.4304/jcp.8.10.2483-2488
BibTeX@article{Qian2013b, author = {Zhenxing Qian and Tong Qiao}, title = {Simplified Anti-Forensics of JPEG Compression}, journal = {Journal of Computers}, publisher = {ACADEMY PUBLISHER}, year = {2013}, volume = {8}, number = {10}, pages = {2483--2488}}
-
Forensic sensor pattern noise extraction from large image data set
Proc. Speech and Signal Processing 2013 IEEE Int. Conf. Acoustics
2013, pp. 3023-3027
DOI: 10.1109/ICASSP.2013.6638213
BibTeX@inproceedings{Qu2013a, author = {Z. Qu and X. Kang and J. Huang and Y. Li}, title = {Forensic sensor pattern noise extraction from large image data set}, booktitle = {Proc. Speech and Signal Processing 2013 IEEE Int. Conf. Acoustics}, year = {2013}, pages = {3023--3027}}
-
Forensic Sensor Pattern Noise Extraction From Large Image Data Set
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013
Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013, 2013
DOI: 10.1109/icassp.2013.6638213
BibTeX@inproceedings{Qu2013, author = {Zhenhua Qu and Xiangui Kang and Jiwu Huang and Yinxiang Li, Sun Yat-Sen}, title = {Forensic Sensor Pattern Noise Extraction From Large Image Data Set}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013}, journal = {Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013}, year = {2013}}
-
Forensic collection of cloud storage data: Does the act of collection result in changes to the data or its metadata?
Digital Investigation, 2013(0), pp. -
DOI: 10.1016/j.diin.2013.07.001
BibTeX@article{Quick2013, author = {Darren Quick and Kim-Kwang Raymond Choo}, title = {Forensic collection of cloud storage data: Does the act of collection result in changes to the data or its metadata?}, journal = {Digital Investigation}, year = {2013}, number = {0}, pages = {-}}
-
A Method For Estimating Light Direction, Shape, And Reflection Parameters From A Single Image
Proc. IEEE International Conference on Image Processing ICIP 2013
2013, pp. 2034-2038
BibTeX@inproceedings{Rahman2013, author = {Sejuti Rahman and Antonio Robles-Kelly}, title = {A Method For Estimating Light Direction, Shape, And Reflection Parameters From A Single Image}, booktitle = {Proc. IEEE International Conference on Image Processing ICIP 2013}, year = {2013}, pages = {2034--2038}}
-
A Novel Approach for Forgery Detection of Images
International Journal of Application or Innovation in Engineering & Management (IJAIEM), 2013
BibTeX@article{Raj2013, author = {Vimal Raj and Lija Thomas}, title = {A Novel Approach for Forgery Detection of Images}, journal = {International Journal of Application or Innovation in Engineering & Management (IJAIEM)}, year = {2013}}
-
Harnessing Motion Blur To Uncover Splicing
Proc. IEEE International Conference on Image Processing ICIP 2013
2013, pp. 4507 - 4511
BibTeX@inproceedings{PurnachandraRao2013, author = {M. Purnachandra Rao and A.N. Rajagopalan}, title = {Harnessing Motion Blur To Uncover Splicing}, booktitle = {Proc. IEEE International Conference on Image Processing ICIP 2013}, year = {2013}, pages = {4507 -- 4511}}
-
Anti-Forensics of the Triangle Test by Random Fingerprint-Copy Attack
Computational Visual Media Conference, 2013
BibTeX@article{Rao2013, author = {Quanquan Rao and Haodong Li and Weiqi Luo and Jiwu Huang}, title = {Anti-Forensics of the Triangle Test by Random Fingerprint-Copy Attack}, journal = {Computational Visual Media Conference}, year = {2013}}
-
Physics-based and Statistical Features for Image Forensics -- Physikalische und statistische Merkmale in der Bildforensik
Der Technischen Fakultät der Universität Erlangen--Nürnberg, Der Technischen Fakultät der Universität Erlangen--Nürnberg, 2013
BibTeX@phdthesis{Riess2013, author = {Christian Riess}, title = {Physics-based and Statistical Features for Image Forensics -- Physikalische und statistische Merkmale in der Bildforensik}, school = {Der Technischen Fakultät der Universität Erlangen--Nürnberg}, year = {2013}}
-
Imaging
Proceedings of the17th Interpol International Forensic Science Managers Symposium, Lyon
2013, pp. 638-651
BibTeX@inproceedings{Ruifrok2013, author = {Arnout Ruifrok and Zeno Geradts and Jurrien Bijhold}, title = {Imaging}, booktitle = {Proceedings of the17th Interpol International Forensic Science Managers Symposium, Lyon}, year = {2013}, pages = {638--651}}
-
Rotation Invariant Localization of Duplicated Image Regions Based on Zernike Moments
IEEE Transactions on Information Forensics and Security, 2013, Vol. 8(8), pp. 1355-1370
DOI: 10.1109/TIFS.2013.2272377
BibTeX@article{Ryu2013, author = {S.-J. Ryu and Kirchner, M. and Lee, M.-J. and Lee, H.-K.}, title = {Rotation Invariant Localization of Duplicated Image Regions Based on Zernike Moments}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2013}, volume = {8}, number = {8}, pages = {1355--1370}}
-
A Survey on Passive-Blind Image Forensics
Proceedings of the second International Conference on Role of Technology in Nation Building (ICRTNB - 2013), 2013
BibTeX@article{Saini2013, author = {Anupama Saini}, title = {A Survey on Passive-Blind Image Forensics}, journal = {Proceedings of the second International Conference on Role of Technology in Nation Building (ICRTNB - 2013)}, year = {2013}}
-
Source identification for mobile devices, based on wavelet transforms combined with sensor imperfections
Computing, Springer Vienna, 2013, Vol. -, pp. 1-13
DOI: 10.1007/s00607-013-0313-5
BibTeX@article{SandovalOrozco2013, author = {Sandoval Orozco, A.L. and Arenas González, D.M. and Rosales Corripio, J. and García Villalba, L.J. and Hernandez-Castro, J.C.}, title = {Source identification for mobile devices, based on wavelet transforms combined with sensor imperfections}, journal = {Computing}, publisher = {Springer Vienna}, year = {2013}, volume = {-}, pages = {1--13}}
-
Picture-to-Identity linking of social network accounts based on Sensor Pattern Noise
Proceedings International Conference on Imaging for Crime Detection and Prevention (ICDP 2013), Kingston University London, UK
2013
DOI: 10.1049/ic.2013.0266
BibTeX@inproceedings{Satta2013, author = {Riccardo Satta and Pasquale Stirparo}, title = {Picture-to-Identity linking of social network accounts based on Sensor Pattern Noise}, booktitle = {Proceedings International Conference on Imaging for Crime Detection and Prevention (ICDP 2013), Kingston University London, UK}, year = {2013}}
-
Digital Image Forensics: There is More to a Picture than Meets the Eye
Springer, 2013
BibTeX@book{Sencar2013, author = {Husrev T. Sencar and Nasir D. Memon}, title = {Digital Image Forensics: There is More to a Picture than Meets the Eye}, publisher = {Springer}, year = {2013}}
-
Forensic detection of image manipulation using the Zernike moments and pixel-pair histogram
Institution of Engineering and Technology, Institution of Engineering and Technology, 2013, pp. -(0)
BibTeX@article{Shabanifard2013, author = {Mahmood Shabanifard and Mahrokh G. Shayesteh and Mohammad Ali Akhaee}, title = {Forensic detection of image manipulation using the Zernike moments and pixel-pair histogram}, journal = {Institution of Engineering and Technology}, publisher = {Institution of Engineering and Technology}, year = {2013}, pages = {-(0)}}
-
Detection of frame deletion for digital video forensics
Digital Investigation, 2013(0), pp. -
DOI: 10.1016/j.diin.2013.10.004
BibTeX@article{Shanableh2013, author = {Tamer Shanableh}, title = {Detection of frame deletion for digital video forensics}, journal = {Digital Investigation}, year = {2013}, number = {0}, pages = {-}}
-
Digital Image forensics using noise features
Department of Computer Science & Engineering, Indian Institute of Technology (IIT), Kanpur, Department of Computer Science & Engineering, Indian Institute of Technology (IIT), Kanpur, 2013
BibTeX@techreport{Sharang2013, author = {Abhijit Sharang and Pankaj Jindal}, title = {Digital Image forensics using noise features}, school = {Department of Computer Science & Engineering, Indian Institute of Technology (IIT), Kanpur}, year = {2013}}
-
Copy-Move Image Forgery Detection by DyWT and DCT using Euclidean distances
International Journal of Computer Technology and Electronics Communication, 2013
BibTeX@article{Sharma2013a, author = {Chetna Sharma and Unmukh Datta}, title = {Copy-Move Image Forgery Detection by DyWT and DCT using Euclidean distances}, journal = {International Journal of Computer Technology and Electronics Communication}, year = {2013}}
-
Digital Image Tampering -- A Threat to Security Management
International Journal of Advanced Research in Computer and Communication Engineering, 2013, Vol. 2(10), pp. 4120 - 4123
BibTeX@article{Sharma2013, author = {Deepika Sharma and Pawanesh Abrol}, title = {Digital Image Tampering -- A Threat to Security Management}, journal = {International Journal of Advanced Research in Computer and Communication Engineering}, year = {2013}, volume = {2}, number = {10}, pages = {4120 -- 4123}}
-
Image Copy-Move Forgery Detection Based on SIFT and Gray Level
Applied Mechanics and Materials, Trans Tech Publ, 2013, Vol. 263, pp. 3021-3024
BibTeX@article{Shen2013, author = {Shen, X.J. and Zhu, Y. and Lv, Y.D. and Chen, H.P.}, title = {Image Copy-Move Forgery Detection Based on SIFT and Gray Level}, journal = {Applied Mechanics and Materials}, publisher = {Trans Tech Publ}, year = {2013}, volume = {263}, pages = {3021--3024}}
-
Comparison and Analysis of Copy-Move Forgery Detection Algorithms for Electronic Image Processing
Jin, D. & Lin, S. (ed.)
Advances in Mechanical and Electronic Engineering
Springer Berlin Heidelberg, 2013, Vol. 178, pp. 343-348
BibTeX@incollection{Sheng2013, author = {Sheng, YunZhong and Wang, HangJun and Zhang, GuangQun}, title = {Comparison and Analysis of Copy-Move Forgery Detection Algorithms for Electronic Image Processing}, booktitle = {Advances in Mechanical and Electronic Engineering}, publisher = {Springer Berlin Heidelberg}, year = {2013}, volume = {178}, pages = {343--348}}
-
Source Identification Of Camera Phones Using Svd
Proc. IEEE International Conference on Image Processing ICIP 2013
2013, pp. 4487-4491
BibTeX@inproceedings{Soobhany2013, author = {Ahmad Ryad Soobhany and K. P. Lam and Peter Fletcher and David Collins}, title = {Source Identification Of Camera Phones Using Svd}, booktitle = {Proc. IEEE International Conference on Image Processing ICIP 2013}, year = {2013}, pages = {4487--4491}}
-
Image compression using anti-forensics method
CoRR, 2013, Vol. abs/1303.2330
BibTeX@article{Sreelakshmi2013, author = {M. S. Sreelakshmi and D. Venkataraman}, title = {Image compression using anti-forensics method}, journal = {CoRR}, year = {2013}, volume = {abs/1303.2330}}
-
Image compression using anti-forensics method
arxiv, 2013
BibTeX@article{Sreelakshmi2013a, author = {M. S. Sreelakshmi and D. Venkataraman}, title = {Image compression using anti-forensics method}, journal = {arxiv}, year = {2013}}
-
Information Forensics: An Overview of the First Decade
IEEE Access, 2013, Vol. 1, pp. 167-200
DOI: 10.1109/ACCESS.2013.2260814
BibTeX@article{Stamm2013, author = {Stamm, M and Wu, M. and Liu, K. J. R.}, title = {Information Forensics: An Overview of the First Decade}, journal = {IEEE Access}, year = {2013}, volume = {1}, pages = {167--200}}
-
Rapid Image Splicing Detection Based on Relevance Vector Machine
Shi, Y., Kim, H.-J. & Pérez-González, F. (ed.)
Digital Forensics and Watermaking
Springer Berlin Heidelberg, 2013, Vol. 7809, pp. 300-310
DOI: 10.1007/978-3-642-40099-5_25
BibTeX@incollection{Su2013, author = {Su, Bo and Yuan, Quanqiao and Zhang, Yujin and Zhai, Mengying and Wang, Shilin}, title = {Rapid Image Splicing Detection Based on Relevance Vector Machine}, booktitle = {Digital Forensics and Watermaking}, publisher = {Springer Berlin Heidelberg}, year = {2013}, volume = {7809}, pages = {300--310}}
-
Transform Coder Identification
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013
2013
BibTeX@inproceedings{Tagliasacchi2013, author = {Marco Tagliasacchi and Marco Visentini-Scarzanella and Pier Luigi Dragotti and Stefano Tubaro}, title = {Transform Coder Identification}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013}, year = {2013}}
-
Digital Image Forensics: A Two-Step Approach for Identifying Source and Detecting Forgeries
The Era of Interactive Media
Springer New York, 2013, pp. 37-51
DOI: 10.1007/978-1-4614-3501-3_4
BibTeX@incollection{Taktak2013, author = {Taktak, Wiem and Dugelay, Jean-Luc}, title = {Digital Image Forensics: A Two-Step Approach for Identifying Source and Detecting Forgeries}, booktitle = {The Era of Interactive Media}, publisher = {Springer New York}, year = {2013}, pages = {37--51}}
-
Study Of Different Techniques Of Image Forgery Detection
International Journal of Advanced Research in Computer Science, 2013, Vol. 4(1), pp. 8-13
BibTeX@article{Talmale2013, author = {Girish. R. Talmale and Yogesh Malode}, title = {Study Of Different Techniques Of Image Forgery Detection}, journal = {International Journal of Advanced Research in Computer Science}, year = {2013}, volume = {4}, number = {1}, pages = {8--13}}
-
State of The Art of Copy-move Forgery Detection Techniques: A Review
IJCSI International Journal of Computer Science, 2013, Vol. 10(6), pp. 174-183
BibTeX@article{Thajeel2013, author = {Thajeel, Salam A. and Ghazali Bin Sulong}, title = {State of The Art of Copy-move Forgery Detection Techniques: A Review}, journal = {IJCSI International Journal of Computer Science}, year = {2013}, volume = {10}, number = {6}, pages = {174--183}}
-
Computer Generated Images vs. Digital Photographs: A Synergetic Feature and Classifier Combination Approach
Journal of Visual Communication and Image Representation, 2013(0), pp. -
DOI: 10.1016/j.jvcir.2013.08.009
BibTeX@article{Tokuda2013, author = {Eric Tokuda and Helio Pedrini and Anderson Rocha}, title = {Computer Generated Images vs. Digital Photographs: A Synergetic Feature and Classifier Combination Approach}, journal = {Journal of Visual Communication and Image Representation}, year = {2013}, number = {0}, pages = {-}}
-
Robust Digital Camera Identification Based on Pairwise Magnitude Relations of Clustered Sensor Pattern Noise
IEEE Transactions on Information Forensics and Security, 2013, Vol. 8(12), pp. 1986-1995
DOI: 10.1109/TIFS.2013.2284761
BibTeX@article{Tomioka2013, author = {Y. Tomioka and Ito, Y. and Kitazawa, H.}, title = {Robust Digital Camera Identification Based on Pairwise Magnitude Relations of Clustered Sensor Pattern Noise}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2013}, volume = {8}, number = {12}, pages = {1986--1995}}
-
Image Splicing Detection Based on Statistical Properties of Benford Model
Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013)
2013
DOI: 10.2991/iccsee.2013.200
BibTeX@inproceedings{Tong2013, author = {Tong, Senfeng And Zhang, Zhen And Xie, Yongjie And Wu, Xiaodi}, title = {Image Splicing Detection Based on Statistical Properties of Benford Model}, booktitle = {Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013)}, year = {2013}}
-
Distinguishing Computer Graphics from Natural Images Based on Statistical Characteristics
Vehicle, Mechatronics and Information Technologies, 2013, Vol. 380 - 384, pp. 1306-1309
DOI: 10.4028/www.scientific.net/AMM.380-384.1306
BibTeX@article{Tong2013a, author = {Sen Feng Tong and Yu Hao Yang and Yong Jie Xie}, title = {Distinguishing Computer Graphics from Natural Images Based on Statistical Characteristics}, journal = {Vehicle, Mechatronics and Information Technologies}, year = {2013}, volume = {380 - 384}, pages = {1306--1309}}
-
CoMoFoD --- New database for copy-move forgery detection
ELMAR, 2013 55th International Symposium
2013, pp. 49-54
BibTeX@inproceedings{Tralic2013, author = {Tralic, Dijana and Zupancic, Ivan and Grgic, Sonja and Grgic, Mislay}, title = {CoMoFoD --- New database for copy-move forgery detection}, booktitle = {ELMAR, 2013 55th International Symposium}, year = {2013}, pages = {49--54}}
-
Image forgery detection using Color Coherence Vector
Electronics, Computer and Computation (ICECCO), 2013 International Conference on
2013, pp. 107-110
DOI: 10.1109/ICECCO.2013.6718240
BibTeX@inproceedings{Ulutas2013b, author = {Ulutas, G. and Ulutas, M.}, title = {Image forgery detection using Color Coherence Vector}, booktitle = {Electronics, Computer and Computation (ICECCO), 2013 International Conference on}, year = {2013}, pages = {107--110}}
-
Copy move forgery detection based on LBP
Signal Processing and Communications Applications Conference (SIU), 2013 21st
2013, pp. 1-4
DOI: 10.1109/SIU.2013.6531569
BibTeX@inproceedings{Ulutas2013, author = {Ulutas, G. and Ulutas, M. and Nabiyev, V. V.}, title = {Copy move forgery detection based on LBP}, booktitle = {Signal Processing and Communications Applications Conference (SIU), 2013 21st}, year = {2013}, pages = {1--4}}
-
Revealing the Traces of JPEG Compression Anti-Forensics
IEEE Transactions on Information Forensics and Security, 2013, Vol. 8(2), pp. 335-349
DOI: 10.1109/TIFS.2012.2234117
BibTeX@article{Valenzise2013, author = {Valenzise, Giuseppe and Tagliasacchi, Marco and Tubaro, Stefano}, title = {Revealing the Traces of JPEG Compression Anti-Forensics}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2013}, volume = {8}, number = {2}, pages = {335--349}}
-
Unambiguous interpolation rate estimation in uncompressed resized color digital images
Biometrics and Forensics (IWBF), 2013 International Workshop on
2013, pp. 1-4
DOI: 10.1109/IWBF.2013.6547314
BibTeX@inproceedings{Valera2013, author = {Jesus Valera and Narciso Garcia}, title = {Unambiguous interpolation rate estimation in uncompressed resized color digital images}, booktitle = {Biometrics and Forensics (IWBF), 2013 International Workshop on}, year = {2013}, pages = {1--4}}
-
Set-Membership Identification of Resampled Signals
2013 IEEE International Workshop on Information Forensics and Security (WIFS)
Institute of Electrical & Electronics Engineers (IEEE), 2013
DOI: 10.1109/WIFS.2013.6707810
BibTeX@inproceedings{Vazquez-Padin2013, author = {D. Vázquez-Padın and P. Comesana and F Pérez-González}, title = {Set-Membership Identification of Resampled Signals}, booktitle = {2013 IEEE International Workshop on Information Forensics and Security (WIFS)}, publisher = {Institute of Electrical & Electronics Engineers (IEEE)}, year = {2013}}
-
Pixel Estimation Based Video Forgery Detection
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013
Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013, 2013
DOI: 10.1109/icassp.2013.6638216
BibTeX@inproceedings{Venkata2013, author = {Subramanyam Venkata}, title = {Pixel Estimation Based Video Forgery Detection}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013}, journal = {Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013}, year = {2013}}
-
Robust Detection of Copy-Move Forgery in Color Images
2013
BibTeX@electronic{Wandji2013a, author = {Nathalie Diane Wandji and Sun Xingming}, title = {Robust Detection of Copy-Move Forgery in Color Images}, year = {2013}}
-
Detection of copy-move forgery in digital images based on DCT
Arxiv, 2013
BibTeX@article{Wandji2013, author = {Nathalie Diane Wandji and Sun Xingming and Moise Fah Kue}, title = {Detection of copy-move forgery in digital images based on DCT}, journal = {Arxiv}, year = {2013}}
-
Blind Detection of Region Duplication Forgery by Merging Blur and Affine Moment Invariants
Proc. Seventh Int Image and Graphics (ICIG) Conf
2013, pp. 258-264
DOI: 10.1109/ICIG.2013.61
BibTeX@inproceedings{Wang2013b, author = {T. Wang and J. Tang and B. Luo}, title = {Blind Detection of Region Duplication Forgery by Merging Blur and Affine Moment Invariants}, booktitle = {Proc. Seventh Int Image and Graphics (ICIG) Conf}, year = {2013}, pages = {258--264}}
-
Estimation of the primary quantization parameter in MPEG videos
Visual Communications and Image Processing (VCIP), 2013
2013, pp. 1-6
DOI: 10.1109/VCIP.2013.6706413
BibTeX@inproceedings{Wang2013, author = {Wang, Wan and Jiang, Xinghao and Wang, Shilin and Sun, Tanfeng}, title = {Estimation of the primary quantization parameter in MPEG videos}, booktitle = {Visual Communications and Image Processing (VCIP), 2013}, year = {2013}, pages = {1--6}}
-
Identifying Image Composites by Detecting Discrepancies in Defocus and Motion Blur
Journal of Computers, 2013, Vol. 8(11)
DOI: 10.4304/jcp.8.11.2789-2794
BibTeX@article{Wang2013a, author = {Wei Wang and Feng Zeng and Honglin Yuan and Xintao Duan}, title = {Identifying Image Composites by Detecting Discrepancies in Defocus and Motion Blur}, journal = {Journal of Computers}, year = {2013}, volume = {8}, number = {11}}
-
Sensor-Pattern-Noise Map Reconstruction in Source Camera Identification for Size-Reduced Images
IEICE TRANSACTIONS on Information and Systems, 2013, Vol. E96-D(8), pp. 1882-1885
BibTeX@article{Watanabe2013, author = {Joji Watanabe And Tadaaki Hosaka And Takayuki Hamamoto}, title = {Sensor-Pattern-Noise Map Reconstruction in Source Camera Identification for Size-Reduced Images}, journal = {IEICE TRANSACTIONS on Information and Systems}, year = {2013}, volume = {E96-D}, number = {8}, pages = {1882--1885}}
-
Duplicated Region Detection Using Robust Features
International Journal of Applied Mathematics and Statistics, 2013, Vol. 49(19)
BibTeX@article{Wen2013, author = {Jiang Wen}, title = {Duplicated Region Detection Using Robust Features}, journal = {International Journal of Applied Mathematics and Statistics}, year = {2013}, volume = {49}, number = {19}}
-
Image tampering localization via estimating the non-aligned double JPEG compression
Proc. SPIE 8665, Media Watermarking, Security, and Forensics, 2013, pp. 86650R-86650R-7
DOI: 10.1117/12.2003695
BibTeX@article{Wu2013b, author = {Wu, Lanying and Kong, Xiangwei and Wang, Bo and Shang, Shize}, title = {Image tampering localization via estimating the non-aligned double JPEG compression}, journal = {Proc. SPIE 8665, Media Watermarking, Security, and Forensics}, year = {2013}, pages = {86650R-86650R-7}}
-
Blind Detection of Tampered JPEG Image Based on Blocking Artifacts of Double Quantization
Applied Mechanics and Materials, Trans Tech Publ, 2013, Vol. 263, pp. 3104-3107
BibTeX@article{Wu2013, author = {Wu, S.B. and Shen, D.S.}, title = {Blind Detection of Tampered JPEG Image Based on Blocking Artifacts of Double Quantization}, journal = {Applied Mechanics and Materials}, publisher = {Trans Tech Publ}, year = {2013}, volume = {263}, pages = {3104--3107}}
-
Anti-forensics Of Median Filtering
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013
Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013, 2013
DOI: 10.1109/icassp.2013.6638217
BibTeX@inproceedings{Wu2013a, author = {Zhung-Han Wu and Matthew C. Stamm and K. J. Ray Liu}, title = {Anti-forensics Of Median Filtering}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2013}, journal = {Proceedings of the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 2013}, year = {2013}}
-
Source Camera Identification Based on In-and-Inter Channel Traces
Applied Mechanics and Materials, 2013, Vol. 380-384, pp. 3754-3757
DOI: 10.4028/www.scientific.net/AMM.380-384.3754
BibTeX@article{Xie2013a, author = {Yong Jie Xie and Yi Bao and Sen Feng Tong and Yu Hao Yang}, title = {Source Camera Identification Based on In-and-Inter Channel Traces}, journal = {Applied Mechanics and Materials}, year = {2013}, volume = {380-384}, pages = {3754--3757}}
-
Source Digital Image Identification based on Cross-correlation
Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013)
2013, pp. 201
DOI: 10.2991/iccsee.2013.199
BibTeX@inproceedings{Xie2013, author = {Xie, Yong-jie and BAO, Yi and TONG, Sen-feng and YANG, Yu-hao}, title = {Source Digital Image Identification based on Cross-correlation}, booktitle = {Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013)}, year = {2013}, pages = {201}}
-
Camera calibration method based on a flexible spliced pattern of equilateral triangles
Chinese Automation Congress (CAC), 2013
2013, pp. 250-254
DOI: 10.1109/CAC.2013.6775737
BibTeX@inproceedings{Xiuping2013, author = {Wang Xiuping and Bai Ruilin and Guo Xinnian}, title = {Camera calibration method based on a flexible spliced pattern of equilateral triangles}, booktitle = {Chinese Automation Congress (CAC), 2013}, year = {2013}, pages = {250--254}}
-
Detect Image splicing using merged features in chroma space
The Scientific World Journal, 2013
BibTeX@article{Xu2013, author = {Bo Xu and Guangjie Liu and Yuewei Dai}, title = {Detect Image splicing using merged features in chroma space}, journal = {The Scientific World Journal}, year = {2013}}
-
Research on forensic identification of forged images
Proc. Int Mechatronic Sciences, Electric Engineering and Computer (MEC) Conf
2013, pp. 1152-1155
DOI: 10.1109/MEC.2013.6885238
BibTeX@inproceedings{Yan2013, author = {Cheng Yan}, title = {Research on forensic identification of forged images}, booktitle = {Proc. Int Mechatronic Sciences, Electric Engineering and Computer (MEC) Conf}, year = {2013}, pages = {1152--1155}}
-
Image Forgery Detection via Multifeature Classification
Journal of Pattern Recognition & Image Processing, 2013
BibTeX@article{Yang2013a, author = {Benjuan Yang and Benyong Liu}, title = {Image Forgery Detection via Multifeature Classification}, journal = {Journal of Pattern Recognition & Image Processing}, year = {2013}}
-
An Efficient Forensic Method for Copy-move Forgery Detection Based on DWT-FWHT.
Radioengineering, 2013, Vol. 22(4), pp. 1098-1105
BibTeX@article{Yang2013b, author = {Bin Yang And Xingming Sun And Xianyi Chen And Jianjun Zhang And Xu Li}, title = {An Efficient Forensic Method for Copy-move Forgery Detection Based on DWT-FWHT.}, journal = {Radioengineering}, year = {2013}, volume = {22}, number = {4}, pages = {1098--1105}}
-
Digital Image Forgery Forensics by Using Undecimated Dyadic Wavelet Transform and Zernike Moments
Journal of Computational Information Systems, 2013, Vol. 9(16), pp. 6399-6408
BibTeX@article{Yang2013, author = {Jiyun Yang And Ei Ran And Di Xiao And Inyong Tan}, title = {Digital Image Forgery Forensics by Using Undecimated Dyadic Wavelet Transform and Zernike Moments}, journal = {Journal of Computational Information Systems}, year = {2013}, volume = {9}, number = {16}, pages = {6399--6408}}
-
Game Theoretic Analysis of Camera Source Identification
Proceedings of the APSIPA
2013
DOI: 10.1109/apsipa.2013.6694150
BibTeX@inproceedings{Zeng2013a, author = {Hui Zeng and Yunwen Jiang and Xiangui Kang and Li Liu}, title = {Game Theoretic Analysis of Camera Source Identification}, booktitle = {Proceedings of the APSIPA}, year = {2013}}
-
Mixed-strategy Nash Equilibrium In The Camera Source Identification Game
Proc. IEEE International Conference on Image Processing ICIP 2013
2013, pp. 4472-4476
DOI: 10.1109/icip.2013.6738921
BibTeX@inproceedings{Zeng2013, author = {Hui Zeng and Xiangui Kang and Jiwu Huang}, title = {Mixed-strategy Nash Equilibrium In The Camera Source Identification Game}, booktitle = {Proc. IEEE International Conference on Image Processing ICIP 2013}, year = {2013}, pages = {4472--4476}}
-
Image-splicing forgery detection based on local binary patterns of DCT coefficients
Security and Communication Networks, 2013, Vol. -, pp. n/a-n/a
DOI: 10.1002/sec.721
BibTeX@article{Zhang2013, author = {Zhang, Yujin and Zhao, Chenglin and Pi, Yiming and Li, Shenghong and Wang, Shilin}, title = {Image-splicing forgery detection based on local binary patterns of DCT coefficients}, journal = {Security and Communication Networks}, year = {2013}, volume = {-}, pages = {n/a--n/a}}
-
Detecting shifted double JPEG compression tampering utilizing both intra-block and inter-block correlations
Journal of Shanghai Jiaotong University (Science), Shanghai Jiaotong University Press, 2013, Vol. 18, pp. 7-16
DOI: 10.1007/s12204-013-1362-9
BibTeX@article{Zhang2013a, author = {Zhang, Yu-jin and Li, Sheng-hong and Wang, Shi-lin}, title = {Detecting shifted double JPEG compression tampering utilizing both intra-block and inter-block correlations}, journal = {Journal of Shanghai Jiaotong University (Science)}, publisher = {Shanghai Jiaotong University Press}, year = {2013}, volume = {18}, pages = {7--16}}
-
Passive Forensics for Region Duplication Image Forgery Based on Harris Feature Points and Local Binary Patterns
Mathematical Problems in Engineering, 2013, Vol. 2013
BibTeX@article{Zhao2013a, author = {Jie Zhao and Weifeng Zhao}, title = {Passive Forensics for Region Duplication Image Forgery Based on Harris Feature Points and Local Binary Patterns}, journal = {Mathematical Problems in Engineering}, year = {2013}, volume = {2013}}
-
Image Splicing Detection Based on Noncausal Markov Model
Proc. IEEE International Conference on Image Processing ICIP 2013
2013, pp. 4462 - 4466
BibTeX@inproceedings{Zhao2013, author = {Xudong Zhao and Shilin Wang and Shenghong Li and Jianhua Li and Quanqiao Yuan}, title = {Image Splicing Detection Based on Noncausal Markov Model}, booktitle = {Proc. IEEE International Conference on Image Processing ICIP 2013}, year = {2013}, pages = {4462 -- 4466}}
-
A LBP-Based Method for Detecting Copy-Move Forgery with Rotation
Park, J. J. (J. H., Ng, J. K.-Y., Jeong, H. Y. & Waluyo, B. (ed.)
Multimedia and Ubiquitous Engineering
Springer Netherlands, 2013, Vol. 240, pp. 261-267
DOI: 10.1007/978-94-007-6738-6_33
BibTeX@incollection{Zheng2013, author = {Zheng, Ning and Wang, Yixing and Xu, Ming}, title = {A LBP-Based Method for Detecting Copy-Move Forgery with Rotation}, booktitle = {Multimedia and Ubiquitous Engineering}, publisher = {Springer Netherlands}, year = {2013}, volume = {240}, pages = {261--267}}
-
A robust image copy-move forgery detection based on mixed moments
Software Engineering and Service Science (ICSESS), 2013 4th IEEE International Conference on
2013, pp. 381-384
DOI: 10.1109/ICSESS.2013.6615329
BibTeX@inproceedings{Zhong2013, author = {Le Zhong and Weihong Xu}, title = {A robust image copy-move forgery detection based on mixed moments}, booktitle = {Software Engineering and Service Science (ICSESS), 2013 4th IEEE International Conference on}, year = {2013}, pages = {381--384}}
-
Proceedings of the 17th Interpol International Forensic Science Managers Symposium, Lyon
Daéid, N. N. (ed.)
2013, Vol. Centre for Forensic Science, University of Strathclyde, Glasgow, UK
DOI: 10.1109/isplc.2013.6525804
BibTeX@proceedings{Interpol2013,, title = {Proceedings of the 17th Interpol International Forensic Science Managers Symposium, Lyon}, year = {2013}, volume = {Centre for Forensic Science, University of Strathclyde, Glasgow, UK}}
2012
-
Unsupervised Estimation of Signal-Dependent CCD Camera Noise
EURASIP Journal on Advances in Signal Processing, Springer, 2012, Vol. 2012(1), pp. 231
BibTeX@article{Aiazzi2012, author = {Aiazzi, B. and Alparone, L. and Baronti, S. and Selva, M. and Stefani, L.}, title = {Unsupervised Estimation of Signal-Dependent CCD Camera Noise}, journal = {EURASIP Journal on Advances in Signal Processing}, publisher = {Springer}, year = {2012}, volume = {2012}, number = {1}, pages = {231}}
-
Estimate of PRNU Noise Based on Different Noise Models for Source Camera Identification
International Journal of Digital Crime and Forensics (IJDCF), 2012, Vol. 2(2), pp. 21-34
BibTeX@article{Amerini2012, author = {Irene Amerini and Roberto Caldelli and Vito Cappellini and Francesco Picchioni and and Alessandro Piva}, title = {Estimate of PRNU Noise Based on Different Noise Models for Source Camera Identification}, journal = {International Journal of Digital Crime and Forensics (IJDCF)}, year = {2012}, volume = {2}, number = {2}, pages = {21-34}}
-
Detection of doctored images using correlations of PSF
Proceedings of the Eighth Indian Conference on Computer Vision, Graphics and Image Processing
ACM, 2012, pp. 56:1-56:6
BibTeX@inproceedings{Ananya2012, author = {Ananya, U. and Muktanidhi, S. D. and Mudenagudi, Uma}, title = {Detection of doctored images using correlations of PSF}, booktitle = {Proceedings of the Eighth Indian Conference on Computer Vision, Graphics and Image Processing}, publisher = {ACM}, year = {2012}, pages = {56:1--56:6}}
-
Camera identification by grouping images from database, based on shared noise patterns
CoRR, 2012, Vol. abs/1207.2641, pp. -
BibTeX@article{Baar2012, author = {Teun Baar and Wiger van Houten and Zeno Geradts}, title = {Camera identification by grouping images from database, based on shared noise patterns}, journal = {CoRR}, year = {2012}, volume = {abs/1207.2641}, pages = {-}}
-
Dealing with uncertainty in image forensics: A fuzzy approach
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2012
2012, pp. 1753-1756
BibTeX@inproceedings{Barni2012, author = {Barni, M. and Costanzo, A. }, title = {Dealing with uncertainty in image forensics: A fuzzy approach}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2012}, year = {2012}, pages = {1753--1756}}
-
A universal technique to hide traces of histogram-based image manipulations
Proceedings of the on Multimedia and security
ACM, 2012, pp. 97-104
BibTeX@inproceedings{Barni2012b, author = {Barni, Mauro and Fontani, Marco and Tondi, Benedetta}, title = {A universal technique to hide traces of histogram-based image manipulations}, booktitle = {Proceedings of the on Multimedia and security}, publisher = {ACM}, year = {2012}, pages = {97--104}}
-
Optimum forensic and counter-forensic strategies for source identification with training data
Proc. IEEE Int Information Forensics and Security (WIFS) Workshop
2012, pp. 199-204
BibTeX@inproceedings{Barni2012a, author = {Barni, Mauro and Tondi, Benedetta}, title = {Optimum forensic and counter-forensic strategies for source identification with training data}, booktitle = {Proc. IEEE Int Information Forensics and Security (WIFS) Workshop}, year = {2012}, pages = {199--204}}
-
Shape, albedo, and illumination from a single image of an unknown object
Proc. IEEE Conf. Computer Vision and Pattern Recognition (CVPR)
2012, pp. 334-341
BibTeX@inproceedings{Barron2012, author = {Barron, J. T. and Malik, J.}, title = {Shape, albedo, and illumination from a single image of an unknown object}, booktitle = {Proc. IEEE Conf. Computer Vision and Pattern Recognition (CVPR)}, year = {2012}, pages = {334--341}}
-
Image Forensics of High Dynamic Range Imaging
Shi, Y., Kim, H.-J. & Perez-Gonzalez, F. (ed.)
Digital Forensics and Watermarking
Springer Berlin / Heidelberg, 2012, Vol. 7128, pp. 336-348
BibTeX@incollection{Bateman2012, author = {Bateman, Philip and Ho, Anthony and Briffa, Johann}, title = {Image Forensics of High Dynamic Range Imaging}, booktitle = {Digital Forensics and Watermarking}, publisher = {Springer Berlin / Heidelberg}, year = {2012}, volume = {7128}, pages = {336-348}}
-
Robust Image Alignment for Tampering Detection
IEEE Transactions on Information Forensics and Security, 2012, Vol. 7(4), pp. 1105-1117
BibTeX@article{Battiato2012a, author = {Battiato, S. and Farinella, G. M. and Messina, E. and Puglisi, G. }, title = {Robust Image Alignment for Tampering Detection}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2012}, volume = {7}, number = {4}, pages = {1105--1117}}
-
Image forgery detection by means of no-reference quality metrics
Memon, N. D., Alattar, A. M. & III, E. J. D. (ed.)
Proc. SPIE 8303
Media Watermarking, Security, and Forensics 2012, SPIE, 2012, Vol. 8303(1), pp. 83030K
BibTeX@inproceedings{Battisti2012, author = {F. Battisti and M. Carli and A. Neri}, title = {Image forgery detection by means of no-reference quality metrics}, booktitle = {Proc. SPIE 8303}, journal = {Media Watermarking, Security, and Forensics 2012}, publisher = {SPIE}, year = {2012}, volume = {8303}, number = {1}, pages = {83030K}}
-
Efficient Sensor Fingerprint Matching Through Fingerprint Binarization
IEEE Transactions on Information Forensics and Security, 2012, Vol. 7(4), pp. 1404-1413
BibTeX@article{Bayram2012, author = {Bayram, S. and Sencar, H. T. and Memon, N.}, title = {Efficient Sensor Fingerprint Matching Through Fingerprint Binarization}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2012}, volume = {7}, number = {4}, pages = {1404--1413}}
-
Video codec identification
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2012
2012, pp. 2257-2260
BibTeX@inproceedings{Bestagini2012a, author = {Bestagini, Paolo and Allam, Ahmed and Milani, Simone and Tagliasacchi, Marco and Tubaro, Stefano}, title = {Video codec identification}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2012}, year = {2012}, pages = {2257--2260}}
-
An Overview on Video Forensics
Poc. of the 20th European Signal Processing Conference (EUSIPCO 2012)
2012, pp. 1234-1238
BibTeX@inproceedings{Bestagini2012, author = {P. Bestagini and M. Fontani and S. Milani and M. Barni and A. Piva and M. Tagliasacchi and S. Tubaro}, title = {An Overview on Video Forensics}, booktitle = {Poc. of the 20th European Signal Processing Conference (EUSIPCO 2012)}, year = {2012}, pages = {1234-1238}}
-
Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts
IEEE Transactions on Information Forensics and Security, 2012, Vol. 7(3), pp. 1003 - 1017
BibTeX@article{Bianchi2012, author = {Bianchi, Tiziano and Piva, Alessandro}, title = {Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2012}, volume = {7}, number = {3}, pages = {1003 - 1017}}
-
Reverse engineering of double JPEG compression in the presence of image resizing
Information Forensics and Security (WIFS), 2012 IEEE International Workshop on
2012, pp. 127-132
BibTeX@inproceedings{Bianchi2012a, author = {Bianchi, Tiziano and Piva, Alessandro}, title = {Reverse engineering of double JPEG compression in the presence of image resizing}, booktitle = {Information Forensics and Security (WIFS), 2012 IEEE International Workshop on}, year = {2012}, pages = {127--132}}
-
Detection of Nonaligned Double JPEG Compression Based on Integer Periodicity Maps
Information Forensics and Security, IEEE Transactions on, 2012, Vol. 7(2), pp. 842-848
BibTeX@article{Bianchi2012b, author = {Bianchi, T. and Piva, A.}, title = {Detection of Nonaligned Double JPEG Compression Based on Integer Periodicity Maps}, journal = {Information Forensics and Security, IEEE Transactions on}, year = {2012}, volume = {7}, number = {2}, pages = {842-848}}
-
Digital Image Forensics
Sencar, H. T. & Memon, N. (ed.)
Chapter Counter-Forensics: Attacking Image Forensics
Springer, 2012, pp. -
BibTeX@inbook{Boehme2012, author = {Rainer Böhme and Matthias Kirchner}, title = {Digital Image Forensics}, publisher = {Springer}, year = {2012}, pages = {-}}
-
Image forgery detection through motion blur estimates
Computational Intelligence & Computing Research (ICCIC), 2012 IEEE International Conference on
2012, pp. 1-4
BibTeX@inproceedings{Bora2012, author = {Bora, R.M. and Shahane, N.M.}, title = {Image forgery detection through motion blur estimates}, booktitle = {Computational Intelligence & Computing Research (ICCIC), 2012 IEEE International Conference on}, year = {2012}, pages = {1--4}}
-
Detecting Primary,secondary and Triple Jpeg Compression Having Same Quantization Matrix
International Journal of Communications and Engineering, 2012, Vol. 3(3), pp. 8-14
BibTeX@article{Brindha2012, author = {S. Brindha and S Kumarganesh}, title = {Detecting Primary,secondary and Triple Jpeg Compression Having Same Quantization Matrix}, journal = {International Journal of Communications and Engineering}, year = {2012}, volume = {3}, number = {3}, pages = {8-14}}
-
A Tampered Image Detecting Method Based on Wavelet Analysis
International Journal of Information and Electronics Engineering, 2012, Vol. 2(2), pp. 38-43
BibTeX@article{Bu2012, author = {Wenqing Bu and Ming Xu and Ning Zheng}, title = {A Tampered Image Detecting Method Based on Wavelet Analysis}, journal = {International Journal of Information and Electronics Engineering}, year = {2012}, volume = {2}, number = {2}, pages = {38-43}}
-
Blind CFA Interpolation Detection Based on the Entropy
Advanced Materials Research, 2012, Vol. 532 - 533 Materials Science and Information Technology II, pp. 787-791
BibTeX@article{Cai2012, author = {Suozhang Cai and Mingli Li}, title = {Blind CFA Interpolation Detection Based on the Entropy}, journal = {Advanced Materials Research}, year = {2012}, volume = {532 - 533 Materials Science and Information Technology II}, pages = {787-791}}
-
On the effectiveness of local warping against SIFT-based copy-move detection
Proc. 5th Int Communications Control and Signal Processing (ISCCSP) Symp
2012, pp. 1-5
BibTeX@inproceedings{Caldelli2012, author = {Caldelli, R. and Amerini, I. and Ballan, L. and Serra, G. and Barni, M. and Costanzo, A.}, title = {On the effectiveness of local warping against SIFT-based copy-move detection}, booktitle = {Proc. 5th Int Communications Control and Signal Processing (ISCCSP) Symp}, year = {2012}, pages = {1--5}}
-
Measuring the Statistical Correlation Inconsistencies in Mobile Images for Tamper Detection
Shi, Y. (ed.)
Transactions on Data Hiding and Multimedia Security VII
Springer Berlin / Heidelberg, 2012, Vol. 7110, pp. 63-81
BibTeX@incollection{Cao2012, author = {Cao, Hong and Kot, Alex}, title = {Measuring the Statistical Correlation Inconsistencies in Mobile Images for Tamper Detection}, booktitle = {Transactions on Data Hiding and Multimedia Security VII}, publisher = {Springer Berlin / Heidelberg}, year = {2012}, volume = {7110}, pages = {63-81}}
-
Detection of Tampering Inconsistencies on Mobile Photos
Proc. Int. Workshop on Digital Watermarking
Lecture Notes in Computer Science, 2012, Vol. -, pp. 115-119
BibTeX@article{Cao2012c, author = {H. Cao and A.C. Kot}, title = {Detection of Tampering Inconsistencies on Mobile Photos}, booktitle = {Proc. Int. Workshop on Digital Watermarking}, journal = {Lecture Notes in Computer Science}, year = {2012}, volume = {-}, pages = {115--119}}
-
Measuring the statistical correlation inconsistencies in mobile images for tamper detection
Shi, Y. Q. (ed.)
Transactions on Data Hiding and Multimedia Security VII
Chapter Measuring the statistical correlation inconsistencies in mobile images for tamper detection
Springer-Verlag, 2012, pp. 63-81
BibTeX@incollection{Cao2012b, author = {Cao, Hong and Kot, Alex C.}, title = {Measuring the statistical correlation inconsistencies in mobile images for tamper detection}, booktitle = {Transactions on Data Hiding and Multimedia Security VII}, publisher = {Springer-Verlag}, year = {2012}, pages = {63--81}}
-
Manipulation Detection on Image Patches Using FusionBoost
IEEE Transactions on Information Forensics and Security, 2012, Vol. 7(3), pp. 992-1002
BibTeX@article{Cao2012a, author = {Cao, H. and Kot, A. C. }, title = {Manipulation Detection on Image Patches Using FusionBoost}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2012}, volume = {7}, number = {3}, pages = {992--1002}}
-
Improvement of Real-Time Image Splicing Method Basic on Gray Level
Computer Science & Service System (CSSS), 2012 International Conference on
2012, pp. 1555-1558
BibTeX@inproceedings{Cao2012d, author = {YueQin Cao}, title = {Improvement of Real-Time Image Splicing Method Basic on Gray Level}, booktitle = {Computer Science & Service System (CSSS), 2012 International Conference on}, year = {2012}, pages = {1555--1558}}
-
Experiments on Improving Sensor Pattern Noise Extraction for Source Camera Identification
Proc. Sixth Int Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS) Conf
2012, pp. 609-616
BibTeX@inproceedings{Cattaneo2012, author = {Giuseppe Cattaneo and Pompeo Faruolo and Umberto Ferraro Petrillo}, title = {Experiments on Improving Sensor Pattern Noise Extraction for Source Camera Identification}, booktitle = {Proc. Sixth Int Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS) Conf}, year = {2012}, pages = {609--616}}
-
A two dimensional camera identification method based on image sensor noise
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2012
2012, pp. 1741-1744
BibTeX@inproceedings{Chan2012, author = {Chan, Lit-Hung and Law, Ngai-Fong and Siu, Wan-Chi}, title = {A two dimensional camera identification method based on image sensor noise}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2012}, year = {2012}, pages = {1741--1744}}
-
Median Filtering Detection Using Edge Based Prediction Matrix
Shi, Y., Kim, H.-J. & Perez-Gonzalez, F. (ed.)
Digital Forensics and Watermarking
Springer Berlin / Heidelberg, 2012, Vol. 7128, pp. 361-375
BibTeX@incollection{Chen2012, author = {Chen, Chenglong and Ni, Jiangqun}, title = {Median Filtering Detection Using Edge Based Prediction Matrix}, booktitle = {Digital Forensics and Watermarking}, publisher = {Springer Berlin / Heidelberg}, year = {2012}, volume = {7128}, pages = {361-375}}
-
Blind Median Filtering Detection Using Statistics in Difference Domain
ihconference.org
2012
BibTeX@inproceedings{Chen2012b, author = {C Chen and J Ni and R Huang and, J Huang}, title = {Blind Median Filtering Detection Using Statistics in Difference Domain}, booktitle = {ihconference.org}, year = {2012}}
-
An Image Region Description Method Based on Step Sector Statistics and its Application in Image Copy-Rotate/Flip-Move Forgery Detection
International Journal of Digital Crime and Forensics (IJDCF), 2012, Vol. 4(1), pp. 49-53
BibTeX@article{Chen2012a, author = {Likai Chen and Wei Lu and Jiangqun Ni}, title = {An Image Region Description Method Based on Step Sector Statistics and its Application in Image Copy-Rotate/Flip-Move Forgery Detection}, journal = {International Journal of Digital Crime and Forensics (IJDCF)}, year = {2012}, volume = {4}, number = {1}, pages = {49--53}}
-
A Study an the Photo Response Non-uniformity Noise Pattern Based Image Forensics in Real-world Applications
Institute for Infocomm Research, 1 Fusionopolis Way, 138632, Singapore, Institute for Infocomm Research, 1 Fusionopolis Way, 138632, Singapore, 2012
BibTeX@techreport{Chen2012c, author = {Yu Chen and Vrizlynn L. L. Thing}, title = {A Study an the Photo Response Non-uniformity Noise Pattern Based Image Forensics in Real-world Applications}, school = {Institute for Infocomm Research, 1 Fusionopolis Way, 138632, Singapore}, year = {2012}}
-
A Novel Photographic and Computer Graphic Composites Detection Method
Proc. of the National Conference on Information Technology and Computer Science (CITCS 2012)
2012
BibTeX@inproceedings{Chen2012e, author = {Chen, Zhenwei. and Ke, Yongzhen}, title = {A Novel Photographic and Computer Graphic Composites Detection Method}, booktitle = {Proc. of the National Conference on Information Technology and Computer Science (CITCS 2012)}, year = {2012}}
-
Source camera identification based on nonsubsampled Contourlet transform denoising filter design
Journal of Computer Applications, 2012, Vol. 2, pp. 055
BibTeX@article{Chen2012d, author = {Chen, Z. and Zhou, Z.}, title = {Source camera identification based on nonsubsampled Contourlet transform denoising filter design}, journal = {Journal of Computer Applications}, year = {2012}, volume = {2}, pages = {055}}
-
Forged Region Detection for Scanned Images
J. (Jong Hyuk) Park, J., Chao, H.-C., S. Obaidat, M. & Kim, J. (ed.)
Computer Science and Convergence
Springer Netherlands, 2012, Vol. 114, pp. 687-694
BibTeX@incollection{Choi2012, author = {Choi, Chang-Hee and Lee, Min-Jeong and Hyun, Dai-Kyung and Lee, Heung-Kyu}, title = {Forged Region Detection for Scanned Images}, booktitle = {Computer Science and Convergence}, publisher = {Springer Netherlands}, year = {2012}, volume = {114}, pages = {687-694}}
-
An Evaluation of Popular Copy-Move Forgery Detection Approaches
ArXiv > Computer Science > Computer Vision and Pattern Recognition, 2012
BibTeX@electronic{Christlein2012, author = {Vincent Christlein and Christian Riess and Johannes Jordan and Corinna Riess and Elli Angelopoulou}, title = {An Evaluation of Popular Copy-Move Forgery Detection Approaches}, journal = {ArXiv > Computer Science > Computer Vision and Pattern Recognition}, year = {2012}}
-
An Evaluation of Popular Copy-Move Forgery Detection Approaches
IEEE Transactions on Information Forensics and Security, 2012, Vol. 7(6), pp. 1841-1854
BibTeX@article{Christlein2012a, author = {Christlein, V. and Riess, C. and Jordan, J. and Riess, C. and Angelopoulou, E.}, title = {An Evaluation of Popular Copy-Move Forgery Detection Approaches}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2012}, volume = {7}, number = {6}, pages = {1841--1854}}
-
Forensic identification of compressively sensed images
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2012
2012, pp. 1837-1840
BibTeX@inproceedings{Chu2012, author = {Xiaoyu Chu and Stamm, M. C. and Lin, W. S. and Liu, K. J. R.}, title = {Forensic identification of compressively sensed images}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2012}, year = {2012}, pages = {1837--1840}}
-
Resiliency Assessment and Enhancement of Intrinsic Fingerprinting
Faculty of the Graduate School of the University of Maryland, College Park, Faculty of the Graduate School of the University of Maryland, College Park, 2012
BibTeX@phdthesis{Chuang2012, author = {Wei-Hong Chuang}, title = {Resiliency Assessment and Enhancement of Intrinsic Fingerprinting}, school = {Faculty of the Graduate School of the University of Maryland, College Park}, year = {2012}}
-
An Anti-Forensic Algorithm of JPEG Double Compression Based Forgery Detection
Information Science and Engineering (ISISE), 2012 International Symposium on
2012, pp. 159-164
BibTeX@inproceedings{Chunhui2012, author = {Feng Chunhui and Xu Zhengquan and Zheng Xinghui}, title = {An Anti-Forensic Algorithm of JPEG Double Compression Based Forgery Detection}, booktitle = {Information Science and Engineering (ISISE), 2012 International Symposium on}, year = {2012}, pages = {159--164}}
-
An Image Splicing Detection Based on Interpolation Analysis
Lin, W., Xu, D., Ho, A., Wu, J., He, Y., Cai, J., Kankanhalli, M. & Sun, M.-T. (ed.)
Advances in Multimedia Information Processing -- PCM 2012
Springer Berlin Heidelberg, 2012, Vol. 7674, pp. 390-401
BibTeX@incollection{Ciptasari2012, author = {Ciptasari, RimbaW. and Rhee, Kyung-Hyune and Sakurai, Kouichi}, title = {An Image Splicing Detection Based on Interpolation Analysis}, booktitle = {Advances in Multimedia Information Processing -- PCM 2012}, publisher = {Springer Berlin Heidelberg}, year = {2012}, volume = {7674}, pages = {390-401}}
-
Exposing Digital Forgeries in Ballistic Motion
IEEE Transactions on Information Forensics and Security, 2012, Vol. 7(1), pp. 283-296
BibTeX@article{Conotter2012, author = {Conotter, V. and O'Brien, J. F. and Farid, H.}, title = {Exposing Digital Forgeries in Ballistic Motion}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2012}, volume = {7}, number = {1}, pages = {283--296}}
-
A Comparative Analysis of Forgery Detection Algorithms
International Workshops on Statistical Techniques in Pattern Recognition, LNCS 7626
2012
BibTeX@inproceedings{Cozzolino2012, author = {D. Cozzolino and G. Poggi and C. Sansone and L. Verdoliva}, title = {A Comparative Analysis of Forgery Detection Algorithms}, booktitle = {International Workshops on Statistical Techniques in Pattern Recognition, LNCS 7626}, year = {2012}}
-
Discrimination Between Computer Generated and Natural Human Faces Based on Asymmetry Information
Poc. of the 20th European Signal Processing Conference (EUSIPCO 2012)
2012, pp. 1234-1238
BibTeX@inproceedings{Dang-Nguyen2012, author = {D. T. Dang-Nguyen and G. Boato and F. D. N. De Natale}, title = {Discrimination Between Computer Generated and Natural Human Faces Based on Asymmetry Information}, booktitle = {Poc. of the 20th European Signal Processing Conference (EUSIPCO 2012)}, year = {2012}, pages = {1234-1238}}
-
Detection of Copy-Rotate-Move Forgery Using Dual Tree Complex Wavelet Transform
Advanced Science Letters, 2012, Vol. 16(1), pp. 32-38
BibTeX@article{Deng:2012:1936-6612:32, author = {Deng, Yu and Wu, Yunjie and Zhou, Linna}, title = {Detection of Copy-Rotate-Move Forgery Using Dual Tree Complex Wavelet Transform}, journal = {Advanced Science Letters}, year = {2012}, volume = {16}, number = {1}, pages = {32-38}}
-
Pixel Based Digital Image Forgery Detection Techniques
International Journal of Engineering Research and Applications (IJERA), 2012, Vol. 2(3), pp. 539-543
BibTeX@article{Deshpande2012, author = {Pradyumna Deshpande and Prashasti Kanikar}, title = {Pixel Based Digital Image Forgery Detection Techniques}, journal = {International Journal of Engineering Research and Applications (IJERA)}, year = {2012}, volume = {2}, number = {3}, pages = {539-543}}
-
Region duplication blind detection based on multiple feature combination
Machine Learning and Cybernetics (ICMLC), 2012 International Conference on
2012, Vol. 1, pp. 17-21
BibTeX@inproceedings{Du2012, author = {Zhen-Long Du and Xiao-Li Li and Li-Xin Jiao and Kangkang Shen}, title = {Region duplication blind detection based on multiple feature combination}, booktitle = {Machine Learning and Cybernetics (ICMLC), 2012 International Conference on}, year = {2012}, volume = {1}, pages = {17--21}}
-
Source Camera Classification and Clustering from Sensor Pattern Noise
2012
BibTeX@article{Eklann2012, author = {Eklann, J. and Lundberg, J.}, title = {Source Camera Classification and Clustering from Sensor Pattern Noise}, year = {2012}}
-
Detectable Tampering of JPEG Anti-Forensics
2012, pp. 1-4
BibTeX@misc{Fahmy2012, author = {Fahmy, Gamal}, title = {Detectable Tampering of JPEG Anti-Forensics}, year = {2012}, pages = {1--4}}
-
3D Lighting-Based Image Forgery Detection Using Shape-From-Shading
Poc. of the 20th European Signal Processing Conference (EUSIPCO 2012)
2012, pp. 1777-1781
BibTeX@inproceedings{Fan2012, author = {W. Fan and K. Wang and F. Cayre and Z. Xiong}, title = {3D Lighting-Based Image Forgery Detection Using Shape-From-Shading}, booktitle = {Poc. of the 20th European Signal Processing Conference (EUSIPCO 2012)}, year = {2012}, pages = {1777-1781}}
-
Perceptual discrimination of computer generated and photographic faces
Digital Investigation, 2012, Vol. 8(3-4), pp. 226 - 235
BibTeX@article{Farid2012, author = {Hany Farid and Mary J. Bravo}, title = {Perceptual discrimination of computer generated and photographic faces}, journal = {Digital Investigation}, year = {2012}, volume = {8}, number = {3--4}, pages = {226 - 235}}
-
Digital camera simulation
Applied Optics, 2012, Vol. 51(4), pp. A80-A90
BibTeX@article{Farrell2012, author = {Joyce E. Farrell and Peter B. Catrysse and Brian A. Wandell}, title = {Digital camera simulation}, journal = {Applied Optics}, year = {2012}, volume = {51}, number = {4}, pages = {A80-A90}}
-
Normalized Energy Density-Based Forensic Detection of Resampled Images
IEEE Transactions on Multimedia, 2012, Vol. 14(3), pp. 536-545
BibTeX@article{Feng2012, author = {Feng, X. and Cox, I. J. and Doerr, G. }, title = {Normalized Energy Density-Based Forensic Detection of Resampled Images}, journal = {IEEE Transactions on Multimedia}, year = {2012}, volume = {14}, number = {3}, pages = {536--545}}
-
Image Forgery Localization via Fine-Grained Analysis of CFA Artifacts
IEEE Transactions on Information Forensics and Security, 2012, Vol. 7(5), pp. 1566-1577
BibTeX@article{Ferrara2012, author = {Ferrara, Pasquale and Bianchi, Tiziano and De Rosa, Alessia and Piva, Alessandro }, title = {Image Forgery Localization via Fine-Grained Analysis of CFA Artifacts}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2012}, volume = {7}, number = {5}, pages = {1566--1577}}
-
Hiding Traces of Median Filtering in Digital Images
Poc. of the 20th European Signal Processing Conference (EUSIPCO 2012)
2012
BibTeX@inproceedings{Fontani2012, author = {M. Fontani and M. Barni}, title = {Hiding Traces of Median Filtering in Digital Images}, booktitle = {Poc. of the 20th European Signal Processing Conference (EUSIPCO 2012)}, year = {2012}}
-
Techniques of image manipulation and detection of copy-move attack
Telecommunications Forum (TELFOR), 2012 20th
2012, pp. 1625-1628
BibTeX@inproceedings{Franc2012, author = {Franc, I. and Stojmenovic, M.}, title = {Techniques of image manipulation and detection of copy-move attack}, booktitle = {Telecommunications Forum (TELFOR), 2012 20th}, year = {2012}, pages = {1625--1628}}
-
Sensor Defects in Digital Image Forensic
Chapter 1: Sensor Defects in Digital Image Forensic
2012
BibTeX@unpublished{Fridrich2012, author = {Jessica Fridrich}, title = {Sensor Defects in Digital Image Forensic}, year = {2012}}
-
Forgery Authentication in Extreme Wide-Angle Lens Using Distortion Cue and Fake Saliency Map
IEEE Transactions on Information Forensics and Security, 2012, Vol. 7(4), pp. 1301-1314
BibTeX@article{Fu2012, author = {Huazhu Fu and Xiaochun Cao}, title = {Forgery Authentication in Extreme Wide-Angle Lens Using Distortion Cue and Fake Saliency Map}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2012}, volume = {7}, number = {4}, pages = {1301--1314}}
-
Camera Response Function Estimation and Application with a Single Image
Yang, D. (ed.)
Informatics in Control, Automation and Robotics
Lecture Notes in Electrical Engineering, Springer Berlin Heidelberg, 2012, Vol. 133, pp. 149-156
BibTeX@incollection{Fu2012a, author = {Fu, Li and Qi, Yue}, title = {Camera Response Function Estimation and Application with a Single Image}, booktitle = {Informatics in Control, Automation and Robotics}, journal = {Lecture Notes in Electrical Engineering}, publisher = {Springer Berlin Heidelberg}, year = {2012}, volume = {133}, pages = {149-156}}
-
Using Multi-step Transition Matrices for Camera Model Identification
International Journal of Hybrid Information Technology, 2012, Vol. 5(2), pp. 275-288
BibTeX@article{Gao2012a, author = {Gao, S. and Hu, R.M. and Tian, G.}, title = {Using Multi-step Transition Matrices for Camera Model Identification}, journal = {International Journal of Hybrid Information Technology}, year = {2012}, volume = {5}, number = {2}, pages = {275--288}}
-
Camera Model Identification Based on the Characteristic of CFA and Interpolation
Shi, Y., Kim, H.-J. & Perez-Gonzalez, F. (ed.)
Digital Forensics and Watermarking
Springer Berlin / Heidelberg, 2012, Vol. 7128, pp. 268-280
BibTeX@incollection{Gao2012, author = {Gao, Shang and Xu, Guanshuo and Hu, Rui-Min}, title = {Camera Model Identification Based on the Characteristic of CFA and Interpolation}, booktitle = {Digital Forensics and Watermarking}, publisher = {Springer Berlin / Heidelberg}, year = {2012}, volume = {7128}, pages = {268-280}}
-
Research on PRNU
Nederlands Forensisch Instituut, Nederlands Forensisch Instituut, 2012
BibTeX@techreport{Gisolf2012, author = {Floris Gisolf}, title = {Research on PRNU}, school = {Nederlands Forensisch Instituut}, year = {2012}}
-
Forensic analysis of ordered data structures on the example of JPEG files
Proc. IEEE Int Information Forensics and Security (WIFS) Workshop
2012, pp. 139-144
BibTeX@inproceedings{Gloe2012, author = {Gloe, Thomas}, title = {Forensic analysis of ordered data structures on the example of JPEG files}, booktitle = {Proc. IEEE Int Information Forensics and Security (WIFS) Workshop}, year = {2012}, pages = {139--144}}
-
Unexpected artefacts in PRNU-based camera identification: a ´Dresden Image Database´ case-study
Proceedings of the on Multimedia and security
ACM, 2012, pp. 109-114
BibTeX@inproceedings{Gloe2012a, author = {Gloe, Thomas and Pfennig, Stefan and Kirchner, Matthias}, title = {Unexpected artefacts in PRNU-based camera identification: a ´Dresden Image Database´ case-study}, booktitle = {Proceedings of the on Multimedia and security}, publisher = {ACM}, year = {2012}, pages = {109--114}}
-
Analysis of images for local artificial changes with JPEG compression properties
Pattern Recognition and Image Analysis, MAIK Nauka/Interperiodica distributed exclusively by Springer Science+Business Media LLC., 2012, Vol. 22, pp. 210-214
BibTeX@article{Glumov2012, author = {Glumov, N. and Kuznetsov, A.}, title = {Analysis of images for local artificial changes with JPEG compression properties}, journal = {Pattern Recognition and Image Analysis}, publisher = {MAIK Nauka/Interperiodica distributed exclusively by Springer Science+Business Media LLC.}, year = {2012}, volume = {22}, pages = {210-214}}
-
Sensor-Fingerprint Based Identification of Images Corrected for Lens Distortion
Proceedings of SPIE, 2012
BibTeX@article{Goljan2012, author = {Miroslav Goljan and Jessica Fridrich}, title = {Sensor-Fingerprint Based Identification of Images Corrected for Lens Distortion}, journal = {Proceedings of SPIE}, year = {2012}}
-
Fakery Image Identifying Using Lighting Direction
Journal of Information & Computational Science, 2012, Vol. 9(7), pp. 1949-1955
BibTeX@article{Gong2012, author = {Wenyong Gong and Xinglong Wu and Tieru Wu}, title = {Fakery Image Identifying Using Lighting Direction}, journal = {Journal of Information & Computational Science}, year = {2012}, volume = {9}, number = {7}, pages = {1949-1955}}
-
Duplication Forgery Detection Using Improved DAISY Descriptor
Expert Systems with Applications, 2012, Vol. -(0), pp. -
BibTeX@article{Guo2012, author = {Jing-Ming Guo and Yun-Fu Liu and Zong-Jhe Wu}, title = {Duplication Forgery Detection Using Improved DAISY Descriptor}, journal = {Expert Systems with Applications}, year = {2012}, volume = {-}, number = {0}, pages = {-}}
-
Noise-Contrastive Estimation of Unnormalized Statistical Models, with Applications to Natural Image Statistics
Journal of Machine Learning Research, 2012, Vol. 13, pp. 307-361
BibTeX@article{Gutmann2012, author = {Michael U. Gutmann and Aapo Hyv¨ arinen}, title = {Noise-Contrastive Estimation of Unnormalized Statistical Models, with Applications to Natural Image Statistics}, journal = {Journal of Machine Learning Research}, year = {2012}, volume = {13}, pages = {307-361}}
-
Digital image splicing detection based on Markov features in DCT and DWT domain
Pattern Recognition, 2012(0), pp. -
BibTeX@article{He2012, author = {Zhongwei He and Wei Lu and Wei Sun and Jiwu Huang}, title = {Digital image splicing detection based on Markov features in DCT and DWT domain}, journal = {Pattern Recognition}, year = {2012}, number = {0}, pages = { - }}
-
A New Algorithm for Image Copy-Move Forgery Detection
Materials Science and Information Technology, 2012, Vol. 433-440, pp. 5930-5934
BibTeX@article{Hou2012, author = {Dong Mei Hou and Zheng Yao Bai and Shu Chun Liu}, title = {A New Algorithm for Image Copy-Move Forgery Detection}, journal = {Materials Science and Information Technology}, year = {2012}, volume = {433-440}, pages = {5930-5934}}
-
Using Anisotropic Diffusion for Efficient Extraction of Sensor Noise in Camera Identification
Journal of Forensic Sciences, 2012, Vol. 57(2), pp. 512-527
BibTeX@article{Houten2012, author = {Wiger van Houten and Zeno Geradts}, title = {Using Anisotropic Diffusion for Efficient Extraction of Sensor Noise in Camera Identification}, journal = {Journal of Forensic Sciences}, year = {2012}, volume = {57}, number = {2}, pages = {512-527}}
-
Digital evidence collection for web image access
Security and Communication Networks, Wiley Online Library, 2012
BibTeX@article{Hsieh2012, author = {Hsieh, Che-Jen and Li, Jung-Shian and Liu, Wei-Cheng}, title = {Digital evidence collection for web image access}, journal = {Security and Communication Networks}, publisher = {Wiley Online Library}, year = {2012}}
-
Detection of copy-move forgery image using Gabor descriptor
Proc. Int Anti-Counterfeiting, Security and Identification (ASID) Conf
2012, pp. 1-4
BibTeX@inproceedings{Hsu2012, author = {Hao-Chiang Hsu and Min-Shi Wang}, title = {Detection of copy-move forgery image using Gabor descriptor}, booktitle = {Proc. Int Anti-Counterfeiting, Security and Identification (ASID) Conf}, year = {2012}, pages = {1--4}}
-
Fast camera fingerprint search algorithm for source camera identification
Proc. 5th Int Communications Control and Signal Processing (ISCCSP) Symp
2012, pp. 1-5
BibTeX@inproceedings{Hu2012, author = {Yongjian Hu and Chang-Tsun Li and Zhimao Lai and Shangfan Zhang}, title = {Fast camera fingerprint search algorithm for source camera identification}, booktitle = {Proc. 5th Int Communications Control and Signal Processing (ISCCSP) Symp}, year = {2012}, pages = {1--5}}
-
An Improved Algorithm for Camera Model Identification Using Inter-channel Demosaicking Traces
Proc. Eighth Int Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) Conf
2012, pp. 325-330
BibTeX@inproceedings{Hu2012b, author = {Hu, Yongjian and Li, Chang-Tsun and Lin, Xufeng and Liu, Bei-bei}, title = {An Improved Algorithm for Camera Model Identification Using Inter-channel Demosaicking Traces}, booktitle = {Proc. Eighth Int Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) Conf}, year = {2012}, pages = {325--330}}
-
Blind Integrity Verification of Medical Images
IEEE Transactions on Information Technology in Biomedicine, 2012, Vol. 16(6), pp. 1122-1126
BibTeX@article{Huang2012, author = {Huang, H. and Coatrieux, G. and Shu, H. and Luo, L. and Roux, C. }, title = {Blind Integrity Verification of Medical Images}, journal = {IEEE Transactions on Information Technology in Biomedicine}, year = {2012}, volume = {16}, number = {6}, pages = {1122--1126}}
-
Copy-Move Image Forgery Detection Using Multi-Resolution Weber Descriptors
Proc. Eighth Int Signal Image Technology and Internet Based Systems (SITIS) Conf
2012, pp. 395-401
BibTeX@inproceedings{Hussain2012, author = {Hussain, Muhammad and Muhammad, Ghulam and Saleh, Sahar Q. and Mirza, Anwar M. and Bebis, George}, title = {Copy-Move Image Forgery Detection Using Multi-Resolution Weber Descriptors}, booktitle = {Proc. Eighth Int Signal Image Technology and Internet Based Systems (SITIS) Conf}, year = {2012}, pages = {395--401}}
-
A Novel Forged Image Detection Method Using the Characteristics of Interpolation
Journal of Forensic Sciences, 2012, Vol. -, pp. -
BibTeX@article{Hwang2012, author = {Hwang, Min-Gu and Har, Dong-Hwan}, title = {A Novel Forged Image Detection Method Using the Characteristics of Interpolation}, journal = {Journal of Forensic Sciences}, year = {2012}, volume = {-}, pages = {-}}
-
Camcorder Identification for Heavily Compressed Low Resolution Videos
J. (Jong Hyuk) Park, J. J. (J. H., Chao, H.-C., S. Obaidat, M. S. & Kim, J. (ed.)
Computer Science and Convergence
Springer Netherlands, 2012, Vol. 114, pp. 695-701
BibTeX@incollection{Hyun2012, author = {Hyun, Dai-Kyung and Choi, Chang-Hee and Lee, Heung-Kyu}, title = {Camcorder Identification for Heavily Compressed Low Resolution Videos}, booktitle = {Computer Science and Convergence}, publisher = {Springer Netherlands}, year = {2012}, volume = {114}, pages = {695-701}}
-
Image Copy-Move Forgery Detecting Based on Local Invariant Feature
Journal of Multimedia, 2012, Vol. 7(1), pp. 90-97
BibTeX@article{Jing2012, author = {Li Jing and Chao Shao}, title = {Image Copy-Move Forgery Detecting Based on Local Invariant Feature}, journal = {Journal of Multimedia}, year = {2012}, volume = {7}, number = {1}, pages = {90-97}}
-
Detecting Re-captured Videos Using Shot-Based Photo Response Non-Uniformity
Shi, Y., Kim, H.-J. & Perez-Gonzalez, F. (ed.)
Digital Forensics and Watermarking
Springer Berlin / Heidelberg, 2012, Vol. 7128, pp. 281-291
BibTeX@incollection{Jung2012, author = {Jung, Dae-Jin and Hyun, Dai-Kyung and Ryu, Seung-Jin and Lee, Ji-Won and Lee, Hae-Yeoun and Lee, Heung-Kyu}, title = {Detecting Re-captured Videos Using Shot-Based Photo Response Non-Uniformity}, booktitle = {Digital Forensics and Watermarking}, publisher = {Springer Berlin / Heidelberg}, year = {2012}, volume = {7128}, pages = {281-291}}
-
Exposing Postprocessed Copy--Paste Forgeries Through Transform-Invariant Features
IEEE Transactions on Information Forensics and Security, 2012, Vol. 7(3), pp. 1018-1028
BibTeX@article{Kakar2012, author = {Kakar, P. and Sudha, N. }, title = {Exposing Postprocessed Copy--Paste Forgeries Through Transform-Invariant Features}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2012}, volume = {7}, number = {3}, pages = {1018--1028}}
-
Authenticating Image Metadata Elements Using Geolocation Information and Sun Direction Estimation
Proc. IEEE Int Multimedia and Expo (ICME) Conf
2012, pp. 236-241
BibTeX@inproceedings{Kakar2012a, author = {Kakar, P. and Sudha, N. }, title = {Authenticating Image Metadata Elements Using Geolocation Information and Sun Direction Estimation}, booktitle = {Proc. IEEE Int Multimedia and Expo (ICME) Conf}, year = {2012}, pages = {236--241}}
-
Verifying Temporal Data in Geotagged Images Via Sun Azimuth Estimation
IEEE Transactions on Information Forensics and Security, 2012, Vol. 7(3), pp. 1029-1039
BibTeX@article{Kakar2012b, author = {Kakar, P. and Sudha, N.}, title = {Verifying Temporal Data in Geotagged Images Via Sun Azimuth Estimation}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2012}, volume = {7}, number = {3}, pages = {1029--1039}}
-
Novel Blind Video Forgery Detection Using Markov Models on Motion Residue
Pan, J.-S., Chen, S.-M. & Nguyen, N. (ed.)
Intelligent Information and Database Systems
Springer Berlin / Heidelberg, 2012, Vol. 7198, pp. 308-315
BibTeX@incollection{Kancherla2012, author = {Kancherla, Kesav and Mukkamala, Srinivas}, title = {Novel Blind Video Forgery Detection Using Markov Models on Motion Residue}, booktitle = {Intelligent Information and Database Systems}, publisher = {Springer Berlin / Heidelberg}, year = {2012}, volume = {7198}, pages = {308-315}}
-
Enhancing Source Camera Identification Performance With a Camera Reference Phase Sensor Pattern Noise
IEEE Transactions on Information Forensics and Security, 2012, Vol. 7(2), pp. 393-402
BibTeX@article{Kang2012, author = {Xiangui Kang and Yinxiang Li and Zhenhua Qu and Jiwu Huang}, title = {Enhancing Source Camera Identification Performance With a Camera Reference Phase Sensor Pattern Noise}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2012}, volume = {7}, number = {2}, pages = {393--402}}
-
Robust Median Filtering Forensics Based on the Autoregressive Model of Median Filtered Residual
2012
BibTeX@article{Kang2012a, author = {Kang, X. and Stamm, M.C. and Peng, A. and Liu, K.J.R.}, title = {Robust Median Filtering Forensics Based on the Autoregressive Model of Median Filtered Residual}, year = {2012}}
-
Effective Detection for Linear Up-Sampling by a Factor of Fraction
IEEE Transactions on Image Processing, 2012, Vol. 21(8), pp. 3443-3453
BibTeX@article{Kao2012, author = {Yang Ta Kao and Hwei Jen Lin and Chun Wei Wang and Yi Chun Pai}, title = {Effective Detection for Linear Up-Sampling by a Factor of Fraction}, journal = {IEEE Transactions on Image Processing}, year = {2012}, volume = {21}, number = {8}, pages = {3443--3453}}
-
Updates to Policies and Procedures Related to Potential Scientific and Academic Misconduct in the Journals of the American Diabetes Association
Diabetes Care, 2012, Vol. 35(1), pp. 189-190
BibTeX@article{Kohler2012, author = {Christian S. Kohler}, title = {Updates to Policies and Procedures Related to Potential Scientific and Academic Misconduct in the Journals of the American Diabetes Association}, journal = {Diabetes Care}, year = {2012}, volume = {35}, number = {1}, pages = {189-190}}
-
Alternative Anti-Forensics Method for Contrast Enhancement
Shi, Y., Kim, H.-J. & Perez-Gonzalez, F. (ed.)
Digital Forensics and Watermarking
Springer Berlin / Heidelberg, 2012, Vol. 7128, pp. 398-410
BibTeX@incollection{Kwok2012, author = {Kwok, Chun-Wing and Au, O. and Chui, Sung-Him}, title = {Alternative Anti-Forensics Method for Contrast Enhancement}, booktitle = {Digital Forensics and Watermarking}, publisher = {Springer Berlin / Heidelberg}, year = {2012}, volume = {7128}, pages = {398-410}}
-
Estimating the Natural Illumination Conditions from a Single Outdoor Image
International Journal of Computer Vision, Springer US, 2012, Vol. 98, pp. 123-145
BibTeX@article{Lalonde2012, author = {Lalonde, Jean-François and Efros, AlexeiA. and Narasimhan, SrinivasaG.}, title = {Estimating the Natural Illumination Conditions from a Single Outdoor Image}, journal = {International Journal of Computer Vision}, publisher = {Springer US}, year = {2012}, volume = {98}, pages = {123-145}}
-
Secrets of image denoising cuisine
Acta Numerica, 2012, Vol. 21, pp. 475-576
BibTeX@article{Lebrun2012, author = {M. Lebrun and M. Colom and A. Buades and J. M. Morel}, title = {Secrets of image denoising cuisine}, journal = {Acta Numerica}, year = {2012}, volume = {21}, pages = {475-576}}
-
Reconstructing compressed photo and video data
University of Cambridge - Computer Laboratory, University of Cambridge - Computer Laboratory, 2012(813)
BibTeX@techreport{Lewis2012, author = {Andrew B. Lewis}, title = {Reconstructing compressed photo and video data}, school = {University of Cambridge - Computer Laboratory}, year = {2012}, number = {813}}
-
An Empirical Investigation into the Correlation between Vignetting Effect and the Quality of Sensor Pattern Noise
Department of Computer Science, University of Warwick, Coventry CV4 7AL, UK, Department of Computer Science, University of Warwick, Coventry CV4 7AL, UK, 2012
BibTeX@techreport{Li2012b, author = {Li, C.T. and Satta, R.}, title = {An Empirical Investigation into the Correlation between Vignetting Effect and the Quality of Sensor Pattern Noise}, school = {Department of Computer Science, University of Warwick, Coventry CV4 7AL, UK}, year = {2012}}
-
Color-Decoupled Photo Response Non-Uniformity for Digital Image Forensics
IEEE Transactions on Circuits and Systems for Video Technology, 2012, Vol. 22(2), pp. 260-271
BibTeX@article{Li2012, author = {Chang-Tsun Li and Yue Li}, title = {Color-Decoupled Photo Response Non-Uniformity for Digital Image Forensics}, journal = {IEEE Transactions on Circuits and Systems for Video Technology}, year = {2012}, volume = {22}, number = {2}, pages = {260--271}}
-
Blind Detection of Digital Forgery Image Based on the Edge Width
Zhang, Y., Zhou, Z.-H., Zhang, C. & Li, Y. (ed.)
Intelligent Science and Intelligent Data Engineering
Springer Berlin / Heidelberg, 2012, Vol. 7202, pp. 546-553
BibTeX@incollection{Li2012c, author = {Li, Hang and Zheng, Jiangbin}, title = {Blind Detection of Digital Forgery Image Based on the Edge Width}, booktitle = {Intelligent Science and Intelligent Data Engineering}, publisher = {Springer Berlin / Heidelberg}, year = {2012}, volume = {7202}, pages = {546-553}}
-
Copy-move forgery detection based on PHT
Proc. World Congress Information and Communication Technologies (WICT)
2012, pp. 1061-1065
BibTeX@inproceedings{Li2012e, author = {Li, Leida and Li, Shushang and Wang, Jun}, title = {Copy-move forgery detection based on PHT}, booktitle = {Proc. World Congress Information and Communication Technologies (WICT)}, year = {2012}, pages = {1061--1065}}
-
Detection of tampered region for JPEG images by using mode-based first digit features
EURASIP Journal on Advances in Signal Processing, 2012, Vol. 1(190)
BibTeX@article{Li2012a, author = {Li, Xiang Hua and Zhao, Yu Qian and Liao, Miao and Shi Yun Q}, title = {Detection of tampered region for JPEG images by using mode-based first digit features}, journal = {EURASIP Journal on Advances in Signal Processing}, year = {2012}, volume = {1}, number = {190}}
-
Passive detection of copy-paste forgery between JPEG images
Journal of Central South University, Central South University, 2012, Vol. 19, pp. 2839-2851
BibTeX@article{Li2012d, author = {Li, Xiang-hua and Zhao, Yu-qian and Liao, Miao and Shih, F.Y. and Shi, Y.Q.}, title = {Passive detection of copy-paste forgery between JPEG images}, journal = {Journal of Central South University}, publisher = {Central South University}, year = {2012}, volume = {19}, pages = {2839-2851}}
-
Efficient Image Copy Detection Using Multiscale Fingerprints
IEEE Multimedia, 2012, Vol. 19(1), pp. 60-69
BibTeX@article{Ling2012, author = {Hefei Ling and Hongrui Cheng and Qingzhen Ma and Fuhao Zou and WeiQi Yan}, title = {Efficient Image Copy Detection Using Multiscale Fingerprints}, journal = {IEEE Multimedia}, year = {2012}, volume = {19}, number = {1}, pages = {60--69}}
-
Blind detection of image splicing based on run length matrix combined properties
Proc. 10th World Congress Intelligent Control and Automation (WCICA)
2012, pp. 4545-4550
BibTeX@inproceedings{Liu2012a, author = {Liu, Han and Yang, Yun and Shang, Minqing}, title = {Blind detection of image splicing based on run length matrix combined properties}, booktitle = {Proc. 10th World Congress Intelligent Control and Automation (WCICA)}, year = {2012}, pages = {4545--4550}}
-
Identification of Smartphone-Image Source and Manipulation
Jiang, H., Ding, W., Ali, M. & Wu, X. (ed.)
Advanced Research in Applied Artificial Intelligence
Springer Berlin / Heidelberg, 2012, Vol. 7345, pp. 262-271
BibTeX@incollection{Liu2012, author = {Liu, Qingzhong and Li, Xiaodong and Chen, Lei and Cho, Hyuk and Cooper, Peter and Chen, Zhongxue and Qiao, Mengyu and Sung, Andrew}, title = {Identification of Smartphone-Image Source and Manipulation}, booktitle = {Advanced Research in Applied Artificial Intelligence}, publisher = {Springer Berlin / Heidelberg}, year = {2012}, volume = {7345}, pages = {262-271}}
-
A Source Cell-phone Identification Scheme Based on Canonical Correlation Analysis of Photo Response Non-uniformity
Journal of Computational Information Systems, 2012, Vol. 8(4), pp. 1433-1440
BibTeX@article{Long2012, author = {Min Long and Ting Peng and Fei Peng}, title = {A Source Cell-phone Identification Scheme Based on Canonical Correlation Analysis of Photo Response Non-uniformity}, journal = {Journal of Computational Information Systems}, year = {2012}, volume = {8}, number = {4}, pages = {1433-1440}}
-
RGB digital image forgery detection using Singular Value Decomposition and One Dimensional Cellular Automata
Proc. 8th Int Computing Technology and Information Management (ICCM) Conf
2012, Vol. 1, pp. 483-488
BibTeX@inproceedings{Malakooti2012, author = {Malakooti, Mohammad V. and Pahlavan Tafti, Ahmad and Rohani, Faezeh and Moghaddasifar, Mohammad Amin}, title = {RGB digital image forgery detection using Singular Value Decomposition and One Dimensional Cellular Automata}, booktitle = {Proc. 8th Int Computing Technology and Information Management (ICCM) Conf}, year = {2012}, volume = {1}, pages = {483--488}}
-
Exposing structural tampering in digital images
Proc. IEEE Int Signal Processing, Computing and Control (ISPCC) Conf
2012, pp. 1-6
BibTeX@inproceedings{Mall2012, author = {Mall, V. and Bhatt, K. and Mitra, S. K. and Roy, A. K. }, title = {Exposing structural tampering in digital images}, booktitle = {Proc. IEEE Int Signal Processing, Computing and Control (ISPCC) Conf}, year = {2012}, pages = {1--6}}
-
A Review on Passive Approach for Image Manipulation Detection Techniques for Copy Move Forgery
Journal of Computing Technologies, 2012, Vol. 1(2), pp. -
BibTeX@article{Malviya2012, author = {A.V. Malviya and S.A. Sandlake}, title = {A Review on Passive Approach for Image Manipulation Detection Techniques for Copy Move Forgery}, journal = {Journal of Computing Technologies}, year = {2012}, volume = {1}, number = {2}, pages = {-}}
-
Discriminating multiple JPEG compression using first digit features
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2012
2012, pp. 2253-2256
BibTeX@inproceedings{Milani2012, author = {Milani, Simone and Tagliasacchi, Marco and Tubaro, Stefano}, title = {Discriminating multiple JPEG compression using first digit features}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2012}, year = {2012}, pages = {2253--2256}}
-
Detection of doctored images
International Journal of Current Engineering and Technology
International Journal of Current Engineering and Technology, ACM, 2012
BibTeX@article{Mudenagudi2012, author = {Uma Mudenagudi and Lalitha M. and Ananya U. and Harsh Holalad and Muktanidhi S. D.}, title = {Detection of doctored images}, booktitle = {International Journal of Current Engineering and Technology}, journal = {International Journal of Current Engineering and Technology}, publisher = {ACM}, year = {2012}}
-
Passive copy move image forgery detection using undecimated dyadic wavelet transform
Digital Investigation, 2012(0), pp. -
BibTeX@article{Muhammad2012, author = {Ghulam Muhammad and Muhammad Hussain and George Bebis}, title = {Passive copy move image forgery detection using undecimated dyadic wavelet transform}, journal = {Digital Investigation}, year = {2012}, number = {0}, pages = { - }}
-
Dyadic wavelets and DCT based blind copy-move image forgery detection
Proc. IET Conf. Image Processing (IPR 2012)
2012, pp. 1-6
BibTeX@inproceedings{Muhammad2012a, author = {Muhammad, Ghulam and Hussain, Muhammad and Mirza, Anwar M. and Bebis, George}, title = {Dyadic wavelets and DCT based blind copy-move image forgery detection}, booktitle = {Proc. IET Conf. Image Processing (IPR 2012)}, year = {2012}, pages = {1--6}}
-
Detection of digital photo image forgery
Proc. IEEE Int Advanced Communication Control and Computing Technologies (ICACCCT) Conf
2012, pp. 120-124
BibTeX@inproceedings{Murali2012a, author = {Murali, S. and Anami, B. S. and Chittapur, G. B. }, title = {Detection of digital photo image forgery}, booktitle = {Proc. IEEE Int Advanced Communication Control and Computing Technologies (ICACCCT) Conf}, year = {2012}, pages = {120--124}}
-
Format based photo forgery image detection
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
ACM, 2012, pp. 452-457
BibTeX@inproceedings{Murali2012, author = {Murali, S. and Chittapur, Govindraj B. and Prabhakara, H. S.}, title = {Format based photo forgery image detection}, booktitle = {Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology}, publisher = {ACM}, year = {2012}, pages = {452--457}}
-
Saliency detection as a support for image forensics
Proc. 5th Int Communications Control and Signal Processing (ISCCSP) Symp
2012, pp. 1-5
BibTeX@inproceedings{Muratov2012, author = {Muratov, O. and Duc-Tien Dang-Nguyen and Boato, Giulia and De Natale, F. G. B. }, title = {Saliency detection as a support for image forensics}, booktitle = {Proc. 5th Int Communications Control and Signal Processing (ISCCSP) Symp}, year = {2012}, pages = {1--5}}
-
Robust Resampling Detection in Digital Images
De Decker, B. & Chadwick, D. (ed.)
Communications and Multimedia Security
Springer Berlin / Heidelberg, 2012, Vol. 7394, pp. 3-15
BibTeX@incollection{Nguyen2012b, author = {Nguyen, Hieu and Katzenbeisser, Stefan}, title = {Robust Resampling Detection in Digital Images}, booktitle = {Communications and Multimedia Security}, publisher = {Springer Berlin / Heidelberg}, year = {2012}, volume = {7394}, pages = {3-15}}
-
Performance and Robustness Analysis for Some Re-sampling Detection Techniques in Digital Images
Shi, Y., Kim, H.-J. & Perez-Gonzalez, F. (ed.)
Digital Forensics and Watermarking
Springer Berlin / Heidelberg, 2012, Vol. 7128, pp. 387-397
BibTeX@incollection{Nguyen2012a, author = {Nguyen, Hieu and Katzenbeisser, Stefan}, title = {Performance and Robustness Analysis for Some Re-sampling Detection Techniques in Digital Images}, booktitle = {Digital Forensics and Watermarking}, publisher = {Springer Berlin / Heidelberg}, year = {2012}, volume = {7128}, pages = {387-397}}
-
Detection of Copy-move Forgery in Digital Images Using Radon Transformation and Phase Correlation
Proc. Eighth Int Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) Conf
2012, pp. 134-137
BibTeX@inproceedings{Nguyen2012, author = {Nguyen, Hieu Cuong and Katzenbeisser, Stefan}, title = {Detection of Copy-move Forgery in Digital Images Using Radon Transformation and Phase Correlation}, booktitle = {Proc. Eighth Int Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) Conf}, year = {2012}, pages = {134--137}}
-
Exposing photo manipulation with inconsistent reflections
ACM Trans. Graph., ACM, 2012, Vol. 31(1), pp. 4:1-4:11
BibTeX@article{OBrien2012, author = {O´Brien, James F. and Farid, Hany}, title = {Exposing photo manipulation with inconsistent reflections}, journal = {ACM Trans. Graph.}, publisher = {ACM}, year = {2012}, volume = {31}, number = {1}, pages = {4:1--4:11}}
-
Image manipulation detection using contourlet transform
Proc. 20th Signal Processing and Communications Applications Conf. (SIU)
2012, pp. 1-4
BibTeX@inproceedings{Ozparlak2012, author = {Özparlak, L. and Avcibas, I.}, title = {Image manipulation detection using contourlet transform}, booktitle = {Proc. 20th Signal Processing and Communications Applications Conf. (SIU)}, year = {2012}, pages = {1--4}}
-
Exposing image splicing with inconsistent local noise variances
Proc. IEEE Int Computational Photography (ICCP) Conf
2012, pp. 1-10
BibTeX@inproceedings{Pan2012, author = {Xunyu Pan and Xing Zhang and Siwei Lyu}, title = {Exposing image splicing with inconsistent local noise variances}, booktitle = {Proc. IEEE Int Computational Photography (ICCP) Conf}, year = {2012}, pages = {1--10}}
-
Detecting splicing in digital audios using local noise level estimation
Acoustics, Speech and Signal Processing (ICASSP), 2012 IEEE International Conference on
2012, pp. 1841-1844
BibTeX@inproceedings{Pan2012a, author = {Xunyu Pan and Xing Zhang and Siwei Lyu}, title = {Detecting splicing in digital audios using local noise level estimation}, booktitle = {Acoustics, Speech and Signal Processing (ICASSP), 2012 IEEE International Conference on}, year = {2012}, pages = {1841--1844}}
-
Identification of Natural Images and Computer Generated Graphics Based on Hybrid Features
International Journal of Digital Crime and Forensics (IJDCF), 2012, Vol. 4(1), pp. 1-16
BibTeX@article{Peng2012, author = {Fei Peng and Juan Liu and Min Long}, title = {Identification of Natural Images and Computer Generated Graphics Based on Hybrid Features}, journal = {International Journal of Digital Crime and Forensics (IJDCF)}, year = {2012}, volume = {4}, number = {1}, pages = {1-16}}
-
Spectral methods to determine the exact scaling factor of resampled digital images
Proc. 5th Int Communications Control and Signal Processing (ISCCSP) Symp
2012, pp. 1-6
BibTeX@inproceedings{Pfennig2012, author = {Pfennig, S. and Kirchner, M.}, title = {Spectral methods to determine the exact scaling factor of resampled digital images}, booktitle = {Proc. 5th Int Communications Control and Signal Processing (ISCCSP) Symp}, year = {2012}, pages = {1--6}}
-
A Comparative Analysis on Copy Move Forgery Detection in Spatial Domain Method Using Lexicographic and Non Lexicographic techniques
IJECCE, 2012, Vol. 3(1), pp. -
BibTeX@article{Pujari2012, author = {Vidya S. Pujari and Mandar Sohani}, title = {A Comparative Analysis on Copy Move Forgery Detection in Spatial Domain Method Using Lexicographic and Non Lexicographic techniques}, journal = {IJECCE}, year = {2012}, volume = {3}, number = {1}, pages = {-}}
-
Surrey University Library for Forensic Analysis (SULFA) of video content
Proc. IET Conf. Image Processing (IPR 2012)
2012, pp. 1-6
BibTeX@inproceedings{Qadir2012, author = {Qadir, Ghulam and Yahaya, Syamsul and Ho, Anthony T S}, title = {Surrey University Library for Forensic Analysis (SULFA) of video content}, booktitle = {Proc. IET Conf. Image Processing (IPR 2012)}, year = {2012}, pages = {1--6}}
-
Image Forensics with Rotation-Tolerant Resampling Detection
Proc. IEEE Int Multimedia and Expo Workshops (ICMEW) Conf
2012, pp. 61-66
BibTeX@inproceedings{Qian2012, author = {Qian, Ruohan and Li, Weihai and Yu, Nenghai and Hao, Zhuo}, title = {Image Forensics with Rotation-Tolerant Resampling Detection}, booktitle = {Proc. IEEE Int Multimedia and Expo Workshops (ICMEW) Conf}, year = {2012}, pages = {61--66}}
-
Combating Anti-forensics of Jpeg Compression
IJCSI International Journal of Computer Science Issues, 2012, Vol. 9(3), pp. 454-459
BibTeX@article{Qian2012a, author = {Zhenxing Qian and Xinpeng Zhang}, title = {Combating Anti-forensics of Jpeg Compression}, journal = {IJCSI International Journal of Computer Science Issues}, year = {2012}, volume = {9}, number = {3}, pages = {454--459}}
-
Identifying Shifted Double JPEG Compression Artifacts for Non-intrusive Digital Image Forensics
Hu, S.-M. & Martin, R. (ed.)
Computational Visual Media
Lecture Notes in Computer Science, Springer Berlin Heidelberg, 2012, Vol. 7633, pp. 1-8
BibTeX@incollection{Qu2012, author = {Qu, Zhenhua and Luo, Weiqi and Huang, Jiwu}, title = {Identifying Shifted Double JPEG Compression Artifacts for Non-intrusive Digital Image Forensics}, booktitle = {Computational Visual Media}, journal = {Lecture Notes in Computer Science}, publisher = {Springer Berlin Heidelberg}, year = {2012}, volume = {7633}, pages = {1-8}}
-
Copy-move forgery detection in digital images based on local dimension estimation
Proc. Int Cyber Security, Cyber Warfare and Digital Forensic (CyberSec) Conf
2012, pp. 180-185
BibTeX@inproceedings{Quan2012, author = {Xiaomei Quan and Hongbin Zhang}, title = {Copy-move forgery detection in digital images based on local dimension estimation}, booktitle = {Proc. Int Cyber Security, Cyber Warfare and Digital Forensic (CyberSec) Conf}, year = {2012}, pages = {180--185}}
-
Robust single image noise estimation from approximate local statistics
2012
BibTeX@article{Roodt2012, author = {Roodt, Y. and Clarke, W. and Robinson, P.E. and Nel, A.}, title = {Robust single image noise estimation from approximate local statistics}, year = {2012}}
-
Kamera-Sensorforensik: Erkennungsraten im Kontext von Bildkompression
Heinrich C. Mayr, Alpen-Adria-Universität Klagenfurt, A. (C. D. F. T. U. D. G. U. F. H. f. T. S. U. F. U. D.-E. G. J.-C. F. H.-U. z. B. G. M. G. U. D.-E. G. R. H. U. B. G. M. K. U. d. B. M. G. A. L. U. d. B. M. G. E. W. M. T. U. M. G. S. S. U. S. G. I. T. U. T. K. V. H. B. G. M. W. U. K.-L. G. (ed.)
Lecture Notes in Informatics
Fachhochschule Brandenburg, Fachbereich Informatik und Medien PF 2132, D--14737 Brandenburg, Fachhochschule Brandenburg, Fachbereich Informatik und Medien PF 2132, D--14737 Brandenburg, 2012, Vol. P-194(2012), pp. 117
BibTeX@inproceedings{Rosenfeld, author = {Rosenfeld, M. and Creutzburg, R. and Vielhauer, C.}, title = {Kamera-Sensorforensik: Erkennungsraten im Kontext von Bildkompression}, booktitle = {Lecture Notes in Informatics}, school = {Fachhochschule Brandenburg, Fachbereich Informatik und Medien PF 2132, D--14737 Brandenburg}, year = {2012}, volume = {P-194(2012)}, pages = {117}}
-
Forgery detection in digital images using Self Organizing Map
Proc. Int Devices, Circuits and Systems (ICDCS) Conf
2012, pp. 699-703
BibTeX@inproceedings{Ruth2012, author = {Ruth, R. M. S. and Vanitha, L. and Gnanaraj, F. F. }, title = {Forgery detection in digital images using Self Organizing Map}, booktitle = {Proc. Int Devices, Circuits and Systems (ICDCS) Conf}, year = {2012}, pages = {699--703}}
-
A Novel Method for Detecting Triple JPEG Compression with the Same Quantization Matrix
International Journal of Engineering Trends and Technology, 2012, Vol. 3(2), pp. 94-97
BibTeX@article{Manimurugan2012, author = {S.Manimurugan and Boby Jose}, title = {A Novel Method for Detecting Triple JPEG Compression with the Same Quantization Matrix}, journal = {International Journal of Engineering Trends and Technology}, year = {2012}, volume = {3}, number = {2}, pages = {94-97}}
-
NIH Image to ImageJ: 25 years of image analysis
Nature Methods, Nature Publishing Group, 2012, Vol. 9(7), pp. 671-675
BibTeX@article{Schneider2012, author = {Schneider, C.A. and Rasband, W.S. and Eliceiri, K.W.}, title = {NIH Image to ImageJ: 25 years of image analysis}, journal = {Nature Methods}, publisher = {Nature Publishing Group}, year = {2012}, volume = {9}, number = {7}, pages = {671--675}}
-
Microelectronic Systems: Circuits, Systems and Applications
Heppner, J., Heuberger, A., Kirsch, K., Elst, G. & Hanke, R. (ed.)
Chapter Analysis of Processing Pipelines in Digital Raw Cameras
Springer, 2012, pp. 281
BibTeX@inbook{Schoeberl2012, author = {Michael Schöberl}, title = {Microelectronic Systems: Circuits, Systems and Applications}, publisher = {Springer}, year = {2012}, pages = {281}}
-
Image region duplication detection based on circular window expansion and phase correlation
Forensic Science International, 2012, Vol. 04, pp. -
BibTeX@article{Shao2012, author = {Hong Shao and Tianshu Yu and Mengjia Xu and Wencheng Cui}, title = {Image region duplication detection based on circular window expansion and phase correlation}, journal = {Forensic Science International}, year = {2012}, volume = {04}, pages = {-}}
-
A Countermeasure against Double Compression Based Image Forensic
IEICE TRANSACTIONS on Information and Systems, The Institute of Electronics, Information and Communication Engineers, 2012, Vol. 95(10), pp. 2577-2580
BibTeX@article{Shen2012, author = {Shen, W. and Xiamu, NIU}, title = {A Countermeasure against Double Compression Based Image Forensic}, journal = {IEICE TRANSACTIONS on Information and Systems}, publisher = {The Institute of Electronics, Information and Communication Engineers}, year = {2012}, volume = {95}, number = {10}, pages = {2577--2580}}
-
A new method for detecting JEPG doubly compression images by using estimated primary quantization step
Proc. Int Systems and Informatics (ICSAI) Conf
2012, pp. 1810-1814
BibTeX@inproceedings{Shi2012, author = {FangLing Shi and BaoSheng Kang and HongAn Li and Yu Zhu}, title = {A new method for detecting JEPG doubly compression images by using estimated primary quantization step}, booktitle = {Proc. Int Systems and Informatics (ICSAI) Conf}, year = {2012}, pages = {1810--1814}}
-
Digital Forgery Detection Scheme Incorporating Imaging Device Characteristics Using Wiener Filter
J. (Jong Hyuk) Park, J. J. (J. H., Chao, H.-C., S. Obaidat, M. S. & Kim, J. (ed.)
Computer Science and Convergence
Springer Netherlands, 2012, Vol. 114, pp. 713-721
BibTeX@incollection{Shim2012, author = {Shim, Jae Youn and Kim, Seong-Whan}, title = {Digital Forgery Detection Scheme Incorporating Imaging Device Characteristics Using Wiener Filter}, booktitle = {Computer Science and Convergence}, publisher = {Springer Netherlands}, year = {2012}, volume = {114}, pages = {713-721}}
-
Fast Detection of Copy-Move Forgery Image Using Three Step Search Algorithm in the Spatial Domain
Lee, G., Howard, D., Kang, J. & Slezak, D. (ed.)
Convergence and Hybrid Information Technology
Springer Berlin / Heidelberg, 2012, Vol. 7425, pp. 389-395
BibTeX@incollection{Shin2012, author = {Shin, Yong-Dal}, title = {Fast Detection of Copy-Move Forgery Image Using Three Step Search Algorithm in the Spatial Domain}, booktitle = {Convergence and Hybrid Information Technology}, publisher = {Springer Berlin / Heidelberg}, year = {2012}, volume = {7425}, pages = {389-395}}
-
Primary Quality Factor Estimation in Double Compressed JPEG Images Using Quantization Error
Zhang, W., Yang, X., Xu, Z., An, P., Liu, Q. & Lu, Y. (ed.)
Advances on Digital Television and Wireless Multimedia Communications
Springer Berlin Heidelberg, 2012, Vol. 331, pp. 133-139
BibTeX@incollection{Shuang2012, author = {Shuang, Yang and Zhen, Fang}, title = {Primary Quality Factor Estimation in Double Compressed JPEG Images Using Quantization Error}, booktitle = {Advances on Digital Television and Wireless Multimedia Communications}, publisher = {Springer Berlin Heidelberg}, year = {2012}, volume = {331}, pages = {133-139}}
-
A High Performance Copy-Move Image Forgery Detection Scheme on GPU
Deep, K., Nagar, A., Pant, M. & Bansal, J. C. (ed.)
Proceedings of the International Conference on Soft Computing for Problem Solving (SocProS 2011) December 20-22, 2011
Springer Berlin / Heidelberg, 2012, Vol. 131, pp. 239-246
BibTeX@incollection{Singh2012, author = {Singh, Jaideep and Raman, Balasubramanian}, title = {A High Performance Copy-Move Image Forgery Detection Scheme on GPU}, booktitle = {Proceedings of the International Conference on Soft Computing for Problem Solving (SocProS 2011) December 20-22, 2011}, publisher = {Springer Berlin / Heidelberg}, year = {2012}, volume = {131}, pages = {239-246}}
-
Copy -- Move Image Forgery Detection an a Parallel Environment
Computer Science & Information Technology, 2012, Vol. 2, pp. 19-29
BibTeX@article{Sridevi2012a, author = {M. Sridevi and C. Mala and S. Sandeep}, title = {Copy -- Move Image Forgery Detection an a Parallel Environment}, journal = {Computer Science & Information Technology}, year = {2012}, volume = {2}, pages = {19-29}}
-
Comparative Study of Image Forgery and Copy-Move Techniques
Wyld, D. C., Zizka, J. & Nagamalai, D. (ed.)
Advances in Computer Science, Engineering & Applications
Springer Berlin / Heidelberg, 2012, Vol. 166, pp. 715-723
BibTeX@incollection{Sridevi2012, author = {Sridevi, M. and Mala, C. and Sanyam, Siddhant}, title = {Comparative Study of Image Forgery and Copy-Move Techniques}, booktitle = {Advances in Computer Science, Engineering & Applications}, publisher = {Springer Berlin / Heidelberg}, year = {2012}, volume = {166}, pages = {715-723}}
-
Temporal Forensics and Anti-Forensics for Motion Compensated Video
IEEE Transactions on Information Forensics and Security, 2012, Vol. 7(4), pp. 1315-1329
BibTeX@article{Stamm2012, author = {Stamm, M. C. and Lin, W. S. and Liu, K. J. R. }, title = {Temporal Forensics and Anti-Forensics for Motion Compensated Video}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2012}, volume = {7}, number = {4}, pages = {1315--1329}}
-
Forensics vs. anti-forensics: A decision and game theoretic framework
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2012
2012, pp. 1749-1752
BibTeX@inproceedings{Stamm2012a, author = {Stamm, Matthew C. and Lin, W. Sabrina and Liu, K. J. Ray}, title = {Forensics vs. anti-forensics: A decision and game theoretic framework}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2012}, year = {2012}, pages = {1749--1752}}
-
Exposing video forgeries by detecting MPEG double compression
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2012
2012, pp. 1389-1392
BibTeX@inproceedings{Sun2012, author = {Tanfeng Sun and Wan Wang and Xinghao Jiang}, title = {Exposing video forgeries by detecting MPEG double compression}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2012}, year = {2012}, pages = {1389--1392}}
-
Image Statistical Frameworks For Digital Image Forensics
New Jersey Institute of Technology - Department of Electrical and Computer Engineering, New Jersey Institute of Technology - Department of Electrical and Computer Engineering, 2012
BibTeX@phdthesis{Sutthiwan2012a, author = {Patchara Sutthiwan}, title = {Image Statistical Frameworks For Digital Image Forensics}, school = {New Jersey Institute of Technology - Department of Electrical and Computer Engineering}, year = {2012}}
-
Anti-Forensics of Double JPEG Compression Detection
Shi, Y., Kim, H.-J. & Perez-Gonzalez, F. (ed.)
Digital Forensics and Watermarking
Springer Berlin / Heidelberg, 2012, Vol. 7128, pp. 411-424
BibTeX@incollection{Sutthiwan2012, author = {Sutthiwan, Patchara and Shi, Yun}, title = {Anti-Forensics of Double JPEG Compression Detection}, booktitle = {Digital Forensics and Watermarking}, publisher = {Springer Berlin / Heidelberg}, year = {2012}, volume = {7128}, pages = {411-424}}
-
The Era of Interactive Media
Xu, M. & Jin, J. S. (ed.)
Chapter Digital Image Forensics: A Two-Step Approach for Identifying Source and Detecting Forgeries
The Era of Interactive Media, Springer, 2012, pp. 37
BibTeX@inbook{Taktak2012, author = {Taktak, Wiem and Dugelay, Jean-Luc}, title = {The Era of Interactive Media}, journal = {The Era of Interactive Media}, publisher = {Springer}, year = {2012}, pages = {37}}
-
Analysis Of Different Techniques Of Image Forgery Detection
International Journal of Computer Applications (IJCA), 2012, Vol. 7-8, pp. 13-18
BibTeX@article{Talmale2012, author = {G.R. Talmale and R.W. Jasutkar}, title = {Analysis Of Different Techniques Of Image Forgery Detection}, journal = {International Journal of Computer Applications (IJCA)}, year = {2012}, volume = {7-8}, pages = {13-18}}
-
Dual-Transform Based Noise Estimation
Proc. IEEE Int Multimedia and Expo (ICME) Conf
2012, pp. 991-996
BibTeX@inproceedings{Tang2012, author = {Chongwu Tang and Xiaokang Yang and Guangtao Zhai}, title = {Dual-Transform Based Noise Estimation}, booktitle = {Proc. IEEE Int Multimedia and Expo (ICME) Conf}, year = {2012}, pages = {991--996}}
-
Camera Model Identification Based on Hypothesis Testing Theory
Poc. of the 20th European Signal Processing Conference (EUSIPCO 2012)
2012, pp. 1234-1238
BibTeX@inproceedings{Thai2012, author = {T. H. Thai and R. Cogranne and F. Retraint}, title = {Camera Model Identification Based on Hypothesis Testing Theory}, booktitle = {Poc. of the 20th European Signal Processing Conference (EUSIPCO 2012)}, year = {2012}, pages = {1234-1238}}
-
An Improved Double Compression Detection Method for JPEG Image Forensics
Proc. IEEE Int Multimedia (ISM) Symp
2012, pp. 290-297
BibTeX@inproceedings{Thing2012, author = {Thing, Vrizlynn L. L. and Chen, Yu and Cheh, Carmen}, title = {An Improved Double Compression Detection Method for JPEG Image Forensics}, booktitle = {Proc. IEEE Int Multimedia (ISM) Symp}, year = {2012}, pages = {290--297}}
-
Image Noise Estimation Using A Variation-Adaptive Evolutionary Approach
IEEE Signal Processing Letters, 2012, Vol. 19(7), pp. 395-398
BibTeX@article{Tian2012, author = {Tian, J. and Chen, L. }, title = {Image Noise Estimation Using A Variation-Adaptive Evolutionary Approach}, journal = {IEEE Signal Processing Letters}, year = {2012}, volume = {19}, number = {7}, pages = {395--398}}
-
JPEG image tampering detection using blocking artifacts
Proc. 19th Int Systems, Signals and Image Processing (IWSSIP) Conf
2012, pp. 5-8
BibTeX@inproceedings{Tralic2012, author = {Tralic, Dijana and Petrovic, Juraj and Grgic, Sonja}, title = {JPEG image tampering detection using blocking artifacts}, booktitle = {Proc. 19th Int Systems, Signals and Image Processing (IWSSIP) Conf}, year = {2012}, pages = {5--8}}
-
Using decision fusion of feature selection in digital forensics for camera source model identification
Comput. Stand. Interfaces, Elsevier Science Publishers B. V., 2012, Vol. 34(3), pp. 292-304
BibTeX@article{Tsai2012, author = {Tsai, Min-Jen and Wang, Chen-Sheng and Liu, Jung and Yin, Jin-Sheng}, title = {Using decision fusion of feature selection in digital forensics for camera source model identification}, journal = {Comput. Stand. Interfaces}, publisher = {Elsevier Science Publishers B. V.}, year = {2012}, volume = {34}, number = {3}, pages = {292--304}}
-
Iris-sensor authentication using camera PRNU fingerprints
Proc. 5th IAPR Int Biometrics (ICB) Conf
2012, pp. 230-237
BibTeX@inproceedings{Uhl2012, author = {Uhl, A. and Holler, Y. }, title = {Iris-sensor authentication using camera PRNU fingerprints}, booktitle = {Proc. 5th IAPR Int Biometrics (ICB) Conf}, year = {2012}, pages = {230--237}}
-
Exploring Duplicated Regions in Natural Images
IJCA Proceedings on International Conference in Computational Intelligence (ICCIA2012), 2012, Vol. iccia(3), pp. -
BibTeX@article{V.Hulmukhe2012, author = {Kavita V.Hulmukhe and S.S.Sane and Alpana A. Borse}, title = {Exploring Duplicated Regions in Natural Images}, journal = {IJCA Proceedings on International Conference in Computational Intelligence (ICCIA2012)}, year = {2012}, volume = {iccia}, number = {3}, pages = {-}}
-
Pascal transform based self-authentication of color images
Proc. 19th Int Systems, Signals and Image Processing (IWSSIP) Conf
2012, pp. 168-171
BibTeX@inproceedings{Varsaki2012, author = {Varsaki, E. E. and Fotopoulos, V. and Skodras, A. N. }, title = {Pascal transform based self-authentication of color images}, booktitle = {Proc. 19th Int Systems, Signals and Image Processing (IWSSIP) Conf}, year = {2012}, pages = {168--171}}
-
Detection of video double encoding with GOP size estimation
Information Forensics and Security (WIFS), 2012 IEEE International Workshop on
2012, pp. 151-156
BibTeX@inproceedings{Vazquez-Padin2012a, author = {Vazquez-Padin, D. and Fontani, M. and Bianchi, T. and Comesana, P. and Piva, A. and Barni, M.}, title = {Detection of video double encoding with GOP size estimation}, booktitle = {Information Forensics and Security (WIFS), 2012 IEEE International Workshop on}, year = {2012}, pages = {151--156}}
-
Exposing Original and Duplicated Regions Using SIFT Features and Resampling Traces
Shi, Y., Kim, H.-J. & Perez-Gonzalez, F. (ed.)
Digital Forensics and Watermarking
Lecture Notes in Computer Science, Springer Berlin / Heidelberg, 2012, Vol. 7128, pp. 306-320
BibTeX@incollection{Vazquez-Padin2012, author = {Vázquez-Padín, David and Pérez-González, Fernando}, title = {Exposing Original and Duplicated Regions Using SIFT Features and Resampling Traces}, booktitle = {Digital Forensics and Watermarking}, journal = {Lecture Notes in Computer Science}, publisher = {Springer Berlin / Heidelberg}, year = {2012}, volume = {7128}, pages = {306-320}}
-
The Metadata Anonymization Toolkit
arXiv preprint arXiv:1212.3648, 2012
BibTeX@article{Voisin2012, author = {Voisin, Julien and Guyeux, Christophe and Bahi, Jacques M}, title = {The Metadata Anonymization Toolkit}, journal = {arXiv preprint arXiv:1212.3648}, year = {2012}}
-
Inter-Camera Model Image Source Identification with Conditional Probability Features
Proc. of the 3rd IIEEJ Image Electronics and Visual Computing Workshop 2012
2012
BibTeX@inproceedings{Wahab2012, author = {Ainuddin Wahid Abdul Wahab and Anthony T.S. Ho and Shujun Li}, title = {Inter-Camera Model Image Source Identification with Conditional Probability Features}, booktitle = {Proc. of the 3rd IIEEJ Image Electronics and Visual Computing Workshop 2012}, year = {2012}}
-
Image Splicing Localization Based on Re-demosaicing
Zeng, D. (ed.)
Advances in Information Technology and Industry Applications
Springer Berlin Heidelberg, 2012, Vol. 136, pp. 725-732
BibTeX@incollection{Wang2012, author = {Wang, Bo and Kong, Xiangwei}, title = {Image Splicing Localization Based on Re-demosaicing}, booktitle = {Advances in Information Technology and Industry Applications}, publisher = {Springer Berlin Heidelberg}, year = {2012}, volume = {136}, pages = {725-732}}
-
Hiding traces of double compression in JPEG images based on Tabu Search
Neural Computing & Applications, Springer London, 2012, Vol. -, pp. 1-9
BibTeX@article{Wang2012a, author = {Wang, Shen and Niu, Xiamu}, title = {Hiding traces of double compression in JPEG images based on Tabu Search}, journal = {Neural Computing & Applications}, publisher = {Springer London}, year = {2012}, volume = {-}, pages = {1-9}}
-
Blind Detection of Copy-Move Forgery Based on Multi-Scale Autoconvolution Invariants
Liu, C.-L., Zhang, C. & Wang, L. (ed.)
Pattern Recognition
Springer Berlin Heidelberg, 2012, Vol. 321, pp. 438-446
BibTeX@incollection{Wang2012c, author = {Wang, Tao and Tang, Jin and Zhao, Wei and Xu, Qin and Luo, Bin}, title = {Blind Detection of Copy-Move Forgery Based on Multi-Scale Autoconvolution Invariants}, booktitle = {Pattern Recognition}, publisher = {Springer Berlin Heidelberg}, year = {2012}, volume = {321}, pages = {438-446}}
-
Image forensic signature for content authenticity analysis
Journal of Visual Communication and Image Representation, 2012, Vol. 23(5), pp. 782 - 797
BibTeX@article{Wang2012d, author = {Xiaofeng Wang and Jianru Xue and Zhenqiang Zheng and Zhenli Liu and Ning Li}, title = {Image forensic signature for content authenticity analysis}, journal = {Journal of Visual Communication and Image Representation}, year = {2012}, volume = {23}, number = {5}, pages = {782 - 797}}
-
Wavelet Based Region Duplication Forgery Detection
Proc. Ninth Int Information Technology: New Generations (ITNG) Conf
2012, pp. 30-35
BibTeX@inproceedings{Wang2012b, author = {Wang, Yang and Gurule, Kaitlyn and Wise, Jacqueline and Zheng, Jun}, title = {Wavelet Based Region Duplication Forgery Detection}, booktitle = {Proc. Ninth Int Information Technology: New Generations (ITNG) Conf}, year = {2012}, pages = {30--35}}
-
Article: Blind Method for Image Forgery Detection: A tool for Digital Image Forensics
IJCA Proceedings on National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2012), 2012, Vol. ncipet(11), pp. 37-40
BibTeX@article{Warbhe2012, author = {Anil Dada Warbhe and R. V. Dharaskar}, title = {Article: Blind Method for Image Forgery Detection: A tool for Digital Image Forensics}, journal = {IJCA Proceedings on National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2012)}, year = {2012}, volume = {ncipet}, number = {11}, pages = {37-40}}
-
An Image Forensics Algorithm for Blur Detection Based on Properties of Sharp Edge Points
Advanced Materials Research, 2012, Vol. Volumes 341 - 342 Material and Manufacturing Technology II, pp. 743-747
BibTeX@article{Wei2012, author = {Li Xian Wei and Jun Jie Zhu and Xiao Yuan Yang}, title = {An Image Forensics Algorithm for Blur Detection Based on Properties of Sharp Edge Points}, journal = {Advanced Materials Research}, year = {2012}, volume = {Volumes 341 - 342 Material and Manufacturing Technology II}, pages = {743-747}}
-
The Analysis and Detection of Double JPEG2000 Compression Based on Statistical Characterization of DWT Coefficients
Energy Procedia, 2012, Vol. 17, Part A(0), pp. 623 - 629
BibTeX@article{Wei2012a, author = {Wang Wei and WANG Rang-ding}, title = {The Analysis and Detection of Double JPEG2000 Compression Based on Statistical Characterization of DWT Coefficients}, journal = {Energy Procedia}, year = {2012}, volume = {17, Part A}, number = {0}, pages = {623 - 629}}
-
A Context Adaptive Predictor of Sensor Pattern Noise for Camera Source Identification
School of Information Science and Technology, School of Information Science and Technology, 2012
BibTeX@techreport{Wu2012a, author = {Guangdong Wu and , Xiangui Kang and and K. J. Ray Liu}, title = {A Context Adaptive Predictor of Sensor Pattern Noise for Camera Source Identification}, school = {School of Information Science and Technology}, year = {2012}}
-
Detecting image forgeries using metrology
Machine Vision and Applications, Springer Berlin / Heidelberg, 2012, Vol. 23, pp. 363-373
BibTeX@article{Wu2012, author = {Wu, Lin and Cao, Xiaochun and Zhang, Wei and Wang, Yang}, title = {Detecting image forgeries using metrology}, journal = {Machine Vision and Applications}, publisher = {Springer Berlin / Heidelberg}, year = {2012}, volume = {23}, pages = {363-373}}
-
Detecting image forgeries using geometric cues
arXiv, Springer Berlin / Heidelberg, 2012
BibTeX@article{Wu2012b, author = {Wu, Lin Wang, Yang}, title = {Detecting image forgeries using geometric cues}, journal = {arXiv}, publisher = {Springer Berlin / Heidelberg}, year = {2012}}
-
A Fast Image Copy-Move Forgery Detection Method Using Phase Correlation
Proc. Fourth Int Multimedia Information Networking and Security (MINES) Conf
2012, pp. 319-322
BibTeX@inproceedings{Xu2012a, author = {Xu, Bo and Liu, Guangjie and Dai, Yuewei}, title = {A Fast Image Copy-Move Forgery Detection Method Using Phase Correlation}, booktitle = {Proc. Fourth Int Multimedia Information Networking and Security (MINES) Conf}, year = {2012}, pages = {319--322}}
-
Camera Model Identification Using Local Binary Patterns
Proc. IEEE Int Multimedia and Expo (ICME) Conf
2012, pp. 392-397
BibTeX@inproceedings{Xu2012, author = {Guanshuo Xu and Yun Qing Shi}, title = {Camera Model Identification Using Local Binary Patterns}, booktitle = {Proc. IEEE Int Multimedia and Expo (ICME) Conf}, year = {2012}, pages = {392--397}}
-
Detection of Blue Screen Special Effects in Videos
Physics Procedia, 2012, Vol. 33(0), pp. 1316 - 1322
BibTeX@article{Xu2012b, author = {Junyu Xu and Yanru Yu and Yuting Su and Bo Dong and Xingang You}, title = {Detection of Blue Screen Special Effects in Videos}, journal = {Physics Procedia}, year = {2012}, volume = {33}, number = {0}, pages = {1316 - 1322}}
-
Detection of Copy-Move Forgery of Images Using Discrete Wavelet Transform
International Journal on Computer Science and Engineering (IJCSE), 2012, Vol. 4, pp. 265-270
BibTeX@article{Yadav2012, author = {Preeti Yadav and Yogesh Rathore}, title = {Detection of Copy-Move Forgery of Images Using Discrete Wavelet Transform}, journal = {International Journal on Computer Science and Engineering (IJCSE)}, year = {2012}, volume = {4}, pages = {265-270}}
-
DWT Based Copy-Move Image Forgery Detection
International Journal of Advanced Research in Computer Science and Electroic Engineering, 2012, Vol. 1(5)
BibTeX@article{Yadav2012a, author = {Preeti Yadav and Yogesh Rathore and Aarti Yadu}, title = {DWT Based Copy-Move Image Forgery Detection}, journal = {International Journal of Advanced Research in Computer Science and Electroic Engineering}, year = {2012}, volume = {1}, number = {5}}
-
Advanced video camera identification using Conditional Probability Features
Proc. IET Conf. Image Processing (IPR 2012)
2012, pp. 1-5
BibTeX@inproceedings{Yahaya2012, author = {Yahaya, Syamsul and Ho, Anthony T S and Wahab, Ainuddin Abdul}, title = {Advanced video camera identification using Conditional Probability Features}, booktitle = {Proc. IET Conf. Image Processing (IPR 2012)}, year = {2012}, pages = {1--5}}
-
An Anti-JPEG Compression Digital Watermarking Technology with an Ability in Detecting Forgery Region for Color Images
Proc. Int Computer Distributed Control and Intelligent Environmental Monitoring (CDCIEM) Conf
2012, pp. 93-97
BibTeX@inproceedings{Yang2012, author = {Zheng-Chao Yang and Zhao-Hong Li}, title = {An Anti-JPEG Compression Digital Watermarking Technology with an Ability in Detecting Forgery Region for Color Images}, booktitle = {Proc. Int Computer Distributed Control and Intelligent Environmental Monitoring (CDCIEM) Conf}, year = {2012}, pages = {93--97}}
-
Detecting Image Forgery Using Perspective Constraints
IEEE Signal Processing Letters, 2012, Vol. 19(3), pp. 123-126
BibTeX@article{Yao2012, author = {Yao, H. and Wang, S. and Zhao, Y. and Zhang, X.}, title = {Detecting Image Forgery Using Perspective Constraints}, journal = {IEEE Signal Processing Letters}, year = {2012}, volume = {19}, number = {3}, pages = {123--126}}
-
Measure and redress of mode field diameter of polarization maintaining photonic crystal fibers
Instrumentation and Control Technology (ISICT), 2012 8th IEEE International Symposium on
2012, pp. 101-104
BibTeX@inproceedings{Ye2012, author = {Miao Ye and Yuanhong Yang and Weiqian Duan and Mingwei Yang}, title = {Measure and redress of mode field diameter of polarization maintaining photonic crystal fibers}, booktitle = {Instrumentation and Control Technology (ISICT), 2012 8th IEEE International Symposium on}, year = {2012}, pages = {101--104}}
-
Robust Evidence Detection of Copy-Rotate-Move Forgery in Image Based on Singular Value Decomposition
Chim, T. & Yuen, T. (ed.)
Information and Communications Security
Springer Berlin Heidelberg, 2012, Vol. 7618, pp. 357-364
BibTeX@incollection{Yong2012, author = {Yong, Liu and Meishan, Huang and Bogang, Lin}, title = {Robust Evidence Detection of Copy-Rotate-Move Forgery in Image Based on Singular Value Decomposition}, booktitle = {Information and Communications Security}, publisher = {Springer Berlin Heidelberg}, year = {2012}, volume = {7618}, pages = {357-364}}
-
Automated Image Forgery Detection through Classification of JPEG Ghosts
Pinz, A., Pock, T., Bischof, H. & Leberl, F. (ed.)
Pattern Recognition
Springer Berlin / Heidelberg, 2012, Vol. 7476, pp. 185-194
BibTeX@incollection{Zach2012, author = {Zach, Fabian and Riess, Christian and Angelopoulou, Elli}, title = {Automated Image Forgery Detection through Classification of JPEG Ghosts}, booktitle = {Pattern Recognition}, publisher = {Springer Berlin / Heidelberg}, year = {2012}, volume = {7476}, pages = {185-194}}
-
The Utility of Inconsistency in Information Security and Digital Forensics
Özyer, T., Kianmehr, K. & Tan, M. (ed.)
Recent Trends in Information Reuse and Integration
Springer Vienna, 2012, Vol. -, pp. 381-397
BibTeX@incollection{Zhang2012, author = {Zhang, Du}, title = {The Utility of Inconsistency in Information Security and Digital Forensics}, booktitle = {Recent Trends in Information Reuse and Integration}, publisher = {Springer Vienna}, year = {2012}, volume = {-}, pages = {381-397}}
-
Revealing Image Splicing Forgery Using Local Binary Patterns of DCT Coefficients
Liang, Q., Wang, W., Mu, J., Liang, J., Zhang, B., Pi, Y. & Zhao, C. (ed.)
Communications, Signal Processing, and Systems
Springer New York, 2012, Vol. 202, pp. 181-189
BibTeX@incollection{Zhang2012a, author = {Zhang, Yujin and Zhao, Chenglin and Pi, Yiming and Li, Shenghong}, title = {Revealing Image Splicing Forgery Using Local Binary Patterns of DCT Coefficients}, booktitle = {Communications, Signal Processing, and Systems}, publisher = {Springer New York}, year = {2012}, volume = {202}, pages = {181-189}}
-
A Comprehensive Study on Third Order Statistical Features for Image Splicing Detection
Shi, Y., Kim, H.-J. & Perez-Gonzalez, F. (ed.)
Digital Forensics and Watermarking
Springer Berlin / Heidelberg, 2012, Vol. 7128, pp. 243-256
BibTeX@incollection{Zhao2012, author = {Zhao, Xudong and Wang, Shilin and Li, Shenghong and Li, Jianhua}, title = {A Comprehensive Study on Third Order Statistical Features for Image Splicing Detection}, booktitle = {Digital Forensics and Watermarking}, publisher = {Springer Berlin / Heidelberg}, year = {2012}, volume = {7128}, pages = {243-256}}
-
A New Algorithm to Exposing Image Forgeries by Detecting Ambient Illumination Consistency
Zhang, C. S. (ed.)
Materials Science and Information Technology
2012, pp. 5463-5468
BibTeX@inproceedings{Zhong2012, author = {Wei Dong Zhong and Jun Jie Zhu and Li Xian Wei and Xiao Yuan Yang}, title = {A New Algorithm to Exposing Image Forgeries by Detecting Ambient Illumination Consistency}, booktitle = {Materials Science and Information Technology}, year = {2012}, pages = {5463-5468}}
-
Blind Copy-Paste Detection Using Improved SIFT Ring Descriptor
Shi, Y., Kim, H.-J. & Perez-Gonzalez, F. (ed.)
Digital Forensics and Watermarking
Springer Berlin / Heidelberg, 2012, Vol. 7128, pp. 257-267
BibTeX@incollection{Zhou2012, author = {Zhou, Lin-na and Guo, Yun-biao and You, Xin-gang}, title = {Blind Copy-Paste Detection Using Improved SIFT Ring Descriptor}, booktitle = {Digital Forensics and Watermarking}, publisher = {Springer Berlin / Heidelberg}, year = {2012}, volume = {7128}, pages = {257-267}}
-
Digital Image Identification Based on Asymmetrical Distribution
Journal of Information & Computational Science, 2012, Vol. 9(5), pp. 1337-1342
BibTeX@article{Zhou2012a, author = {Zhou, Z. and Zhou, C.}, title = {Digital Image Identification Based on Asymmetrical Distribution}, journal = {Journal of Information & Computational Science}, year = {2012}, volume = {9}, number = {5}, pages = {1337--1342}}
-
Image Detection Based-on the Analysis of Interpolating Signal Periodicity
Advanced Materials Research, 2012, Vol. 403-408, pp. 1297-1301
BibTeX@article{Zhu2012, author = {Jue Yu Zhu and Meng Yuan Chen and Feng Li}, title = {Image Detection Based-on the Analysis of Interpolating Signal Periodicity}, journal = {Advanced Materials Research}, year = {2012}, volume = {403-408}, pages = {1297-1301}}
2011
-
Numerical Analysis - Theory and Application
Awrejcewicz, J. (ed.)
Chapter Methods for Blind Estimation of the Variance of Mixed Noise and Their Performance Analysis
InTech, 2011, pp. 49-70
BibTeX@inbook{Abramov2011, author = {Sergey Abramov and Victoria Zabrodina and Vladimir Lukin and Benoit Vozel and Kacem Chehdi and Jaakko Astola}, title = {Numerical Analysis - Theory and Application}, publisher = {InTech}, year = {2011}, pages = {49-70}}
-
An image forensics tool for copy-move detection and localization
Irene Amerini, Lamberto Ballan, Roberto Caldelli, Alberto Del Bimbo, Luca Del Tongo, Giuseppe Serra, 2011
BibTeX@techreport{Amerini2011a, author = {Irene Amerini and Lamberto Ballan and Roberto Caldelli and Alberto Del Bimbo and Luca Del Tongo and Giuseppe Serra}, title = {An image forensics tool for copy-move detection and localization}, year = {2011}}
-
A SIFT-based forensic method for copy-move attack detection and transformation recovery
IEEE Transactions on Information Forensics and Security, 2011, Vol. 6(3), pp. 1099 - 1110
BibTeX@article{Amerini2011, author = {Amerini, I. and Ballan, L. and Caldelli, R. and Del Bimbo, A. and Serra, G.}, title = {A SIFT-based forensic method for copy-move attack detection and transformation recovery}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2011}, volume = {6}, number = {3}, pages = {1099 - 1110}}
-
Detection of doctored images using bispectral analysis
Proc. Int Image Information Processing (ICIIP) Conf
2011, pp. 1-6
BibTeX@inproceedings{Ananya2011, author = {Ananya, U. and Mudenagudi, U.}, title = {Detection of doctored images using bispectral analysis}, booktitle = {Proc. Int Image Information Processing (ICIIP) Conf}, year = {2011}, pages = {1--6}}
-
Digital Image Analysis: Analytical Framework For Authenticating Digital Images
University of Colorado Denver, 2011
BibTeX@mastersthesis{Anderson2011, author = {Anderson, Scott Dale}, title = {Digital Image Analysis: Analytical Framework For Authenticating Digital Images}, school = {University of Colorado Denver}, year = {2011}}
-
Robust Image Registration and Tampering Localization Exploiting Bag of Features Based Forensic Signature
Proceedings of the 19th ACM international conference on Multimedia
ACM, 2011, pp. 1245-1248
BibTeX@inproceedings{Battiato2011, author = {Sebastiano Battiato and Giovanni Maria Farinella and Enrico Messina and Giovanni Puglisi}, title = {Robust Image Registration and Tampering Localization Exploiting Bag of Features Based Forensic Signature}, booktitle = {Proceedings of the 19th ACM international conference on Multimedia}, publisher = {ACM}, year = {2011}, pages = {1245--1248}}
-
A Forensic Signature Based on Spatial Distributed Bag of Features for Image Alignment and Tampering Detection
Proceedings of the 3rd international ACM workshop on Multimedia in forensics and intelligence
ACM, 2011, pp. 19-24
BibTeX@inproceedings{Battiato2011a, author = {Sebastiano Battiato and Giovanni Maria Farinella and Enrico Messina and Giovanni Puglisi}, title = {A Forensic Signature Based on Spatial Distributed Bag of Features for Image Alignment and Tampering Detection}, booktitle = {Proceedings of the 3rd international ACM workshop on Multimedia in forensics and intelligence}, publisher = {ACM}, year = {2011}, pages = {19--24}}
-
Understanding geometric manipulations of images through bovw-based hashing
Proc. IEEE Int Multimedia and Expo (ICME) Conf
2011, pp. 1-6
BibTeX@inproceedings{Battiato2011b, author = {Battiato, S. and Farinella, G. M. and Messina, E. and Puglisi, G. }, title = {Understanding geometric manipulations of images through bovw-based hashing}, booktitle = {Proc. IEEE Int Multimedia and Expo (ICME) Conf}, year = {2011}, pages = {1--6}}
-
Improved DCT coefficient analysis for forgery localization in JPEG images
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2011
2011, pp. 2444-2447
BibTeX@inproceedings{Bianchi2011, author = {Bianchi, Tiziano and De Rosa, Alessia and Piva, Alessandro}, title = {Improved DCT coefficient analysis for forgery localization in JPEG images}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2011}, year = {2011}, pages = {2444--2447}}
-
Detection of Non-Aligned Double JPEG Compression Based on Integer Periodicity Maps
IEEE Transactions on Information Forensics and Security, 2011, Vol. PP(99), pp. 1
BibTeX@article{Bianchi2011a, author = {Bianchi, Tiziano and Piva, Alessandro}, title = {Detection of Non-Aligned Double JPEG Compression Based on Integer Periodicity Maps}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2011}, volume = {PP}, number = {99}, pages = {1}}
-
Analysis of non-aligned double JPEG artifacts for the localization of image forgeries
Proc. IEEE Int Information Forensics and Security (WIFS) Workshop
2011, pp. 1-6
BibTeX@inproceedings{Bianchi2011b, author = {Bianchi, Tiziano and Piva, Alessandro }, title = {Analysis of non-aligned double JPEG artifacts for the localization of image forgeries}, booktitle = {Proc. IEEE Int Information Forensics and Security (WIFS) Workshop}, year = {2011}, pages = {1--6}}
-
Detection of non-aligned double JPEG compression with estimation of primary compression parameters
Proc. 18th IEEE Int Image Processing (ICIP) Conf
2011, pp. 1929-1932
BibTeX@inproceedings{Bianchi2011d, author = {Bianchi, Tiziano and Piva, Alessandro }, title = {Detection of non-aligned double JPEG compression with estimation of primary compression parameters}, booktitle = {Proc. 18th IEEE Int Image Processing (ICIP) Conf}, year = {2011}, pages = {1929--1932}}
-
Uniform Motion Blur in Poissonian Noise: Blur/Noise Tradeoff
IEEE Transactions on Image Processing, 2011, Vol. 20(2), pp. 592-598
BibTeX@article{Boracchi2011, author = {Boracchi, G. and Foi, A.}, title = {Uniform Motion Blur in Poissonian Noise: Blur/Noise Tradeoff}, journal = {IEEE Transactions on Image Processing}, year = {2011}, volume = {20}, number = {2}, pages = {592--598}}
-
Exposing duplicated regions affected by reflection, rotation and scaling
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2011
2011, pp. 1880-1883
BibTeX@inproceedings{Bravo-Solorio2011, author = {Bravo-Solorio, Sergio and Nandi, Asoke K.}, title = {Exposing duplicated regions affected by reflection, rotation and scaling}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2011}, year = {2011}, pages = {1880--1883}}
-
Automated detection and localisation of duplicated regions affected by reflection, rotation and scaling in image forensics
Signal Processing, 2011, Vol. 91(8), pp. 1759 - 1770
BibTeX@article{Bravo-Solorio2011a, author = {Sergio Bravo-Solorio and Asoke K. Nandi}, title = {Automated detection and localisation of duplicated regions affected by reflection, rotation and scaling in image forensics}, journal = {Signal Processing}, year = {2011}, volume = {91}, number = {8}, pages = {1759 - 1770}}
-
Crop Detection Through Blocking Artefacts Analysis
Proc. of the 16th International Conference on Image Analysis and Processing ICIAP 2011
2011
BibTeX@inproceedings{Bruna2011, author = {Bruna, A.R., Messina, G., Battiato, S.}, title = {Crop Detection Through Blocking Artefacts Analysis}, booktitle = {Proc. of the 16th International Conference on Image Analysis and Processing ICIAP 2011}, year = {2011}}
-
Blind Image Tampering Identification Based on Histogram Features
Proc. Third Int Multimedia Information Networking and Security (MINES) Conf
2011, pp. 300-303
BibTeX@inproceedings{Cai2011, author = {Kaiwei Cai and Xiaoqing Lu and Jianguo Song and Xiao Wang}, title = {Blind Image Tampering Identification Based on Histogram Features}, booktitle = {Proc. Third Int Multimedia Information Networking and Security (MINES) Conf}, year = {2011}, pages = {300--303}}
-
Forensic identification of resampling operators: A semi non-intrusive approach
Forensic Science International, 2011, Vol. -(0), pp. -
BibTeX@article{Cao2011b, author = {Gang Cao and Yao Zhao and Rongrong Ni}, title = {Forensic identification of resampling operators: A semi non-intrusive approach}, journal = {Forensic Science International}, year = {2011}, volume = {-}, number = {0}, pages = { - }}
-
Unsharp Masking Sharpening Detection via Overshoot Artifacts Analysis
IEEE Signal Processing Letters, 2011, Vol. 18(10), pp. 603-606
BibTeX@article{Cao2011d, author = {G. Cao and Y. Zhao and R. Ni and AC Kot}, title = {Unsharp Masking Sharpening Detection via Overshoot Artifacts Analysis}, journal = {IEEE Signal Processing Letters}, year = {2011}, volume = {18}, number = {10}, pages = {603--606}}
-
Detection of Tampering Inconsistencies on Mobile Photos
Kim, H.-J., Shi, Y. & Barni, M. (ed.)
Digital Watermarking
Springer Berlin / Heidelberg, 2011, Vol. 6526, pp. 105-119
BibTeX@incollection{Cao2011, author = {Cao, Hong and Kot, Alex}, title = {Detection of Tampering Inconsistencies on Mobile Photos}, booktitle = {Digital Watermarking}, publisher = {Springer Berlin / Heidelberg}, year = {2011}, volume = {6526}, pages = {105-119}}
-
Similar DSLR Processor Identification using Compact Model Templates
APSIPA ASC, 2011, pp. 5
BibTeX@article{Cao2011c, author = {H. Cao and A.C. Kot}, title = {Similar DSLR Processor Identification using Compact Model Templates}, journal = {APSIPA ASC}, year = {2011}, pages = {5}}
-
A robust detection algorithm for copy-move forgery in digital images
Forensic Science International, 2011, Vol. In Press, Corrected Proof, pp. -
BibTeX@article{Cao2011a, author = {Yanjun Cao and Tiegang Gao and Li Fan and Qunting Yang}, title = {A robust detection algorithm for copy-move forgery in digital images}, journal = {Forensic Science International}, year = {2011}, volume = {In Press, Corrected Proof}, pages = { - }}
-
Image Multi-Distortion Estimation
IEEE Transactions on Image Processing, 2011, Vol. 20 Issue:12, pp. 3442 - 3454
BibTeX@article{Caron2011, author = {Caron, A. and Jodoin, P.}, title = {Image Multi-Distortion Estimation}, journal = {IEEE Transactions on Image Processing}, year = {2011}, volume = {20 Issue:12}, pages = {3442 - 3454}}
-
A Forensic Analysis of Images on Online Social Networks
Proc. Third Int Intelligent Networking and Collaborative Systems (INCoS) Conf
2011, pp. 679-684
BibTeX@inproceedings{Castiglione2011, author = {Castiglione, A. and Cattaneo, G. and De Santis, A. }, title = {A Forensic Analysis of Images on Online Social Networks}, booktitle = {Proc. Third Int Intelligent Networking and Collaborative Systems (INCoS) Conf}, year = {2011}, pages = {679--684}}
-
Practical Bounds on Image Denoising: From Estimation to Information
IEEE Transactions on Image Processing, 2011, Vol. 20(5), pp. 1221-1233
BibTeX@article{Chatterjee2011, author = {Chatterjee, P. and Milanfar, P. }, title = {Practical Bounds on Image Denoising: From Estimation to Information}, journal = {IEEE Transactions on Image Processing}, year = {2011}, volume = {20}, number = {5}, pages = {1221--1233}}
-
Research noise of image acquisition system on CCD
Proc. Int Electronics and Optoelectronics (ICEOE) Conf
2011, Vol. 2
BibTeX@inproceedings{Chen2011a, author = {Ying Chen and Shao-bo Fu and Lan-fang Fu and Zhi-yong Li and Yun-peng Hu}, title = {Research noise of image acquisition system on CCD}, booktitle = {Proc. Int Electronics and Optoelectronics (ICEOE) Conf}, year = {2011}, volume = {2}}
-
Further studies on forensic features for source camera identification
Proc. th Int Imaging for Crime Detection and Prevention 2011 (ICDP 2011) Conf
2011, pp. 1-6
BibTeX@inproceedings{Chen2011b, author = {Ying-Chu Chen and Yongjian Hu and Chang-Tsun Li}, title = {Further studies on forensic features for source camera identification}, booktitle = {Proc. th Int Imaging for Crime Detection and Prevention 2011 (ICDP 2011) Conf}, year = {2011}, pages = {1--6}}
-
Detecting Recompression of JPEG Images via Periodicity Analysis of Compression Artifacts for Tampering Detection
IEEE Transactions on Information Forensics and Security, 2011, Vol. 6(2), pp. 396-406
BibTeX@article{Chen2011, author = {Yi-Lei Chen and Chiou-Ting Hsu}, title = {Detecting Recompression of JPEG Images via Periodicity Analysis of Compression Artifacts for Tampering Detection}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2011}, volume = {6}, number = {2}, pages = {396--406}}
-
Efficient Image Matching using Local Invariant Features for Copy Detection
Li, C.-T. & Ho, T. S. (ed.)
Chapter cho18
New Technologies for Digital Crime and Forensics: Devices, Applications, and Software, IGI Global, 2011, pp. 257-276
BibTeX@inbook{Chennamma2011a, author = {Chennamma, H.R. and Lalitha Rangarajan and Rao, M.S.}, title = {Efficient Image Matching using Local Invariant Features for Copy Detection}, journal = {New Technologies for Digital Crime and Forensics: Devices, Applications, and Software}, publisher = {IGI Global}, year = {2011}, pages = {257-276}}
-
Image Splicing Detection Using Inherent Lens Radial Distortion
IJCSI International Journal of Computer Science Issues, 2011, Vol. 7, pp. 49-158
BibTeX@article{Chennamma2011, author = {H. R. Chennamma and Lalitha Rangarajan}, title = {Image Splicing Detection Using Inherent Lens Radial Distortion}, journal = {IJCSI International Journal of Computer Science Issues}, year = {2011}, volume = {7}, pages = {49-158}}
-
Noise in a CMOS digital pixel sensor
Journal of Semiconductors, 2011, Vol. 32(11), pp. 115005
BibTeX@article{Chi2011, author = {Zhang Chi and Yao Suying and Xu Jiangtao}, title = {Noise in a CMOS digital pixel sensor}, journal = {Journal of Semiconductors}, year = {2011}, volume = {32}, number = {11}, pages = {115005}}
-
PRNU-based detection of small-size image forgeries
Proc. 17th Int Digital Signal Processing (DSP) Conf
2011, pp. 1-6
BibTeX@inproceedings{Chierchia2011, author = {Chierchia, G. and Parrilli, S. and Poggi, G. and Verdoliva, L. and Sansone, C.}, title = {PRNU-based detection of small-size image forgeries}, booktitle = {Proc. 17th Int Digital Signal Processing (DSP) Conf}, year = {2011}, pages = {1--6}}
-
CFA pattern identification of digital cameras using intermediate value counting
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
ACM, 2011, pp. 21-26
BibTeX@inproceedings{Choi2011, author = {Choi, Chang-Hee and Choi, Jung-Ho and Lee, Heung-Kyu}, title = {CFA pattern identification of digital cameras using intermediate value counting}, booktitle = {Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security}, publisher = {ACM}, year = {2011}, pages = {21--26}}
-
Exploring compression effects for improved source camera identification using strongly compressed video
Proc. 18th IEEE Int Image Processing (ICIP) Conf
2011, pp. 1953-1956
BibTeX@inproceedings{Chuang2011, author = {Wei-Hong Chuang and Hui Su and Min Wu}, title = {Exploring compression effects for improved source camera identification using strongly compressed video}, booktitle = {Proc. 18th IEEE Int Image Processing (ICIP) Conf}, year = {2011}, pages = {1953--1956}}
-
Digital Forensics Tool Testing--Image Metadata in the Cloud
Department of Computer Science and Media Technology Gjøvik University College, 2011, 2011
BibTeX@mastersthesis{Clark2011, author = {Clark, Philip}, title = {Digital Forensics Tool Testing--Image Metadata in the Cloud}, school = {Department of Computer Science and Media Technology Gjøvik University College, 2011}, year = {2011}}
-
Analysis of sensor fingerprint for source camera identification
Electronics Letters, 2011, Vol. 47(25), pp. 1366-1367
BibTeX@article{Conotter2011, author = {Conotter, V. and Boato, Giulia }, title = {Analysis of sensor fingerprint for source camera identification}, journal = {Electronics Letters}, year = {2011}, volume = {47}, number = {25}, pages = {1366--1367}}
-
Performance comparison of denoising filters for source camera identification
Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
Proceedings of SPIE
Media Watermarking, Security, and Forensics III, SPIE, 2011, Vol. 7880(1), pp. 788007
BibTeX@conference{Cortiana2011, author = {A. Cortiana and V. Conotter and G. Boato and F. G. B. De Natale}, title = {Performance comparison of denoising filters for source camera identification}, booktitle = {Proceedings of SPIE}, journal = {Media Watermarking, Security, and Forensics III}, publisher = {SPIE}, year = {2011}, volume = {7880}, number = {1}, pages = {788007}}
-
Analisi e sviluppo di metodi per l'individuazione di manipolazioni copy-move in applicazioni di image forensics
UNIVERSITA DEGLI STUDI DI FIRENZE, 2011
BibTeX@mastersthesis{DelTongo2011, author = {Luca Del Tongo}, title = {Analisi e sviluppo di metodi per l'individuazione di manipolazioni copy-move in applicazioni di image forensics}, school = {UNIVERSITA DEGLI STUDI DI FIRENZE}, year = {2011}}
-
Source camera identification using Auto-White Balance approximation
Proc. IEEE Int Computer Vision (ICCV) Conf
2011, pp. 57-64
BibTeX@inproceedings{Deng2011, author = {Zhonghai Deng and Gijsenij, A. and Jingyuan Zhang}, title = {Source camera identification using Auto-White Balance approximation}, booktitle = {Proc. IEEE Int Computer Vision (ICCV) Conf}, year = {2011}, pages = {57--64}}
-
Digital Image Processing Techniques for Detection And Removal of Noise In Images Implementing Blind Source Separation
International Journal on Computer Science and Engineering (IJCSE), 2011, Vol. 3(8), pp. 3108-3114
BibTeX@article{Devi2011, author = {Devi, K. Devaki and Swamy, G.N.}, title = {Digital Image Processing Techniques for Detection And Removal of Noise In Images Implementing Blind Source Separation}, journal = {International Journal on Computer Science and Engineering (IJCSE)}, year = {2011}, volume = {3}, number = {8}, pages = {3108-3114}}
-
Double Compression Detection Based on Markov Model of the First Digits of DCT Coefficients
Proc. Sixth Int Image and Graphics (ICIG) Conf
2011, pp. 234-237
BibTeX@inproceedings{Dong2011, author = {Lisha Dong and Xiangwei Kong and Bo Wang and Xin´gang You}, title = {Double Compression Detection Based on Markov Model of the First Digits of DCT Coefficients}, booktitle = {Proc. Sixth Int Image and Graphics (ICIG) Conf}, year = {2011}, pages = {234--237}}
-
Modeling the EXIF-Image correlation for image manipulation detection
Proc. 18th IEEE Int Image Processing (ICIP) Conf
2011, pp. 1945-1948
BibTeX@inproceedings{Fan2011a, author = {Jiayuan Fan and Kot, A. C. and Hong Cao and Sattar, F.}, title = {Modeling the EXIF-Image correlation for image manipulation detection}, booktitle = {Proc. 18th IEEE Int Image Processing (ICIP) Conf}, year = {2011}, pages = {1945--1948}}
-
Detection of Double-Compression in JPEG2000 by Using Markov Features
Wu, Y. (ed.)
Computing and Intelligent Systems
Springer Berlin Heidelberg, 2011, Vol. 234, pp. 441-449
BibTeX@incollection{Fan2011, author = {Fan, Zhao and Wang, Shilin and Li, Shenghong and Zhang, Yujin}, title = {Detection of Double-Compression in JPEG2000 by Using Markov Features}, booktitle = {Computing and Intelligent Systems}, publisher = {Springer Berlin Heidelberg}, year = {2011}, volume = {234}, pages = {441-449}}
-
An energy-based method for the forensic detection of Re-sampled images
Proc. IEEE Int Multimedia and Expo (ICME) Conf
2011, pp. 1-6
BibTeX@inproceedings{Feng2011, author = {Xiaoying Feng and Cox, Ingemar J. and Doerr, Gwenael}, title = {An energy-based method for the forensic detection of Re-sampled images}, booktitle = {Proc. IEEE Int Multimedia and Expo (ICME) Conf}, year = {2011}, pages = {1--6}}
-
Statistical Image Processing and Multidimensional Modeling
Jordan, M., Nowak, R. & Schölkopf, B. (ed.)
Springer, 2011
BibTeX@book{Fieguth2010, author = {Fieguth, Paul}, title = {Statistical Image Processing and Multidimensional Modeling}, publisher = {Springer}, year = {2011}}
-
A Dempster-Shafer framework for decision fusion in image forensics
Information Forensics and Security (WIFS), 2011 IEEE International Workshop on
2011, pp. 1-6
BibTeX@inproceedings{Fontani2011, author = {Fontani, M and Bianchi, Tiziano and De Rosa, Alessia and Piva, Alessandro and Barni, M.}, title = {A Dempster-Shafer framework for decision fusion in image forensics}, booktitle = {Information Forensics and Security (WIFS), 2011 IEEE International Workshop on}, year = {2011}, pages = {1--6}}
-
Determining approximate age of digital images using sensor defects
Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
Proceedings of SPIE
Media Watermarking, Security, and Forensics III, SPIE, 2011, Vol. 7880(1), pp. 788006
BibTeX@conference{Fridrich2011, author = {Jessica Fridrich and Miroslav Goljan}, title = {Determining approximate age of digital images using sensor defects}, booktitle = {Proceedings of SPIE}, journal = {Media Watermarking, Security, and Forensics III}, publisher = {SPIE}, year = {2011}, volume = {7880}, number = {1}, pages = {788006}}
-
Multimodal Location Estimation on Flickr Videos
-
2011
BibTeX@inproceedings{Friedland2011, author = {Gerald Friedland and Jaeyoung Choi and Howard Lei and, Adam Janin}, title = {Multimodal Location Estimation on Flickr Videos}, booktitle = {-}, year = {2011}}
-
Robust detection of copy-move forgery using texture features
Proc. 19th Iranian Conf. Electrical Engineering (ICEE)
2011, pp. 1 - 4
BibTeX@inproceedings{Gharibi2011, author = {Gharibi, Fereshteh and RavanJamjah, Javad and Akhlaghian, Fardin and Azami, Bahram Zahir and Alirezaie, Javad}, title = {Robust detection of copy-move forgery using texture features}, booktitle = {Proc. 19th Iranian Conf. Electrical Engineering (ICEE)}, year = {2011}, pages = {1 - 4}}
-
Digital Camera Identification by Modeling the Probability Distribution of Sensor Pattern Noise
Proc. 7th Iranian Machine Vision and Image Processing (MVIP)
2011, pp. 1-4
BibTeX@inproceedings{Gharibi2011a, author = {Gharibi, F. and RavanJamjah, J. and ZahirAzami, B. and Akhlaghian, F. }, title = {Digital Camera Identification by Modeling the Probability Distribution of Sensor Pattern Noise}, booktitle = {Proc. 7th Iranian Machine Vision and Image Processing (MVIP)}, year = {2011}, pages = {1--4}}
-
DWT-DCT (QCD) based copy-move image forgery detection
Proc. 18th Int Systems, Signals and Image Processing (IWSSIP) Conf
2011, pp. 1-4
BibTeX@inproceedings{Ghorbani2011, author = {Ghorbani, M. and Firouzmand, M. and Faraahi, A.}, title = {DWT-DCT (QCD) based copy-move image forgery detection}, booktitle = {Proc. 18th Int Systems, Signals and Image Processing (IWSSIP) Conf}, year = {2011}, pages = {1--4}}
-
Demystifying histograms of multi-quantised DCT coefficients
Proc. IEEE Int Multimedia and Expo (ICME) Conf
2011, pp. 1-6
BibTeX@inproceedings{Gloe2011, author = {Gloe, T.}, title = {Demystifying histograms of multi-quantised DCT coefficients}, booktitle = {Proc. IEEE Int Multimedia and Expo (ICME) Conf}, year = {2011}, pages = {1--6}}
-
Detection of local artificial changes in images
Optoelectronics, Instrumentation and Data Processing, Allerton Press, Inc. distributed exclusively by Springer Science+Business Media LLC, 2011, Vol. 47, pp. 207-214
BibTeX@article{Glumov2011, author = {Glumov, N. and Kuznetsov, A.}, title = {Detection of local artificial changes in images}, journal = {Optoelectronics, Instrumentation and Data Processing}, publisher = {Allerton Press, Inc. distributed exclusively by Springer Science+Business Media LLC}, year = {2011}, volume = {47}, pages = {207-214}}
-
Analysis of images for local artificial changes with JPEG compression properties
Pattern Recognition and Image Analysis, MAIK Nauka/Interperiodica distributed exclusively by Springer Science+Business Media LLC., 2011, Vol. 21, pp. 251-253
BibTeX@article{Glumov2011a, author = {Glumov, N. and Kuznetsov, A.}, title = {Analysis of images for local artificial changes with JPEG compression properties}, journal = {Pattern Recognition and Image Analysis}, publisher = {MAIK Nauka/Interperiodica distributed exclusively by Springer Science+Business Media LLC.}, year = {2011}, volume = {21}, pages = {251-253}}
-
Defending Against Fingerprint-Copy Attack in Sensor-Based Camera Identification
IEEE Transactions on Information Forensics and Security, 2011, Vol. 6(1), pp. 227-236
BibTeX@article{Goljan2011, author = {Goljan, M. and Fridrich, J. and Mo Chen}, title = {Defending Against Fingerprint-Copy Attack in Sensor-Based Camera Identification}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2011}, volume = {6}, number = {1}, pages = {227--236}}
-
Blind Video Tamper Detection Based on Fusion of Source Features
Proc. Int Digital Image Computing Techniques and Applications (DICTA) Conf
2011, pp. 608-613
BibTeX@inproceedings{Goodwin2011, author = {Goodwin, J. and Chetty, G. }, title = {Blind Video Tamper Detection Based on Fusion of Source Features}, booktitle = {Proc. Int Digital Image Computing Techniques and Applications (DICTA) Conf}, year = {2011}, pages = {608--613}}
-
An Anisotropic Fourth-Order Diffusion Filter for Image Noise Removal
International Journal of Computer Vision, Springer Netherlands, 2011, Vol. 92, pp. 177-191
BibTeX@article{Hajiaboli2011, author = {Hajiaboli, Mohammad}, title = {An Anisotropic Fourth-Order Diffusion Filter for Image Noise Removal}, journal = {International Journal of Computer Vision}, publisher = {Springer Netherlands}, year = {2011}, volume = {92}, pages = {177-191}}
-
Digital image splicing detection based on approximate run length
Pattern Recognition Letters, 2011, Vol. 32(12), pp. 1591 - 1597
BibTeX@article{He2011, author = {Zhongwei He and Wei Sun and Wei Lu and Hongtao Lu}, title = {Digital image splicing detection based on approximate run length}, journal = {Pattern Recognition Letters}, year = {2011}, volume = {32}, number = {12}, pages = {1591 - 1597}}
-
Identifying camcorders using noise patterns from video clips recorded with image stabilisation
Proc. 7th Int Image and Signal Processing and Analysis (ISPA) Symp
2011, pp. 668-671
BibTeX@inproceedings{Hoglund2011, author = {Hoglund, Tobias and Brolund, Per and Norell, Kristin}, title = {Identifying camcorders using noise patterns from video clips recorded with image stabilisation}, booktitle = {Proc. 7th Int Image and Signal Processing and Analysis (ISPA) Symp}, year = {2011}, pages = {668--671}}
-
Representations and Techniques for 3D Object Recognition & Scene Interpretation (Synthesis Lectures on Artificial Intelligence and Machine Learning)
Chapter 2 -- Single view metrology
Morgan & Claypool Publishers, 2011, pp. 4-9
BibTeX@inbook{Hoiem2011, author = {Derek Hoiem and Silvio Savarese}, title = {Representations and Techniques for 3D Object Recognition & Scene Interpretation (Synthesis Lectures on Artificial Intelligence and Machine Learning)}, publisher = {Morgan & Claypool Publishers}, year = {2011}, pages = {4--9}}
-
An edge-sensing generic demosaicing algorithm with application to image resampling
IEEE Transactions on Image Processing, 2011, Vol. 99(99), pp. 9
BibTeX@article{Hore2011, author = {Hore, A. and Ziou, D. }, title = {An edge-sensing generic demosaicing algorithm with application to image resampling}, journal = {IEEE Transactions on Image Processing}, year = {2011}, volume = {99}, number = {99}, pages = {9}}
-
Image copy-move forgery detection based on "crossing shadow" division
Proc. Int Electric Information and Control Engineering (ICEICE) Conf
2011, pp. 1416-1419
BibTeX@inproceedings{Hou2011, author = {Dongmei Hou and Zhengyao Bai and Shuchun Liu}, title = {Image copy-move forgery detection based on "crossing shadow" division}, booktitle = {Proc. Int Electric Information and Control Engineering (ICEICE) Conf}, year = {2011}, pages = {1416--1419}}
-
Image copy-move forgery detection based on crossing shadow division
Proc. Int Electric Information and Control Engineering (ICEICE) Conf
2011, pp. 1416-1419
BibTeX@inproceedings{Hou2011a, author = {Dongmei Hou and Zhengyao Bai and Shuchun Liu}, title = {Image copy-move forgery detection based on crossing shadow division}, booktitle = {Proc. Int Electric Information and Control Engineering (ICEICE) Conf}, year = {2011}, pages = {1416--1419}}
-
Image copy-move forgery detection based on textquotedblleftcrossing shadowtextquotedblright division
Proc. Int Electric Information and Control Engineering (ICEICE) Conf
2011, pp. 1416-1419
BibTeX@inproceedings{Hou2011b, author = {Dongmei Hou and Zhengyao Bai and Shuchun Liu}, title = {Image copy-move forgery detection based on textquotedblleftcrossing shadowtextquotedblright division}, booktitle = {Proc. Int Electric Information and Control Engineering (ICEICE) Conf}, year = {2011}, pages = {1416--1419}}
-
Implementation of the likelihood ratio framework for camera identification based on sensor noise patterns
Law, Probability and Risk, 2011, Vol. 10(2), pp. 149-159
BibTeX@article{Houten2011, author = {Wiger van Houten and Ivo Alberink and Zeno Geradts}, title = {Implementation of the likelihood ratio framework for camera identification based on sensor noise patterns}, journal = {Law, Probability and Risk}, year = {2011}, volume = {10}, number = {2}, pages = {149-159}}
-
Exposing digital image forgeries by detecting inconsistencies in principal point
Proc. Int Computer Science and Service System (CSSS) Conf
2011, pp. 404-407
BibTeX@inproceedings{Hu2011a, author = {Jing Hu and Yezhou Li and Shaozhang Niu and Xianzhe Meng}, title = {Exposing digital image forgeries by detecting inconsistencies in principal point}, booktitle = {Proc. Int Computer Science and Service System (CSSS) Conf}, year = {2011}, pages = {404--407}}
-
An Improved Lexicographical Sort Algorithm of Copy-move Forgery Detection
Proc. Second Int Networking and Distributed Computing (ICNDC) Conf
2011, pp. 23-27
BibTeX@inproceedings{Hu2011, author = {Jie Hu and Huaxiong Zhang and Qiang Gao and Hai Huang}, title = {An Improved Lexicographical Sort Algorithm of Copy-move Forgery Detection}, booktitle = {Proc. Second Int Networking and Distributed Computing (ICNDC) Conf}, year = {2011}, pages = {23--27}}
-
Source Camera Identification Issues: Forensic Features Selection and Robustness
International Journal of Digital Crime and Forensics (IJDCF), 2011, Vol. 3(4), pp. 1-15
BibTeX@article{Hu2011b, author = {Yongjian Hu and Chang-Tsun Li and Changhui Zhou and Xufeng Lin}, title = {Source Camera Identification Issues: Forensic Features Selection and Robustness}, journal = {International Journal of Digital Crime and Forensics (IJDCF)}, year = {2011}, volume = {3}, number = {4}, pages = {1-15}}
-
Blind forensics in medical imaging based on Tchebichef image moments
Proc. Annual Int Engineering in Medicine and Biology Society,EMBC Conf. of the IEEE
2011, pp. 4473-4476
BibTeX@inproceedings{Huang2011a, author = {Huang, H. and Coatrieux, G. and Shu, H. Z. and Luo, L. M. and Roux, C. }, title = {Blind forensics in medical imaging based on Tchebichef image moments}, booktitle = {Proc. Annual Int Engineering in Medicine and Biology Society,EMBC Conf. of the IEEE}, year = {2011}, pages = {4473--4476}}
-
Improved DCT-based detection of copy-move forgery in images
Forensic Science International, 2011, Vol. 206(1-3), pp. 178 - 184
BibTeX@article{Huang2011, author = {Yanping Huang and Wei Lu and Wei Sun and Dongyang Long}, title = {Improved DCT-based detection of copy-move forgery in images}, journal = {Forensic Science International}, year = {2011}, volume = {206}, number = {1-3}, pages = {178 - 184}}
-
Webcam geo-localization using aggregate light levels
Proc. IEEE Workshop Applications of Computer Vision (WACV)
2011, pp. 132-138
BibTeX@inproceedings{Jacobs2011, author = {Jacobs, N. and Miskell, K. and Pless, R. }, title = {Webcam geo-localization using aggregate light levels}, booktitle = {Proc. IEEE Workshop Applications of Computer Vision (WACV)}, year = {2011}, pages = {132--138}}
-
A Novel Algorithm of Image Splicing Detection
School of Electrical Engineering Zhengzhou University, 2011
BibTeX@techreport{Kaizhen2011, author = {Zhu Kaizhen and, Zhen Zhang}, title = {A Novel Algorithm of Image Splicing Detection}, year = {2011}}
-
Detecting copy-paste forgeries using transform-invariant features
Proc. IEEE 15th Int Consumer Electronics (ISCE) Symp
2011, pp. 58-61
BibTeX@inproceedings{Kakar2011, author = {Kakar, P. and Sudha, N. }, title = {Detecting copy-paste forgeries using transform-invariant features}, booktitle = {Proc. IEEE 15th Int Consumer Electronics (ISCE) Symp}, year = {2011}, pages = {58--61}}
-
Exposing Digital Image Forgeries by Detecting Discrepancies in Motion Blur
IEEE Transactions on Multimedia, 2011, Vol. 13(3), pp. 443-452
BibTeX@article{Kakar2011a, author = {Kakar, P. and Sudha, N. and Ser, W.}, title = {Exposing Digital Image Forgeries by Detecting Discrepancies in Motion Blur}, journal = {IEEE Transactions on Multimedia}, year = {2011}, volume = {13}, number = {3}, pages = {443--452}}
-
Enhancing ROC performance of trustworthy camera source identification
Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
Proceedings of SPIE
Media Watermarking, Security, and Forensics III, SPIE, 2011, Vol. 7880(1), pp. 788009
BibTeX@conference{Kang2011, author = {Xiangui Kang and Yinxiang Li and Zhenhua Qu and Jiwu Huang}, title = {Enhancing ROC performance of trustworthy camera source identification}, booktitle = {Proceedings of SPIE}, journal = {Media Watermarking, Security, and Forensics III}, publisher = {SPIE}, year = {2011}, volume = {7880}, number = {1}, pages = {788009}}
-
Enhancing Source Camera Identification Performance with a Camera Reference Phase Sensor Pattern Noise
IEEE Transactions on Information Forensics and Security, 2011, Vol. PP Issue:99(99), pp. 1
BibTeX@article{Kang2011a, author = {Kang, X. and Li, Y. and Qu, Z. and Huang, J.}, title = {Enhancing Source Camera Identification Performance with a Camera Reference Phase Sensor Pattern Noise}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2011}, volume = {PP Issue:99}, number = {99}, pages = {1}}
-
Rendering synthetic objects into legacy photographs
Proceedings of the 2011 SIGGRAPH Asia Conference
ACM, 2011, pp. 157:1-157:12
BibTeX@inproceedings{Karsch2011, author = {Karsch, Kevin and Hedau, Varsha and Forsyth, David and Hoiem, Derek}, title = {Rendering synthetic objects into legacy photographs}, booktitle = {Proceedings of the 2011 SIGGRAPH Asia Conference}, publisher = {ACM}, year = {2011}, pages = {157:1--157:12}}
-
Digital Image Authentication From JPEG Headers
IEEE Transactions on Information Forensics and Security, 2011, Vol. 6(3), pp. 1066-1075
BibTeX@article{Kee2011, author = {Kee, Eric. and Johnson, Micah. Kimo and Farid, H.}, title = {Digital Image Authentication From JPEG Headers}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2011}, volume = {6}, number = {3}, pages = {1066--1075}}
-
Detection of copy-move forgery using multiresolution characteristic of discrete wavelet transform
Proceedings of the International Conference &38; Workshop on Emerging Trends in Technology
ACM, 2011, pp. 127-131
BibTeX@inproceedings{Khan2011, author = {Khan, S. and Kulkarni, A.}, title = {Detection of copy-move forgery using multiresolution characteristic of discrete wavelet transform}, booktitle = {Proceedings of the International Conference &38; Workshop on Emerging Trends in Technology}, publisher = {ACM}, year = {2011}, pages = {127--131}}
-
A photographic forensic case study: Myths, principles and techniques
Mathematical and Computer Modelling, 2011, Vol. In Press, Accepted Manuscript, pp. -
BibTeX@article{Kim2011, author = {Hyoung Joong Kim and Soomin Lim and Jongsub Moon and Boram Kim and Eui S. Jung}, title = {A photographic forensic case study: Myths, principles and techniques}, journal = {Mathematical and Computer Modelling}, year = {2011}, volume = {In Press, Accepted Manuscript}, pages = { - }}
-
Region-based tampering detection and recovery using homogeneity analysis in quality-sensitive imaging
Computer Vision and Image Understanding, 2011, Vol. 115(9), pp. 1308 - 1323
BibTeX@article{Kim2011a, author = {Kyung-Su Kim and Min-Jeong Lee and Ji-Won Lee and Tae-Woo Oh and Hae-Yeoun Lee}, title = {Region-based tampering detection and recovery using homogeneity analysis in quality-sensitive imaging}, journal = {Computer Vision and Image Understanding}, year = {2011}, volume = {115}, number = {9}, pages = {1308 - 1323}}
-
Article: Image based Secret Communication using Double Compression
International Journal of Computer Applications, 2011, Vol. 21(7), pp. 6-9
BibTeX@article{Kommini2011, author = {Chaitanya Kommini and Kamalesh Ellanti and Srinivasulu Asadi}, title = {Article: Image based Secret Communication using Double Compression}, journal = {International Journal of Computer Applications}, year = {2011}, volume = {21}, number = {7}, pages = {6--9}}
-
Countering Counter-Forensics: The Case of JPEG Compression
Filler, T., Pevný, T., Craver, S. & Ker, A. (ed.)
Information Hiding
Springer Berlin / Heidelberg, 2011, Vol. 6958, pp. 285-298
BibTeX@incollection{Lai2011, author = {Lai, ShiYue and Böhme, Rainer}, title = {Countering Counter-Forensics: The Case of JPEG Compression}, booktitle = {Information Hiding}, publisher = {Springer Berlin / Heidelberg}, year = {2011}, volume = {6958}, pages = {285-298}}
-
Understanding and recreating visual appearance under natural illumination
DTIC Document, 2011
BibTeX@techreport{Lalonde2011a, author = {Lalonde, Jean-Francois}, title = {Understanding and recreating visual appearance under natural illumination}, year = {2011}}
-
Estimating the natural illumination conditions from a single outdoor image
International Journal of Computer Vision, 2011, Vol. -, pp. 1-25
BibTeX@article{Lalonde2011, author = {Jean-François Lalonde and Alexei A. Efros and Srinivasa G. Narasimhan}, title = {Estimating the natural illumination conditions from a single outdoor image}, journal = {International Journal of Computer Vision}, year = {2011}, volume = {-}, pages = {1-25}}
-
On the Location-Dependent Quality of the Sensor Pattern Noise and Its Implication in Multimedia Forensics
Proceedings of the 4th International Conference on Imaging for Crime Detection and Prevention (ICDP 2011), London, United Kingdom
4th International Conference on Imaging for Crime Detection and Prevention (ICDP 2011), 2011
BibTeX@inproceedings{Li2011f, author = {Chang-Tzun Li and Riccardo Satta}, title = {On the Location-Dependent Quality of the Sensor Pattern Noise and Its Implication in Multimedia Forensics}, booktitle = {Proceedings of the 4th International Conference on Imaging for Crime Detection and Prevention (ICDP 2011), London, United Kingdom}, journal = {4th International Conference on Imaging for Crime Detection and Prevention (ICDP 2011)}, year = {2011}}
-
A Robust Approach to Detect Tampering by Exploring Correlation Patterns
Real, P., Diaz-Pernil, D., Molina-Abril, H., Berciano, A. & Kropatsch, W. (ed.)
Computer Analysis of Images and Patterns
Springer Berlin / Heidelberg, 2011, Vol. 6855, pp. 515-522
BibTeX@incollection{Li2011c, author = {Li, Lu and Xue, Jianru and Wang, Xiaofeng and Tian, Lihua}, title = {A Robust Approach to Detect Tampering by Exploring Correlation Patterns}, booktitle = {Computer Analysis of Images and Patterns}, publisher = {Springer Berlin / Heidelberg}, year = {2011}, volume = {6855}, pages = {515-522}}
-
Blind identification algorithm for retouched images based on Bi-Laplacian
Journal of Computer Applications, 2011, Vol. 1, pp. -
BibTeX@article{Li2011, author = {Li, Xiao-Fei and Shen, Xuan-Jing and Chen, Hai-Peng}, title = {Blind identification algorithm for retouched images based on Bi-Laplacian}, journal = {Journal of Computer Applications}, year = {2011}, volume = {1}, pages = {-}}
-
Decomposed PRNU Library for Forensics on Photos
International Journal of Digital Library Systems,, 2011, Vol. 2(1), pp. 38
BibTeX@article{Li2011b, author = {Yue Li}, title = {Decomposed PRNU Library for Forensics on Photos}, journal = {International Journal of Digital Library Systems,}, year = {2011}, volume = {2}, number = {1}, pages = {38}}
-
A robust forensic method based on Scale-Invariance Feature Transform
Proc. Int Multimedia Technology (ICMT) Conf
2011, pp. 5246-5249
BibTeX@inproceedings{Li2011e, author = {Yue Li}, title = {A robust forensic method based on Scale-Invariance Feature Transform}, booktitle = {Proc. Int Multimedia Technology (ICMT) Conf}, year = {2011}, pages = {5246--5249}}
-
Optimized digital library for digital forenisc based on Decomposed PRNU
Proc. Int Multimedia Technology (ICMT) Conf
2011, pp. 610-613
BibTeX@inproceedings{Li2011d, author = {Yue Li and Chang-Tsun Li}, title = {Optimized digital library for digital forenisc based on Decomposed PRNU}, booktitle = {Proc. Int Multimedia Technology (ICMT) Conf}, year = {2011}, pages = {610--613}}
-
An integrated technique for splicing and copy-move forgery image detection
Proc. 4th Int Image and Signal Processing (CISP) Congress
2011, Vol. 2, pp. 1086-1090
BibTeX@inproceedings{Lin2011a, author = {Lin, S. D. and Tszan Wu}, title = {An integrated technique for splicing and copy-move forgery image detection}, booktitle = {Proc. 4th Int Image and Signal Processing (CISP) Congress}, year = {2011}, volume = {2}, pages = {1086--1090}}
-
Image Authentication Using Distributed Source Coding
IEEE Transactions on Image Processing, 2011, Vol. PP Issue:99(99), pp. 1
BibTeX@article{Lin2011, author = {Lin, Y. and Varodayan, D. and Girod, B.}, title = {Image Authentication Using Distributed Source Coding}, journal = {IEEE Transactions on Image Processing}, year = {2011}, volume = {PP Issue:99}, number = {99}, pages = {1}}
-
Detect image splicing with artificial blurred boundary
Mathematical and Computer Modelling, 2011, Vol. In Press, Accepted Manuscript, pp. -
BibTeX@article{Liu2011, author = {Guangjie Liu and Junwen Wang and Shiguo Lian and Yuewei Dai}, title = {Detect image splicing with artificial blurred boundary}, journal = {Mathematical and Computer Modelling}, year = {2011}, volume = {In Press, Accepted Manuscript}, pages = { - }}
-
Detection of misaligned cropping and recompression with the same quantization matrix and relevant forgery
Proceedings of the 3rd international ACM workshop on Multimedia in forensics and intelligence
ACM, 2011, pp. 25-30
BibTeX@inproceedings{Liu2011c, author = {Liu, Qingzhong}, title = {Detection of misaligned cropping and recompression with the same quantization matrix and relevant forgery}, booktitle = {Proceedings of the 3rd international ACM workshop on Multimedia in forensics and intelligence}, publisher = {ACM}, year = {2011}, pages = {25--30}}
-
Identifying Image Composites Through Shadow Matte Consistency
IEEE Transactions on Information Forensics and Security, 2011, Vol. 6(3), pp. 1111-1122
BibTeX@article{Liu2011e, author = {Qiguang Liu and Xiaochun Cao and Chao Deng and Xiaojie Guo}, title = {Identifying Image Composites Through Shadow Matte Consistency}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2011}, volume = {6}, number = {3}, pages = {1111--1122}}
-
A Method to Detect JPEG-Based Double Compression
Liu, D., Zhang, H., Polycarpou, M., Alippi, C. & He, H. (ed.)
Advances in Neural Networks -- ISNN 2011
Springer Berlin / Heidelberg, 2011, Vol. 6676, pp. 466-476
BibTeX@incollection{Liu2011a, author = {Liu, Qingzhong and Sung, Andrew and Qiao, Mengyu}, title = {A Method to Detect JPEG-Based Double Compression}, booktitle = {Advances in Neural Networks -- ISNN 2011}, publisher = {Springer Berlin / Heidelberg}, year = {2011}, volume = {6676}, pages = {466-476}}
-
A fast noise variance estimation algorithm
Proc. Asia Pacific Conf Microelectronics and Electronics (PrimeAsia) Postgraduate Research in
2011, pp. 61-64
BibTeX@inproceedings{Liu2011b, author = {Liu, Wenjiang and Liu, Tao and Rong, Mengtian and Wang, Ruolin and Zhang, Hao}, title = {A fast noise variance estimation algorithm}, booktitle = {Proc. Asia Pacific Conf Microelectronics and Electronics (PrimeAsia) Postgraduate Research in}, year = {2011}, pages = {61--64}}
-
Passive Forensics Method to Detect Tampering for Double JPEG Compression Image
Proc. IEEE Int Multimedia (ISM) Symp
2011, pp. 185-189
BibTeX@inproceedings{Liu2011d, author = {Liu, Zhenli and Wang, Xiaofeng and Chen, Jing}, title = {Passive Forensics Method to Detect Tampering for Double JPEG Compression Image}, booktitle = {Proc. IEEE Int Multimedia (ISM) Symp}, year = {2011}, pages = {185--189}}
-
Revealing digital fakery using multiresolution decomposition and higher order statistics
Engineering Applications of Artificial Intelligence, 2011, Vol. 24(4), pp. 666 - 672
BibTeX@article{Lu2011, author = {Wei Lu and Wei Sun and Fu-Lai Chung and Hongtao Lu}, title = {Revealing digital fakery using multiresolution decomposition and higher order statistics}, journal = {Engineering Applications of Artificial Intelligence}, year = {2011}, volume = {24}, number = {4}, pages = {666 - 672}}
-
Blind Identification of Image Copy-paste Tampering Based on Logarithm Polar Coordinate Transformation
Blind Identification of Image Copy-paste Tampering Based on Logarithm Polar Coordinate Transformation, 2011
BibTeX@techreport{Lv2011, author = {Lv , A. Ying-Da and Shen, B. Xuan-Jing and Chen C. Hai-Peng}, title = {Blind Identification of Image Copy-paste Tampering Based on Logarithm Polar Coordinate Transformation}, year = {2011}}
-
An improved image blind identification based on inconsistency in light source direction
The Journal of Supercomputing, Springer Netherlands, 2011, Vol. 19(2), pp. 211-218
BibTeX@article{Lv2011a, author = {Lv, Yingda and Shen, Xuanjing and Chen, Haipeng}, title = {An improved image blind identification based on inconsistency in light source direction}, journal = {The Journal of Supercomputing}, publisher = {Springer Netherlands}, year = {2011}, volume = {19}, number = {2}, pages = {211-218}}
-
Digital image forgery detection and estimation by exploring basic image manipulations
Digital Investigation, 2011, Vol. In Press, Corrected Proof, pp. -
BibTeX@article{Mahalakshmi2011, author = {Mahalakshmi,S. Devi and K. Vijayalakshmi and S. Priyadharsini}, title = {Digital image forgery detection and estimation by exploring basic image manipulations}, journal = {Digital Investigation}, year = {2011}, volume = {In Press, Corrected Proof}, pages = { - }}
-
Identifying image forgeries using change points detection
Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
Proceedings of SPIE
Media Watermarking, Security, and Forensics III, SPIE, 2011, Vol. 7880(1), pp. 788008
BibTeX@conference{Mahdian2011a, author = {Babak Mahdian and Stanislav Saic}, title = {Identifying image forgeries using change points detection}, booktitle = {Proceedings of SPIE}, journal = {Media Watermarking, Security, and Forensics III}, publisher = {SPIE}, year = {2011}, volume = {7880}, number = {1}, pages = {788008}}
-
Image tampering detection using methods based on JPEG compression artifacts: a real-life experiment
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies
ACM, 2011, pp. 176:1-176:5
BibTeX@inproceedings{Mahdian2011b, author = {Mahdian, Babak and Saic, Stanislav}, title = {Image tampering detection using methods based on JPEG compression artifacts: a real-life experiment}, booktitle = {Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies}, publisher = {ACM}, year = {2011}, pages = {176:1--176:5}}
-
JPEG Quantization Tables Forensics: A Statistical Approach
Sako, H., Franke, K. & Saitoh, S. (ed.)
Computational Forensics
Springer Berlin / Heidelberg, 2011, Vol. 6540, pp. 150-159
BibTeX@incollection{Mahdian2011, author = {Mahdian, Babak and Saic, Stanislav and Nedbal, Radim}, title = {JPEG Quantization Tables Forensics: A Statistical Approach}, booktitle = {Computational Forensics}, publisher = {Springer Berlin / Heidelberg}, year = {2011}, volume = {6540}, pages = {150-159}}
-
Forensic printer detection using intrinsic signatures
Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
Proceedings of SPIE
Media Watermarking, Security, and Forensics III, SPIE, 2011, Vol. 7880(1), pp. 78800R
BibTeX@conference{Mikkilineni2011, author = {Aravind K. Mikkilineni and Nitin Khanna and Edward J. Delp}, title = {Forensic printer detection using intrinsic signatures}, booktitle = {Proceedings of SPIE}, journal = {Media Watermarking, Security, and Forensics III}, publisher = {SPIE}, year = {2011}, volume = {7880}, number = {1}, pages = {78800R}}
-
Discriminating Multiple Jpeg Compression Using First Digit Features
Dipartimento di Elettronica e Informazione - Politecnico di Milano, 2011
BibTeX@techreport{Milani2011, author = {Simone Milani and Marco Tagliasacchi and Stefano Tubaro}, title = {Discriminating Multiple Jpeg Compression Using First Digit Features}, year = {2011}}
-
Blind Copy Move Image Forgery Detection using Dyadic Undecimated Wavelet Transform
Proceedings of the 17th International Conference on Digital Signal Processing
College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia, 2011
BibTeX@inproceedings{Muhammad2011, author = {Ghulam Muhammad and Muhammad Hussain and Khalid Khawaji and George Bebis}, title = {Blind Copy Move Image Forgery Detection using Dyadic Undecimated Wavelet Transform}, booktitle = {Proceedings of the 17th International Conference on Digital Signal Processing}, year = {2011}}
-
Robust copy-move image forgery detection using undecimated wavelets and Zernike moments
Proceedings of the Third International Conference on Internet Multimedia Computing and Service
ACM, 2011, pp. 95-98
BibTeX@inproceedings{Muhammad2011a, author = {Muhammad, Ghulam and Hussain, Muhammad Shamim}, title = {Robust copy-move image forgery detection using undecimated wavelets and Zernike moments}, booktitle = {Proceedings of the Third International Conference on Internet Multimedia Computing and Service}, publisher = {ACM}, year = {2011}, pages = {95--98}}
-
A Non-intrusive Method for Copy-Move Forgery Detection
Bebis, G., Boyle, R., Parvin, B., Koracin, D., Wang, S., Kyungnam, K., Benes, B., Moreland, K., Borst, C., DiVerdi, S., Yi-Jen, C. & Ming, J. (ed.)
Advances in Visual Computing
Springer Berlin / Heidelberg, 2011, Vol. 6939, pp. 516-525
BibTeX@incollection{Muhammad2011b, author = {Muhammad, Najah and Hussain, Muhammad and Muhammad, Ghulam and Bebis, George}, title = {A Non-intrusive Method for Copy-Move Forgery Detection}, booktitle = {Advances in Visual Computing}, publisher = {Springer Berlin / Heidelberg}, year = {2011}, volume = {6939}, pages = {516-525}}
-
Copy-Move Forgery Detection Using Dyadic Wavelet Transform
Proc. Eighth Int Computer Graphics, Imaging and Visualization (CGIV) Conf
2011, pp. 103-108
BibTeX@inproceedings{Muhammad2011c, author = {Muhammad, Najah and Hussain, Muhammad and Muhammad, Ghulam and Bebis, George}, title = {Copy-Move Forgery Detection Using Dyadic Wavelet Transform}, booktitle = {Proc. Eighth Int Computer Graphics, Imaging and Visualization (CGIV) Conf}, year = {2011}, pages = {103--108}}
-
Detection of Copy-Create Image Forgery Using Luminance Level Techniques
Proc. Third National Conf. Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG)
2011, pp. 215-218
BibTeX@inproceedings{Murali2011, author = {Murali, S. and Anami, B. S. and Chittapur, G. B. }, title = {Detection of Copy-Create Image Forgery Using Luminance Level Techniques}, booktitle = {Proc. Third National Conf. Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG)}, year = {2011}, pages = {215--218}}
-
A Statistical Model for Quantized AC Block DCT Coefficients in JPEG Compression and its Application to Detecting Potential Compression History in Bitmap Images
Kim, H.-J., Shi, Y. & Barni, M. (ed.)
Digital Watermarking
Lecture Notes in Computer Science, Springer Berlin / Heidelberg, 2011, Vol. 6526, pp. 75-89
BibTeX@incollection{Narayanan2011, author = {Narayanan, Gopal and Shi, Yun}, title = {A Statistical Model for Quantized AC Block DCT Coefficients in JPEG Compression and its Application to Detecting Potential Compression History in Bitmap Images}, booktitle = {Digital Watermarking}, journal = {Lecture Notes in Computer Science}, publisher = {Springer Berlin / Heidelberg}, year = {2011}, volume = {6526}, pages = {75-89}}
-
Security of copy-move forgery detection techniques
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2011
2011, pp. 1864-1867
BibTeX@inproceedings{Nguyen2011, author = {Nguyen, Hieu Cuong and Katzenbeisser, Stefan}, title = {Security of copy-move forgery detection techniques}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2011}, year = {2011}, pages = {1864--1867}}
-
Digital image forensics using wavelet based image models
Proc. IEEE 19th Conf. Signal Processing and Communications Applications (SIU)
2011, pp. 335-338
BibTeX@inproceedings{Oezparlak2011, author = {Özparlak, L. and Avcibas, I.}, title = {Digital image forensics using wavelet based image models}, booktitle = {Proc. IEEE 19th Conf. Signal Processing and Communications Applications (SIU)}, year = {2011}, pages = {335--338}}
-
Differentiating Between Images Using Wavelet Based Transforms: A Comparative Study
IEEE Transactions on Information Forensics and Security, 2011, Vol. PP(99), pp. 1
BibTeX@article{Oezparlak2011b, author = {Özparlak, L. and Avcibas, I.}, title = {Differentiating Between Images Using Wavelet Based Transforms: A Comparative Study}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2011}, volume = {PP}, number = {99}, pages = {1}}
-
Discriminating Computer Graphics Images and Natural Images Using Hidden Markov Tree Model
Kim, H.-J., Shi, Y. & Barni, M. (ed.)
Digital Watermarking
Springer Berlin Heidelberg, 2011, Vol. 6526, pp. 23-28
BibTeX@incollection{Pan2011b, author = {Pan, Feng and Huang, Jiwu}, title = {Discriminating Computer Graphics Images and Natural Images Using Hidden Markov Tree Model}, booktitle = {Digital Watermarking}, publisher = {Springer Berlin Heidelberg}, year = {2011}, volume = {6526}, pages = {23-28}}
-
Image source detection : a case study on Facebook images taken by iPhones
ATIS 2011 : Workshop proceedingof ATIS 2011. Melbourne, November 9th, 2011. Second Applications and Techniques in Information Security Workshop
2011
BibTeX@inproceedings{Pan2011a, author = {Pan, Lei and Trepanic, Nijaz}, title = {Image source detection : a case study on Facebook images taken by iPhones}, booktitle = {ATIS 2011 : Workshop proceedingof ATIS 2011. Melbourne, November 9th, 2011. Second Applications and Techniques in Information Security Workshop}, year = {2011}}
-
Exposing image forgery with blind noise estimation
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
ACM, 2011, pp. 15-20
BibTeX@inproceedings{Pan2011, author = {Pan, Xunyu and Zhang, Xing and Lyu, Siwei}, title = {Exposing image forgery with blind noise estimation}, booktitle = {Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security}, publisher = {ACM}, year = {2011}, pages = {15--20}}
-
Identification of Photographic Images and Computer Graphics Using Fractal Feature of Sensor Pattern Noise
International Journal of Advancements in Computing Technology, 2011, Vol. 3(3), pp. 222-227
BibTeX@article{Peng2011a, author = {Fei Peng and Min Long}, title = {Identification of Photographic Images and Computer Graphics Using Fractal Feature of Sensor Pattern Noise}, journal = {International Journal of Advancements in Computing Technology}, year = {2011}, volume = {3}, number = {3}, pages = {222-227}}
-
A complete passive blind image copy-move forensics scheme based on compound statistics features
Forensic Science International, 2011, Vol. In Press, Corrected Proof, pp. -
BibTeX@article{Peng2011, author = {Fei Peng and Yun-ying Nie and Min Long}, title = {A complete passive blind image copy-move forensics scheme based on compound statistics features}, journal = {Forensic Science International}, year = {2011}, volume = {In Press, Corrected Proof}, pages = { - }}
-
Forensics Investigations of Multimedia Data: A Review of the State-of-the-Art
Proc. Sixth Int IT Security Incident Management and IT Forensics (IMF) Conf
2011, pp. 48-61
BibTeX@inproceedings{Poisel2011, author = {Poisel, R. and Tjoa, S.}, title = {Forensics Investigations of Multimedia Data: A Review of the State-of-the-Art}, booktitle = {Proc. Sixth Int IT Security Incident Management and IT Forensics (IMF) Conf}, year = {2011}, pages = {48--61}}
-
Forensische Unterschung Multimedialer Daten
9. Sicherheitskonferenz Krems, 2011
2011
BibTeX@inproceedings{Poisel2011a, author = {Rainer Poisel and Simon Tjoa}, title = {Forensische Unterschung Multimedialer Daten}, booktitle = {9. Sicherheitskonferenz Krems, 2011}, year = {2011}}
-
Image forensic of glare feature for improving image retrieval using Benford´s Law
Proc. IEEE Int Circuits and Systems (ISCAS) Symp
2011, pp. 2661-2664
BibTeX@inproceedings{Qadir2011, author = {Qadir, Ghulam and Zhao, Xi and Ho, Anthony TS and Casey, Matthew}, title = {Image forensic of glare feature for improving image retrieval using Benford´s Law}, booktitle = {Proc. IEEE Int Circuits and Systems (ISCAS) Symp}, year = {2011}, pages = {2661--2664}}
-
Blind Detection of Eclosion Forgeries Based on Curvelet Image Enhancement and Edge Detection
Proc. Int Multimedia and Signal Processing (CMSP) Conf
2011, Vol. 1, pp. 316-320
BibTeX@inproceedings{Qi2011, author = {Qi, Yin-Cheng and Xing, Xiao-Shuang and Zhang, Hua-Fang-Zi}, title = {Blind Detection of Eclosion Forgeries Based on Curvelet Image Enhancement and Edge Detection}, booktitle = {Proc. Int Multimedia and Signal Processing (CMSP) Conf}, year = {2011}, volume = {1}, pages = {316--320}}
-
A Novel Approach for Detection of Copy-Move Forgery
Proceedings of the ADVCOMP 2011, The Fifth International Conference on Advanced Engineering Computing and Applications in Sciences
2011
BibTeX@conference{Qiao2011, author = {Mengyu Qiao and Andrew Sung and Qingzhong Liu and Bernardete Ribeiro}, title = {A Novel Approach for Detection of Copy-Move Forgery}, booktitle = {Proceedings of the ADVCOMP 2011, The Fifth International Conference on Advanced Engineering Computing and Applications in Sciences}, year = {2011}}
-
Vision of the unseen: Current trends and challenges in digital image and video forensics
ACM Comput. Surv., ACM, 2011, Vol. 43(4), pp. 26:1-26:42
BibTeX@article{Rocha2011, author = {Rocha, Anderson and Scheirer, Walter and Boult, Terrance and Goldenstein, Siome}, title = {Vision of the unseen: Current trends and challenges in digital image and video forensics}, journal = {ACM Comput. Surv.}, publisher = {ACM}, year = {2011}, volume = {43}, number = {4}, pages = {26:1--26:42}}
-
Blind source separation of discrete finite alphabet sources using a single mixture
Proc. IEEE Statistical Signal Processing Workshop (SSP)
2011, pp. 709-712
BibTeX@inproceedings{Rostami2011, author = {Rostami, M. and Babaie-Zadeh, M. and Samadi, S. and Jutten, C. }, title = {Blind source separation of discrete finite alphabet sources using a single mixture}, booktitle = {Proc. IEEE Statistical Signal Processing Workshop (SSP)}, year = {2011}, pages = {709--712}}
-
A novel method for detecting light source for digital images forensic
Opto-Electronics Review, Versita, co-published with Springer-Verlag GmbH, 2011, Vol. 19, pp. 211-218
BibTeX@article{Roy2011, author = {Roy, A. and Mitra, S. and Agrawal, R.}, title = {A novel method for detecting light source for digital images forensic}, journal = {Opto-Electronics Review}, publisher = {Versita, co-published with Springer-Verlag GmbH}, year = {2011}, volume = {19}, pages = {211-218}}
-
Eye specular highlights telltales for digital forensics: A machine learning approach
Proc. 18th IEEE Int Image Processing (ICIP) Conf
2011, pp. 1937-1940
BibTeX@inproceedings{Saboia2011, author = {Saboia, P. and Carvalho, T. and Rocha, A. }, title = {Eye specular highlights telltales for digital forensics: A machine learning approach}, booktitle = {Proc. 18th IEEE Int Image Processing (ICIP) Conf}, year = {2011}, pages = {1937--1940}}
-
The First Robust Image Tamper Detection Scheme under Brightness
Proc. Fifth Int Genetic and Evolutionary Computing (ICGEC) Conf
2011, pp. 200-203
BibTeX@inproceedings{Shen2011, author = {Jau-Ji Shen and Wei-Cheng Huang}, title = {The First Robust Image Tamper Detection Scheme under Brightness}, booktitle = {Proc. Fifth Int Genetic and Evolutionary Computing (ICGEC) Conf}, year = {2011}, pages = {200--203}}
-
A Blur Image Blind Identify Algorithm Based on the Edge Feature
Proc. Third Int Multimedia Information Networking and Security (MINES) Conf
2011, pp. 309-313
BibTeX@inproceedings{Shen2011a, author = {Shen, Xuan-jing and Tang, Bo-hao and L,i Xiao-fei and Chen, Hai-peng}, title = {A Blur Image Blind Identify Algorithm Based on the Edge Feature}, booktitle = {Proc. Third Int Multimedia Information Networking and Security (MINES) Conf}, year = {2011}, pages = {309--313}}
-
Automated Forensic Method for Copy-Move Forgery Detection based on Harris Interest Points and SIFT Descriptors
International Journal of Computer Applications, 2011, Vol. 27(3), pp. 9-17
BibTeX@article{Shivakumar2011, author = {B.L. Shivakumar and S.Santhosh Baboo}, title = {Automated Forensic Method for Copy-Move Forgery Detection based on Harris Interest Points and SIFT Descriptors}, journal = {International Journal of Computer Applications}, year = {2011}, volume = {27}, number = {3}, pages = {9-17}}
-
Fast and Efficient Region Duplication Detection in Digital Images Using Sub-Blocking Method
International Journal of Advanced Science and Technology, 2011, Vol. 35, pp. 93-102
BibTeX@article{Singh2011, author = {Vivek Kumar Singh and R.C. Tripathi}, title = {Fast and Efficient Region Duplication Detection in Digital Images Using Sub-Blocking Method}, journal = {International Journal of Advanced Science and Technology}, year = {2011}, volume = {35}, pages = {93--102}}
-
A new estimation approach of resampling factors using threshold-based peak detection
Proc. IEEE Int Consumer Electronics (ICCE) Conf
2011, pp. 731-732
BibTeX@inproceedings{Song2011, author = {Geun-Sil Song and Yong-In Yun and Won-Hyung Lee}, title = {A new estimation approach of resampling factors using threshold-based peak detection}, booktitle = {Proc. IEEE Int Consumer Electronics (ICCE) Conf}, year = {2011}, pages = {731--732}}
-
Anti-forensics for frame deletion/addition in MPEG video
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2011
2011, pp. 1876-1879
BibTeX@inproceedings{Stamm2011, author = {Stamm, Matthew C. and Liu, K. J. Ray}, title = {Anti-forensics for frame deletion/addition in MPEG video}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2011}, year = {2011}, pages = {1876--1879}}
-
Anti-forensics of digital image compression
IEEE Transactions on Information Forensics and Security, 2011, Vol. 6(3), pp. 1050-1065
BibTeX@article{Stamm2011a, author = {Stamm, M. C. and Liu, K. J. R. }, title = {Anti-forensics of digital image compression}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2011}, volume = {6}, number = {3}, pages = {1050--1065}}
-
Detection of blue screen based on edge features
Information Technology and Artificial Intelligence Conference (ITAIC), 2011 6th IEEE Joint International
2011, Vol. 2, pp. 469-472
BibTeX@inproceedings{Su2011, author = {Y. Su and Y. Han and C. Zhang}, title = {Detection of blue screen based on edge features}, booktitle = {Information Technology and Artificial Intelligence Conference (ITAIC), 2011 6th IEEE Joint International}, year = {2011}, volume = {2}, pages = {469--472}}
-
Copy-Move Forgery Detection in Digital Images: Progress and Challenges
International Journal on Computer Science and Engineering, 2011, Vol. 3, pp. 652-663
BibTeX@article{SunilKumar2011, author = {Sunil Kumar, P. K. and Das, Shally and Mukherjee, S.}, title = {Copy-Move Forgery Detection in Digital Images: Progress and Challenges}, journal = {International Journal on Computer Science and Engineering}, year = {2011}, volume = {3}, pages = {652-663}}
-
Markovian Rake Transform for Digital Image Tampering Detection
Shi, Y., Emmanuel, S., Kankanhalli, M., Chang, S.-F., Radhakrishnan, R., Ma, F. & Zhao, L. (ed.)
Transactions on Data Hiding and Multimedia Security VI
Springer Berlin / Heidelberg, 2011, Vol. 6730, pp. 1-17
BibTeX@incollection{Sutthiwan2011, author = {Sutthiwan, Patchara and Shi, Yun and Zhao, Hong and Ng, Tian-Tsong and Su, Wei}, title = {Markovian Rake Transform for Digital Image Tampering Detection}, booktitle = {Transactions on Data Hiding and Multimedia Security VI}, publisher = {Springer Berlin / Heidelberg}, year = {2011}, volume = {6730}, pages = {1-17}}
-
Analysis of multimedia forensic technique
Proceedings of the 2011 International Conference on Communication, Computing & Security (ICCCS 2011)
Proceedings of the 2011 International Conference on Communication, Computing & Security, ACM, 2011, pp. 289-294
BibTeX@inproceedings{Talmale2011, author = {Talmale, G. R. and Talhan, A. V. and Dharaskar, R. V.}, title = {Analysis of multimedia forensic technique}, booktitle = {Proceedings of the 2011 International Conference on Communication, Computing & Security (ICCCS 2011)}, journal = {Proceedings of the 2011 International Conference on Communication, Computing & Security}, publisher = {ACM}, year = {2011}, pages = {289--294}}
-
Digital camera identification based on the clustered pattern noise of image sensors
Proc. IEEE Int Multimedia and Expo (ICME) Conf
2011, pp. 1-4
BibTeX@inproceedings{Tomioka2011, author = {Tomioka, Y. and Kitazawa, H. }, title = {Digital camera identification based on the clustered pattern noise of image sensors}, booktitle = {Proc. IEEE Int Multimedia and Expo (ICME) Conf}, year = {2011}, pages = {1--4}}
-
Countering JPEG anti-forensics
Proc. 18th IEEE Int Image Processing (ICIP) Conf
2011, pp. 1949-1952
BibTeX@inproceedings{Valenzise2011a, author = {Valenzise, Giuseppe and Nobile, V. and Tagliasacchi, Marco and Tubaro, Stefano}, title = {Countering JPEG anti-forensics}, booktitle = {Proc. 18th IEEE Int Image Processing (ICIP) Conf}, year = {2011}, pages = {1949--1952}}
-
The Cost of JPEG Compression Anti-forensics
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2011
2011
BibTeX@inproceedings{Valenzise2011, author = {Valenzise, Giuseppe and Tagliasacchi, Marco and Tubaro, Stefano}, title = {The Cost of JPEG Compression Anti-forensics}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2011}, year = {2011}}
-
Prefilter design for forensic resampling estimation
Proc. IEEE Int Information Forensics and Security (WIFS) Workshop
2011
BibTeX@inproceedings{Vazquez-Padin2011, author = {Vazquez-Padin, David and Perez-Gonzalez, Fernando}, title = {Prefilter design for forensic resampling estimation}, booktitle = {Proc. IEEE Int Information Forensics and Security (WIFS) Workshop}, year = {2011}}
-
Impact of Quantization Matrix on the Performance of JPEG
International Journal of Future Generation Communication and Networking, 2011, Vol. 4(3), pp. 107-118
BibTeX@article{Viraktamath2011, author = {S. V. Viraktamath and Girish V. Attimarad}, title = {Impact of Quantization Matrix on the Performance of JPEG}, journal = {International Journal of Future Generation Communication and Networking}, year = {2011}, volume = {4}, number = {3}, pages = {107--118}}
-
The image tampered detection and restoration using the characteristic values
Proc. Int Machine Learning and Cybernetics (ICMLC) Conf
2011, Vol. 4, pp. 1845-1850
BibTeX@inproceedings{Wang2011f, author = {Ching-Te Wang and Ching-Lin Wang and Lin-Chun Li and Ming-Yuan Hsieh}, title = {The image tampered detection and restoration using the characteristic values}, booktitle = {Proc. Int Machine Learning and Cybernetics (ICMLC) Conf}, year = {2011}, volume = {4}, pages = {1845--1850}}
-
Tampered Region Localization of Digital Color Images Based on JPEG Compression Noise
Kim, H.-J., Shi, Y. & Barni, M. (ed.)
Digital Watermarking
Springer Berlin / Heidelberg, 2011, Vol. 6526, pp. 120-133
BibTeX@incollection{Wang2011, author = {Wang, Wei and Dong, Jing and Tan, Tieniu}, title = {Tampered Region Localization of Digital Color Images Based on JPEG Compression Noise}, booktitle = {Digital Watermarking}, publisher = {Springer Berlin / Heidelberg}, year = {2011}, volume = {6526}, pages = {120-133}}
-
Exploring DCT coefficient quantization effect for image tampering localization
Proc. IEEE Int Information Forensics and Security (WIFS) Workshop
2011, pp. 1-6
BibTeX@inproceedings{Wang2011b, author = {Wei Wang and Jing Dong and Tieniu Tan}, title = {Exploring DCT coefficient quantization effect for image tampering localization}, booktitle = {Proc. IEEE Int Information Forensics and Security (WIFS) Workshop}, year = {2011}, pages = {1--6}}
-
The Analysis and Detection of Double JPEG2000 Compression
Key Engineering Materials, 2011, Vol. (Volumes 474 - 476) Advanced Materials and Computer Science, pp. 2043-2048
BibTeX@article{Wang2011a, author = {Wei Wang and Rang Ding Wang}, title = {The Analysis and Detection of Double JPEG2000 Compression}, journal = {Key Engineering Materials}, year = {2011}, volume = {(Volumes 474 - 476) Advanced Materials and Computer Science}, pages = {2043-2048}}
-
A DWT-DCT Based Passive Forensics Method for Copy-Move Attacks
Multimedia Information Networking and Security (MINES), 2011 Third International Conference on
2011, pp. 304-308
BibTeX@inproceedings{Wang2011c, author = {Xiaofeng Wang and Xiaoni Zhang and Zhen Li and Shangping Wang}, title = {A DWT-DCT Based Passive Forensics Method for Copy-Move Attacks}, booktitle = {Multimedia Information Networking and Security (MINES), 2011 Third International Conference on}, year = {2011}, pages = {304--308}}
-
Log-Polar Based Scheme for Revealing Duplicated Regions in Digital Images
IEEE Signal Processing Letters, 2011, Vol. 18(10), pp. 559-562
BibTeX@article{Wu2011, author = {Qiumin Wu and Shuozhong Wang and Xinpeng Zhang}, title = {Log-Polar Based Scheme for Revealing Duplicated Regions in Digital Images}, journal = {IEEE Signal Processing Letters}, year = {2011}, volume = {18}, number = {10}, pages = {559--562}}
-
Identifying computer generated graphics via histogram features
Image Processing (ICIP), 2011 18th IEEE International Conference on
2011, pp. 1933-1936
BibTeX@inproceedings{Wu2011b, author = {Ruoyu Wu and Xiaolong Li and Bin Yang}, title = {Identifying computer generated graphics via histogram features}, booktitle = {Image Processing (ICIP), 2011 18th IEEE International Conference on}, year = {2011}, pages = {1933--1936}}
-
Image Splicing Detection Using Illuminant Color Inconsistency
Proc. Third Int Multimedia Information Networking and Security (MINES) Conf
2011, pp. 600-603
BibTeX@inproceedings{Wu2011a, author = {Xuemin Wu and Zhen Fang}, title = {Image Splicing Detection Using Illuminant Color Inconsistency}, booktitle = {Proc. Third Int Multimedia Information Networking and Security (MINES) Conf}, year = {2011}, pages = {600--603}}
-
Photorealistic computer graphics forensics based on leading digit law
Journal of Electronics (China), Science Press, co-published with Springer-Verlag GmbH, 2011, Vol. 28, pp. 95-100
BibTeX@article{Xu2011, author = {Xu, Bo and Wang, Junwen and Liu, Guangjie and Dai, Yuewei}, title = {Photorealistic computer graphics forensics based on leading digit law}, journal = {Journal of Electronics (China)}, publisher = {Science Press, co-published with Springer-Verlag GmbH}, year = {2011}, volume = {28}, pages = {95-100}}
-
Detecting Copy-Move Forgery Using Non-negative Matrix Factorization
Proc. Third Int Multimedia Information Networking and Security (MINES) Conf
2011, pp. 591-594
BibTeX@inproceedings{Yao2011, author = {Heng Yao and Tong Qiao and Zhenjun Tang and Yan Zhao and Hualing Mao}, title = {Detecting Copy-Move Forgery Using Non-negative Matrix Factorization}, booktitle = {Proc. Third Int Multimedia Information Networking and Security (MINES) Conf}, year = {2011}, pages = {591--594}}
-
Digital Image Forgery Detection Based on Lens and Sensor Aberration
International Journal of Computer Vision, Springer Netherlands, 2011, Vol. 92, pp. 71-91
BibTeX@article{Yerushalmy2011, author = {Yerushalmy, Ido and Hel-Or, Hagit}, title = {Digital Image Forgery Detection Based on Lens and Sensor Aberration}, journal = {International Journal of Computer Vision}, publisher = {Springer Netherlands}, year = {2011}, volume = {92}, pages = {71-91}}
-
Toward the identification of DSLR lenses by chromatic aberration
Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
Proceedings of SPIE
Media Watermarking, Security, and Forensics III, SPIE, 2011, Vol. 7880(1), pp. 788010
BibTeX@conference{Yu2011, author = {Jun Yu and Scott Craver and Enping Li}, title = {Toward the identification of DSLR lenses by chromatic aberration}, booktitle = {Proceedings of SPIE}, journal = {Media Watermarking, Security, and Forensics III}, publisher = {SPIE}, year = {2011}, volume = {7880}, number = {1}, pages = {788010}}
-
Blind Forensics of Median Filtering in Digital Images
Proc. Fourth Int Computational Sciences and Optimization (CSO) Joint ConfMedian
IEEE Transactions on Information Forensics and Security, 2011(99), pp. 332 - 335
BibTeX@inproceedings{Yuan, author = {Yuan, H.}, title = {Blind Forensics of Median Filtering in Digital Images}, booktitle = {Proc. Fourth Int Computational Sciences and Optimization (CSO) Joint ConfMedian}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2011}, number = {99}, pages = {332 - 335}}
-
Image Authentication Using Active Watermarking and Passive Forensics Techniques
Lin, W., Tao, D., Kacprzyk, J., Li, Z., Izquierdo, E. & Wang, H. (ed.)
Multimedia Analysis, Processing and Communications
Springer Berlin / Heidelberg, 2011, Vol. 346, pp. 139-183
BibTeX@incollection{Zhao2011, author = {Zhao, Xi and Bateman, Philip and Ho, Anthony}, title = {Image Authentication Using Active Watermarking and Passive Forensics Techniques}, booktitle = {Multimedia Analysis, Processing and Communications}, publisher = {Springer Berlin / Heidelberg}, year = {2011}, volume = {346}, pages = {139-183}}
-
Detecting Digital Image Splicing in Chroma Spaces
Kim, H.-J., Shi, Y. & Barni, M. (ed.)
Digital Watermarking
Springer Berlin / Heidelberg, 2011, Vol. 6526, pp. 12-22
BibTeX@incollection{Zhao2011a, author = {Zhao, Xudong and Li, Jianhua and Li, Shenghong and Wang, Shilin}, title = {Detecting Digital Image Splicing in Chroma Spaces}, booktitle = {Digital Watermarking}, publisher = {Springer Berlin / Heidelberg}, year = {2011}, volume = {6526}, pages = {12--22}}
-
Passive Detection of Paint-Doctored JPEG Images
Kim, H.-J., Shi, Y. & Barni, M. (ed.)
Digital Watermarking
Springer Berlin / Heidelberg, 2011, Vol. 6526, pp. 1-11
BibTeX@incollection{Zhao2011b, author = {Zhao, Yu and Shih, Frank and Shi, Yun}, title = {Passive Detection of Paint-Doctored JPEG Images}, booktitle = {Digital Watermarking}, publisher = {Springer Berlin / Heidelberg}, year = {2011}, volume = {6526}, pages = {1-11}}
-
An Overview of Digital Watermarking in Image Forensics
Proc. Fourth Int Computational Sciences and Optimization (CSO) Joint Conf
2011, pp. 332-335
BibTeX@inproceedings{Zhou, author = {Zhou, Guojuan and Lv, Dianji}, title = {An Overview of Digital Watermarking in Image Forensics}, booktitle = {Proc. Fourth Int Computational Sciences and Optimization (CSO) Joint Conf}, year = {2011}, pages = {332--335}}
-
Photographic Composite Detection Using Two Circles
Proc. Sixth Int Image and Graphics (ICIG) Conf
2011, pp. 858-863
BibTeX@inproceedings{Zhu2011, author = {Shuyi Zhu and Xiaochun Cao and Handong Zhao}, title = {Photographic Composite Detection Using Two Circles}, booktitle = {Proc. Sixth Int Image and Graphics (ICIG) Conf}, year = {2011}, pages = {858--863}}
-
Passive Detection of Copy-paste Tampering for Digital Image Forensics
Proc. Int Intelligent Computation Technology and Automation (ICICTA) Conf
2011, Vol. 2, pp. 649-652
BibTeX@inproceedings{Zhulong2011, author = {Liu Zhulong and Li Xianghua and Zhao Yuqian}, title = {Passive Detection of Copy-paste Tampering for Digital Image Forensics}, booktitle = {Proc. Int Intelligent Computation Technology and Automation (ICICTA) Conf}, year = {2011}, volume = {2}, pages = {649--652}}
-
DWT-PCA (EVD) Based Copy-move Image Forgery Detection
International Journal of Digital Content Technology and its Applications., 2011, Vol. 5, pp. 251-258
BibTeX@article{Zimba2011, author = {Michael Zimba and Sun Xingming}, title = {DWT-PCA (EVD) Based Copy-move Image Forgery Detection}, journal = {International Journal of Digital Content Technology and its Applications.}, year = {2011}, volume = {5}, pages = {251--258}}
-
Tampering detection for composite images based on re-sampling and JPEG compression
Proc. First Asian Conf. Pattern Recognition (ACPR)
2011, pp. 169-173
BibTeX@inproceedings{Zuo2011, author = {Juxian Zuo and Shengjun Pan and Benyong Liu and Xiang Liao}, title = {Tampering detection for composite images based on re-sampling and JPEG compression}, booktitle = {Proc. First Asian Conf. Pattern Recognition (ACPR)}, year = {2011}, pages = {169--173}}
2010
-
XMP Specification Part 1 Data Model, Serialization, and Core Properties
Adobe, 2010
BibTeX@standard{Adobe2010, author = {Adobe}, title = {XMP Specification Part 1 Data Model, Serialization, and Core Properties}, year = {2010}}
-
XMP Specification Part 2 Additional Properties
Adobe, 2010
BibTeX@standard{Adobe2010a, author = {Adobe}, title = {XMP Specification Part 2 Additional Properties}, year = {2010}}
-
XMP Specification Part 3 Storage in Files
Adobe, 2010
BibTeX@standard{Adobe2010b, author = {Adobe}, title = {XMP Specification Part 3 Storage in Files}, year = {2010}}
-
Geometric tampering estimation by means of a sift-based forensic analysis
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2010
International Conference on Acoustics, Speech, and Signal Processing, 2010
BibTeX@inproceedings{Amerini2010, author = {Amerini, Irene and Ballan, Lamberto and Caldelli, Roberto and Bimbo, Alberto Del and Serra, Giuseppe}, title = {Geometric tampering estimation by means of a sift-based forensic analysis}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2010}, journal = {International Conference on Acoustics, Speech, and Signal Processing}, year = {2010}}
-
Geometric tampering estimation by means of a SIFT-based forensic analysis
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2010
2010, pp. 1702-1705
BibTeX@inproceedings{Amerini2010b, author = {Amerini, I. and Ballan, L. and Caldelli, R. and Del Bimbo, A. and Serra, G. }, title = {Geometric tampering estimation by means of a SIFT-based forensic analysis}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2010}, year = {2010}, pages = {1702--1705}}
-
Detecting multiple copies in tampered images
Proc. 17th IEEE Int Image Processing (ICIP) Conf
2010, pp. 2117-2120
BibTeX@inproceedings{Ardizzone2010, author = {Ardizzone, E. and Bruno, A. and Mazzola, G.}, title = {Detecting multiple copies in tampered images}, booktitle = {Proc. 17th IEEE Int Image Processing (ICIP) Conf}, year = {2010}, pages = {2117--2120}}
-
Identification of Cut & Paste Tampering by Means of Double-JPEG Detection and Image Segmentation
International Symposium on Circuits and Systems
2010
BibTeX@inproceedings{Barni2010, author = {Barni, Mauro and Costanzo, Andrea and Sabatini, Lara}, title = {Identification of Cut & Paste Tampering by Means of Double-JPEG Detection and Image Segmentation}, booktitle = {International Symposium on Circuits and Systems}, year = {2010}}
-
Exploring Duplicated Regions in Natural Images
IEEE Transactions on Image Processing, 2010, Vol. PP Issue:99(99), pp. 1
BibTeX@article{Bashar2010, author = {Bashar, M. and Noda, K. and Ohnishi, N. and Mori, K.}, title = {Exploring Duplicated Regions in Natural Images}, journal = {IEEE Transactions on Image Processing}, year = {2010}, volume = {PP Issue:99}, number = {99}, pages = {1}}
-
Chain of evidence generation for contrast enhancement in digital image forensics
Creutzburg, R. & Akopian, D. (ed.)
Proc. SPIE 7542
Multimedia on Mobile Devices 2010, SPIE, 2010, Vol. 7542(1), pp. 75420E
BibTeX@conference{Battiato2010, author = {Sebastiano Battiato and Giuseppe Messina and Daniela Strano}, title = {Chain of evidence generation for contrast enhancement in digital image forensics}, booktitle = {Proc. SPIE 7542}, journal = {Multimedia on Mobile Devices 2010}, publisher = {SPIE}, year = {2010}, volume = {7542}, number = {1}, pages = {75420E}}
-
Efficient techniques for sensor fingerprint matching in large image and video databases
Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
Media Forensics and Security II
Media Forensics and Security II, SPIE, 2010, Vol. 7541(1), pp. 754109
BibTeX@inproceedings{Bayram2010, author = {Sevinc Bayram and H. Taha Sencar and Nasir Memon}, title = {Efficient techniques for sensor fingerprint matching in large image and video databases}, booktitle = {Media Forensics and Security II}, journal = {Media Forensics and Security II}, publisher = {SPIE}, year = {2010}, volume = {7541}, number = {1}, pages = {754109}}
-
Forensic visual evidence 2007-2010: A Review
Proceeding of the 16th INTERPOL Forensic Science Symposium, Lyon, France, October 2010
2010
BibTeX@conference{Bijhold2010, author = {Bijhold, J. and Ruifrok, A. and Geradts, Z. J.}, title = {Forensic visual evidence 2007-2010: A Review}, booktitle = {Proceeding of the 16th INTERPOL Forensic Science Symposium, Lyon, France, October 2010}, year = {2010}}
-
Image Copy-Move Forgery Detection Based on SURF
Proc. Int Multimedia Information Networking and Security (MINES) Conf
2010, pp. 889-892
BibTeX@inproceedings{Bo2010, author = {Xu Bo and Wang Junwen and Liu Guangjie and Dai Yuewei}, title = {Image Copy-Move Forgery Detection Based on SURF}, booktitle = {Proc. Int Multimedia Information Networking and Security (MINES) Conf}, year = {2010}, pages = {889--892}}
-
Signal-dependent raw image denoising using sensor noise characterization via multiple acquisitions
Imai, Francisco; Sampat, N. X. F. (ed.)
Digital Photography VI
2010, Vol. Proceedings of the SPIE, Volume 7537
BibTeX@inproceedings{Bosco2010, author = {Bosco, A.; Bruna, R. A.; Giacalone, D.; Battiato, S.; Rizzo, R.}, title = {Signal-dependent raw image denoising using sensor noise characterization via multiple acquisitions}, booktitle = {Digital Photography VI}, year = {2010}, volume = {Proceedings of the SPIE, Volume 7537}}
-
Blind Tampering Identification by Incorporating EFR and Calibration
Proc. Int Multimedia Information Networking and Security (MINES) Conf
2010, pp. 379-383
BibTeX@inproceedings{Cai2010, author = {Kaiwei Cai and Xiaolong Li and Bin Yang and Xiaoqing Lu}, title = {Blind Tampering Identification by Incorporating EFR and Calibration}, booktitle = {Proc. Int Multimedia Information Networking and Security (MINES) Conf}, year = {2010}, pages = {379--383}}
-
A DFT-Based Analysis to Discern Between Camera and Scanned Images
International Journal of Digital Crime and Forensics (IJDCF), 2010, Vol. 2(1), pp. 21-29
BibTeX@article{Caldelli2010, author = {Caldelli, Roberto and Amerini, Irene and Picchioni, Francesco}, title = {A DFT-Based Analysis to Discern Between Camera and Scanned Images}, journal = {International Journal of Digital Crime and Forensics (IJDCF)}, year = {2010}, volume = {2}, number = {1}, pages = {21-29}}
-
Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions
Klinger, K. (ed.)
Chapter Multimedia Forensic Techniques for Acquisition Device Identification and Digital Image Authentication (Chapter 6)
Information Science Reference, 2010, pp. 130-154
BibTeX@inbook{Caldelli2010a, author = {Caldelli, Roberto and Amerini, Irene and Picchioni, Francesco and Rosa, Alessia De and Uccheddu, Francesca}, title = {Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions}, publisher = {Information Science Reference}, year = {2010}, pages = {130-154}}
-
Edge-based Blur Metric for Tamper Detection
Journal of Information Hiding and Multimedia Signal Processing, 2010, Vol. 1(1), pp. 20-27
BibTeX@article{Cao2010, author = {Cao, Gang and Zhao, Yao and Ni, Rongrong}, title = {Edge-based Blur Metric for Tamper Detection}, journal = {Journal of Information Hiding and Multimedia Signal Processing}, year = {2010}, volume = {1}, number = {1}, pages = {20-27}}
-
Forensic Estimation of Gamma Correction in Digital Images
International Conference on Image Processing
2010
BibTeX@inproceedings{Cao2010d, author = {Cao, Gang and Zhao, Yao and Ni, Rongrong}, title = {Forensic Estimation of Gamma Correction in Digital Images}, booktitle = {International Conference on Image Processing}, year = {2010}}
-
Anti-forensics of contrast enhancement in digital images
Proceedings of the 12th ACM workshop on Multimedia and security
ACM, 2010, pp. 25-34
BibTeX@inproceedings{Cao2010b, author = {Cao, Gang and Zhao, Yao and Ni, Rongrong and Tian, Huawei}, title = {Anti-forensics of contrast enhancement in digital images}, booktitle = {Proceedings of the 12th ACM workshop on Multimedia and security}, publisher = {ACM}, year = {2010}, pages = {25--34}}
-
Forensic Detection of Median Filtering in Digital Images
IEEE International Conference on Multimedia and EXPO
2010
BibTeX@inproceedings{Cao2010e, author = {Cao, Gang and Zhao, Yao and Ni, Rongrong and Yu, Lifang and Tian, Huawei}, title = {Forensic Detection of Median Filtering in Digital Images}, booktitle = {IEEE International Conference on Multimedia and EXPO}, year = {2010}}
-
Identification of recaptured photographs on LCD screens
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2010
2010, pp. 1790-1793
BibTeX@inproceedings{Cao2010a, author = {Cao, Hong and Kot, Alex C.}, title = {Identification of recaptured photographs on LCD screens}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2010}, year = {2010}, pages = {1790--1793}}
-
Mobile Camera Identification Using Demosaicing Features
International Symposium on Circuits and Systems
2010
BibTeX@inproceedings{Cao2010c, author = {Cao, Hong and Kot, Alex C.}, title = {Mobile Camera Identification Using Demosaicing Features}, booktitle = {International Symposium on Circuits and Systems}, year = {2010}}
-
Identification of recaptured photographs on LCD screens
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2010
2010, pp. 1790-1793
BibTeX@inproceedings{Cao2010f, author = {Hong Cao and Alex C. Kot}, title = {Identification of recaptured photographs on LCD screens}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2010}, year = {2010}, pages = {1790--1793}}
-
Search Strategies for Image Multi-distortion Estimation
Proc. 20th Int Pattern Recognition (ICPR) Conf
2010, pp. 2824-2827
BibTeX@inproceedings{Caron2010, author = {Caron, A. and Jodoin, P. and Charrier, C. }, title = {Search Strategies for Image Multi-distortion Estimation}, booktitle = {Proc. 20th Int Pattern Recognition (ICPR) Conf}, year = {2010}, pages = {2824--2827}}
-
Source Camera Identification in Real Practice: A Preliminary Experimentation
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, Communication and Applications, BWCCA 2010, November 4-6, 2010, Fukuoka Institute of Technology, Fukuoka, Japan (In conjunction with the 3PGCIC-2010 International Conference)
2010, pp. 417-422
BibTeX@inproceedings{Castiglione2010, author = {Castiglione, A. and Cattaneo, G. and Cembalo, M. and Petrillo, U. F.}, title = {Source Camera Identification in Real Practice: A Preliminary Experimentation}, booktitle = {Proceedings of the Fifth International Conference on Broadband and Wireless Computing, Communication and Applications, BWCCA 2010, November 4-6, 2010, Fukuoka Institute of Technology, Fukuoka, Japan (In conjunction with the 3PGCIC-2010 International Conference)}, year = {2010}, pages = {417--422}}
-
Integration Experiences and Performance Studies of A COTS Parallel Archive System
Cluster Computing (CLUSTER), 2010 IEEE International Conference on
2010, pp. 166-177
BibTeX@inproceedings{Chen2010a, author = {Chen, H. and Grider, G. and Scott, C. and Turley, M. and Torres, A. and Sanchez, K. and Bremer, J.}, title = {Integration Experiences and Performance Studies of A COTS Parallel Archive System}, booktitle = {Cluster Computing (CLUSTER), 2010 IEEE International Conference on}, year = {2010}, pages = {166--177}}
-
Blind Identification Method for Authenticity of Infinite Light Source Images
Proc. Fifth Int Frontier of Computer Science and Technology (FCST) Conf
2010, pp. 131-135
BibTeX@inproceedings{Chen2010, author = {Haipeng Chen and Xuanjing Shen and Yingda Lv}, title = {Blind Identification Method for Authenticity of Infinite Light Source Images}, booktitle = {Proc. Fifth Int Frontier of Computer Science and Technology (FCST) Conf}, year = {2010}, pages = {131--135}}
-
Source Camera Identification Based on Sensor Readout Noise
International Journal of Digital Crime and Forensics (IJDCF), 2010, Vol. 2(3), pp. 28-43
BibTeX@article{Chennamma2010, author = {H. R. Chennamma and Lalitha Rangarajan}, title = {Source Camera Identification Based on Sensor Readout Noise}, journal = {International Journal of Digital Crime and Forensics (IJDCF)}, year = {2010}, volume = {2}, number = {3}, pages = {28-43}}
-
Blind and passive digital video tamper detection based on multimodal fusion
Proceedings of the 14th WSEAS international conference on Communications
World Scientific and Engineering Academy and Society (WSEAS), 2010, pp. 109-117
BibTeX@inproceedings{Chetty2010a, author = {Chetty, Girija}, title = {Blind and passive digital video tamper detection based on multimodal fusion}, booktitle = {Proceedings of the 14th WSEAS international conference on Communications}, publisher = {World Scientific and Engineering Academy and Society (WSEAS)}, year = {2010}, pages = {109--117}}
-
Nonintrusive Image Tamper Detection Based on Fuzzy Fusion
Journal of Computer Science and Network Security, 2010, Vol. 10(9), pp. 86-90
BibTeX@article{Chetty2010b, author = {Chetty, Girija}, title = {Nonintrusive Image Tamper Detection Based on Fuzzy Fusion}, journal = {Journal of Computer Science and Network Security}, year = {2010}, volume = {10}, number = {9}, pages = {86-90}}
-
Digital Video Tamper Detection Based on Multimodal Fusion of Residue Features
Proc. 4th Int Network and System Security (NSS) Conf
2010, pp. 606-613
BibTeX@inproceedings{Chetty2010d, author = {Chetty, G. and Biswas, M. and Singh, R. }, title = {Digital Video Tamper Detection Based on Multimodal Fusion of Residue Features}, booktitle = {Proc. 4th Int Network and System Security (NSS) Conf}, year = {2010}, pages = {606--613}}
-
Digital Image Tamper Detection Based on Multimodal Fusion of Residue Features
Blanc-Talon, J., Bone, D., Philips, W., Popescu, D. & Scheunders, P. (ed.)
Advanced Concepts for Intelligent Vision Systems
Springer Berlin / Heidelberg, 2010, Vol. 6475, pp. 79-87
BibTeX@incollection{Chetty2010c, author = {Chetty, Girija and Goodwin, Julian and Singh, Monica}, title = {Digital Image Tamper Detection Based on Multimodal Fusion of Residue Features}, booktitle = {Advanced Concepts for Intelligent Vision Systems}, publisher = {Springer Berlin / Heidelberg}, year = {2010}, volume = {6475}, pages = {79-87}}
-
Blind Image Tamper Detection Based on Multimodal Fusion
Wong, K., Mendis, B. & Bouzerdoum, A. (ed.)
Neural Information Processing. Models and Applications
Springer Berlin / Heidelberg, 2010, Vol. 6444, pp. 557-564
BibTeX@incollection{Chetty2010, author = {Chetty, Girija and Singh, Monica and White, Matthew}, title = {Blind Image Tamper Detection Based on Multimodal Fusion}, booktitle = {Neural Information Processing. Models and Applications}, publisher = {Springer Berlin / Heidelberg}, year = {2010}, volume = {6444}, pages = {557-564}}
-
Intelligent Multimedia Analysis for Security Applications
Husrev T. Sencar, Sergio Velastin, N. N. S. L. (ed.)
Chapter Printer and Scanner Forensics: Models and Methods
Springer Berlin / Heidelberg, 2010, pp. 145-187
BibTeX@inbook{Chiang2010, author = {Chiang and Khanna and Mikkilineni and Segovia and Chiu and Delp, E. J.}, title = {Intelligent Multimedia Analysis for Security Applications}, publisher = {Springer Berlin / Heidelberg}, year = {2010}, pages = {145-187}}
-
Studies in Computational Intelligence
Chapter Printer and Scanner Forensics: Models and Methods
Springer, 2010, pp. 145-187
BibTeX@inbook{Chiang2010a, author = {Pei-Ju Chiang and Nitin Khanna and Aravind K. Mikkilineni and Maria V. Ortiz Segovia and Jan P. Allebach and George T. C. Chiu and Edward J. Delp}, title = {Studies in Computational Intelligence}, publisher = {Springer}, year = {2010}, pages = {145-187}}
-
On the influence of denoising in PRNU based forgery detection
Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence
ACM, 2010, pp. 117-122
BibTeX@inproceedings{Chierchia:2010:IDP:1877972.1878002, author = {Chierchia, Giovanni and Parrilli, Sara and Poggi, Giovanni and Sansone, Carlo and Verdoliva, Luisa}, title = {On the influence of denoising in PRNU based forgery detection}, booktitle = {Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence}, publisher = {ACM}, year = {2010}, pages = {117--122}}
-
Scanner Identification Using Spectral Noise in the Frequency Domain
International Conference on Image Processing
2010
BibTeX@inproceedings{Choi2010, author = {Choi, Chang-Hee and Lee, Min-Jeong and Lee, Heung-Kyu}, title = {Scanner Identification Using Spectral Noise in the Frequency Domain}, booktitle = {International Conference on Image Processing}, year = {2010}}
-
A Study on Features for the Detection of Copy-Move Forgeries
Information Security Solutions Europe
2010
BibTeX@inproceedings{Christlein2010, author = {Christlein, Vincent and Riess, Christian and Angelopoulou, Elli}, title = {A Study on Features for the Detection of Copy-Move Forgeries}, booktitle = {Information Security Solutions Europe}, year = {2010}}
-
On rotation invariance in copy-move forgery detection
Proc. IEEE Int Information Forensics and Security (WIFS) Workshop
2010, pp. 1-6
BibTeX@inproceedings{Christlein2010a, author = {Christlein, V. and Riess, C. and Angelopoulou, E.}, title = {On rotation invariance in copy-move forgery detection}, booktitle = {Proc. IEEE Int Information Forensics and Security (WIFS) Workshop}, year = {2010}, pages = {1--6}}
-
Semi non-intrusive training for cell-phone camera model linkage
Proc. IEEE Int Information Forensics and Security (WIFS) Workshop
2010, pp. 1-6
BibTeX@inproceedings{Chuang2010, author = {Wei-Hong Chuang and Min Wu}, title = {Semi non-intrusive training for cell-phone camera model linkage}, booktitle = {Proc. IEEE Int Information Forensics and Security (WIFS) Workshop}, year = {2010}, pages = {1--6}}
-
Removing chromatic aberration by digital image processing
Optical Engineering, SPIE, 2010, Vol. 49(6), pp. 067002
BibTeX@article{Chung2010, author = {Soon-Wook Chung and Byoung-Kwang Kim and Woo-Jin Song}, title = {Removing chromatic aberration by digital image processing}, journal = {Optical Engineering}, publisher = {SPIE}, year = {2010}, volume = {49}, number = {6}, pages = {067002}}
-
Exchangable image file format dor digital still cameras: EXIF Version 2.3
CIPA, 2010
BibTeX@standard{CIPA2010, author = {CIPA}, title = {Exchangable image file format dor digital still cameras: EXIF Version 2.3}, year = {2010}}
-
Handbook of Blind Source Separation: Independent Component Analysis and Applications
Academic Press, 2010
BibTeX@book{Comon2010, author = {Comon, Pierre and Jutten, Christian}, title = {Handbook of Blind Source Separation: Independent Component Analysis and Applications}, publisher = {Academic Press}, year = {2010}}
-
Detecting Photo Manipulation on Signs and Billboards
International Conference on Image Processing
2010
BibTeX@inproceedings{Conotter2010, author = {Conotter, Valentina and Boato, Giulia and Farid, Hany}, title = {Detecting Photo Manipulation on Signs and Billboards}, booktitle = {International Conference on Image Processing}, year = {2010}}
-
Avoiding Twisted Pixels: Ethical Guidelines for the Appropriate Use and Manipulation of Scientific Digital Images
Science and Engineering Ethics, Springer Netherlands, 2010, Vol. 16, pp. 639-667
BibTeX@article{Cromey2010, author = {Cromey, Douglas}, title = {Avoiding Twisted Pixels: Ethical Guidelines for the Appropriate Use and Manipulation of Scientific Digital Images}, journal = {Science and Engineering Ethics}, publisher = {Springer Netherlands}, year = {2010}, volume = {16}, pages = {639-667}}
-
Image splicing detection based on estimation of camera intrinsic parameters
Proc. Int Audio Language and Image Processing (ICALIP) Conf
2010, pp. 214-218
BibTeX@inproceedings{Dai2010, author = {Yanfei Dai and Hui Xiang and Peng Lu and Wenjuan Feng}, title = {Image splicing detection based on estimation of camera intrinsic parameters}, booktitle = {Proc. Int Audio Language and Image Processing (ICALIP) Conf}, year = {2010}, pages = {214--218}}
-
SIFT algorithm analysis and optimization
Proc. Int Image Analysis and Signal Processing (IASP) Conf
2010, pp. 415-419
BibTeX@inproceedings{Daixian2010, author = {Zhu Daixian}, title = {SIFT algorithm analysis and optimization}, booktitle = {Proc. Int Image Analysis and Signal Processing (IASP) Conf}, year = {2010}, pages = {415--419}}
-
On the Role of Differentiation for Resampling Detection
International Conference on Image Processing
2010
BibTeX@inproceedings{Dalgaard2010, author = {Dalgaard, Nahuel and Mosquera, Carlos and Perez-Gonzalez, Fernando}, title = {On the Role of Differentiation for Resampling Detection}, booktitle = {International Conference on Image Processing}, year = {2010}}
-
On the Limits of Perceptually Optimized JPEG
Multimedia Signal Processing Group (MMSPG) Ecole Polytechnique F´ed´erale de Lausanne (EPFL) CH-1015 Lausanne, Switzerland, 2010
BibTeX@techreport{DeSimone2010, author = {De Simone, Francesca and Goldmann, Lutz and Filimonov, Denis and Ebrahimi, Touradj}, title = {On the Limits of Perceptually Optimized JPEG}, year = {2010}}
-
Authentication of JPEG Images Based on Genetic Algorithms
The Open Artificial Intelligence Journal, 2010, Vol. 4, pp. 30-36
BibTeX@article{Edupuganti2010, author = {Edupuganti, Venkata Gopal and Shih, Frank. Y}, title = {Authentication of JPEG Images Based on Genetic Algorithms}, journal = {The Open Artificial Intelligence Journal}, year = {2010}, volume = {4}, pages = {30-36}}
-
Image Splicing Detection Using Color Edge Inconsistency
Proc. Int Multimedia Information Networking and Security (MINES) Conf
2010, pp. 923-926
BibTeX@inproceedings{Fang2010, author = {Zhen Fang and Shuozhong Wang and Xinpeng Zhang}, title = {Image Splicing Detection Using Color Edge Inconsistency}, booktitle = {Proc. Int Multimedia Information Networking and Security (MINES) Conf}, year = {2010}, pages = {923--926}}
-
A 3-D Photo Forensic Analysis of the Lee Harvey Oswald Backyard Photo
Department of Computer Science, Dartmouth College, 2010(TR2010-669)
BibTeX@techreport{Farid2010a, author = {Farid, Hany}, title = {A 3-D Photo Forensic Analysis of the Lee Harvey Oswald Backyard Photo}, year = {2010}, number = {TR2010-669}}
-
Image forensic analyses that elude the human visual system
Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
Media Forensics and Security II
Media Forensics and Security II, SPIE, 2010, Vol. 7541(1), pp. 754106
BibTeX@inproceedings{Farid2010, author = {Hany Farid and Mary J. Bravo}, title = {Image forensic analyses that elude the human visual system}, booktitle = {Media Forensics and Security II}, journal = {Media Forensics and Security II}, publisher = {SPIE}, year = {2010}, volume = {7541}, number = {1}, pages = {754106}}
-
JPEG recompression detection
Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
Media Forensics and Security II
Media Forensics and Security II, SPIE, 2010, Vol. 7541(1), pp. 75410J
BibTeX@inproceedings{Feng2010, author = {Feng, Xiaoying and Doërr, Gwenaël}, title = {JPEG recompression detection}, booktitle = {Media Forensics and Security II}, journal = {Media Forensics and Security II}, publisher = {SPIE}, year = {2010}, volume = {7541}, number = {1}, pages = {75410J}}
-
Detecting content adaptive scaling of images for forensic applications
Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
Media Forensics and Security II
Media Forensics and Security II, SPIE, 2010, Vol. 7541(1), pp. 75410Z
BibTeX@inproceedings{Fillion2010, author = {Claude Fillion and Gaurav Sharma}, title = {Detecting content adaptive scaling of images for forensic applications}, booktitle = {Media Forensics and Security II}, journal = {Media Forensics and Security II}, publisher = {SPIE}, year = {2010}, volume = {7541}, number = {1}, pages = {75410Z}}
-
Die digitale Erkennung von Bildbearbeitung
Deutsche Schule Stockholm Karlavägen 25 11431 Stockholm SCHWEDEN, 2010
BibTeX@techreport{Flemstroem2010, author = {David Flemström and Moritz Roth}, title = {Die digitale Erkennung von Bildbearbeitung}, year = {2010}}
-
Removing pedestrians from Google street view images
Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition Workshops (CVPRW)
2010, pp. 53-58
BibTeX@inproceedings{Flores2010, author = {Flores, Arturo and Belongie, Serge}, title = {Removing pedestrians from Google street view images}, booktitle = {Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition Workshops (CVPRW)}, year = {2010}, pages = {53--58}}
-
Multimodal location estimation
Proceedings of the international conference on Multimedia
ACM, 2010, pp. 1245-1252
BibTeX@inproceedings{Friedland2010, author = {Friedland, Gerald and Vinyals, Oriol and Darrell, Trevor}, title = {Multimodal location estimation}, booktitle = {Proceedings of the international conference on Multimedia}, publisher = {ACM}, year = {2010}, pages = {1245--1252}}
-
Single-View Recaptured Image Detection Based on Physics-Based Features
IEEE International Conference on Multimedia and EXPO
2010
BibTeX@inproceedings{Gao2010, author = {Gao, Xinting and Ng, Tian-Tsong and Qiu, Bo and Chang, Shih-Fu}, title = {Single-View Recaptured Image Detection Based on Physics-Based Features}, booktitle = {IEEE International Conference on Multimedia and EXPO}, year = {2010}}
-
Automatic Acquisition Device Identification from Speech Recordings
International Conference on Acoustics, Speech, and Signal Processing
2010, pp. 1806-1809
BibTeX@inproceedings{Garcia-Romero2010, author = {Garcia-Romero, Daniel and Espy-Wilson, Carol}, title = {Automatic Acquisition Device Identification from Speech Recordings}, booktitle = {International Conference on Acoustics, Speech, and Signal Processing}, year = {2010}, pages = {1806-1809}}
-
Using the local information of image to identify the source camera
Proc. IEEE Int Signal Processing and Information Technology (ISSPIT) Symp
2010, pp. 515-519
BibTeX@inproceedings{Gharibi2010, author = {Gharibi, F. and Akhlaghian, F. and RavanJamjah, J. and ZahirAzami, B. }, title = {Using the local information of image to identify the source camera}, booktitle = {Proc. IEEE Int Signal Processing and Information Technology (ISSPIT) Symp}, year = {2010}, pages = {515--519}}
-
The ´Dresden Image Database´ for benchmarking digital image forensics
SAC ´10: Proceedings of the 2010 ACM Symposium on Applied Computing
ACM, 2010, pp. 1584-1590
BibTeX@inproceedings{Gloe2010a, author = {Gloe, Thomas and Böhme, Rainer}, title = {The ´Dresden Image Database´ for benchmarking digital image forensics}, booktitle = {SAC ´10: Proceedings of the 2010 ACM Symposium on Applied Computing}, publisher = {ACM}, year = {2010}, pages = {1584--1590}}
-
Efficient estimation and large-scale evaluation of lateral chromatic aberration for digital image forensics
Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
Media Forensics and Security II
Media Forensics and Security II, SPIE, 2010, Vol. 7541(1), pp. 754107
BibTeX@inproceedings{Gloe2010, author = {Thomas Gloe and Karsten Borowka and Antje Winkler}, title = {Efficient estimation and large-scale evaluation of lateral chromatic aberration for digital image forensics}, booktitle = {Media Forensics and Security II}, journal = {Media Forensics and Security II}, publisher = {SPIE}, year = {2010}, volume = {7541}, number = {1}, pages = {754107}}
-
Sensor noise camera identification: countering counter-forensics
Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
Media Forensics and Security II
Media Forensics and Security II, SPIE, 2010, Vol. 7541(1), pp. 75410S
BibTeX@inproceedings{Goljan2010a, author = {Miroslav Goljan and Jessica Fridrich and Mo Chen}, title = {Sensor noise camera identification: countering counter-forensics}, booktitle = {Media Forensics and Security II}, journal = {Media Forensics and Security II}, publisher = {SPIE}, year = {2010}, volume = {7541}, number = {1}, pages = {75410S}}
-
Managing a large database of camera fingerprints
Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
Media Forensics and Security II
Media Forensics and Security II, SPIE, 2010, Vol. 7541(1), pp. 754108
BibTeX@inproceedings{Goljan2010, author = {Miroslav Goljan and Jessica Fridrich and Filler, Tomáš}, title = {Managing a large database of camera fingerprints}, booktitle = {Media Forensics and Security II}, journal = {Media Forensics and Security II}, publisher = {SPIE}, year = {2010}, volume = {7541}, number = {1}, pages = {754108}}
-
Survey on passive methods of image tampering detection
Proc. Int Communication and Computational Intelligence (INCOCCI) Conf
2010, pp. 431-436
BibTeX@inproceedings{Granty2010, author = {Granty, R. E. J. and Aditya, T. S. and Madhu, S. S. }, title = {Survey on passive methods of image tampering detection}, booktitle = {Proc. Int Communication and Computational Intelligence (INCOCCI) Conf}, year = {2010}, pages = {431--436}}
-
Deanonymisierung von Profilen sozialer Netzwerke unter Nutzung von Metadaten aus Bildern
Proceedings of D•A•CH Security 2010
2010
BibTeX@inproceedings{Greveler2010, author = {Ulrich Greveler and Dennis Löhr}, title = {Deanonymisierung von Profilen sozialer Netzwerke unter Nutzung von Metadaten aus Bildern}, booktitle = {Proceedings of D•A•CH Security 2010}, year = {2010}}
-
Digital Image Forgery Detection by Local Statistical Models
International Conference on Intelligent Information Hiding and Multimedia Signal Processing
2010, pp. 579-582
BibTeX@inproceedings{Grim2010, author = {Grim, Jiri and Somol, Petr and Pudil, Pavel}, title = {Digital Image Forgery Detection by Local Statistical Models}, booktitle = {International Conference on Intelligent Information Hiding and Multimedia Signal Processing}, year = {2010}, pages = {579-582}}
-
SVD based image manipulation detection
Proc. 17th IEEE Int Image Processing (ICIP) Conf
2010, pp. 1765-1768
BibTeX@inproceedings{Gul2010, author = {Gul, Gokhan and Avcibas, Ismail and Kurugollu, Fatih}, title = {SVD based image manipulation detection}, booktitle = {Proc. 17th IEEE Int Image Processing (ICIP) Conf}, year = {2010}, pages = {1765--1768}}
-
Retrieval of Bitmap Compression History
International Journal of Computer Science and Information Security, 2010, Vol. 8, pp. 141-146
BibTeX@article{Hamdy2010, author = {Salma Hamdy and Haytham El-Messiry and Mohamed Roushdy and Essam Kahlifa}, title = {Retrieval of Bitmap Compression History}, journal = {International Journal of Computer Science and Information Security}, year = {2010}, volume = {8}, pages = {141-146}}
-
Quantization Table Estimation in JPEG Images
International Journal of Advanced Computer Sciences and Applications, 2010, Vol. 1, pp. 17-23
BibTeX@article{Hamdy2010a, author = {Salma Hamdy and Haytham El-Messiry and Mohamed Roushdy and Essam Kahlifa}, title = {Quantization Table Estimation in JPEG Images}, journal = {International Journal of Advanced Computer Sciences and Applications}, year = {2010}, volume = {1}, pages = {17-23}}
-
Rendering fake soft shadows based on the erosion and dilation
Proc. 2nd Int Computer Engineering and Technology (ICCET) Conf
2010, Vol. 6
BibTeX@inproceedings{Hanjun2010, author = {Jin Hanjun and Sun Huali}, title = {Rendering fake soft shadows based on the erosion and dilation}, booktitle = {Proc. 2nd Int Computer Engineering and Technology (ICCET) Conf}, year = {2010}, volume = {6}}
-
Inter-Channel Demosaicking Traces for Digital Image Forensics
IEEE International Conference on Multimedia and EXPO
2010
BibTeX@inproceedings{Ho2010, author = {Ho, John and Au, Oscar C. and Zhou, Jiantao}, title = {Inter-Channel Demosaicking Traces for Digital Image Forensics}, booktitle = {IEEE International Conference on Multimedia and EXPO}, year = {2010}}
-
Camera Response Functions For Image Forensics: An Automatic Algorithm for Splicing Detection
IEEE Transactions on Information Forensics and Security, 2010, Vol. 5(5), pp. 1
BibTeX@article{Hsu2010, author = {Hsu, Y. F. and Chang, S. F.}, title = {Camera Response Functions For Image Forensics: An Automatic Algorithm for Splicing Detection}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2010}, volume = {5}, number = {5}, pages = {1}}
-
Using improved imaging sensor pattern noise for source camera identification
Proc. IEEE Int Multimedia and Expo (ICME) Conf
2010, pp. 1481-1486
BibTeX@inproceedings{Hu2010b, author = {Yongjian Hu and Chao Jian and Chang-Tsun Li}, title = {Using improved imaging sensor pattern noise for source camera identification}, booktitle = {Proc. IEEE Int Multimedia and Expo (ICME) Conf}, year = {2010}, pages = {1481--1486}}
-
Building fingerprints with information from three color bands for source camera identification
Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence
ACM, 2010, pp. 111-116
BibTeX@inproceedings{Hu2010a, author = {Hu, Yongjian and Li, Chang-Tsun and Jian, Chao}, title = {Building fingerprints with information from three color bands for source camera identification}, booktitle = {Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence}, publisher = {ACM}, year = {2010}, pages = {111--116}}
-
Selecting forensic features for robust source camera identification
Proc. Int. Computer Symp. (ICS)
2010, pp. 506-511
BibTeX@inproceedings{Hu2010, author = {Yongjian Hu and Chang-Tsun Li and Changhui Zhou}, title = {Selecting forensic features for robust source camera identification}, booktitle = {Proc. Int. Computer Symp. (ICS)}, year = {2010}, pages = {506--511}}
-
Detecting Double JPEG Compression With the Same Quantization Matrix
IEEE Transactions on Information Forensics and Security, 2010, Vol. 5(4), pp. 848-856
BibTeX@article{Huang2010a, author = {Fangjun Huang and Jiwu Huang and Yun Qing Shi}, title = {Detecting Double JPEG Compression With the Same Quantization Matrix}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2010}, volume = {5}, number = {4}, pages = {848--856}}
-
Medical image tamper approximation based on an image moment signature
Proc. 12th IEEE Int e-Health Networking Applications and Services (Healthcom) Conf
2010, pp. 254-259
BibTeX@inproceedings{Huang2010b, author = {Huang, H. and Coatrieux, G. and Shu, H. Z. and Luo, L. M. and Roux, C.}, title = {Medical image tamper approximation based on an image moment signature}, booktitle = {Proc. 12th IEEE Int e-Health Networking Applications and Services (Healthcom) Conf}, year = {2010}, pages = {254--259}}
-
Learning from Interpolated Images using Neural Networks for Digital Forensics
Computer Sciences Department University of Wisconsin-Madison, 2010
BibTeX@techreport{Huang2010, author = {Huang, Y. and Fang, N.}, title = {Learning from Interpolated Images using Neural Networks for Digital Forensics}, year = {2010}}
-
IPTC Standard Photo Metadata IPTC Core Specification Version 1.1 IPTC Extension Specification Version 1.1
IPTC, 2010
BibTeX@standard{IPTC2010, author = {IPTC}, title = {IPTC Standard Photo Metadata IPTC Core Specification Version 1.1 IPTC Extension Specification Version 1.1}, year = {2010}}
-
Identification of copy--paste regions in digital image
International Journal of Imaging Systems and Technology, 2010, Vol. 20(4), pp. 367-369
BibTeX@article{Jajal2010, author = {Brijesh Jajal and Vipul Desai}, title = {Identification of copy--paste regions in digital image}, journal = {International Journal of Imaging Systems and Technology}, year = {2010}, volume = {20}, number = {4}, pages = {367--369}}
-
A Novel Multi-size Block Benford’s Law Scheme for Printer Identification
Qiu, G., Lam, K., Kiya, H., Xue, X.-Y., Kuo, C.-C. & Lew, M. (ed.)
Advances in Multimedia Information Processing - PCM 2010
Springer Berlin Heidelberg, 2010, Vol. 6297, pp. 643-652
BibTeX@incollection{Jiang2010, author = {Jiang, Weina and Ho, AnthonyT.S. and Treharne, Helen and Shi, YunQ.}, title = {A Novel Multi-size Block Benford’s Law Scheme for Printer Identification}, booktitle = {Advances in Multimedia Information Processing - PCM 2010}, publisher = {Springer Berlin Heidelberg}, year = {2010}, volume = {6297}, pages = {643-652}}
-
Artificial Joint Surface Fitting Based on Moving Least Squares Methods
Proc. Int Internet Technology and Applications Conf
2010, pp. 1-4
BibTeX@inproceedings{Jin2010, author = {Xiangyang Jin}, title = {Artificial Joint Surface Fitting Based on Moving Least Squares Methods}, booktitle = {Proc. Int Internet Technology and Applications Conf}, year = {2010}, pages = {1--4}}
-
Image tamper detection algorithm based on Radon and Fourier-Mellin transform
Proc. IEEE Int Information Theory and Information Security (ICITIS) Conf
2010, pp. 212-215
BibTeX@inproceedings{Jing2010, author = {Tao Jing and Xinghua Li and Feifei Zhang}, title = {Image tamper detection algorithm based on Radon and Fourier-Mellin transform}, booktitle = {Proc. IEEE Int Information Theory and Information Security (ICITIS) Conf}, year = {2010}, pages = {212--215}}
-
GPS coordinates estimation and camera calibration from solar shadows
Computer Vision and Image Understanding, 2010, Vol. 114(9), pp. 991 - 1003
BibTeX@article{Junejo2010, author = {Junejo, Imran N. and Foroosh, Hassan}, title = {GPS coordinates estimation and camera calibration from solar shadows}, journal = {Computer Vision and Image Understanding}, year = {2010}, volume = {114}, number = {9}, pages = {991 - 1003}}
-
Detection of Copy-Move Forgery based on one improved LLE method
Proc. 2nd Int Advanced Computer Control (ICACC) Conf
2010, Vol. 4, pp. 547-550
BibTeX@inproceedings{Junhong2010, author = {Zhao Junhong}, title = {Detection of Copy-Move Forgery based on one improved LLE method}, booktitle = {Proc. 2nd Int Advanced Computer Control (ICACC) Conf}, year = {2010}, volume = {4}, pages = {547--550}}
-
Detecting Digital Image Forgeries Through Inconsistent Motion Blur
IEEE International Conference on Multimedia and EXPO
2010
BibTeX@inproceedings{Kakar2010, author = {Kakar, Pravin and Natarajan, Sudha and Ser, Wee}, title = {Detecting Digital Image Forgeries Through Inconsistent Motion Blur}, booktitle = {IEEE International Conference on Multimedia and EXPO}, year = {2010}}
-
Image authentication by motion blur consistency verification
TENCON 2010 - 2010 IEEE Region 10 Conference
2010, pp. 188-193
BibTeX@inproceedings{Kakar2010a, author = {Kakar, P. and Natarajan, S. and Wee Ser}, title = {Image authentication by motion blur consistency verification}, booktitle = {TENCON 2010 - 2010 IEEE Region 10 Conference}, year = {2010}, pages = {188--193}}
-
Copy-move forgery detection in digital image
Proc. 3rd Int Image and Signal Processing (CISP) Congress
2010, Vol. 5, pp. 2419-2421
BibTeX@inproceedings{Kang2010, author = {Li Kang and Xiao-ping Cheng}, title = {Copy-move forgery detection in digital image}, booktitle = {Proc. 3rd Int Image and Signal Processing (CISP) Congress}, year = {2010}, volume = {5}, pages = {2419--2421}}
-
Digital image authentication from thumbnails
Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
Media Forensics and Security II
Media Forensics and Security II, SPIE, 2010, Vol. 7541(1), pp. 75410E
BibTeX@inproceedings{Kee2010, author = {Kee, Eric and Farid, Hany}, title = {Digital image authentication from thumbnails}, booktitle = {Media Forensics and Security II}, journal = {Media Forensics and Security II}, publisher = {SPIE}, year = {2010}, volume = {7541}, number = {1}, pages = {75410E}}
-
Exposing Digital Forgeries from 3-D Lighting Environments
IEEE International Workshop on Information Forensics and Security
2010
BibTeX@misc{Kee2010a, author = {Kee, Eric and Farid, Hany}, title = {Exposing Digital Forgeries from 3-D Lighting Environments}, booktitle = {IEEE International Workshop on Information Forensics and Security}, year = {2010}}
-
An Efficient Method for Detection of Copy-Move Forgery Using Discrete Wavelet Transform.
International Journal on Computer Science and Engineering, 2010, Vol. 2, pp. 1801-1806
BibTeX@article{Khan2010, author = {Saiqa Khan and Arun Kulkarni}, title = {An Efficient Method for Detection of Copy-Move Forgery Using Discrete Wavelet Transform.}, journal = {International Journal on Computer Science and Engineering}, year = {2010}, volume = {2}, pages = {1801-1806}}
-
Reduced Time Complexity for Detection of Copy-Move Forgery Using Discrete Wavelet Transform
International Journal of Computer Applications, 2010, Vol. 6, pp. 31-36
BibTeX@article{Khan2010a, author = {Saiqa Khan and Arun Kulkarni}, title = {Reduced Time Complexity for Detection of Copy-Move Forgery Using Discrete Wavelet Transform}, journal = {International Journal of Computer Applications}, year = {2010}, volume = {6}, pages = {31-36}}
-
Robust method for detection of copy-move forgery in digital images
Proc. Int Signal and Image Processing (ICSIP) Conf
2010, pp. 69-73
BibTeX@inproceedings{Khan2010b, author = {Khan, S. and Kulkarni, A. }, title = {Robust method for detection of copy-move forgery in digital images}, booktitle = {Proc. Int Signal and Image Processing (ICSIP) Conf}, year = {2010}, pages = {69--73}}
-
Intrinsic Signatures for Scanned Documents Forensics : Effect of Font Shape and Size
International Symposium on Circuits and Systems
2010
BibTeX@inproceedings{Khanna2010a, author = {Khanna, Nitin and Delp, Edward J.}, title = {Intrinsic Signatures for Scanned Documents Forensics : Effect of Font Shape and Size}, booktitle = {International Symposium on Circuits and Systems}, year = {2010}}
-
Efficient estimation of CFA pattern configuration in digital camera images
Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
Proc. SPIE
Media Forensics and Security II, SPIE, 2010, Vol. 7541(1), pp. 754111
BibTeX@conference{Kirchner2010, author = {Matthias Kirchner}, title = {Efficient estimation of CFA pattern configuration in digital camera images}, booktitle = {Proc. SPIE}, journal = {Media Forensics and Security II}, publisher = {SPIE}, year = {2010}, volume = {7541}, number = {1}, pages = {754111}}
-
Linear row and column predictors for the analysis of resized images
Proceedings of the 12th ACM workshop on Multimedia and security
ACM, 2010, pp. 13-18
BibTeX@inproceedings{Kirchner2010a, author = {Kirchner, Matthias}, title = {Linear row and column predictors for the analysis of resized images}, booktitle = {Proceedings of the 12th ACM workshop on Multimedia and security}, publisher = {ACM}, year = {2010}, pages = {13--18}}
-
On detection of median filtering in digital images
Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
Proc. SPIE
Media Forensics and Security II, SPIE, 2010, Vol. 7541(1), pp. 754110
BibTeX@conference{Kirchner2010b, author = {Matthias Kirchner and Jessica Fridrich}, title = {On detection of median filtering in digital images}, booktitle = {Proc. SPIE}, journal = {Media Forensics and Security II}, publisher = {SPIE}, year = {2010}, volume = {7541}, number = {1}, pages = {754110}}
-
Detecting Forgery from Static-Scene Video Based on Inconsistency in Noise Level Functions
IEEE Transactions on Information Forensics and Security, 2010, Vol. 5(4), pp. 1
BibTeX@article{Kobayashi2010, author = {Kobayashi, M. and Okabe, T. and Sato, Y.}, title = {Detecting Forgery from Static-Scene Video Based on Inconsistency in Noise Level Functions}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2010}, volume = {5}, number = {4}, pages = {1}}
-
Detecting Ground Shadows in Outdoor Consumer Photographs
Daniilidis, K., Maragos, P. & Paragios, N. (ed.)
Computer Vision -- ECCV 2010
Springer Berlin Heidelberg, 2010, Vol. 6312, pp. 322-335
BibTeX@incollection{Lalonde2010, author = {Lalonde, Jean-François and Efros, AlexeiA. and Narasimhan, SrinivasaG.}, title = {Detecting Ground Shadows in Outdoor Consumer Photographs}, booktitle = {Computer Vision -- ECCV 2010}, publisher = {Springer Berlin Heidelberg}, year = {2010}, volume = {6312}, pages = {322-335}}
-
An Introduction to Independent Component Analysis: InfoMax and FastICA algorithms
Tutorials in Quantitative Methods for Psychology, 2010, Vol. 6(1), pp. 31-38
BibTeX@article{Langlois2010, author = {Dominic Langlois and Sylvain Chartier and Dominique Gosselin}, title = {An Introduction to Independent Component Analysis: InfoMax and FastICA algorithms}, journal = {Tutorials in Quantitative Methods for Psychology}, year = {2010}, volume = {6(1)}, pages = {31--38}}
-
Exact JPEG recompression
Visual Information Processing and Communication
Visual Information Processing and Communication, SPIE, 2010, Vol. 7543(1), pp. 75430V
BibTeX@conference{Lewis2010, author = {Andrew B. Lewis and Markus G. Kuhn}, title = {Exact JPEG recompression}, booktitle = {Visual Information Processing and Communication}, journal = {Visual Information Processing and Communication}, publisher = {SPIE}, year = {2010}, volume = {7543}, number = {1}, pages = {75430V}}
-
Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions
Klinger, K. (ed.)
Hershey, New York, 2010
BibTeX@book{Li2010c, author = {Chang-Tsun Li}, title = {Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions}, publisher = {Hershey, New York}, year = {2010}}
-
Source Camera Identification Using Enhanced Sensor Pattern Noise
IEEE Transactions on Information Forensics and Security, 2010, Vol. 5(2), pp. 280-287
BibTeX@article{Li2010, author = {Li, Chang-Tsun}, title = {Source Camera Identification Using Enhanced Sensor Pattern Noise}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2010}, volume = {5}, number = {2}, pages = {280-287}}
-
Unsupervised Classification of Digital Images Using Enhanced Sensor Pattern Noise
IEEE International Symposium on Circuits and Systems
2010
BibTeX@inproceedings{Li2010b, author = {Li, Chang-Tsun}, title = {Unsupervised Classification of Digital Images Using Enhanced Sensor Pattern Noise}, booktitle = {IEEE International Symposium on Circuits and Systems}, year = {2010}}
-
On the Repudiability of Device Identification and Image Integrity Verification Using Sensor Pattern Noise
Akan, O., Bellavista, P., Cao, J., Dressler, F., Ferrari, D., Gerla, M., Kobayashi, H., Palazzo, S., Sahni, S., Shen, X. (S., Stan, M., Xiaohua, J., Zomaya, A., Coulson, G. & Weerasinghe, D. (ed.)
Information Security and Digital Forensics
Springer Berlin Heidelberg, 2010, Vol. 41, pp. 19-25
BibTeX@incollection{Li2010e, author = {Li, Chang-Tsun and Chang, Chih-Yuan and Li, Yue}, title = {On the Repudiability of Device Identification and Image Integrity Verification Using Sensor Pattern Noise}, booktitle = {Information Security and Digital Forensics}, publisher = {Springer Berlin Heidelberg}, year = {2010}, volume = {41}, pages = {19-25}}
-
Digital Camera Identification Using Colour-Decoupled Photo Response Non-Uniformity Noise Pattern
International Symposium on Circuits and Systems
2010
BibTeX@inproceedings{Li2010a, author = {Li, Chang-Tsun and Li, Yue}, title = {Digital Camera Identification Using Colour-Decoupled Photo Response Non-Uniformity Noise Pattern}, booktitle = {International Symposium on Circuits and Systems}, year = {2010}}
-
Resampling forgery detection in JPEG-compressed images
Proc. 3rd Int Image and Signal Processing (CISP) Congress
2010, Vol. 3, pp. 1166-1170
BibTeX@inproceedings{Li2010g, author = {Shu-ping Li and Zhi Han and Yi-zhen Chen and Bo Fu and Chunhui Lu and Xiaohui Yao}, title = {Resampling forgery detection in JPEG-compressed images}, booktitle = {Proc. 3rd Int Image and Signal Processing (CISP) Congress}, year = {2010}, volume = {3}, pages = {1166--1170}}
-
Rotation Robust Detection of Copy-Move Forgery
Image Processing (ICIP), 2010 17th IEEE International Conference on
2010
BibTeX@inproceedings{Li2010f, author = {Li, Weihai and Yu, Nenghai}, title = {Rotation Robust Detection of Copy-Move Forgery}, booktitle = {Image Processing (ICIP), 2010 17th IEEE International Conference on}, year = {2010}}
-
Identifying camera and processing from cropped JPEG photos via tensor analysis
Proc. IEEE Int Systems Man and Cybernetics (SMC) Conf
2010, pp. 3889-3895
BibTeX@inproceedings{Li2010h, author = {Weihai Li and Nenghai Yu and Yuan Yuan}, title = {Identifying camera and processing from cropped JPEG photos via tensor analysis}, booktitle = {Proc. IEEE Int Systems Man and Cybernetics (SMC) Conf}, year = {2010}, pages = {3889--3895}}
-
Identifying photorealistic computer graphics using second-order difference statistics
Proc. Seventh Int Fuzzy Systems and Knowledge Discovery (FSKD) Conf
2010, Vol. 5, pp. 2316-2319
BibTeX@inproceedings{Li2010d, author = {Wenxiang Li and Tao Zhang and Ergong Zheng and Xijian Ping}, title = {Identifying photorealistic computer graphics using second-order difference statistics}, booktitle = {Proc. Seventh Int Fuzzy Systems and Knowledge Discovery (FSKD) Conf}, year = {2010}, volume = {5}, pages = {2316--2319}}
-
Image splicing detection based on moment features and Hilbert-Huang Transform
Proc. IEEE Int Information Theory and Information Security (ICITIS) Conf
2010, pp. 1127-1130
BibTeX@inproceedings{Li2010i, author = {Xuefang Li and Tao Jing and Xinghua Li}, title = {Image splicing detection based on moment features and Hilbert-Huang Transform}, booktitle = {Proc. IEEE Int Information Theory and Information Security (ICITIS) Conf}, year = {2010}, pages = {1127--1130}}
-
Multimedia Forensics for Detecting Forgeries
Stavroulakis, P. & Stamp, M. (ed.)
Handbook of Information and Communication Security
Springer Berlin Heidelberg, 2010, pp. 809-828
BibTeX@incollection{Lian2010, author = {Lian, Shiguo and Zhang, Yan}, title = {Multimedia Forensics for Detecting Forgeries}, booktitle = {Handbook of Information and Communication Security}, publisher = {Springer Berlin Heidelberg}, year = {2010}, pages = {809-828}}
-
Fast Forgery Detection with the Intrinsic Resampling Properties
Proc. Sixth Int Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) Conf
2010, pp. 232-235
BibTeX@inproceedings{Lien2010, author = {Lien, Cheng-Chang and Shih, Cheng-Lun and Chou, Chih-Hsun}, title = {Fast Forgery Detection with the Intrinsic Resampling Properties}, booktitle = {Proc. Sixth Int Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) Conf}, year = {2010}, pages = {232--235}}
-
A passive scheme for tampering detection based on quantization table estimation
Frossard, P., Li, H., Wu, F., Girod, B., Li, S. & Wei, G. (ed.)
Proceedings of SPIE
Visual Communications and Image Processing 2010, SPIE, 2010, Vol. 7744(1), pp. 774433
BibTeX@conference{Lin2010, author = {Guo-Shiang Lin and Min-Kuan Chang and You-lin Chen}, title = {A passive scheme for tampering detection based on quantization table estimation}, booktitle = {Proceedings of SPIE}, journal = {Visual Communications and Image Processing 2010}, publisher = {SPIE}, year = {2010}, volume = {7744}, number = {1}, pages = {774433}}
-
On classification of source cameras: A graph based approach
Proc. IEEE Int Information Forensics and Security (WIFS) Workshop
2010, pp. 1-5
BibTeX@inproceedings{Liu2010c, author = {Bei-bei Liu and Heung-Kyu Lee and Yongjian Hu and Chang-Hee Choi}, title = {On classification of source cameras: A graph based approach}, booktitle = {Proc. IEEE Int Information Forensics and Security (WIFS) Workshop}, year = {2010}, pages = {1--5}}
-
Source camera identification from significant noise residual regions
Proc. 17th IEEE Int Image Processing (ICIP) Conf
2010, pp. 1749-1752
BibTeX@inproceedings{Liu2010b, author = {Liu, Bei-Bei and Hu, Yongjian and Lee, Heung-Kyu}, title = {Source camera identification from significant noise residual regions}, booktitle = {Proc. 17th IEEE Int Image Processing (ICIP) Conf}, year = {2010}, pages = {1749--1752}}
-
Digital Image Forensics Using Multi-Resolution Histograms
International Journal of Digital Crime and Forensics (IJDCF), 2010, Vol. 2(4), pp. 37-51
BibTeX@article{Liu2010d, author = {Jin Liu and Hefei Ling and Fuhao Zou and WeiQi Yan and and Zhengding Lu}, title = {Digital Image Forensics Using Multi-Resolution Histograms}, journal = {International Journal of Digital Crime and Forensics (IJDCF)}, year = {2010}, volume = {2}, number = {4}, pages = {37-51}}
-
Optimizing Photo Composition
Computer Graphics Forum, 2010, Vol. 29(2), pp. 469-478
BibTeX@article{Liu2010, author = {Liu, L., Chen, R., Wolf, L. and Cohen-Or, D}, title = {Optimizing Photo Composition}, journal = {Computer Graphics Forum}, year = {2010}, volume = {29}, number = {2}, pages = {469-478}}
-
Camera Model Identification for JPEG Images via Tensor Analysis
International Conference on Intelligent Information Hiding and Multimedia Signal Processing
2010, pp. 462-465
BibTeX@inproceedings{Liu2010a, author = {Liu, Ming and Yu, Nenghai and Li, Weihai}, title = {Camera Model Identification for JPEG Images via Tensor Analysis}, booktitle = {International Conference on Intelligent Information Hiding and Multimedia Signal Processing}, year = {2010}, pages = {462-465}}
-
Forensic hash for multimedia information
Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
Proc. SPIE
Media Forensics and Security II, SPIE, 2010, Vol. 7541(1), pp. 75410Y
BibTeX@conference{Lu2010, author = {Wenjun Lu and Avinash L. Varna and Min Wu}, title = {Forensic hash for multimedia information}, booktitle = {Proc. SPIE}, journal = {Media Forensics and Security II}, publisher = {SPIE}, year = {2010}, volume = {7541}, number = {1}, pages = {75410Y}}
-
Hiding traces of the blurring effect in digital forgeries
Proc. Int Information Networking and Automation (ICINA) Conf
2010, Vol. 2
BibTeX@inproceedings{Luo2010a, author = {Siqing Luo and Di Wu and Shen Wang}, title = {Hiding traces of the blurring effect in digital forgeries}, booktitle = {Proc. Int Information Networking and Automation (ICINA) Conf}, year = {2010}, volume = {2}}
-
JPEG Error Analysis and Its Applications to Digital Image Forensics
IEEE Transactions on Information Forensics and Security, 2010, Vol. PP Issue:99(99), pp. 1
BibTeX@article{Luo2010, author = {Luo, W and Huang, J and Qiu, G}, title = {JPEG Error Analysis and Its Applications to Digital Image Forensics}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2010}, volume = {PP Issue:99}, number = {99}, pages = {1}}
-
Estimating vignetting function from a single image for image authentication
Proceedings of the 12th ACM workshop on Multimedia and security
ACM, 2010, pp. 3-12
BibTeX@inproceedings{Lyu2010, author = {Lyu, Siwei}, title = {Estimating vignetting function from a single image for image authentication}, booktitle = {Proceedings of the 12th ACM workshop on Multimedia and security}, publisher = {ACM}, year = {2010}, pages = {3--12}}
-
Printer Identification Techniques and Their Privacy Implications
Newcastle University, University of Newcastle upon Tyne, Computing Science, 2010
BibTeX@techreport{Mace2010, author = {Mace, John}, title = {Printer Identification Techniques and Their Privacy Implications}, publisher = {University of Newcastle upon Tyne, Computing Science}, year = {2010}}
-
A bibliography on blind methods for identifying image forgery
Signal Processing: Image Communication, 2010, Vol. 25(6), pp. 389 - 399
BibTeX@article{Mahdian2010, author = {Babak Mahdian and Stanislav Saic}, title = {A bibliography on blind methods for identifying image forgery}, journal = {Signal Processing: Image Communication}, year = {2010}, volume = {25}, number = {6}, pages = {389 - 399}}
-
Blind methods for detecting image fakery
IEEE Aerospace and Electronic Systems Magazine, 2010, Vol. 25(4), pp. 18-24
BibTeX@article{Mahdian2010a, author = {Mahdian, B. and Saic, S.}, title = {Blind methods for detecting image fakery}, journal = {IEEE Aerospace and Electronic Systems Magazine}, year = {2010}, volume = {25}, number = {4}, pages = {18--24}}
-
Watermarking of Raw Digital Images in Camera Firmware
IPSJ Transactions on Computer Vision and Applications, 2010, Vol. 2( ), pp. 16-24
BibTeX@article{Meerwald2010, author = {Meerwald, Peter and Uhl, Andreas}, title = {Watermarking of Raw Digital Images in Camera Firmware}, journal = {IPSJ Transactions on Computer Vision and Applications}, year = {2010}, volume = {2}, number = { }, pages = {16-24}}
-
Tamper Detection for Shifted Double JPEG Compression
Proc. Sixth Int Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) Conf
2010, pp. 434-437
BibTeX@inproceedings{Meng2010, author = {Meng, Xian-zhe and Niu, Shao-zhang and Zou, Jian-chen}, title = {Tamper Detection for Shifted Double JPEG Compression}, booktitle = {Proc. Sixth Int Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) Conf}, year = {2010}, pages = {434--437}}
-
Texture based attacks on intrinsic signature based printer identification
Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
Media Forensics and Security II
Media Forensics and Security II, SPIE, 2010, Vol. 7541(1), pp. 75410T
BibTeX@inproceedings{Mikkilineni2010, author = {Aravind K. Mikkilineni and Nitin Khanna and Edward J. Delp}, title = {Texture based attacks on intrinsic signature based printer identification}, booktitle = {Media Forensics and Security II}, journal = {Media Forensics and Security II}, publisher = {SPIE}, year = {2010}, volume = {7541}, number = {1}, pages = {75410T}}
-
Improving re-sampling detection by adding noise
Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
Media Forensics and Security II
Media Forensics and Security II, SPIE, 2010, Vol. 7541(1), pp. 75410I
BibTeX@inproceedings{Nataraj2010a, author = {Lakshmanan Nataraj and Anindya Sarkar and B. S. Manjunath}, title = {Improving re-sampling detection by adding noise}, booktitle = {Media Forensics and Security II}, journal = {Media Forensics and Security II}, publisher = {SPIE}, year = {2010}, volume = {7541}, number = {1}, pages = {75410I}}
-
Improving re-sampling detection by adding noise
Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series
2010, Vol. 7541
BibTeX@inproceedings{Nataraj2010, author = {Nataraj, L. and Sarkar, A. and Manjunath, B.~S.}, title = {Improving re-sampling detection by adding noise}, booktitle = {Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series}, year = {2010}, volume = {7541}}
-
Detecting Image Region Duplication Using SIFT Features
International Conference on Acoustics, Speech, and Signal Processing
2010
BibTeX@inproceedings{Pan2010, author = {Pan, Xunyu and Lyu, Siwei}, title = {Detecting Image Region Duplication Using SIFT Features}, booktitle = {International Conference on Acoustics, Speech, and Signal Processing}, year = {2010}}
-
Region Duplication Detection Using Image Feature Matching
IEEE Transactions on Information Forensics and Security, 2010, Vol. 5(4), pp. 857-867
BibTeX@article{Pan2010a, author = {Pan, Xunyu. and Lyu, Siwei}, title = {Region Duplication Detection Using Image Feature Matching}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2010}, volume = {5}, number = {4}, pages = {857--867}}
-
Digital Image Forgery Forensics by Using Blur Estimation and Abnormal Hue Detection
Proc. Symp. Photonics and Optoelectronic (SOPO)
2010, pp. 1-4
BibTeX@inproceedings{Peng2010, author = {Fei Peng and Xi-lan Wang}, title = {Digital Image Forgery Forensics by Using Blur Estimation and Abnormal Hue Detection}, booktitle = {Proc. Symp. Photonics and Optoelectronic (SOPO)}, year = {2010}, pages = {1--4}}
-
Signal Processing Algorithms For Digital Image Forensics
Faculty of Engineering, 2010
BibTeX@mastersthesis{Prasad2010, author = {Prasad, S}, title = {Signal Processing Algorithms For Digital Image Forensics}, school = {Faculty of Engineering}, year = {2010}}
-
Estimating JPEG2000 compression for image forensics using Benford´s Law
Schelkens, P., Ebrahimi, T., Cristobal, G., Truchetet, F. & Saarikko, P. (ed.)
Proc. SPIE 7723
Optics, Photonics, and Digital Technologies for Multimedia Applications, SPIE, 2010, Vol. 7723(1), pp. 77230J
BibTeX@conference{Qadir2010, author = {Ghulam Qadir and Xi Zhao and Anthony T. S. Ho}, title = {Estimating JPEG2000 compression for image forensics using Benford´s Law}, booktitle = {Proc. SPIE 7723}, journal = {Optics, Photonics, and Digital Technologies for Multimedia Applications}, publisher = {SPIE}, year = {2010}, volume = {7723}, number = {1}, pages = {77230J}}
-
Image stitching using simplified SIFT
Proc. IEEE Int Information and Automation (ICIA) Conf
2010, pp. 1134-1137
BibTeX@inproceedings{Qidan2010, author = {Zhu Qidan and Li Ke}, title = {Image stitching using simplified SIFT}, booktitle = {Proc. IEEE Int Information and Automation (ICIA) Conf}, year = {2010}, pages = {1134--1137}}
-
Original oder manipuliert?
Rechtsmedizin, 2010, Vol. -, pp. -
BibTeX@article{Ramsthaler2010, author = {Ramsthaler, F. and Kettner, M. and Potente, S. and Gehl, A. and Kreutz, K. and Verhoff, M.A.}, title = {Original oder manipuliert?}, journal = {Rechtsmedizin}, year = {2010}, volume = {-}, pages = {--}}
-
Digital image forensics: a booklet for beginners
Multimedia Tools and Applications, Springer Netherlands, 2010, pp. 1-30
BibTeX@booklet{Redi2010, author = {Redi, Judith and Taktak, Wiem and Dugelay, Jean-Luc}, title = {Digital image forensics: a booklet for beginners}, journal = {Multimedia Tools and Applications}, publisher = {Springer Netherlands}, year = {2010}, pages = {1-30}}
-
Scene Illumination as an Indicator of Image Manipulation
International Workshop on Information Hiding
2010
BibTeX@inproceedings{Riess2010, author = {Riess, Christian and Angelopoulou, Elli}, title = {Scene Illumination as an Indicator of Image Manipulation}, booktitle = {International Workshop on Information Hiding}, year = {2010}}
-
Exploring image dependencies: a new challenge in image forensics
Memon, N. D., Dittmann, J., Alattar, A. M. & III, E. J. D. (ed.)
Media Forensics and Security II
Media Forensics and Security II, SPIE, 2010, Vol. 7541(1), pp. 75410X
BibTeX@inproceedings{Rosa2010, author = {A. De Rosa and F. Uccheddu and A. Costanzo and A. Piva and M. Barni}, title = {Exploring image dependencies: a new challenge in image forensics}, booktitle = {Media Forensics and Security II}, journal = {Media Forensics and Security II}, publisher = {SPIE}, year = {2010}, volume = {7541}, number = {1}, pages = {75410X}}
-
Electrophotographic Printer Identification by Halftone Texture Analysis
IEEE International Conference on Acoustics, Speech and Signal Processing
2010, pp. 1846-1849
BibTeX@inproceedings{Ryu2010a, author = {Ryu, Seung-Jin and Lee, Hae-Yeoun and Im, Dong-Hyuck and Choi, Jung-Ho and Lee, Heung-Kyu}, title = {Electrophotographic Printer Identification by Halftone Texture Analysis}, booktitle = {IEEE International Conference on Acoustics, Speech and Signal Processing}, year = {2010}, pages = {1846-1849}}
-
Detection of Copy-Rotate-Move Forgery using Zernike Moments
International Workshop on Information Hiding
2010
BibTeX@inproceedings{Ryu2010, author = {Ryu, Seung-Jin and Lee, Min-Jeong and Lee, Heung-Kyu}, title = {Detection of Copy-Rotate-Move Forgery using Zernike Moments}, booktitle = {International Workshop on Information Hiding}, year = {2010}}
-
Uses of software in digital image analysis: a forensic report
Jusoff, K. & Xie, Y. (ed.)
Second International Conference on Digital Image Processing
Second International Conference on Digital Image Processing, SPIE, 2010, Vol. 7546(1), pp. 75462B
BibTeX@conference{Sharma2010, author = {Mukesh Sharma and Shailendra Jha}, title = {Uses of software in digital image analysis: a forensic report}, booktitle = {Second International Conference on Digital Image Processing}, journal = {Second International Conference on Digital Image Processing}, publisher = {SPIE}, year = {2010}, volume = {7546}, number = {1}, pages = {75462B}}
-
Image processing and pattern recognition
Hanzo, L. (ed.)
Wiley-Interscience, 2010
BibTeX@book{Shih2010, author = {Frank Y. Shih}, title = {Image processing and pattern recognition}, publisher = {Wiley-Interscience}, year = {2010}}
-
A Comparison Study on Copy-Cover Image Forgery Detection
The Open Artificial Intelligence Journal, 2010, Vol. 4, pp. 49-54
BibTeX@article{Shih, author = {Shih, Frank Y. and Yuan, Yuan}, title = {A Comparison Study on Copy-Cover Image Forgery Detection}, journal = {The Open Artificial Intelligence Journal}, year = {2010}, volume = {4}, pages = {49-54}}
-
Detecting Copy-Move Forgery in Digital Images:A Survey and Analysis of Current Methods
Global Journal of Computer Science and Technology, 2010, Vol. 10(7), pp. 61-65
BibTeX@article{Shivakumar2010, author = {B.L. Shivakumar and Lt. Dr. S. Santhosh Baboo}, title = {Detecting Copy-Move Forgery in Digital Images:A Survey and Analysis of Current Methods}, journal = {Global Journal of Computer Science and Technology}, year = {2010}, volume = {10}, number = {7}, pages = {61-65}}
-
Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions
Klinger, K. (ed.)
Chapter Digital Camera Photographic Provenance (Chapter 5)
Information Science Reference, 2010, pp. 104-129
BibTeX@inbook{Sorell2010, author = {Matthew Sorell}, title = {Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions}, publisher = {Information Science Reference}, year = {2010}, pages = {104-129}}
-
Forensic Detection of Image Manipulation Using Statistical Intrinsic Fingerprints
IEEE Transactions on Information Forensics and Security, 2010, Vol. PP Issue:99(99), pp. 1
BibTeX@article{Stamm2010a, author = {Stamm, M and Liu, J. R.}, title = {Forensic Detection of Image Manipulation Using Statistical Intrinsic Fingerprints}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2010}, volume = {PP Issue:99}, number = {99}, pages = {1}}
-
Wavelet-Based Image Compression Anti-Forensics
International Conference on Image Processing
2010
BibTeX@inproceedings{Stamm2010b, author = {Stamm, Matthew and Liu, K. J. Ray}, title = {Wavelet-Based Image Compression Anti-Forensics}, booktitle = {International Conference on Image Processing}, year = {2010}}
-
Undetectable Image Tampering Through JPEG Compression Anti-Forensics
International Conference on Image Processing
2010
BibTeX@inproceedings{Stamm2010d, author = {Stamm, Matthew and Tjoa, Steven and Lin, W. Sabrina and Liu, K. J. Ray}, title = {Undetectable Image Tampering Through JPEG Compression Anti-Forensics}, booktitle = {International Conference on Image Processing}, year = {2010}}
-
Forensic estimation and reconstruction of a contrast enhancement mapping
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2010
2010, pp. 1698-1701
BibTeX@inproceedings{Stamm2010c, author = {Stamm, Matthew C. and Liu, K. J. Ray}, title = {Forensic estimation and reconstruction of a contrast enhancement mapping}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2010}, year = {2010}, pages = {1698--1701}}
-
Anti-forensics of JPEG compression
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2010
2010, pp. 1694-1697
BibTeX@inproceedings{Stamm2010, author = {Stamm, Matthew C. and Tjoa, Steven K. and Lin, W. Sabrina and Liu, K. J. Ray}, title = {Anti-forensics of JPEG compression}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2010}, year = {2010}, pages = {1694--1697}}
-
Cell Phone Camera Ballistics: Attacks and Countermeasures
SPIE Conference on Multimedia on Mobile Devices
2010
BibTeX@inproceedings{Steinebach2010a, author = {Steinebach, Martin and Liu, Huajian and Fan, Peishuai and Katzenbeisser, Stefan}, title = {Cell Phone Camera Ballistics: Attacks and Countermeasures}, booktitle = {SPIE Conference on Multimedia on Mobile Devices}, year = {2010}}
-
On the Reliability of Cell Phone Camera Fingerprint Recognition
Goel, S. (ed.)
Chapter On the Reliability of Cell Phone Camera Fingerprint Recognition
Springer Berlin Heidelberg, 2010, Vol. 31, pp. 69-76
BibTeX@inbook{Steinebach2010, author = {Steinebach, Martin and Mohamed El Ouariachi, Huajian Liu and Stefan Katzenbeisser}, title = {On the Reliability of Cell Phone Camera Fingerprint Recognition}, publisher = {Springer Berlin Heidelberg}, year = {2010}, volume = {31}, pages = {69-76}}
-
Detection of Double-Compression in MPEG-2 Videos
Proc. 2nd Int Intelligent Systems and Applications (ISA) Workshop
2010, pp. 1-4
BibTeX@inproceedings{Su2010a, author = {Yuting Su and Junyu Xu}, title = {Detection of Double-Compression in MPEG-2 Videos}, booktitle = {Proc. 2nd Int Intelligent Systems and Applications (ISA) Workshop}, year = {2010}, pages = {1--4}}
-
Exposing Digital Video Logo-removal Forgery by Inconsistency of Blur
International Journal of Pattern Recognition and Artificial Intelligence (IJPRAI), 2010, Vol. 24(7), pp. 1027-1046
BibTeX@article{Su2010, author = {Yuting Su and Jing Zhang and Yu Han and Jing Chen and Qingzhong Liu}, title = {Exposing Digital Video Logo-removal Forgery by Inconsistency of Blur}, journal = {International Journal of Pattern Recognition and Artificial Intelligence (IJPRAI)}, year = {2010}, volume = {24}, number = {7}, pages = {1027-1046}}
-
New Developments in Color Image Tampering Detection
International Symposium on Circuits and Systems
2010
BibTeX@inproceedings{Sutthiwan2010a, author = {Sutthiwan, Patchara and Shi, Yun Qing and Dong, Jing and Tan, Tieniu and Ng, Tian-Tsong}, title = {New Developments in Color Image Tampering Detection}, booktitle = {International Symposium on Circuits and Systems}, year = {2010}}
-
Rake Transform and Edge Statistics for Image Forgery Detection
IEEE International Conference on Multimedia and EXPO
2010
BibTeX@inproceedings{Sutthiwan2010, author = {Sutthiwan, Patchara and Shi, Yun Qing and Su, Wei and Ng, Tian-Tsong}, title = {Rake Transform and Edge Statistics for Image Forgery Detection}, booktitle = {IEEE International Conference on Multimedia and EXPO}, year = {2010}}
-
Estimating demosaicing algorithms using image noise variance
Nara Institute of Science and Technology, 2010
BibTeX@techreport{Takamatsu2010, author = {Takamatsu, Jun and Ogasawara, Tsukasa and Matsushita, Yasuyuki and Ikeuchi, Katsushi}, title = {Estimating demosaicing algorithms using image noise variance}, year = {2010}}
-
Nonattribution Properties of JPEG Quantization Tables
University of New Orleans, 2010
BibTeX@mastersthesis{Tuladhar2010, author = {Punnya Tuladhar}, title = {Nonattribution Properties of JPEG Quantization Tables}, school = {University of New Orleans}, year = {2010}}
-
Detection of resampled images: performance analysis and practical challenges
Proceedings of the 18th European Signal Processing Conference (EUSIPCO-2010)
2010
BibTeX@inproceedings{Uccheddu2010, author = {F. Uccheddu and A. De Rosa and A. Piva and M. Barni}, title = {Detection of resampled images: performance analysis and practical challenges}, booktitle = {Proceedings of the 18th European Signal Processing Conference (EUSIPCO-2010)}, year = {2010}}
-
Two-Dimensional Statistical Test for the Presence of Almost Cyclostationarity on Images
International Conference on Image Processing
2010
BibTeX@inproceedings{Vazquez-Padin2010, author = {Vazquez-Padin, David and Mosquera, Carlos and Perez-Gonzalez, Fernando}, title = {Two-Dimensional Statistical Test for the Presence of Almost Cyclostationarity on Images}, booktitle = {International Conference on Image Processing}, year = {2010}}
-
Conditional Probability Based Camera Identification
International Journal of Cryptology Research, 2010, Vol. 2(1), pp. 63-71
BibTeX@article{Wahab2010, author = {Ainuddin Wahid Abdul Wahab and Philip Bateman}, title = {Conditional Probability Based Camera Identification}, journal = {International Journal of Cryptology Research}, year = {2010}, volume = {2}, number = {1}, pages = {63-71}}
-
Improved method for source camera forensics using JPEG compression images
Proc. IEEE Int Information Theory and Information Security (ICITIS) Conf
2010, pp. 84-87
BibTeX@inproceedings{Wang2010a, author = {Gengzhong Wang and Wenhui Lang and Jianshe Wang}, title = {Improved method for source camera forensics using JPEG compression images}, booktitle = {Proc. IEEE Int Information Theory and Information Security (ICITIS) Conf}, year = {2010}, pages = {84--87}}
-
Image Forgery Forensics Based on Manual Blurred Edge Detection
Proc. Int Multimedia Information Networking and Security (MINES) Conf
2010, pp. 907-911
BibTeX@inproceedings{Wang2010d, author = {Junwen Wang and Guangjie Liu and Bo Xu and Hongyuan Li and Yuewei Dai and Zhiquan Wang}, title = {Image Forgery Forensics Based on Manual Blurred Edge Detection}, booktitle = {Proc. Int Multimedia Information Networking and Security (MINES) Conf}, year = {2010}, pages = {907--911}}
-
Image tampering detection based on stationary distribution of Markov chain
Proc. 17th IEEE Int Image Processing (ICIP) Conf
2010, pp. 2101-2104
BibTeX@inproceedings{Wang2010, author = {Wang, Wei and Dong, Jing and Tan, Tieniu}, title = {Image tampering detection based on stationary distribution of Markov chain}, booktitle = {Proc. 17th IEEE Int Image Processing (ICIP) Conf}, year = {2010}, pages = {2101--2104}}
-
Estimation of Image Rotation Angle Using Interpolation-Related Spectral Signatures With Application to Blind Detection of Image Forgery
IEEE Transactions on Information Forensics and Security, 2010, Vol. 5(3), pp. 507-517
BibTeX@article{Wei2010, author = {Weimin Wei and Shuozhong Wang and Xinpeng Zhang and Zhenjun Tang}, title = {Estimation of Image Rotation Angle Using Interpolation-Related Spectral Signatures With Application to Blind Detection of Image Forgery}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2010}, volume = {5}, number = {3}, pages = {507--517}}
-
Resolution variant visual cryptography for street view of Google Maps
Proc. IEEE Int Circuits and Systems (ISCAS) Symp
2010, pp. 1695-1698
BibTeX@inproceedings{Weir2010, author = {Weir, Jonathan and Yan, WeiQi}, title = {Resolution variant visual cryptography for street view of Google Maps}, booktitle = {Proc. IEEE Int Circuits and Systems (ISCAS) Symp}, year = {2010}, pages = {1695--1698}}
-
Blind Source Separation: Eine Einführung
2010
BibTeX@misc{Wohlmayr2010, author = {Wohlmayr, Michael}, title = {Blind Source Separation: Eine Einführung}, year = {2010}}
-
Geo-location estimation from two shadow trajectories
Proc. IEEE Conf. Computer Vision and Pattern Recognition (CVPR)
2010, pp. 585-590
BibTeX@inproceedings{Wu2010a, author = {Wu, Lin and Cao, Xiaochun}, title = {Geo-location estimation from two shadow trajectories}, booktitle = {Proc. IEEE Conf. Computer Vision and Pattern Recognition (CVPR)}, year = {2010}, pages = {585--590}}
-
Camera calibration and geo-location estimation from two shadow trajectories
Computer Vision and Image Understanding, 2010, Vol. 114(8), pp. 915 - 927
BibTeX@article{Wu2010, author = {Lin Wu and Xiaochun Cao and Hassan Foroosh}, title = {Camera calibration and geo-location estimation from two shadow trajectories}, journal = {Computer Vision and Image Understanding}, year = {2010}, volume = {114}, number = {8}, pages = {915 - 927}}
-
A study of medical image tampering detection
Proc. Int Medical Image Analysis and Clinical Applications (MIACA) Conf
2010, pp. 131-134
BibTeX@inproceedings{Xu2010, author = {Weijian Xu and Hui Huang and Wenxue Yu}, title = {A study of medical image tampering detection}, booktitle = {Proc. Int Medical Image Analysis and Clinical Applications (MIACA) Conf}, year = {2010}, pages = {131--134}}
-
Detecting Resized JPEG Images by Analyzing High Frequency Elements in DCT Coefficients
Proc. Sixth Int Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) Conf
2010, pp. 567-570
BibTeX@inproceedings{Yamasaki2010, author = {Yamasaki, Toshihiko and Matsunami, Tomoaki and Aizawa, Kiyoharu}, title = {Detecting Resized JPEG Images by Analyzing High Frequency Elements in DCT Coefficients}, booktitle = {Proc. Sixth Int Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) Conf}, year = {2010}, pages = {567--570}}
-
Detecting Double Compression of Audio Signal
SPIE Conference on Media Forensics and Security
2010
BibTeX@inproceedings{Yang2010, author = {Yang, Rui and Shi, Yun Qing and Huang, Jiwu}, title = {Detecting Double Compression of Audio Signal}, booktitle = {SPIE Conference on Media Forensics and Security}, year = {2010}}
-
Exposing Digital Image Forgeries by Using Canonical Correlation Analysis
Proc. 20th Int Pattern Recognition (ICPR) Conf
2010, pp. 838-841
BibTeX@inproceedings{Zhang2010b, author = {Chi Zhang and Hongbin Zhang}, title = {Exposing Digital Image Forgeries by Using Canonical Correlation Analysis}, booktitle = {Proc. 20th Int Pattern Recognition (ICPR) Conf}, year = {2010}, pages = {838--841}}
-
Identifying color image origin using curvelet transform
Proc. 17th IEEE Int Image Processing (ICIP) Conf
2010, pp. 2125-2128
BibTeX@inproceedings{Zhang2010c, author = {Zhang, Chi and Zhang, Hongbin}, title = {Identifying color image origin using curvelet transform}, booktitle = {Proc. 17th IEEE Int Image Processing (ICIP) Conf}, year = {2010}, pages = {2125--2128}}
-
Detecting and Extracting the Photo Composites Using Planar Homography and Graph Cut
IEEE Transactions on Information Forensics and Security, 2010, Vol. 5(3), pp. 544-555
BibTeX@article{Zhang2010, author = {Zhang, W. and Cao, X. and Qu, Y. and Hou, Y. and Zhao, H. and Zhang, C.}, title = {Detecting and Extracting the Photo Composites Using Planar Homography and Graph Cut}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2010}, volume = {5}, number = {3}, pages = {544--555}}
-
Detection of composite forged image
Proc. Int Computer Application and System Modeling (ICCASM) Conf
2010, Vol. 11
BibTeX@inproceedings{Zhang2010a, author = {Zhen Zhang and Zhou Yu and BaiNa Su}, title = {Detection of composite forged image}, booktitle = {Proc. Int Computer Application and System Modeling (ICCASM) Conf}, year = {2010}, volume = {11}}
-
Detecting Double Compressed JPEG Images by Using Moment Features of Mode Based DCT Histograms
Proc. Int Multimedia Technology (ICMT) Conf
2010, pp. 1-4
BibTeX@inproceedings{Zhao2010, author = {Feng Zhao and Zhenhua Yu and Shenghong Li}, title = {Detecting Double Compressed JPEG Images by Using Moment Features of Mode Based DCT Histograms}, booktitle = {Proc. Int Multimedia Technology (ICMT) Conf}, year = {2010}, pages = {1--4}}
-
Detecting Composite JPEG Images in Transform Domain
Proc. Int Multimedia Information Networking and Security (MINES) Conf
2010, pp. 340-344
BibTeX@inproceedings{Zheng2010, author = {Ergong Zheng and Xijian Ping and Tao Zhang}, title = {Detecting Composite JPEG Images in Transform Domain}, booktitle = {Proc. Int Multimedia Information Networking and Security (MINES) Conf}, year = {2010}, pages = {340--344}}
-
Digital spliced image forensics based on edge blur measurement
Proc. IEEE Int Information Theory and Information Security (ICITIS) Conf
2010, pp. 399-402
BibTeX@inproceedings{Zheng2010a, author = {Qianru Zheng and Wei Sun and Wei Lu}, title = {Digital spliced image forensics based on edge blur measurement}, booktitle = {Proc. IEEE Int Information Theory and Information Security (ICITIS) Conf}, year = {2010}, pages = {399--402}}
-
Image splicing detection based on image quality and analysis of variance
Proc. 2nd Int Education Technology and Computer (ICETC) Conf
2010, Vol. 4
BibTeX@inproceedings{Zhou2010, author = {Zhou, Zhi-ping and Zhang, Xiao-xiang}, title = {Image splicing detection based on image quality and analysis of variance}, booktitle = {Proc. 2nd Int Education Technology and Computer (ICETC) Conf}, year = {2010}, volume = {4}}
2009
-
Saliency detection for content-aware image resizing
Proc. 16th IEEE Int Image Processing (ICIP) Conf
2009, pp. 1005-1008
BibTeX@inproceedings{Achanta2009, author = {Achanta, R. and Susstrunk, S. }, title = {Saliency detection for content-aware image resizing}, booktitle = {Proc. 16th IEEE Int Image Processing (ICIP) Conf}, year = {2009}, pages = {1005--1008}}
-
Automatic noise estimation in images using local statistics. Additive and multiplicative cases
Image and Vision Computing , 2009, Vol. 27(6), pp. 756 - 770
BibTeX@article{Aja-Fernandez2009, author = {Santiago Aja-Fernández and Gonzalo Vegas-Sánchez-Ferrero and Marcos Martín-Fernández and Carlos Alberola-López}, title = {Automatic noise estimation in images using local statistics. Additive and multiplicative cases }, journal = {Image and Vision Computing }, year = {2009}, volume = {27}, number = {6}, pages = {756 - 770}}
-
Source Camera Identification for Heavily JPEG Compressed Low Resolution Still Images
Journal of Forensic Sciences, 2009, Vol. 54(3), pp. 628-638
BibTeX@article{Alles2009, author = {Alles, Erwin J. and Geradts, Zeno J. and Veenman, Cor. J.}, title = {Source Camera Identification for Heavily JPEG Compressed Low Resolution Still Images}, journal = {Journal of Forensic Sciences}, year = {2009}, volume = {54}, number = {3}, pages = {628-638}}
-
Analysis of denoising filters for photo response non uniformity noise extraction in source camera identification
DSP´09: Proceedings of the 16th international conference on Digital Signal Processing
IEEE Press, 2009, pp. 511-517
BibTeX@inproceedings{Amerini2009, author = {Amerini, Irene and Caldelli, Roberto and Cappellini, Vito and Picchioni, Francesco and Piva, Alessandro}, title = {Analysis of denoising filters for photo response non uniformity noise extraction in source camera identification}, booktitle = {DSP´09: Proceedings of the 16th international conference on Digital Signal Processing}, publisher = {IEEE Press}, year = {2009}, pages = {511--517}}
-
Detection of Duplicated Regions in Tampered Digital Images by Bit-Plane Analysis
Image Analysis and Processing
2009, pp. 893-901
BibTeX@inproceedings{Ardizzone2009, author = {Ardizzone, Edoardo and Mazzola, Giuseppe}, title = {Detection of Duplicated Regions in Tampered Digital Images by Bit-Plane Analysis}, booktitle = {Image Analysis and Processing}, year = {2009}, pages = {893-901}}
-
Identifying sensors from fingerprint images
Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition Workshops CVPR Workshops 2009
2009, pp. 78-84
BibTeX@inproceedings{Bartlow2009, author = {Bartlow, N. and Kalka, N. and Cukic, B. and Ross, A.}, title = {Identifying sensors from fingerprint images}, booktitle = {Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition Workshops CVPR Workshops 2009}, year = {2009}, pages = {78--84}}
-
Image Forensics of Digital Cameras by Analysing Image Variations Using Statistical Process Control
International Conference on Information, Communications and Signal Processing
2009
BibTeX@inproceedings{Bateman2009, author = {Bateman, Philip and Ho, Anthony T. S. and Woodward, Alan}, title = {Image Forensics of Digital Cameras by Analysing Image Variations Using Statistical Process Control}, booktitle = {International Conference on Information, Communications and Signal Processing}, year = {2009}}
-
Digital forgery estimation into DCT domain: a critical analysis
MiFor ´09: Proceedings of the First ACM workshop on Multimedia in forensics
ACM, 2009, pp. 37-42
BibTeX@inproceedings{Battiato2009, author = {Battiato, Sebastiano and Messina, Giuseppe}, title = {Digital forgery estimation into DCT domain: a critical analysis}, booktitle = {MiFor ´09: Proceedings of the First ACM workshop on Multimedia in forensics}, publisher = {ACM}, year = {2009}, pages = {37--42}}
-
Image Forensics
Università di Catania Dipartimento di Matematica ed Informatica Image Processing Laboratory, 2009
BibTeX@techreport{Battiato2009a, author = {Battiato, Sebastiano and Messina, Giuseppe and Rizzo, Rosetta}, title = {Image Forensics}, year = {2009}}
-
An efficient and robust method for detecting copy-move forgery
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2009
2009, pp. 1053-1056
BibTeX@inproceedings{Bayram2009, author = {Bayram, S. and Sencar, H. T. and Memon, N.}, title = {An efficient and robust method for detecting copy-move forgery}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2009}, year = {2009}, pages = {1053--1056}}
-
Multimedia-Forensik als Teildisziplin der digitalen Forensik
Fischer, S., Maehle, E. & Reischuk, R. (ed.)
Informatik 2009, Im Fokus das Leben, 28.9.-2.10.2009, Lübeck,
2009, Vol. 154
BibTeX@conference{Boehme2009, author = {Böhme, R. and Freiling, F. and Gloe, T. and Kirchner, M.}, title = {Multimedia-Forensik als Teildisziplin der digitalen Forensik}, booktitle = {Informatik 2009, Im Fokus das Leben, 28.9.-2.10.2009, Lübeck,}, year = {2009}, volume = {154}}
-
Multimedia Forensics is not Computer Forensics
Geradts, Z. J., Franke, K. Y. & Veenman, C. J. (ed.)
Third International Workshop on Computational Forensics
2009, pp. 90-103
BibTeX@inproceedings{Bohme2009, author = {Böhme, Rainer and Freiling, Felix and Gloe, Thomas and Kirchner, Matthias}, title = {Multimedia Forensics is not Computer Forensics}, booktitle = {Third International Workshop on Computational Forensics}, year = {2009}, pages = {90-103}}
-
The Essential Guide to Image Processing
Academic Press, 2009
BibTeX@book{Bovik2009, author = {Bovik, Al}, title = {The Essential Guide to Image Processing}, publisher = {Academic Press}, year = {2009}}
-
Passive Forensic Method for Detecting Duplicated Regions Affected by Reflection, Rotation and Scaling
Proceedings of the 17th European Signal Processing Conference (EUSIPCO 2009)
2009, pp. 824-828
BibTeX@inproceedings{Bravo-Solorio2009, author = {Bravo-Solorio, Sergio and Nandi, Asoke K.}, title = {Passive Forensic Method for Detecting Duplicated Regions Affected by Reflection, Rotation and Scaling}, booktitle = {Proceedings of the 17th European Signal Processing Conference (EUSIPCO 2009)}, year = {2009}, pages = {824-828}}
-
Passive Method for Detecting Duplicated Regions Affected by Reflection, Rotation and Scaling
European Signal Processing Conference
2009, pp. 824-828
BibTeX@inproceedings{Bravo-Solorio2009a, author = {Bravo-Solorio, Sergio and Nandi, Asoke K.}, title = {Passive Method for Detecting Duplicated Regions Affected by Reflection, Rotation and Scaling}, booktitle = {European Signal Processing Conference}, year = {2009}, pages = {824-828}}
-
Geometric Distortion Signatures for Printer Identification
IEEE International Conference on Acoustics, Speech, and Signal Processing
2009, pp. 1401-1404
BibTeX@inproceedings{Bulan2009, author = {Bulan, Orhan and Mao, Junwen and Sharma, Gaurav}, title = {Geometric Distortion Signatures for Printer Identification}, booktitle = {IEEE International Conference on Acoustics, Speech, and Signal Processing}, year = {2009}, pages = {1401-1404}}
-
Forensics in Telecommunications, Information and Multimedia
Sorell, M. (ed.)
Forensics in Telecommunications, Information and Multimedia
Chapter Distinguishing between Camera and Scanned Images by Means of Frequency Analysis
Springer Berlin Heidelberg, 2009, pp. 95-+
BibTeX@inbook{Caldelli2009, author = {Caldelli, R. and Amerini, I. and Picchioni, F.}, title = {Forensics in Telecommunications, Information and Multimedia}, booktitle = {Forensics in Telecommunications, Information and Multimedia}, publisher = {Springer Berlin Heidelberg}, year = {2009}, pages = {95-+}}
-
Distinguishing Between Camera and Scanned Images by Means of Frequency Analysis
Sorell, M. (ed.)
International Conference on Forensics in Telecommunications, Information and Multimedia
2009
BibTeX@inproceedings{Caldelli2009c, author = {Caldelli, Roberto and Amerini, Irene and Picchioni, Francesco}, title = {Distinguishing Between Camera and Scanned Images by Means of Frequency Analysis}, booktitle = {International Conference on Forensics in Telecommunications, Information and Multimedia}, year = {2009}}
-
Multimedia Forensics: Technologies for Imagery Investigation
Electronic Information, the Visual Arts and Beyond
2009, pp. 87-92
BibTeX@inproceedings{Caldelli2009a, author = {Caldelli, Roberto and Amerini, Irene and Picchioni, Francesco and Rosa, Alessia De and Cappellini, Vito}, title = {Multimedia Forensics: Technologies for Imagery Investigation}, booktitle = {Electronic Information, the Visual Arts and Beyond}, year = {2009}, pages = {87-92}}
-
Detection of image sharpening based on histogram aberration and ringing artifacts
ICME´09: Proceedings of the 2009 IEEE international conference on Multimedia and Expo
IEEE Press, 2009, pp. 1026-1029
BibTeX@inproceedings{Cao2009b, author = {Cao, Gang and Zhao, Yao and Ni, Rongrong}, title = {Detection of image sharpening based on histogram aberration and ringing artifacts}, booktitle = {ICME´09: Proceedings of the 2009 IEEE international conference on Multimedia and Expo}, publisher = {IEEE Press}, year = {2009}, pages = {1026--1029}}
-
RAW Tool Identification Though Detected Demosaicing Regularity
Proc. 16th IEEE Int Image Processing (ICIP) Conf, 2009
2009
BibTeX@inproceedings{Cao2009, author = {Cao, Hong and Kot, Alex C}, title = {RAW Tool Identification Though Detected Demosaicing Regularity}, booktitle = {Proc. 16th IEEE Int Image Processing (ICIP) Conf, 2009}, year = {2009}}
-
Accurate detection of demosaicing regularity for digital image forensics
Trans. Info. For. Sec., IEEE Press, 2009, Vol. 4(4), pp. 899-910
BibTeX@article{Cao2009a, author = {Cao, Hong and Kot, Alex C.}, title = {Accurate detection of demosaicing regularity for digital image forensics}, journal = {Trans. Info. For. Sec.}, publisher = {IEEE Press}, year = {2009}, volume = {4}, number = {4}, pages = {899--910}}
-
Identifying computer generated and digital camera images using fractional lower order moments
Proc. 4th IEEE Conf. Industrial Electronics and Applications ICIEA 2009
2009, pp. 230-235
BibTeX@inproceedings{Chen2009, author = {Dongmei Chen and Jianhua Li and Shilin Wang and Shenghong Li}, title = {Identifying computer generated and digital camera images using fractional lower order moments}, booktitle = {Proc. 4th IEEE Conf. Industrial Electronics and Applications ICIEA 2009}, year = {2009}, pages = {230--235}}
-
Noise brush: interactive high quality image-noise separation
ACM Transactions on Graphics, 2009, Vol. 28, pp. 146:1-146:10
BibTeX@article{Chen2009b, author = {Chen, Jia and Tang, Chi-Keung and Wang, Jue}, title = {Noise brush: interactive high quality image-noise separation}, journal = {ACM Transactions on Graphics}, year = {2009}, volume = {28}, pages = {146:1--146:10}}
-
Digital Camera Imaging System Simulation
IEEE Transactions on Electron Devices, 2009, Vol. 56(11), pp. 2496-2505
BibTeX@article{Chen2009c, author = {Junqing Chen and Venkataraman, K. and Bakin, D. and Rodricks, B. and Gravelle, R. and Rao, P. and Yongshen Ni}, title = {Digital Camera Imaging System Simulation}, journal = {IEEE Transactions on Electron Devices}, year = {2009}, volume = {56}, number = {11}, pages = {2496--2505}}
-
Detecting Doubly Compressed Images Based on Quantization Noise Model and Image Restoration
IEEE Workshop on Multimedia Signal Processing
2009
BibTeX@inproceedings{Chen2009a, author = {Chen, Yi-Lei and Hsu, Chiou-Ting}, title = {Detecting Doubly Compressed Images Based on Quantization Noise Model and Image Restoration}, booktitle = {IEEE Workshop on Multimedia Signal Processing}, year = {2009}}
-
Printer and Scanner Forensics
IEEE Signal Processing Magazine, 2009, Vol. 26(2), pp. 72-83
BibTeX@article{Chiang2009, author = {Chiang, Pei-Ju and Khanna, Nitin and Mikkilineni, Aravind K. and Segovia, Maria V. Ortiz and Suh, Sungjoo and Allebach, Jan P. and Chiu, George T.-C. and Delp, Edward J.}, title = {Printer and Scanner Forensics}, journal = {IEEE Signal Processing Magazine}, year = {2009}, volume = {26}, number = {2}, pages = {72-83}}
-
Color Laser Printer Identification by Analyzing Statistical Features on Discrete Wavelet Transform
IEEE International Conference on Image Processing
2009, pp. 1505-1508
BibTeX@inproceedings{Choi2009, author = {Choi, Jung-Ho and Im, Dong-Hyuck and Lee, Hae-Yeoun and Oh, Jun-Taek and Ryu, Jin-Ho and Lee, Heung-Kyu}, title = {Color Laser Printer Identification by Analyzing Statistical Features on Discrete Wavelet Transform}, booktitle = {IEEE International Conference on Image Processing}, year = {2009}, pages = {1505-1508}}
-
Tampering identification using Empirical Frequency Response
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2009
2009, pp. 1517-1520
BibTeX@inproceedings{Chuang2009, author = {Wei-Hong Chuang and Swaminathan, A. and Min Wu}, title = {Tampering identification using Empirical Frequency Response}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2009}, year = {2009}, pages = {1517--1520}}
-
Detecting and eliminating chromatic aberration in digital images
Proc. 16th IEEE Int Image Processing (ICIP) Conf
2009, pp. 3905-3908
BibTeX@inproceedings{Chung2009, author = {Soon-Wook Chung and Byoung-Kwang Kim and Woo-Jin Song}, title = {Detecting and eliminating chromatic aberration in digital images}, booktitle = {Proc. 16th IEEE Int Image Processing (ICIP) Conf}, year = {2009}, pages = {3905--3908}}
-
MP3Bit Rate Quality Detection Through Frequency Spectrum Analysis
ACM Proceedings of the Multimedia and Security Workshop
2009, pp. 57-62
BibTeX@inproceedings{DAlessandro2009, author = {DAlessandro, Brian and Shi, Yun Qing}, title = {MP3Bit Rate Quality Detection Through Frequency Spectrum Analysis}, booktitle = {ACM Proceedings of the Multimedia and Security Workshop}, year = {2009}, pages = {57-62}}
-
Gaussian Variogram Model for Printing Technology Identification
Proc. Third Asia Int. Conf. Modelling & Simulation AMS ´09
2009, pp. 320-325
BibTeX@inproceedings{Devi2009, author = {Devi, M. U. and Agarwal, A. and Rao, C. R.}, title = {Gaussian Variogram Model for Printing Technology Identification}, booktitle = {Proc. Third Asia Int. Conf. Modelling & Simulation AMS ´09}, year = {2009}, pages = {320--325}}
-
Image tamper detection based on demosaicing artifacts
Proc. 16th IEEE Int Image Processing (ICIP) Conf
2009, pp. 1497-1500
BibTeX@inproceedings{Dirik2009, author = {Dirik, A. E. and Memon, N.}, title = {Image tamper detection based on demosaicing artifacts}, booktitle = {Proc. 16th IEEE Int Image Processing (ICIP) Conf}, year = {2009}, pages = {1497--1500}}
-
Flatbed Scanner Identification Based on Dust and Scratches Over Scanner Platen
IEEE International Conference on Acoustics, Speech, and Signal Processing
2009, pp. 1385-1388
BibTeX@inproceedings{Dirik2009a, author = {Dirik, Ahmet Emir and Sencar, Husrev T. and Memon, Nasir}, title = {Flatbed Scanner Identification Based on Dust and Scratches Over Scanner Platen}, booktitle = {IEEE International Conference on Acoustics, Speech, and Signal Processing}, year = {2009}, pages = {1385-1388}}
-
A pixel-based digital photo authentication framework via demosaicking inter-pixel correlation
MM&38;Sec ´09: Proceedings of the 11th ACM workshop on Multimedia and security
ACM, 2009, pp. 125-130
BibTeX@inproceedings{Fan2009, author = {Fan, Na and Jin, Cheng and Huang, Yizhen}, title = {A pixel-based digital photo authentication framework via demosaicking inter-pixel correlation}, booktitle = {MM&38;Sec ´09: Proceedings of the 11th ACM workshop on Multimedia and security}, publisher = {ACM}, year = {2009}, pages = {125--130}}
-
Source Class Identification for DSLR and Compact Cameras
IEEE Workshop on Multimedia Signal Processing
2009
BibTeX@inproceedings{Fang2009b, author = {Fang, Yanmei and Dirik, Ahmet Emir and Sun, Xiaoxi and Memon, Nasir}, title = {Source Class Identification for DSLR and Compact Cameras}, booktitle = {IEEE Workshop on Multimedia Signal Processing}, year = {2009}}
-
Image Splicing Detection Using Camera Characteristic Inconsistency
Proc. Int. Conf. Multimedia Information Networking and Security MINES ´09
2009, Vol. 1, pp. 20-24
BibTeX@inproceedings{Fang2009, author = {Zhen Fang and Shuozhong Wang and Xinpeng Zhang}, title = {Image Splicing Detection Using Camera Characteristic Inconsistency}, booktitle = {Proc. Int. Conf. Multimedia Information Networking and Security MINES ´09}, year = {2009}, volume = {1}, pages = {20--24}}
-
Advances in Computers
Zelkowitz, M. (ed.)
Chapter Photo Fakery and Forensics
Elsevier, 2009, Vol. 77, pp. 1-55
BibTeX@inbook{Farid2009h, author = {Farid, Hany}, title = {Advances in Computers}, publisher = {Elsevier}, year = {2009}, volume = {77}, pages = {1-55}}
-
Image forgery detection
IEEE Signal Processing Magazine, 2009, Vol. 26(2), pp. 16-25
BibTeX@article{Farid2009, author = {Farid, Hany}, title = {Image forgery detection}, journal = {IEEE Signal Processing Magazine}, year = {2009}, volume = {26}, number = {2}, pages = {16--25}}
-
Seeing is not believing
IEEE Spectrum, 2009, Vol. 46(8), pp. 44-51
BibTeX@article{Farid2009a, author = {Farid, Hany}, title = {Seeing is not believing}, journal = {IEEE Spectrum}, year = {2009}, volume = {46}, number = {8}, pages = {44--51}}
-
Exposing Digital Forgeries From JPEG Ghosts
IEEE Transactions on Information Forensics and Security, 2009, Vol. 4(1), pp. 154-160
BibTeX@article{Farid2009b, author = {Farid, Hany}, title = {Exposing Digital Forgeries From JPEG Ghosts}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2009}, volume = {4}, number = {1}, pages = {154--160}}
-
A Survey of Image Forgery Detection
IEEE Signal Processing Magazine, 2009, Vol. 2(26), pp. 16-25
BibTeX@article{Farid2009d, author = {Farid, Hany}, title = {A Survey of Image Forgery Detection}, journal = {IEEE Signal Processing Magazine}, year = {2009}, volume = {2}, number = {26}, pages = {16-25}}
-
The Lee Harvey Oswald Backyard Photos: Real or Fake?
Perception, 2009, Vol. 11(38), pp. 1731-1734
BibTeX@article{Farid2009f, author = {Farid, Hany}, title = {The Lee Harvey Oswald Backyard Photos: Real or Fake?}, journal = {Perception}, year = {2009}, volume = {11}, number = {38}, pages = {1731-1734}}
-
Deception: Methods, Motives, Contexts and Consequences
Chapter Digital Doctoring: can we trust photographs?
Stanford University Press, 2009, pp. 95-108
BibTeX@inbook{Farid2009g, author = {Farid, Hany}, title = {Deception: Methods, Motives, Contexts and Consequences}, publisher = {Stanford University Press}, year = {2009}, pages = {95-108}}
-
Stochastic Image Denoising
Proceedings of the British Machine Vision Conference (BMVC)
2009
BibTeX@inproceedings{Estrada2009, author = {Francisco Estrada, David Fleet and Allan Jepson}, title = {Stochastic Image Denoising}, booktitle = {Proceedings of the British Machine Vision Conference (BMVC)}, year = {2009}}
-
Digital Image Forensics Using Sensor Noise
IEEE Signal Processing Magazine, 2009, Vol. 26(2), pp. 26-37
BibTeX@article{Fridrich2009, author = {Jessica Fridrich}, title = {Digital Image Forensics Using Sensor Noise}, journal = {IEEE Signal Processing Magazine}, year = {2009}, volume = {26}, number = {2}, pages = {26--37}}
-
Digital Image Forensics
IEEE Signal Processing Magazine, 2009, Vol. 26(2), pp. 26-37
BibTeX@article{Fridrich2009a, author = {Fridrich, J.}, title = {Digital Image Forensics}, journal = {IEEE Signal Processing Magazine}, year = {2009}, volume = {26}, number = {2}, pages = {26--37}}
-
Printer-scanner identification via analysis of structured security deterrents
Proceedings of the 2009 First IEEE International Workshop on Information Forensics and Security
2009, pp. 151-155
BibTeX@inproceedings{Gaubatz2009, author = {Matthew D. Gaubatz and Steven J. Simske}, title = {Printer-scanner identification via analysis of structured security deterrents}, booktitle = {Proceedings of the 2009 First IEEE International Workshop on Information Forensics and Security}, year = {2009}, pages = {151--155}}
-
A Low-complexity Reduced-reference Print Identification Algorithm
IEEE International Conference on Image Processing
2009, pp. 1281-1284
BibTeX@inproceedings{Gaubatz2009a, author = {Gaubatz, Matthew D. and Ulichney, Robert and Rouse, David}, title = {A Low-complexity Reduced-reference Print Identification Algorithm}, booktitle = {IEEE International Conference on Image Processing}, year = {2009}, pages = {1281-1284}}
-
Feature-Based Camera Model Identification Works in Practice: Results of a Comprehensive Evaluation Study
Katzenbeisser, S. & Sadeghi, A.-R. (ed.)
International Workshop on Information Hiding
2009, pp. 262-276
BibTeX@inproceedings{Gloe2009, author = {Gloe, Thomas and Borowka, Karsten and Winkler, Antje}, title = {Feature-Based Camera Model Identification Works in Practice: Results of a Comprehensive Evaluation Study}, booktitle = {International Workshop on Information Hiding}, year = {2009}, pages = {262-276}}
-
High-profile forensic analysis of images
Proc. rd Int Crime Detection and Prevention (ICDP 2009) Conf
2009, pp. 1-6
BibTeX@inproceedings{Goldenstein2009, author = {Goldenstein, Siome and Rocha, Anderson}, title = {High-profile forensic analysis of images}, booktitle = {Proc. rd Int Crime Detection and Prevention (ICDP 2009) Conf}, year = {2009}, pages = {1--6}}
-
The Split Bregman Method for L1-Regularized Problems
SIAM Journal on Imaging Sciences, SIAM, 2009, Vol. 2(2), pp. 323-343
BibTeX@article{Goldstein2009, author = {Tom Goldstein and Stanley Osher}, title = {The Split Bregman Method for L1-Regularized Problems}, journal = {SIAM Journal on Imaging Sciences}, publisher = {SIAM}, year = {2009}, volume = {2}, number = {2}, pages = {323-343}}
-
Digital Camera Identification from Images - Estimating False Acceptance Probability
Digital Watermarking, Springer-Verlag, 2009, Vol. 5450/2009, pp. 454-468
BibTeX@article{Goljan2009, author = {Goljan, Miroslav}, title = {Digital Camera Identification from Images - Estimating False Acceptance Probability}, journal = {Digital Watermarking}, publisher = {Springer-Verlag}, year = {2009}, volume = {5450/2009}, pages = {454--468}}
-
Large Scale Test of Sensor Fingerprint Camera Identification
SPIE Conference on Media Forensics and Security
2009
BibTeX@inproceedings{Goljan2009a, author = {Goljan, Miroslav and Fridrich, Jessica and Filler, Tomáš}, title = {Large Scale Test of Sensor Fingerprint Camera Identification}, booktitle = {SPIE Conference on Media Forensics and Security}, year = {2009}}
-
Intrinsic Sensor Noise Features for Forensic Analysis on Scanners and Scanned Images
IEEE Transactions on Information Forensics and Security, 2009, Vol. 4(3), pp. 476-491
BibTeX@article{Gou2009, author = {Hongmei Gou and Swaminathan, A. and Min Wu}, title = {Intrinsic Sensor Noise Features for Forensic Analysis on Scanners and Scanned Images}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2009}, volume = {4}, number = {3}, pages = {476--491}}
-
Forensic Speech and Audio Analysis Working Group - Best Practice Guidelines for ENF Analysis in Forensic Authentication of Digital Evidence
2009
BibTeX@misc{Grigoras2009, author = {Grigoras, Catalin and Cooper, Alan and Michalek, Marcin}, title = {Forensic Speech and Audio Analysis Working Group - Best Practice Guidelines for ENF Analysis in Forensic Authentication of Digital Evidence}, year = {2009}}
-
Source Cell Phone Camera Identification Based on Singular Value Decomposition
IEEE Workshop on Information Forensics and Security
2009, pp. 171-175
BibTeX@inproceedings{Gul2009, author = {Gül, Gökhan and Avcibas, Ismail}, title = {Source Cell Phone Camera Identification Based on Singular Value Decomposition}, booktitle = {IEEE Workshop on Information Forensics and Security}, year = {2009}, pages = {171-175}}
-
Using the ENF Criterion for Determining the Time of Recording of Short Digital Audio Recordings
Geradts, Z. J., Franke, K. Y. & Veenman, C. J. (ed.)
International Workshop on Computational Forensics
2009, pp. 116-124
BibTeX@inproceedings{Huijbregtse2009, author = {Huijbregtse, Maarten and Geradts, Zeno J.}, title = {Using the ENF Criterion for Determining the Time of Recording of Short Digital Audio Recordings}, booktitle = {International Workshop on Computational Forensics}, year = {2009}, pages = {116-124}}
-
Digital Camera Identification
2009
BibTeX@misc{Jenkins2009, author = {Jenkins, Neil}, title = {Digital Camera Identification}, year = {2009}}
-
Image Denoising Using Adaptive Threshold Based on Second Generation Bandelets Transform
Proc. Int. Forum Computer Science-Technology and Applications IFCSTA ´09
2009, Vol. 1, pp. 444-447
BibTeX@inproceedings{Jiaxue2009, author = {Liu Jiaxue and Guo Lei}, title = {Image Denoising Using Adaptive Threshold Based on Second Generation Bandelets Transform}, booktitle = {Proc. Int. Forum Computer Science-Technology and Applications IFCSTA ´09}, year = {2009}, volume = {1}, pages = {444--447}}
-
Blind Detection of Digital Forgeries Using Detection Trace of Eclosion
Proc. Int. Conf. Computational Intelligence and Software Engineering CiSE 2009
2009, pp. 1-4
BibTeX@inproceedings{Jing2009, author = {Tao Jing and Yuefeng Peng and Feifei Zhang and Yan Huo}, title = {Blind Detection of Digital Forgeries Using Detection Trace of Eclosion}, booktitle = {Proc. Int. Conf. Computational Intelligence and Software Engineering CiSE 2009}, year = {2009}, pages = {1--4}}
-
Image deblurring and denoising using color priors
Proc. IEEE Conf. Computer Vision and Pattern Recognition CVPR 2009
2009, pp. 1550-1557
BibTeX@inproceedings{Joshi2009, author = {Joshi, N. and Zitnick, C. L. and Szeliski, R. and Kriegman, D. J. }, title = {Image deblurring and denoising using color priors}, booktitle = {Proc. IEEE Conf. Computer Vision and Pattern Recognition CVPR 2009}, year = {2009}, pages = {1550--1557}}
-
Image Source Separation Using Color Channel Dependencies
Adali, T., Jutten, C., Romano, J. & Barros, A. (ed.)
Independent Component Analysis and Signal Separation
Springer Berlin / Heidelberg, 2009, Vol. 5441, pp. 499-506
BibTeX@incollection{Kayabol2009, author = {Kayabol, Koray and Kuruoglu, Ercan and Sankur, Bulent}, title = {Image Source Separation Using Color Channel Dependencies}, booktitle = {Independent Component Analysis and Signal Separation}, publisher = {Springer Berlin / Heidelberg}, year = {2009}, volume = {5441}, pages = {499-506}}
-
Detecting Photographic Composites of Famous People
Department of Computer Science, Dartmouth College, 2009(TR2009-656)
BibTeX@techreport{Kee2009, author = {Kee, Eric and Farid, Hany}, title = {Detecting Photographic Composites of Famous People}, year = {2009}, number = {TR2009-656}}
-
Source Scanner Identification for Scanned Documents
IEEE Workshop on Information Forensics and Security
2009, pp. 166-170
BibTeX@inproceedings{Khanna2009c, author = {Khanna, Nitin and Delp, Edward J.}, title = {Source Scanner Identification for Scanned Documents}, booktitle = {IEEE Workshop on Information Forensics and Security}, year = {2009}, pages = {166-170}}
-
Scanner Identification Using Feature-Based Processing and Analysis
IEEE Transactions on Information Forensics and Security, 2009, Vol. 4(1), pp. 123-139
BibTeX@article{Khanna2009, author = {Khanna, N. and Mikkilineni, A. K. and Delp, E. J.}, title = {Scanner Identification Using Feature-Based Processing and Analysis}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2009}, volume = {4}, number = {1}, pages = {123--139}}
-
Forensic Camera Classification: Verification of Sensor Pattern Noise Approach
Forensic Science Communications, 2009, Vol. 11(1), pp. 10
BibTeX@article{Khanna2009b, author = {Khanna, Nitin and Mikkilineni, Aravind K. and Delp, Edward J.}, title = {Forensic Camera Classification: Verification of Sensor Pattern Noise Approach}, journal = {Forensic Science Communications}, year = {2009}, volume = {11}, number = {1}, pages = {10}}
-
A New Forensic Model And Its Application To The Collection, Extraction And Long Term Storage Of Screen Content Off A Memory Dump
International Conference on Digital Signal Processing
2009, pp. 1135-1140
BibTeX@inproceedings{Kiltz2009a, author = {Kiltz, Stefan and Hoppe, Tobias and Dittmann, Jana}, title = {A New Forensic Model And Its Application To The Collection, Extraction And Long Term Storage Of Screen Content Off A Memory Dump}, booktitle = {International Conference on Digital Signal Processing}, year = {2009}, pages = {1135-1140}}
-
Video Surveillance: A new forensic model for the forensically sound retrival of picture content off a memory dump
Fischer, S., Maehle, E. & Reischuk, R. (ed.)
Informatik2009 - Digitale Multimedia-Forensik
2009, pp. 1619-1633
BibTeX@inproceedings{Kiltz2009, author = {Kiltz, Stefan and Hoppe, Tobias and Dittmann, Jana and Vielhauer, Claus}, title = {Video Surveillance: A new forensic model for the forensically sound retrival of picture content off a memory dump}, booktitle = {Informatik2009 - Digitale Multimedia-Forensik}, year = {2009}, pages = {1619-1633}}
-
Synthesis of color filter array pattern in digital images
Proceedings of SPIE
2009, Vol. 7254, pp. 72540K
BibTeX@inproceedings{Kirchner2009, author = {Matthias Kirchner and Rainer Böhme}, title = {Synthesis of color filter array pattern in digital images}, booktitle = {Proceedings of SPIE}, year = {2009}, volume = {7254}, pages = {72540K}}
-
On resampling detection in re-compressed images
Proceedings of the 2009 First IEEE International Workshop on Information Forensics and Security
2009, pp. 21-25
BibTeX@inproceedings{Kirchner2009a, author = {Kirchner, Matthias and Gloe, Thomas}, title = {On resampling detection in re-compressed images}, booktitle = {Proceedings of the 2009 First IEEE International Workshop on Information Forensics and Security}, year = {2009}, pages = {21--25}}
-
Forensics in Telecommunications, Information and Multimedia
Sorell, M. (ed.)
Forensics in Telecommunications, Information and Multimedia (Proceedings of the International Conference on Forensics in Telecommunications, Information and Multimedia)
Chapter Analysis of Sensor Photo Response Non-Uniformity in RAW Images
Springer, 2009, pp. 130-141
BibTeX@inbook{Knight2009, author = {Knight, Simon and Moschou, Simon and Sorell, Matthew}, title = {Forensics in Telecommunications, Information and Multimedia}, booktitle = {Forensics in Telecommunications, Information and Multimedia (Proceedings of the International Conference on Forensics in Telecommunications, Information and Multimedia)}, publisher = {Springer}, year = {2009}, pages = {130-141}}
-
Detecting Video Forgeries Based on Noise Characteristics
Wada, T., Huang, F. & Lin, S. (ed.)
Advances in Image and Video Technology, Third Pacific Rim Symposium
2009, pp. 306-317
BibTeX@inproceedings{Kobayashi2009, author = {Kobayashi, Michihiro and Okabe, Takahiro and Sato, Yoichi}, title = {Detecting Video Forgeries Based on Noise Characteristics}, booktitle = {Advances in Image and Video Technology, Third Pacific Rim Symposium}, year = {2009}, pages = {306-317}}
-
Custom Design of JPEG Quantisation Tables for Compressing Iris Polar Images to Improve Recognition Accuracy
Tistarelli, M. & Nixon, M. (ed.)
Advances in Biometrics
Springer Berlin Heidelberg, 2009, Vol. 5558, pp. 1091-1101
BibTeX@incollection{Konrad2009, author = {Konrad, Mario and Stögner, Herbert and Uhl, Andreas}, title = {Custom Design of JPEG Quantisation Tables for Compressing Iris Polar Images to Improve Recognition Accuracy}, booktitle = {Advances in Biometrics}, publisher = {Springer Berlin Heidelberg}, year = {2009}, volume = {5558}, pages = {1091-1101}}
-
The application of intelligent system to digital image forensics
Proc. Int Machine Learning and Cybernetics Conf
2009, Vol. 5, pp. 2991-2998
BibTeX@inproceedings{Lai2009, author = {Cheng-Liang Lai and Yi-Shiang Chen}, title = {The application of intelligent system to digital image forensics}, booktitle = {Proc. Int Machine Learning and Cybernetics Conf}, year = {2009}, volume = {5}, pages = {2991--2998}}
-
Estimating natural illumination from a single outdoor image
Proc. IEEE 12th Int Computer Vision Conf
2009, pp. 183-190
BibTeX@inproceedings{Lalonde2009, author = {Lalonde, J.-F. and Efros, A. A. and Narasimhan, S. G.}, title = {Estimating natural illumination from a single outdoor image}, booktitle = {Proc. IEEE 12th Int Computer Vision Conf}, year = {2009}, pages = {183--190}}
-
Image and Video Fingerprinting: Forensic Applications
SPIE Conference on Media Forensics and Security
2009
BibTeX@inproceedings{Lefebvre2009, author = {Lefebvre, Frederic and Chupeau, Bertrand and Massoudi, Ayoub and Diehl, Eric}, title = {Image and Video Fingerprinting: Forensic Applications}, booktitle = {SPIE Conference on Media Forensics and Security}, year = {2009}}
-
Understanding and evaluating blind deconvolution algorithms
Proc. IEEE Conf. Computer Vision and Pattern Recognition CVPR 2009
2009, pp. 1964-1971
BibTeX@inproceedings{Levin2009, author = {Levin, A. and Weiss, Y. and Durand, F. and Freeman, W. T. }, title = {Understanding and evaluating blind deconvolution algorithms}, booktitle = {Proc. IEEE Conf. Computer Vision and Pattern Recognition CVPR 2009}, year = {2009}, pages = {1964--1971}}
-
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Sorell, M. (ed.)
Forensics in Telecommunications, Information and Multimedia
Chapter Detection of Block Artifacts for Digital Forensic Analysis
Springer Berlin Heidelberg, 2009, Vol. Volume 8, pp. 173-178
BibTeX@inbook{Li2009a, author = {Li, Chang-Tsun}, title = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, booktitle = {Forensics in Telecommunications, Information and Multimedia}, publisher = {Springer Berlin Heidelberg}, year = {2009}, volume = {Volume 8}, pages = {173-178}}
-
Detection of Block Artifacts for Digital Forensic Analysis
Sorell, M. (ed.)
International Conference on Forensics in Telecommunications, Information and Multimedia
2009, pp. 173-178
BibTeX@inproceedings{Li2009g, author = {Li, Chang-Tsun}, title = {Detection of Block Artifacts for Digital Forensic Analysis}, booktitle = {International Conference on Forensics in Telecommunications, Information and Multimedia}, year = {2009}, pages = {173-178}}
-
Source camera linking using enhanced sensor pattern noise extracted from images
IET Seminar Digests, IEE, 2009, Vol. 2009(2), pp. P46-P46
BibTeX@article{Li2009b, author = {Chang-Tsun Li}, title = {Source camera linking using enhanced sensor pattern noise extracted from images}, journal = {IET Seminar Digests}, publisher = {IEE}, year = {2009}, volume = {2009}, number = {2}, pages = {P46-P46}}
-
Source Camera Identification Using Enhanced Sensor Pattern Noise
IEEE International Conference on Image Processing
2009
BibTeX@inproceedings{Li2009e, author = {Li, Chang-Tsun}, title = {Source Camera Identification Using Enhanced Sensor Pattern Noise}, booktitle = {IEEE International Conference on Image Processing}, year = {2009}}
-
On the Repudiability of Device Identification and Image Integrity Verification Using Sensor Pattern Noise
International Conference on Information Security and Digital Forensics
2009, pp. 19-25
BibTeX@inproceedings{Li2009h, author = {Li, Chang-Tsun and Chang, Chih-Yuan and Li, Yue}, title = {On the Repudiability of Device Identification and Image Integrity Verification Using Sensor Pattern Noise}, booktitle = {International Conference on Information Security and Digital Forensics}, year = {2009}, pages = {19-25}}
-
TDI CCD non-uniformity correction algorithm
Proc. 4th IEEE Conf. Industrial Electronics and Applications ICIEA 2009
2009, pp. 1483-1487
BibTeX@inproceedings{Li2009f, author = {Tao Li and Mingyi He and Ning Lei and Chunmei Li and Qingyuan Wang}, title = {TDI CCD non-uniformity correction algorithm}, booktitle = {Proc. 4th IEEE Conf. Industrial Electronics and Applications ICIEA 2009}, year = {2009}, pages = {1483--1487}}
-
Passive Detection of Doctored JPEG Image Via Block Artifact Grid Extraction
IEEE Transactions on Signal Processing, 2009, Vol. 89(9), pp. 1821-1829
BibTeX@article{Li2009c, author = {Li, Weihai and Yuan, Yuan and Yu, Nenghai}, title = {Passive Detection of Doctored JPEG Image Via Block Artifact Grid Extraction}, journal = {IEEE Transactions on Signal Processing}, year = {2009}, volume = {89}, number = {9}, pages = {1821-1829}}
-
Decomposed Photo Response Non-Uniformity for Digital Forensic Analysis
Sorell, M. (ed.)
International Conference on Forensics in Telecommunications, Information and Multimedia
2009, pp. 166-172
BibTeX@inproceedings{Li2009d, author = {Li, Yue and Li, Chang-Tsun}, title = {Decomposed Photo Response Non-Uniformity for Digital Forensic Analysis}, booktitle = {International Conference on Forensics in Telecommunications, Information and Multimedia}, year = {2009}, pages = {166-172}}
-
Blind Detection of Digital Forgery Image Based on the Local Entropy of the Gradient
Digital Watermarking, Springer-Verlag, 2009, Vol. 5450/2009, pp. 161-169
BibTeX@article{Li2009, author = {Li, Zhe and Zheng, Jiang-Bin}, title = {Blind Detection of Digital Forgery Image Based on the Local Entropy of the Gradient}, journal = {Digital Watermarking}, publisher = {Springer-Verlag}, year = {2009}, volume = {5450/2009}, pages = {161--169}}
-
Image Fakery Detection Based on Singular Value Decomposition
Makara Seri Sains, 2009, Vol. 13(2), pp. 180-184
BibTeX@article{Liliana2009, author = {Liliana, Dewi Yanti and T. Basaruddin}, title = {Image Fakery Detection Based on Singular Value Decomposition}, journal = {Makara Seri Sains}, year = {2009}, volume = {13}, number = {2}, pages = {180-184}}
-
Fast copy-move forgery detection
WSEAS Trans. Sig. Proc., World Scientific and Engineering Academy and Society (WSEAS), 2009, Vol. 5(5), pp. 188-197
BibTeX@article{Lin2009, author = {Lin, Hwei-Jen and Wang, Chun-Wei and Kao, Yang-Ta}, title = {Fast copy-move forgery detection}, journal = {WSEAS Trans. Sig. Proc.}, publisher = {World Scientific and Engineering Academy and Society (WSEAS)}, year = {2009}, volume = {5}, number = {5}, pages = {188--197}}
-
An Efficient Method for Copy-Move Forgery Detection
Proceedings of the 8th WSEAS International Conference on Applied Computer and Applied Computational Science
2009
BibTeX@inproceedings{Lin2009a, author = {Lin, Hwei-Jen and Wang, Chun-Wei and Kao, Yang-Ta}, title = {An Efficient Method for Copy-Move Forgery Detection}, booktitle = {Proceedings of the 8th WSEAS International Conference on Applied Computer and Applied Computational Science}, year = {2009}}
-
Digital Image Forensics Using EM Algorithm
Muneesawang, P., Wu, F., Kumazawa, I., Roeksabutr, A., Liao, M. & Tang, X. (ed.)
Advances in Multimedia Information Processing - PCM 2009
Springer Berlin / Heidelberg, 2009, Vol. 5879, pp. 994-998
BibTeX@incollection{Lin2009c, author = {Lin, Tim-kun and Huang, Chung-Lin}, title = {Digital Image Forensics Using EM Algorithm}, booktitle = {Advances in Multimedia Information Processing - PCM 2009}, publisher = {Springer Berlin / Heidelberg}, year = {2009}, volume = {5879}, pages = {994-998}}
-
Digital Image Source Coder Forensics via Intrinsic Fingerprints
IEEE Transactions on Information Forensics and Security, 2009, Vol. 4(3), pp. 460-475
BibTeX@article{Lin2009e, author = {Lin, W. Sabrina and Tjoa, Steven and Zhao, H. Vicky and Liu, K. J. Ray}, title = {Digital Image Source Coder Forensics via Intrinsic Fingerprints}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2009}, volume = {4}, number = {3}, pages = {460-475}}
-
Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis
Pattern Recognition, 2009, Vol. 42(11), pp. 2492 - 2501
BibTeX@article{Lin2009b, author = {Zhouchen Lin and Junfeng He and Xiaoou Tang and Chi-Keung Tang}, title = {Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis}, journal = {Pattern Recognition}, year = {2009}, volume = {42}, number = {11}, pages = {2492 - 2501}}
-
A new approach for JPEG resize and image splicing detection
MiFor ´09: Proceedings of the First ACM workshop on Multimedia in forensics
ACM, 2009, pp. 43-48
BibTeX@inproceedings{Liu2009, author = {Liu, Qingzhong and Sung, Andrew H.}, title = {A new approach for JPEG resize and image splicing detection}, booktitle = {MiFor ´09: Proceedings of the First ACM workshop on Multimedia in forensics}, publisher = {ACM}, year = {2009}, pages = {43--48}}
-
Blind identification for digital images based on inconsistency of illuminant direction
Journal of Jilin University
2009, Vol. 27(3), pp. 293-298
BibTeX@inproceedings{Lu2009, author = {Lu, Ying-Da and Shen, Xuan-Jing and Chen, Hai-Peng and Wang, You-Wei}, title = {Blind identification for digital images based on inconsistency of illuminant direction}, booktitle = {Journal of Jilin University}, year = {2009}, volume = {27}, number = {3}, pages = {293-298}}
-
A Novel Method for Block Size Forensics Based on Morphological Operations
Lecture Notes In Computer Science, Springer-Verlag, 2009, Vol. 5450/2009, pp. 229-239
BibTeX@article{Luo2009, author = {Luo, Weiqi and Huang, Jiwu and Qiu, Guoping}, title = {A Novel Method for Block Size Forensics Based on Morphological Operations}, journal = {Lecture Notes In Computer Science}, publisher = {Springer-Verlag}, year = {2009}, volume = {5450/2009}, pages = {229--239}}
-
Identifying Image Authenticity by Detecting Inconsistency in Light Source Direction
Proc. Int. Conf. Information Engineering and Computer Science ICIECS 2009
2009, pp. 1-5
BibTeX@inproceedings{Lv2009, author = {Yingda Lv and Xuanjing Shen and Haipeng Chen}, title = {Identifying Image Authenticity by Detecting Inconsistency in Light Source Direction}, booktitle = {Proc. Int. Conf. Information Engineering and Computer Science ICIECS 2009}, year = {2009}, pages = {1--5}}
-
Detection and description of geometrically transformed digital images
Delp, E. J., Dittmann, J., Memon, N. D. & Wong, P. W. (ed.)
Proceedings of SPIE-IS&T Electronic Imaging: Media Forensics and Security XI
2009, Vol. 7254, pp. 72540J
BibTeX@inproceedings{Mahdian2009, author = {Babak Mahdian and Stanislav Saic}, title = {Detection and description of geometrically transformed digital images}, booktitle = {Proceedings of SPIE-IS&T Electronic Imaging: Media Forensics and Security XI}, year = {2009}, volume = {7254}, pages = {72540J}}
-
A Cyclostationarity Analysis Applied to Scaled Images
Leung C.S., Lee M., C. J. (ed.)
International Conference on Neural Information Processing (ICONIP 2009)
2009, Vol. 16
BibTeX@inproceedings{Mahdian2009d, author = {Babak Mahdian and Stanislav Saic}, title = {A Cyclostationarity Analysis Applied to Scaled Images}, booktitle = {International Conference on Neural Information Processing (ICONIP 2009)}, year = {2009}, volume = {16}}
-
Using noise inconsistencies for blind image forensics
Image and Vision Computing, 2009, Vol. 27, pp. 1497-1503
BibTeX@article{Mahdian2009a, author = {Mahdian, Babak and Saic, Stanislav}, title = {Using noise inconsistencies for blind image forensics}, journal = {Image and Vision Computing}, year = {2009}, volume = {27}, pages = {1497--1503}}
-
A cyclostationarity analysis applied to image forensics
Proc. Workshop Applications of Computer Vision (WACV)
2009, pp. 1-6
BibTeX@inproceedings{Mahdian2009b, author = {Mahdian, B. and Saic, S.}, title = {A cyclostationarity analysis applied to image forensics}, booktitle = {Proc. Workshop Applications of Computer Vision (WACV)}, year = {2009}, pages = {1--6}}
-
Detecting double compressed JPEG images
Proc. rd Int Crime Detection and Prevention (ICDP 2009) Conf
2009, pp. 1-6
BibTeX@inproceedings{Mahdian2009c, author = {Mahdian, Babak and Saic, Stanislav}, title = {Detecting double compressed JPEG images}, booktitle = {Proc. rd Int Crime Detection and Prevention (ICDP 2009) Conf}, year = {2009}, pages = {1--6}}
-
Device Temporal Forensics: An Information Theoretic Approach
IEEE International Conference on Image Processing
2009, pp. 1501-1504
BibTeX@inproceedings{Mao2009, author = {Mao, Junwen and Bulan, Orhan and Sharma, Gaurav and Datta, Suprakash}, title = {Device Temporal Forensics: An Information Theoretic Approach}, booktitle = {IEEE International Conference on Image Processing}, year = {2009}, pages = {1501-1504}}
-
An improved camera identification method based on the texture complexity and the image restoration
Proceedings of the 2009 International Conference on Hybrid Information Technology
ACM, 2009, Vol. 3(1), pp. 171-175
BibTeX@inproceedings{Matsushita2009, author = {Matsushita, Kazuya and Kitazawa, Hitoshi}, title = {An improved camera identification method based on the texture complexity and the image restoration}, booktitle = {Proceedings of the 2009 International Conference on Hybrid Information Technology}, publisher = {ACM}, year = {2009}, volume = {3}, number = {1}, pages = {171--175}}
-
Presented to Interpol Crime Against Children Group
Interpol Crime Against Children Group, Lyon, 25 March 2009
2009
BibTeX@conference{Messina2009, author = {Messina, Giuseppe}, title = {Presented to Interpol Crime Against Children Group}, booktitle = {Interpol Crime Against Children Group, Lyon, 25 March 2009}, year = {2009}}
-
Estimating Optimal Block Size for Copy-Move Attack Detection on Highly Textured Image
UNIVERSITI TEKNOLOGI MALAYSIA, 2009
BibTeX@mastersthesis{MohdShaid2009, author = {Mohd Shaid, Syed Zainudeen Bin}, title = {Estimating Optimal Block Size for Copy-Move Attack Detection on Highly Textured Image}, school = {UNIVERSITI TEKNOLOGI MALAYSIA}, year = {2009}}
-
Adding Gaussian Noise to "Denoise" JPEG for detecting Image Resizing
Proceedings of the International Conference on Image Processing 2009, Cairo, Egypt9
2009, pp. 1493-1496
BibTeX@inproceedings{Nataraj2009, author = {Lakshmanan Nataraj and Anindya Sarkar and B. S. Manjunath}, title = {Adding Gaussian Noise to "Denoise" JPEG for detecting Image Resizing}, booktitle = {Proceedings of the International Conference on Image Processing 2009, Cairo, Egypt9}, year = {2009}, pages = {1493--1496}}
-
Camera response function signature for digital forensics --- Part II: Signature extraction
Proceedings of the 2009 First IEEE International Workshop on Information Forensics and Security
2009, pp. 161-165
BibTeX@inproceedings{Ng2009a, author = {Tian-Tsong Ng}, title = {Camera response function signature for digital forensics --- Part II: Signature extraction}, booktitle = {Proceedings of the 2009 First IEEE International Workshop on Information Forensics and Security}, year = {2009}, pages = {161--165}}
-
Identifying and prefiltering images
IEEE Signal Processing Magazine, 2009, Vol. 26(2), pp. 49-58
BibTeX@article{Ng2009b, author = {Tian-Tsong Ng and Shih-Fu Chang}, title = {Identifying and prefiltering images}, journal = {IEEE Signal Processing Magazine}, year = {2009}, volume = {26}, number = {2}, pages = {49--58}}
-
Camera response function signature for digital forensics --- Part I: Theory and data selection
Proceedings of the 2009 First IEEE International Workshop on Information Forensics and Security
2009, pp. 156-160
BibTeX@inproceedings{Ng2009, author = {Tian-Tsong Ng and Mao-Pei Tsui}, title = {Camera response function signature for digital forensics --- Part I: Theory and data selection}, booktitle = {Proceedings of the 2009 First IEEE International Workshop on Information Forensics and Security}, year = {2009}, pages = {156--160}}
-
Image Manipulation as Research Misconduct
Science and Engineering Ethics, Springer Netherlands, 2009, Vol. 15, pp. 161-167
BibTeX@article{Parrish2009, author = {Parrish, Debra and Noonan, Bridget}, title = {Image Manipulation as Research Misconduct}, journal = {Science and Engineering Ethics}, publisher = {Springer Netherlands}, year = {2009}, volume = {15}, pages = {161-167}}
-
Detect Digital Image Splicing with Visual Cues
Katzenbeisser, S. & Sadeghi, A.-R. (ed.)
International Workshop on Information Hiding
2009, pp. 247-261
BibTeX@inproceedings{Qu2009, author = {Qu, Zhenhua and Qiu, Guoping and Huang, Jiwu}, title = {Detect Digital Image Splicing with Visual Cues}, booktitle = {International Workshop on Information Hiding}, year = {2009}, pages = {247-261}}
-
A Study of the Robustness of PRNU-Based Camera Identification
Delp, E. J., Dittmann, J., Memon, N. & Wong, P. W. (ed.)
SPIE Conference on Media Forensics and Security
2009
BibTeX@inproceedings{Rosenfeld2009, author = {Rosenfeld, Kurt and Sencar, Husrev T.}, title = {A Study of the Robustness of PRNU-Based Camera Identification}, booktitle = {SPIE Conference on Media Forensics and Security}, year = {2009}}
-
Feature Based Classification of Computer Graphics and Real Images
IEEE International Conference on Acoustics, Speech, and Signal Processing
2009, pp. 1513-1516
BibTeX@inproceedings{Sankar2009, author = {Sankar, Gopinath and Zhao, H. Vicky and Yang, Yee-Hong}, title = {Feature Based Classification of Computer Graphics and Real Images}, booktitle = {IEEE International Conference on Acoustics, Speech, and Signal Processing}, year = {2009}, pages = {1513-1516}}
-
Detection of seam carving and localization of seam insertions in digital images
MM&38;Sec ´09: Proceedings of the 11th ACM workshop on Multimedia and security
ACM, 2009, pp. 107-116
BibTeX@inproceedings{Sarkar2009, author = {Sarkar, Anindya and Nataraj, Lakshmanan and Manjunath, B. S.}, title = {Detection of seam carving and localization of seam insertions in digital images}, booktitle = {MM&38;Sec ´09: Proceedings of the 11th ACM workshop on Multimedia and security}, publisher = {ACM}, year = {2009}, pages = {107--116}}
-
Identification and recovery of JPEG files with missing fragments
Digital Investigation , 2009, Vol. 6, Supplement(0), pp. S88 - S98
BibTeX@article{Sencar2009, author = {Husrev T. Sencar and Nasir Memon}, title = {Identification and recovery of JPEG files with missing fragments }, journal = {Digital Investigation }, year = {2009}, volume = {6, Supplement}, number = {0}, pages = {S88 - S98}}
-
Detection of manipulated images
Wichita State University, 2009
BibTeX@mastersthesis{Senpathi2009, author = {Senpathi, Santoshi}, title = {Detection of manipulated images}, school = {Wichita State University}, year = {2009}}
-
Copy-Move Forgery Detection Algorithm for Digital Images and a New Accuracy Metric
International Journal of Recent Trends in Engineering,, 2009, Vol. 2(2), pp. 159-161
BibTeX@article{Shahid2009, author = {Shahid, Tehseen and Bin Mansoor, Atif}, title = {Copy-Move Forgery Detection Algorithm for Digital Images and a New Accuracy Metric}, journal = {International Journal of Recent Trends in Engineering,}, year = {2009}, volume = {2}, number = {2}, pages = {159--161}}
-
Image Self-Embedding Technology Research Based on Discrete Cosine Transform
Proc. Int. Conf. Networks Security, Wireless Communications and Trusted Computing NSWCTC ´09
2009, Vol. 1, pp. 42-46
BibTeX@inproceedings{Shengbing2009, author = {Che Shengbing and Che Zuguo and Huang Qiangbo and Yu Shaojun}, title = {Image Self-Embedding Technology Research Based on Discrete Cosine Transform}, booktitle = {Proc. Int. Conf. Networks Security, Wireless Communications and Trusted Computing NSWCTC ´09}, year = {2009}, volume = {1}, pages = {42--46}}
-
Forensic Detection of Image Tampering Using Intrinsic Statistical Fingerprints in Histograms
Proc. APSIPA Annual Summit and Conference
2009
BibTeX@inproceedings{Stamm2009, author = {Stamm, Matthew and Liu, K. J. Ray}, title = {Forensic Detection of Image Tampering Using Intrinsic Statistical Fingerprints in Histograms}, booktitle = {Proc. APSIPA Annual Summit and Conference}, year = {2009}}
-
Computer Graphics Classification Based on Markov Process Model and Boosting Feature Selection Technique
IEEE International Conference on Image Processing
2009, pp. 2913-2916
BibTeX@inproceedings{Sutthiwan2009a, author = {Sutthiwan, Patchara and Cai, Xiao and Shi, Yun Qing and Zhang, Hong}, title = {Computer Graphics Classification Based on Markov Process Model and Boosting Feature Selection Technique}, booktitle = {IEEE International Conference on Image Processing}, year = {2009}, pages = {2913-2916}}
-
An Enhanced Statistical Approach to Identifying Photorealistic Images
Ho, A. T. S., Shi, Y. Q., Kim, H.-J. & Barni, M. (ed.)
International Workshop on Digital Watermarking
2009, pp. 323-335
BibTeX@inproceedings{Sutthiwan2009, author = {Sutthiwan, Patchara and Ye, Jingyu and Shi, Yun Qing}, title = {An Enhanced Statistical Approach to Identifying Photorealistic Images}, booktitle = {International Workshop on Digital Watermarking}, year = {2009}, pages = {323-335}}
-
Component forensics
IEEE Signal Processing Magazine, 2009, Vol. 26(2), pp. 38-48
BibTeX@article{Swaminathan2009, author = {Swaminathan, Ashwin and Min Wu and Liu, K. J. R.}, title = {Component forensics}, journal = {IEEE Signal Processing Magazine}, year = {2009}, volume = {26}, number = {2}, pages = {38--48}}
-
Hash-Based Identification of Sparse Image Tampering
IEEE Transactions on Image Processing, 2009, Vol. 18(11), pp. 2491-2504
BibTeX@article{Tagliasacchi2009, author = {Tagliasacchi, Marco and Valenzise, Giuseppe and Tubaro, Stefano }, title = {Hash-Based Identification of Sparse Image Tampering}, journal = {IEEE Transactions on Image Processing}, year = {2009}, volume = {18}, number = {11}, pages = {2491--2504}}
-
Copy-Move Forgery Detection Based on SVD in Digital Image
Proc. 2nd Int. Congress Image and Signal Processing CISP ´09
2009, pp. 1-5
BibTeX@inproceedings{Ting2009a, author = {Zhang Ting and Wang Rang-ding}, title = {Copy-Move Forgery Detection Based on SVD in Digital Image}, booktitle = {Proc. 2nd Int. Congress Image and Signal Processing CISP ´09}, year = {2009}, pages = {1--5}}
-
Doctored JPEG image detection based on double compression features analysis
Proc. ISECS Int. Colloquium Computing, Communication, Control, and Management CCCM 2009
2009, Vol. 2, pp. 76-80
BibTeX@inproceedings{Ting2009b, author = {Zhang Ting and Wang Rangding}, title = {Doctored JPEG image detection based on double compression features analysis}, booktitle = {Proc. ISECS Int. Colloquium Computing, Communication, Control, and Management CCCM 2009}, year = {2009}, volume = {2}, pages = {76--80}}
-
Copy-Move Forgery Detection Based on SVD in Digital Image
Proc. 2nd Int. Congress Image and Signal Processing CISP ´09
2009, pp. 1-5
BibTeX@inproceedings{Ting2009, author = {Ting, Zhang and Rang-ding, Wang}, title = {Copy-Move Forgery Detection Based on SVD in Digital Image}, booktitle = {Proc. 2nd Int. Congress Image and Signal Processing CISP ´09}, year = {2009}, pages = {1--5}}
-
Fundamentals of Three-Dimensional Digital Image Processing
Springer, 2009
BibTeX@book{Toriwaki2009, author = {Junichiro Toriwaki and Hiroyuki Yoshida}, title = {Fundamentals of Three-Dimensional Digital Image Processing}, publisher = {Springer}, year = {2009}}
-
Richard Tortorella
NARCAP, 2009
BibTeX@techreport{Tortorella2009, author = {Richard Tortorella}, title = {Richard Tortorella}, year = {2009}}
-
A Hybrid Model for Digital Camera Source Identification
IEEE International Conference on Image Processing
2009, pp. 2901-2904
BibTeX@inproceedings{Tsai2009, author = {Tsai, Min-Jen and Wang, Cheng-Sheng and Liu, Jung}, title = {A Hybrid Model for Digital Camera Source Identification}, booktitle = {IEEE International Conference on Image Processing}, year = {2009}, pages = {2901-2904}}
-
Using Sensor Noise to Identify Low Resolution Compressed Videos from YouTube
Geradts, Z. J., Franke, K. Y. & Veenman, C. J. (ed.)
International Workshop on Computational Forensics
2009, pp. 104-115
BibTeX@inproceedings{VanHouten2009a, author = {Van Houten, Wiger and Geradts, Zeno J.}, title = {Using Sensor Noise to Identify Low Resolution Compressed Videos from YouTube}, booktitle = {International Workshop on Computational Forensics}, year = {2009}, pages = {104-115}}
-
Source Video Camera Identification for Multiply Compressed Videos Originating from YouTube
Digital Investigation, 2009, Vol. 6(1-2), pp. 48-60
BibTeX@article{VanHouten2009, author = {Van Houten, Wiger and Geradts, Zeno J.}, title = {Source Video Camera Identification for Multiply Compressed Videos Originating from YouTube}, journal = {Digital Investigation}, year = {2009}, volume = {6}, number = {1-2}, pages = {48-60}}
-
Self-authentication of natural color images in Pascal transform domain
DSP´09: Proceedings of the 16th international conference on Digital Signal Processing
IEEE Press, 2009, pp. 1068-1073
BibTeX@inproceedings{Varsaki2009, author = {Varsaki, E. E. and Fotopoulos, V. and Skodras, A. N.}, title = {Self-authentication of natural color images in Pascal transform domain}, booktitle = {DSP´09: Proceedings of the 16th international conference on Digital Signal Processing}, publisher = {IEEE Press}, year = {2009}, pages = {1068--1073}}
-
Source Camera Identification Forensics Based on Wavelet Features
Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2009. IIH-MSP '09.
2009, pp. 702-705
BibTeX@inproceedings{Wang2009h, author = {Bo Wang and Yiping Guo and Xiangwei Kong and Fanjie Meng}, title = {Source Camera Identification Forensics Based on Wavelet Features}, booktitle = {Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2009. IIH-MSP '09.}, year = {2009}, pages = {702--705}}
-
Source Camera Identification Using Support Vector Machines
Advances in Digital Forensics V
2009, pp. 107-118
BibTeX@inproceedings{Wang2009e, author = {Wang, Bo and Kong, Xiangwei and You, Xingang}, title = {Source Camera Identification Using Support Vector Machines}, booktitle = {Advances in Digital Forensics V}, year = {2009}, pages = {107-118}}
-
What can we learn about the scene structure from three orthogonal vanishing points in images
Pattern Recogn. Lett., Elsevier Science Inc., 2009, Vol. 30(3), pp. 192-202
BibTeX@article{Wang2009d, author = {Wang, Guanghui and Tsui, Hung-Tat and Jonathan Wu, Q. M.}, title = {What can we learn about the scene structure from three orthogonal vanishing points in images}, journal = {Pattern Recogn. Lett.}, publisher = {Elsevier Science Inc.}, year = {2009}, volume = {30}, number = {3}, pages = {192--202}}
-
Understanding Benford´s Law and its Vulnerability in Image Forensics
IEEE International Conference on Multimedia and Expo
2009, pp. 1568-1571
BibTeX@inproceedings{Wang2009j, author = {Wang, Jingwei and Cha, Byung-Ho and Cho, Seong-Ho and Kuo, C. -C. Jay}, title = {Understanding Benford´s Law and its Vulnerability in Image Forensics}, booktitle = {IEEE International Conference on Multimedia and Expo}, year = {2009}, pages = {1568-1571}}
-
Detection of Image Region Duplication Forgery Using Model with Circle Block
Proc. Int. Conf. Multimedia Information Networking and Security MINES ´09
2009, Vol. 1, pp. 25-29
BibTeX@inproceedings{Wang2009, author = {Junwen Wang and Guangjie Liu and Hongyuan Li and Yuewei Dai and Zhiquan Wang}, title = {Detection of Image Region Duplication Forgery Using Model with Circle Block}, booktitle = {Proc. Int. Conf. Multimedia Information Networking and Security MINES ´09}, year = {2009}, volume = {1}, pages = {25--29}}
-
Detection of Resampling Based on Singular Value Decomposition
Proc. Fifth Int. Conf. Image and Graphics ICIG ´09
2009, pp. 879-884
BibTeX@inproceedings{Wang2009a, author = {Ran Wang and Xijian Ping}, title = {Detection of Resampling Based on Singular Value Decomposition}, booktitle = {Proc. Fifth Int. Conf. Image and Graphics ICIG ´09}, year = {2009}, pages = {879--884}}
-
Digital Video Forensics
Department of Computer Science, Dartmouth College, 2009
BibTeX@phdthesis{Wang2009i, author = {Wang, Weihong}, title = {Digital Video Forensics}, school = {Department of Computer Science, Dartmouth College}, year = {2009}}
-
A Survey of Passive Image Tampering Detection
Ho, A. T. S., Shi, Y. Q., Kim, H.-J. & Barni, M. (ed.)
International Workshop on Digital Watermarking
2009, pp. 308-322
BibTeX@inproceedings{Wang2009g, author = {Wang, Wei and Dong, Jing and Tan, Tieniu}, title = {A Survey of Passive Image Tampering Detection}, booktitle = {International Workshop on Digital Watermarking}, year = {2009}, pages = {308-322}}
-
Effective image splicing detection based on image chroma
ICIP´09: Proceedings of the 16th IEEE international conference on Image processing
IEEE Press, 2009, pp. 1249-1252
BibTeX@inproceedings{Wang2009c, author = {Wang, Wei and Dong, Jing and Tan, Tieniu}, title = {Effective image splicing detection based on image chroma}, booktitle = {ICIP´09: Proceedings of the 16th IEEE international conference on Image processing}, publisher = {IEEE Press}, year = {2009}, pages = {1249--1252}}
-
Exposing Digital Forgeries in Video by Detecting Double Quantization
ACM Multimedia and Security Workshop
2009, pp. 39-48
BibTeX@inproceedings{Wang2009f, author = {Wang, Weihong and Farid, Hany}, title = {Exposing Digital Forgeries in Video by Detecting Double Quantization}, booktitle = {ACM Multimedia and Security Workshop}, year = {2009}, pages = {39-48}}
-
Detection of copy-transform-move forgery in color digital image
Jisuanji Gongcheng / Computer Engineering, 2009, Vol. 35(16), pp. 20-22
BibTeX@article{Wang2009b, author = {Wang, Xin and Xuan, Bo and Peng, Si-Long}, title = {Detection of copy-transform-move forgery in color digital image}, journal = {Jisuanji Gongcheng / Computer Engineering}, year = {2009}, volume = {35}, number = {16}, pages = {20-22}}
-
High Performance Java Software for Image Processing
Emory University, 2009
BibTeX@phdthesis{Wendykier2009, author = {Wendykier, Piotr}, title = {High Performance Java Software for Image Processing}, school = {Emory University}, year = {2009}}
-
Printer Forensics Based on Page Document´s Geometric Distortion
IEEE International Conference on Image Processing
2009, pp. 2909-2912
BibTeX@inproceedings{Wu2009, author = {Wu, Yubao and Kong, Xiangwei and You, Xingang and Guo, Yiping}, title = {Printer Forensics Based on Page Document´s Geometric Distortion}, booktitle = {IEEE International Conference on Image Processing}, year = {2009}, pages = {2909-2912}}
-
Camera-Model Identification Using Markovian Transition Probability Matrix
Ho, A. T. S., Shi, Y. Q., Kim, H.-J. & Barni, M. (ed.)
International Workshop on Digital Watermarking
2009, pp. 294-307
BibTeX@inproceedings{Xu2009a, author = {Xu, Guanshuo and Gao, Shang and Shi, Yun Qing and Hu, RuiMin and Su, Wei}, title = {Camera-Model Identification Using Markovian Transition Probability Matrix}, booktitle = {International Workshop on Digital Watermarking}, year = {2009}, pages = {294-307}}
-
Camera brand and model identification using moments of 1-D and 2-D characteristic functions
Proc. 16th IEEE Int Image Processing (ICIP) Conf
2009, pp. 2917-2920
BibTeX@inproceedings{Xu2009, author = {Guanshuo Xu and Yun Qing Shi and Wei Su}, title = {Camera brand and model identification using moments of 1-D and 2-D characteristic functions}, booktitle = {Proc. 16th IEEE Int Image Processing (ICIP) Conf}, year = {2009}, pages = {2917--2920}}
-
Copy-Move Forgery Detection in Digital Image
PCM ´09: Proceedings of the 10th Pacific Rim Conference on Multimedia
Springer-Verlag, 2009, pp. 816-825
BibTeX@inproceedings{Yang2009, author = {Yang, Qing-Chu and Huang, Chung-Lin}, title = {Copy-Move Forgery Detection in Digital Image}, booktitle = {PCM ´09: Proceedings of the 10th Pacific Rim Conference on Multimedia}, publisher = {Springer-Verlag}, year = {2009}, pages = {816--825}}
-
Defeating Fake-Quality MP3
ACM Proceedings of the Multimedia and Security Workshop
2009, pp. 117-124
BibTeX@inproceedings{Yang2009a, author = {Yang, Rui and Shi, Yun Qing and Huang, Jiwu}, title = {Defeating Fake-Quality MP3}, booktitle = {ACM Proceedings of the Multimedia and Security Workshop}, year = {2009}, pages = {117-124}}
-
Adaptive Image Processing: A Computational Intelligence Perspective
Laplante, P. A. (ed.)
CRC Press, 2009
BibTeX@book{Yap2009, author = {Kim-Hui Yap and Ling Guan and Stuart William Perry and Hau San Wong}, title = {Adaptive Image Processing: A Computational Intelligence Perspective}, publisher = {CRC Press}, year = {2009}}
-
Digital Camera Identification Based on Curvelet Transform
IEEE International Conference on Acoustics, Speech, and Signal Processing
2009, pp. 1389-1392
BibTeX@inproceedings{Zhang2009e, author = {Zhang, Chi and Zhang, Hongbin}, title = {Digital Camera Identification Based on Curvelet Transform}, booktitle = {IEEE International Conference on Acoustics, Speech, and Signal Processing}, year = {2009}, pages = {1389-1392}}
-
Detecting logo-removal forgery by inconsistencies of blur
Proc. Int. Conf. Industrial Mechatronics and Automation ICIMA 2009
2009, pp. 32-36
BibTeX@inproceedings{Zhang2009d, author = {Jing Zhang and Yuting Su}, title = {Detecting logo-removal forgery by inconsistencies of blur}, booktitle = {Proc. Int. Conf. Industrial Mechatronics and Automation ICIMA 2009}, year = {2009}, pages = {32--36}}
-
Exposing Digital Video Forgery by Ghost Shadow Artifact
ACM Workshop on Multimedia in Forensics
2009, pp. 49-54
BibTeX@inproceedings{Zhang2009g, author = {Zhang, Jing and Su, Yuting and Zhang, Mingyu}, title = {Exposing Digital Video Forgery by Ghost Shadow Artifact}, booktitle = {ACM Workshop on Multimedia in Forensics}, year = {2009}, pages = {49-54}}
-
Detection of Double-Compression in JPEG2000 Images for Application in Image Forensics
Journal of Multimedia, 2009, Vol. 4(6), pp. 379-388
BibTeX@article{Zhang2009f, author = {Jing Zhang and Haiying Wang and Yuting Su}, title = {Detection of Double-Compression in JPEG2000 Images for Application in Image Forensics}, journal = {Journal of Multimedia}, year = {2009}, volume = {4}, number = {6}, pages = {379-388}}
-
A new approach merging markov and DCT features for image splicing detection
Proc. IEEE Int. Conf. Intelligent Computing and Intelligent Systems ICIS 2009
2009, Vol. 4, pp. 390-394
BibTeX@inproceedings{Zhang2009b, author = {Jing Zhang and Yun Zhao and Yuting Su}, title = {A new approach merging markov and DCT features for image splicing detection}, booktitle = {Proc. IEEE Int. Conf. Intelligent Computing and Intelligent Systems ICIS 2009}, year = {2009}, volume = {4}, pages = {390--394}}
-
Detecting Image Tampering Using Feature Fusion
Proc. Int. Conf. Availability, Reliability and Security ARES ´09
2009, pp. 335-340
BibTeX@inproceedings{Zhang2009a, author = {Pin Zhang and Xiangwei Kong}, title = {Detecting Image Tampering Using Feature Fusion}, booktitle = {Proc. Int. Conf. Availability, Reliability and Security ARES ´09}, year = {2009}, pages = {335--340}}
-
Detecting photographic composites using two-view geometrical constraints
Proc. IEEE Int. Conf. Multimedia and Expo ICME 2009
2009, pp. 1078-1081
BibTeX@inproceedings{Zhang2009c, author = {Wei Zhang and Xiaochun Cao and Zhiyong Feng and Jiawan Zhang and Ping Wang}, title = {Detecting photographic composites using two-view geometrical constraints}, booktitle = {Proc. IEEE Int. Conf. Multimedia and Expo ICME 2009}, year = {2009}, pages = {1078--1081}}
-
Detecting photographic composites using shadows
Proc. IEEE International Conference on Multimedia and Expo ICME 2009
2009, pp. 1042-1045
BibTeX@inproceedings{Zhang2009, author = {Zhang, Wei and Cao, Xiaochun and Zhang, Jiawan and Zhu, Jigui and Wang, Ping}, title = {Detecting photographic composites using shadows}, booktitle = {Proc. IEEE International Conference on Multimedia and Expo ICME 2009}, year = {2009}, pages = {1042--1045}}
-
Image forensics using generalised Benford's Law for accurate detection of unknown JPEG compression in watermarked images
Proc. 16th Int Digital Signal Processing Conf
2009, pp. 1-8
BibTeX@inproceedings{Zhao2009, author = {Xi Zhao and Ho, A. T. S. and Shi, Y. Q.}, title = {Image forensics using generalised Benford's Law for accurate detection of unknown JPEG compression in watermarked images}, booktitle = {Proc. 16th Int Digital Signal Processing Conf}, year = {2009}, pages = {1--8}}
-
A Digital Forgery Image Detection Algorithm Based on Wavelet Homomorphic Filtering
Lecture Notes In Computer Science, Springer-Verlag, 2009, Vol. 5450, pp. 152-160
BibTeX@article{Zheng2009, author = {Zheng, Jiangbin and Liu, Miao}, title = {A Digital Forgery Image Detection Algorithm Based on Wavelet Homomorphic Filtering}, journal = {Lecture Notes In Computer Science}, publisher = {Springer-Verlag}, year = {2009}, volume = {5450}, pages = {152--160}}
-
Scale invariance and noise in natural images
Proc. IEEE 12th Int Computer Vision Conf
2009, pp. 2209-2216
BibTeX@inproceedings{Zoran2009, author = {Zoran, D. and Weiss, Y. }, title = {Scale invariance and noise in natural images}, booktitle = {Proc. IEEE 12th Int Computer Vision Conf}, year = {2009}, pages = {2209--2216}}
-
A fast parallel algorithm for blind estimation of noise variance
University of Stellenbosch, 2009
BibTeX@techreport{ZylMarais2009, author = {Izak van Zyl Marais and Willem Herman Steyn}, title = {A fast parallel algorithm for blind estimation of noise variance}, year = {2009}}
-
Computational Forensics
Geradts, Z. J. M. H., Franke, K. Y. & (Eds.), C. J. V. (ed.)
Springer, 2009, Vol. 5718
BibTeX@proceedings{Geradts2009,, title = {Computational Forensics}, publisher = {Springer}, year = {2009}, volume = {5718}}
-
Multimedia Forensics and Security
Li, C.-T. (ed.)
Hershey, New York, 2009
BibTeX@book{Li2009i,, title = {Multimedia Forensics and Security}, publisher = {Hershey, New York}, year = {2009}}
-
Forensics in Telecommunications, Information and Multimedia
Sorell, M. (ed.)
Springer, 2009
@book{Sorell2009,, title = {Forensics in Telecommunications, Information and Multimedia}, publisher = {Springer}, year = {2009}}
2008
-
Salient region detection and segmentation
ICVS´08: Proceedings of the 6th international conference on Computer vision systems
Springer-Verlag, 2008, pp. 66-75
BibTeX@inproceedings{Achanta2008, author = {Achanta, Radhakrishna and Estrada, Francisco and Wils, Patricia and Süsstrunk, Sabine}, title = {Salient region detection and segmentation}, booktitle = {ICVS´08: Proceedings of the 6th international conference on Computer vision systems}, publisher = {Springer-Verlag}, year = {2008}, pages = {66--75}}
-
Source Camera Identification for Low Resolution Heavily Compressed Images
International Conference on Computational Sciences and Its Applications
2008, pp. 557-567
BibTeX@inproceedings{Alles2008, author = {Alles, Erwin J. and Geradts, Zeno J. and Veenman, Cor. J.}, title = {Source Camera Identification for Low Resolution Heavily Compressed Images}, booktitle = {International Conference on Computational Sciences and Its Applications}, year = {2008}, pages = {557-567}}
-
Image Forensics: Source Identification and Tampering Detection
Universit` a degli Studi di Firenze, 2008
BibTeX@phdthesis{Amerini2008, author = {Irene Amerini}, title = {Image Forensics: Source Identification and Tampering Detection}, school = {Universit` a degli Studi di Firenze}, year = {2008}}
-
A Survey of Copy-Move Forgery Detection Techniques
2008
BibTeX@misc{Bayram2008, author = {Bayram, Sevinc}, title = {A Survey of Copy-Move Forgery Detection Techniques}, year = {2008}}
-
Classification of digital camera-models based on demosaicing artifacts
Digital Investigation, 2008, Vol. 5(1-2), pp. 49 - 59
BibTeX@article{Bayram2008a, author = {Sevinc Bayram and Husrev T. Sencar and Nasir Memon}, title = {Classification of digital camera-models based on demosaicing artifacts}, journal = {Digital Investigation}, year = {2008}, volume = {5}, number = {1-2}, pages = {49 - 59}}
-
Video Copy Detection Based on Source Device Characteristics: A Complementary Approach to Content-Based Methods
ACM International Conference on Multimedia Information Retrieval
2008, pp. 435-442
BibTeX@inproceedings{Bayram2008c, author = {Bayram, Sevinc and Sencar, Husrev T. and Memon, Nasir}, title = {Video Copy Detection Based on Source Device Characteristics: A Complementary Approach to Content-Based Methods}, booktitle = {ACM International Conference on Multimedia Information Retrieval}, year = {2008}, pages = {435-442}}
-
Blind restoration of blurred photographs via AR modelling and MCMC
Proc. 15th IEEE International Conference on Image Processing ICIP 2008
2008, pp. 669-672
BibTeX@inproceedings{Bishop2008, author = {Bishop, T. E. and Molina, R. and Hopgood, J. R.}, title = {Blind restoration of blurred photographs via AR modelling and MCMC}, booktitle = {Proc. 15th IEEE International Conference on Image Processing ICIP 2008}, year = {2008}, pages = {669--672}}
-
Blind Camera Fingerprinting and Image Clustering
IEEE Transactions on Pattern Analysis and Machine Intelligence, 2008, Vol. 30(3), pp. 532-535
BibTeX@article{Bloy2008, author = {Bloy, Greg J.}, title = {Blind Camera Fingerprinting and Image Clustering}, journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence}, year = {2008}, volume = {30}, number = {3}, pages = {532-535}}
-
Global, lokal, digital - Fotojournalismus heute
Elke, G., Neverla, I. & Ammann, I. (ed.)
Chapter Digitale Bildmanipulation und Ethik. Aktuelle Tendenzen im Fotojournalismus.
Herbert von Halem-Verlag, 2008, pp. 108-136
BibTeX@inbook{Buellesbach2008, author = {Büllesbach, Alfred}, title = {Global, lokal, digital - Fotojournalismus heute}, publisher = {Herbert von Halem-Verlag}, year = {2008}, pages = {108-136}}
-
Image Composition Detection Using Object-Based Color Consistency
IEEE International Conference on Signal Processing
2008, pp. 1186-1189
BibTeX@inproceedings{Cao2008a, author = {Cao, Gang and Zhao, Yao and Ni, Rongrong}, title = {Image Composition Detection Using Object-Based Color Consistency}, booktitle = {IEEE International Conference on Signal Processing}, year = {2008}, pages = {1186-1189}}
-
A generalized model for detection of demosaicing characteristics
Proc. IEEE Int Multimedia and Expo Conf
2008, pp. 1513-1516
BibTeX@inproceedings{Cao2008, author = {Hong Cao and Kot, A. C.}, title = {A generalized model for detection of demosaicing characteristics}, booktitle = {Proc. IEEE Int Multimedia and Expo Conf}, year = {2008}, pages = {1513--1516}}
-
Mathematical Optimization in Computer Graphics and Vision
Morgan Kaufman Publishers, 2008
BibTeX@book{Carvalho2008, author = {Paulo Cezar Pinto Carvalho and Luiz Henrique De Figueiredo and Jonas Gomes and Luiz Velho}, title = {Mathematical Optimization in Computer Graphics and Vision}, publisher = {Morgan Kaufman Publishers}, year = {2008}}
-
Blind Identification of Source Cell-Phone Model
IEEE Transactions on Information Forensics and Security, 2008, Vol. 3(3), pp. 553-566
BibTeX@article{Celiktutan2008, author = {Celiktutan, O. and Sankur, B. and Avcibas, I.}, title = {Blind Identification of Source Cell-Phone Model}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2008}, volume = {3}, number = {3}, pages = {553--566}}
-
VQ-Based Oriented Image Tamper Proofing Schemes for Digital Grayscale Images
Proc. Second Int. Symp. Intelligent Information Technology Application IITA ´08
2008, Vol. 2, pp. 1000-1004
BibTeX@inproceedings{Chang2008, author = {Chin-Chen Chang and Jun-Chou Chuang and Yu-Zheng Wang}, title = {VQ-Based Oriented Image Tamper Proofing Schemes for Digital Grayscale Images}, booktitle = {Proc. Second Int. Symp. Intelligent Information Technology Application IITA ´08}, year = {2008}, volume = {2}, pages = {1000--1004}}
-
Determining image origin and integrity using sensor noise
IEEE Transactions on Information Forensics and Security, 2008, Vol. 3(1), pp. 74-90
BibTeX@article{Chen2008, author = {Mo Chen and Jessica Fridrich and Miroslav Goljan and Jan Lukáš}, title = {Determining image origin and integrity using sensor noise}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2008}, volume = {3}, number = {1}, pages = {74--90}}
-
Detection of digital image and video forgeries
New Jersey Institute of Technology, New Jersey Institute of Technology, 2008
BibTeX@phdthesis{Chen2008d, author = {Chen, Wen}, title = {Detection of digital image and video forgeries}, publisher = {New Jersey Institute of Technology}, school = {New Jersey Institute of Technology}, year = {2008}}
-
Detection of Double MPEG Video Compression Using First Digits Statistics
International Workshop on Digital Watermarking
2008
BibTeX@inproceedings{Chen2008c, author = {Chen, Wen and Shi, Yun Qing}, title = {Detection of Double MPEG Video Compression Using First Digits Statistics}, booktitle = {International Workshop on Digital Watermarking}, year = {2008}}
-
Computer Graphics Identification Using Genetic Algorithm
IEEE International Conference on Pattern Recognition
2008
BibTeX@inproceedings{Chen2008b, author = {Chen, Wen and Shi, Yun Qing and Xuan, Guo Rong and Su, Wei}, title = {Computer Graphics Identification Using Genetic Algorithm}, booktitle = {IEEE International Conference on Pattern Recognition}, year = {2008}}
-
Image tampering detection by blocking periodicity analysis in JPEG compressed images
Proc. IEEE 10th Workshop Multimedia Signal Processing
2008, pp. 803-808
BibTeX@inproceedings{Chen2008a, author = {Yi-Lei Chen and Chiou-Ting Hsu}, title = {Image tampering detection by blocking periodicity analysis in JPEG compressed images}, booktitle = {Proc. IEEE 10th Workshop Multimedia Signal Processing}, year = {2008}, pages = {803--808}}
-
A Machine Learning Based Scheme for Double JPEG Compression Detection
International Conference on Pattern Recognition
2008, pp. 1-4
BibTeX@inproceedings{Chunhua2008, author = {Chunhua, Chen and Shi, Yun Qing and Wei, Su}, title = {A Machine Learning Based Scheme for Double JPEG Compression Detection}, booktitle = {International Conference on Pattern Recognition}, year = {2008}, pages = {1-4}}
-
Printer Identification Based on Distance Transform
International Conference on Intelligent Networks and Intelligent Systems
2008, pp. 565-568
BibTeX@inproceedings{Deng2008, author = {Deng, Wei and Chen, Qinghu and Yuan, Feng and Yan, Yuchen}, title = {Printer Identification Based on Distance Transform}, booktitle = {International Conference on Intelligent Networks and Intelligent Systems}, year = {2008}, pages = {565-568}}
-
Digital Single Lens Reflex Camera Identification From Traces of Sensor Dust
IEEE Transactions on Information Forensics and Security, 2008, Vol. 3(3), pp. 539-552
BibTeX@article{Dirik2008, author = {Dirik, A. E. and Sencar, H. T. and Memon, N. }, title = {Digital Single Lens Reflex Camera Identification From Traces of Sensor Dust}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2008}, volume = {3}, number = {3}, pages = {539--552}}
-
A Wavelet-Laplace Variational Technique for Image Deconvolution and Inpainting
IEEE Transactions on Image Processing, 2008, Vol. 17(5), pp. 657-663
BibTeX@article{Dobrosotskaya2008, author = {Dobrosotskaya, J. A. and Bertozzi, A. L. }, title = {A Wavelet-Laplace Variational Technique for Image Deconvolution and Inpainting}, journal = {IEEE Transactions on Image Processing}, year = {2008}, volume = {17}, number = {5}, pages = {657--663}}
-
Run-Length and Edge Statistics Based Approach for Image Splicing Detection
International Workshop on Digital Watermarking
2008, pp. 76-87
BibTeX@inproceedings{Dong2008, author = {Dong, Jing and Wang, Wei and Tan, Tieniu and Shi, Yun Qing}, title = {Run-Length and Edge Statistics Based Approach for Image Splicing Detection}, booktitle = {International Workshop on Digital Watermarking}, year = {2008}, pages = {76-87}}
-
Comparison of Zernike and Tchebichef Moments for Image Tampering Detection Sensitivity and Watermark Recovery
Proc. IEEE Conf. Technologies for Homeland Security
2008, pp. 615-619
BibTeX@inproceedings{Elshoura2008, author = {Elshoura, S. M. and Megherbi, D. B. }, title = {Comparison of Zernike and Tchebichef Moments for Image Tampering Detection Sensitivity and Watermark Recovery}, booktitle = {Proc. IEEE Conf. Technologies for Homeland Security}, year = {2008}, pages = {615--619}}
-
Digital Image Ballistics from JPEG Quantization: A Followup Study
Department of Computer Science, Dartmouth College, 2008(TR2008-638)
BibTeX@techreport{Farid2008, author = {Farid, Hany}, title = {Digital Image Ballistics from JPEG Quantization: A Followup Study}, year = {2008}, number = {TR2008-638}}
-
Digital Image Forensics
Scientific American, 2008, Vol. 6(298), pp. 66-71
BibTeX@article{Farid2008a, author = {Farid, Hany}, title = {Digital Image Forensics}, journal = {Scientific American}, year = {2008}, volume = {6}, number = {298}, pages = {66-71}}
-
Using sensor pattern noise for camera model identification
15th IEEE International Conference on Image Processing ICIP 2008
Image Processing, 2008. ICIP 2008. 15th IEEE International Conference on, 2008, pp. 1296-1299
BibTeX@inproceedings{Filler2008b, author = {Filler, Tomáš and Fridrich, Jessica and Goljan, Miroslav}, title = {Using sensor pattern noise for camera model identification}, booktitle = {15th IEEE International Conference on Image Processing ICIP 2008}, journal = {Image Processing, 2008. ICIP 2008. 15th IEEE International Conference on}, year = {2008}, pages = {1296-1299}}
-
Computational Forensics: An Overview
Srihari, S. & Franke, K. (ed.)
Computational Forensics
Springer Berlin / Heidelberg, 2008, Vol. 5158, pp. 1-10
BibTeX@incollection{Franke2008, author = {Franke, Katrin and Srihari, Sargur}, title = {Computational Forensics: An Overview}, booktitle = {Computational Forensics}, publisher = {Springer Berlin / Heidelberg}, year = {2008}, volume = {5158}, pages = {1-10}}
-
Image authentication by detecting traces of demosaicing
Proc. IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops CVPR Workshops 2008
2008, pp. 1-8
BibTeX@inproceedings{Gallagher2008, author = {Gallagher, A. C. and Tsuhan Chen}, title = {Image authentication by detecting traces of demosaicing}, booktitle = {Proc. IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops CVPR Workshops 2008}, year = {2008}, pages = {1--8}}
-
Image Forgery Identification Using JPEG Intrinsic Fingerprints
Stanford Center for Image Systems Engineering, 2008
BibTeX@techreport{Garg2008, author = {Garg, A. and Hailu, A. and Sridharan, R.}, title = {Image Forgery Identification Using JPEG Intrinsic Fingerprints}, year = {2008}}
-
Illuminant Colour Based Image Forensics
IEEE Region 10 Conference (TENCON 2008)
2008
BibTeX@inproceedings{Gholap2008, author = {Gholap, Sandeep and Bora, P. K.}, title = {Illuminant Colour Based Image Forensics}, booktitle = {IEEE Region 10 Conference (TENCON 2008)}, year = {2008}}
-
Camera identification from cropped and scaled images
III, E. J. D., Wong, P. W., Dittmann, J. & Memon, N. D. (ed.)
Proc. SPIE 6819, 68190E (2008)
Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, SPIE, 2008, Vol. 6819(1), pp. 68190E
BibTeX@conference{Goljan2008, author = {Miroslav Goljan and Jessica Fridrich}, title = {Camera identification from cropped and scaled images}, booktitle = {Proc. SPIE 6819, 68190E (2008)}, journal = {Security, Forensics, Steganography, and Watermarking of Multimedia Contents X}, publisher = {SPIE}, year = {2008}, volume = {6819}, number = {1}, pages = {68190E}}
-
Camera Identification From Printed Images
Delp, E. J., Wong, P. W., Dittmann, J. & Memon, N. (ed.)
SPIE Conference on Security, Forensics, Steganography, and Watermarking of Multimedia Contents
2008, Vol. 6819
BibTeX@inproceedings{Goljan2008a, author = {Goljan, Miroslav and Fridrich, Jessica and Lukáš, Jan}, title = {Camera Identification From Printed Images}, booktitle = {SPIE Conference on Security, Forensics, Steganography, and Watermarking of Multimedia Contents}, year = {2008}, volume = {6819}}
-
IM2GPS: estimating geographic information from a single image
Proc. IEEE Conf. Computer Vision and Pattern Recognition CVPR 2008
2008, pp. 1-8
BibTeX@inproceedings{Hays2008, author = {Hays, J. and Efros, A. A.}, title = {IM2GPS: estimating geographic information from a single image}, booktitle = {Proc. IEEE Conf. Computer Vision and Pattern Recognition CVPR 2008}, year = {2008}, pages = {1--8}}
-
Video Forgery Detection Using Correlation of Noise Residue
IEEE Workshop on Multimedia Signal Processing
2008, pp. 170-174
BibTeX@inproceedings{Hsu2008a, author = {Hsu, Chih-Chung and Hung, Tzu-Yi and Lin, Chia-Wen and Hsu, Chiou-Ting}, title = {Video Forgery Detection Using Correlation of Noise Residue}, booktitle = {IEEE Workshop on Multimedia Signal Processing}, year = {2008}, pages = {170-174}}
-
Statistical fusion of multiple cues for image tampering detection
Proc. 42nd Asilomar Conf. Signals, Systems and Computers
2008, pp. 1386-1390
BibTeX@inproceedings{Hsu2008, author = {Yu-Feng Hsu and Shih-Fu Chang}, title = {Statistical fusion of multiple cues for image tampering detection}, booktitle = {Proc. 42nd Asilomar Conf. Signals, Systems and Computers}, year = {2008}, pages = {1386--1390}}
-
Detection of Copy-Move Forgery in Digital Images Using SIFT Algorithm
Proc. Pacific-Asia Workshop on Computational Intelligence and Industrial Application PACIIA ´08
2008, Vol. 2, pp. 272-276
BibTeX@inproceedings{Huang2008, author = {Huang, Hailing and Guo, Weiqiang and Zhang, Yu}, title = {Detection of Copy-Move Forgery in Digital Images Using SIFT Algorithm}, booktitle = {Proc. Pacific-Asia Workshop on Computational Intelligence and Industrial Application PACIIA ´08}, year = {2008}, volume = {2}, pages = {272--276}}
-
Demosaicking Recognition with Applications in Digital Photo Authentication based on a Quadratic Pixel Correlation Model
Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition
2008
BibTeX@inproceedings{Huang2008a, author = {Yizhen Huang}, title = {Demosaicking Recognition with Applications in Digital Photo Authentication based on a Quadratic Pixel Correlation Model}, booktitle = {Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition}, year = {2008}}
-
IPTC Standard: Information Interchange Model (IIM) - IIM Schema for XMP Specification Version 1.0
IPTC, 2008
BibTeX@standard{IPTC2008, author = {IPTC}, title = {IPTC Standard: Information Interchange Model (IIM) - IIM Schema for XMP Specification Version 1.0}, year = {2008}}
-
Identifying Tampered Regions Using Singular Value Decomposition in Digital Image Forensics
Proc. International Conference on Computer Science and Software Engineering
2008, Vol. 3, pp. 926-930
BibTeX@inproceedings{Kang2008, author = {Kang, XiaoBing and Wei, ShengMin}, title = {Identifying Tampered Regions Using Singular Value Decomposition in Digital Image Forensics}, booktitle = {Proc. International Conference on Computer Science and Software Engineering}, year = {2008}, volume = {3}, pages = {926--930}}
-
Printer Profiling for Forensics and Ballistics
ACM Multimedia and Security Workshop
2008, pp. 3-10
BibTeX@inproceedings{Kee2008, author = {Kee, Eric and Farid, Hany}, title = {Printer Profiling for Forensics and Ballistics}, booktitle = {ACM Multimedia and Security Workshop}, year = {2008}, pages = {3-10}}
-
Forensic techniques for classifying scanner, computer generated and digital camera images
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2008
2008, pp. 1653-1656
BibTeX@inproceedings{Khanna2008, author = {Khanna, N. and Chiu, G. T.-C. and Allebach, J. P. and Delp, E. J. }, title = {Forensic techniques for classifying scanner, computer generated and digital camera images}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2008}, year = {2008}, pages = {1653--1656}}
-
Scanner identification with extension to forgery detection
Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series
2008, Vol. 6819
BibTeX@inproceedings{Khanna2008a, author = {Khanna, N. and Chiu, G.-T.-C. and Allebach, J.-P. and Delp, E.-J.}, title = {Scanner identification with extension to forgery detection}, booktitle = {Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series}, year = {2008}, volume = {6819}}
-
Survey of Scanner and Printer Forensics at Purdue University
International Workshop on Computational Forensics
2008, pp. 22-34
BibTeX@inproceedings{Khanna2008b, author = {Khanna, Nitin and Mikkilineni, Aravind K. and Chiu, George T.-C. and Allebach, Jan P. and Delp, Edward J.}, title = {Survey of Scanner and Printer Forensics at Purdue University}, booktitle = {International Workshop on Computational Forensics}, year = {2008}, pages = {22-34}}
-
Automatic detection and correction of purple fringing using the gradient information and desaturation
Proceedings of the 16th European Signal Processing Conference (EUSIPCO 2008)
2008
BibTeX@inproceedings{Kim2008, author = {Baek-Kyu Kim and Rae-Hong Park}, title = {Automatic detection and correction of purple fringing using the gradient information and desaturation}, booktitle = {Proceedings of the 16th European Signal Processing Conference (EUSIPCO 2008)}, year = {2008}}
-
On the Detectability of Local Resampling in Digital Images
Delp, E. J., Wong, P. W., Dittmann, J. & Memon, N. (ed.)
SPIE Conference on Security, Forensics, Steganography, and Watermarking of Multimedia Contents
2008, Vol. 6819
BibTeX@inproceedings{Kirchner2008a, author = {Kirchner, Matthias}, title = {On the Detectability of Local Resampling in Digital Images}, booktitle = {SPIE Conference on Security, Forensics, Steganography, and Watermarking of Multimedia Contents}, year = {2008}, volume = {6819}}
-
Fast and Reliable Resampling Detection by Spectral Analysis of Fixed Linear Predictor Residue
ACM Multimedia and Security Workshop
2008, pp. 11-20
BibTeX@inproceedings{Kirchner2008c, author = {Kirchner, Matthias}, title = {Fast and Reliable Resampling Detection by Spectral Analysis of Fixed Linear Predictor Residue}, booktitle = {ACM Multimedia and Security Workshop}, year = {2008}, pages = {11-20}}
-
Hiding Traces of Resampling in Digital Images
IEEE Transactions on Information Forensics and Security, 2008, Vol. 3(4), pp. 582-592
BibTeX@article{Kirchner2008, author = {Kirchner, M. and Bohme, R.}, title = {Hiding Traces of Resampling in Digital Images}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2008}, volume = {3}, number = {4}, pages = {582--592}}
-
Using JPEG quantization tables to identify imagery processed by software
Digital Investigation, 2008, Vol. 5, pp. S21-S25
BibTeX@article{Kornblum2008, author = {Jesse D. Kornblum}, title = {Using JPEG quantization tables to identify imagery processed by software}, journal = {Digital Investigation}, year = {2008}, volume = {5}, pages = {S21-S25}}
-
Digital color image processing
Wiley-Interscience, 2008
BibTeX@book{Koschan2008, author = {Koschan, Andreas and Abidi, Mongi}, title = {Digital color image processing}, publisher = {Wiley-Interscience}, year = {2008}}
-
What Does the Sky Tell Us about the Camera?
Forsyth, D., Torr, P. & Zisserman, A. (ed.)
Computer Vision -- ECCV 2008
Springer Berlin / Heidelberg, 2008, Vol. 5305, pp. 354-367
BibTeX@incollection{Lalonde2008, author = {Lalonde, Jean-François and Narasimhan, Srinivasa and Efros, Alexei}, title = {What Does the Sky Tell Us about the Camera?}, booktitle = {Computer Vision -- ECCV 2008}, publisher = {Springer Berlin / Heidelberg}, year = {2008}, volume = {5305}, pages = {354-367}}
-
Detecting Doubly Compressed JPEG Images by Using Mode Based First Digit Features
IEEE Workshop on Multimedia Signal Processing
2008, pp. 730-735
BibTeX@inproceedings{Li2008e, author = {Li, Bin and Shi, Yun Qing and Huang, Jiwu}, title = {Detecting Doubly Compressed JPEG Images by Using Mode Based First Digit Features}, booktitle = {IEEE Workshop on Multimedia Signal Processing}, year = {2008}, pages = {730-735}}
-
Doctored JPEG image detection
Proc. IEEE Int Multimedia and Expo Conf
2008, pp. 253-256
BibTeX@inproceedings{Li2008b, author = {Weihai Li and Nenghai Yu and Yuan Yuan}, title = {Doctored JPEG image detection}, booktitle = {Proc. IEEE Int Multimedia and Expo Conf}, year = {2008}, pages = {253--256}}
-
Doctored JPEG Image Detection
IEEE International Conference on Multimedia and Expo
2008, pp. 253-256
BibTeX@inproceedings{Li2008d, author = {Li, Weihai and Yu, Nenghai and Yuan, Yuan}, title = {Doctored JPEG Image Detection}, booktitle = {IEEE International Conference on Multimedia and Expo}, year = {2008}, pages = {253-256}}
-
Detecting copy-paste Forgery of JPEG Image via Block Artifact Grid Extraction
Proceedings of the 2008 International Workshop on Local and Non-Local Approximation in Image Processing
2008
BibTeX@inproceedings{Li2008, author = {Weihai Li and Yuan Yuan and Nenghai Yu}, title = {Detecting copy-paste Forgery of JPEG Image via Block Artifact Grid Extraction}, booktitle = {Proceedings of the 2008 International Workshop on Local and Non-Local Approximation in Image Processing}, year = {2008}}
-
Image demosaicing: A systematic survey
Proc. of SPIE
2008, Vol. 6822, pp. 68221J-68221J
BibTeX@inproceedings{Li2008c, author = {Li, X. and Gunturk, B. and Zhang, L.}, title = {Image demosaicing: A systematic survey}, booktitle = {Proc. of SPIE}, year = {2008}, volume = {6822}, pages = {68221J--68221J}}
-
Tampered Image Detection Using Image Matching
Proc. Fifth Int. Conf. Computer Graphics, Imaging and Visualisation CGIV ´08
2008, pp. 174-179
BibTeX@inproceedings{Li2008a, author = {Zhenghao Li and Nee, A. Y. C. and Ong, S. K. and Weiguo Gong}, title = {Tampered Image Detection Using Image Matching}, booktitle = {Proc. Fifth Int. Conf. Computer Graphics, Imaging and Visualisation CGIV ´08}, year = {2008}, pages = {174--179}}
-
Localization of tampering in contrast and brightness adjusted images using distributed source coding and expectation maximization
Proc. 15th IEEE Int. Conf. Image Processing ICIP 2008
2008, pp. 2204-2207
BibTeX@inproceedings{Lin2008, author = {Yao-Chung Lin and Varodayan, D. and Fink, T. and Betters, E. and Girod, B. }, title = {Localization of tampering in contrast and brightness adjusted images using distributed source coding and expectation maximization}, booktitle = {Proc. 15th IEEE Int. Conf. Image Processing ICIP 2008}, year = {2008}, pages = {2204--2207}}
-
Automatic Estimation and Removal of Noise from a Single Image
IEEE Transactions on Pattern Analysis and Machine Intelligence, 2008, Vol. 30(2), pp. 299-314
BibTeX@article{Liu2008, author = {Ce Liu and Szeliski, R. and Sing Bing Kang and Zitnick, C. L. and Freeman, W. T.}, title = {Automatic Estimation and Removal of Noise from a Single Image}, journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence}, year = {2008}, volume = {30}, number = {2}, pages = {299--314}}
-
Digital Image Forensics Using Statistical Features and Neural Network Classifier
International Conference on Machine Learning and Cybernetics
2008, pp. 2831-2834
BibTeX@inproceedings{Lu2008, author = {Lu, Wei and Sun, Wei and Huang, Jiwu and Lu, Hong-Tao}, title = {Digital Image Forensics Using Statistical Features and Neural Network Classifier}, booktitle = {International Conference on Machine Learning and Cybernetics}, year = {2008}, pages = {2831-2834}}
-
MPEG Recompression Detection Based on Block Artifacts
SPIE Conference on Security, Forensics, Steganography, and Watermarking of Multimedia Contents
2008
BibTeX@inproceedings{Luo2008, author = {Luo, Weiqi and Wu, Min and Huang, Jiwu}, title = {MPEG Recompression Detection Based on Block Artifacts}, booktitle = {SPIE Conference on Security, Forensics, Steganography, and Watermarking of Multimedia Contents}, year = {2008}}
-
Detection of Resampling Supplemented with Noise Inconsistencies Analysis for Image Forensics
Proc. International Conference on Computational Sciences and Its Applications ICCSA ´08
2008, pp. 546-556
BibTeX@inproceedings{Mahdian2008, author = {Mahdian, B. and Saic, S.}, title = {Detection of Resampling Supplemented with Noise Inconsistencies Analysis for Image Forensics}, booktitle = {Proc. International Conference on Computational Sciences and Its Applications ICCSA ´08}, year = {2008}, pages = {546--556}}
-
Blind methods for detecting image fakery
Proc. 42nd Annual IEEE International Carnahan Conference on Security Technology ICCST 2008
2008, pp. 280-286
BibTeX@inproceedings{Mahdian2008a, author = {Mahdian, B. and Saic, S.}, title = {Blind methods for detecting image fakery}, booktitle = {Proc. 42nd Annual IEEE International Carnahan Conference on Security Technology ICCST 2008}, year = {2008}, pages = {280--286}}
-
Blind Authentication Using Periodic Properties of Interpolation
IEEE Transactions on Information Forensics and Security, 2008, Vol. 3(3), pp. 529-538
BibTeX@article{Mahdian2008d, author = {Mahdian, B. and Saic, S.}, title = {Blind Authentication Using Periodic Properties of Interpolation}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2008}, volume = {3}, number = {3}, pages = {529--538}}
-
Detection of digital processing of images through a realistic model of CCD noise
Proc. 19th International Conference on Pattern Recognition ICPR 2008
2008, pp. 1-4
BibTeX@inproceedings{Maillard2008, author = {Maillard, J.-B. and Levesque, D. and Deschenes, F.}, title = {Detection of digital processing of images through a realistic model of CCD noise}, booktitle = {Proc. 19th International Conference on Pattern Recognition ICPR 2008}, year = {2008}, pages = {1--4}}
-
Confidence Weighting for Sensor Fingerprinting
Computer Vision and Pattern Recognition
2008, pp. 1-6
BibTeX@inproceedings{McCloskey2008, author = {McCloskey, Scott}, title = {Confidence Weighting for Sensor Fingerprinting}, booktitle = {Computer Vision and Pattern Recognition}, year = {2008}, pages = {1-6}}
-
Image acquisition forensics: Forensic analysis to identify imaging source
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2008
2008, pp. 1657-1660
BibTeX@inproceedings{McKay2008, author = {McKay, C. and Swaminathan, A. and Hongmei Gou and Min Wu}, title = {Image acquisition forensics: Forensic analysis to identify imaging source}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2008}, year = {2008}, pages = {1657--1660}}
-
A New Feature-Based Method for Source Camera Identification
Ray, I. & Shenoi, S. (ed.)
Advances in Digital Forensics IV
2008, Vol. 285, pp. 207-218
BibTeX@inproceedings{Meng2008, author = {Meng, Fanjie and Kong, Xiangwei and You, Xingang}, title = {A New Feature-Based Method for Source Camera Identification}, booktitle = {Advances in Digital Forensics IV}, year = {2008}, volume = {285}, pages = {207-218}}
-
Feature Extraction and Image Processing
Academic Press, 2008
BibTeX@book{Nixon2008, author = {Mark S. Nixon and Alberto S. Aguado}, title = {Feature Extraction and Image Processing}, publisher = {Academic Press}, year = {2008}, edition = {2nd}}
-
Using Sensor Dirt for Toolmark Analysis of Digital Photographs
Ray, I. & Shenoi, S. (ed.)
Advances in Digital Forensics IV
2008, Vol. 285, pp. 193-206
BibTeX@inproceedings{Olivier2008a, author = {Olivier, Martin S.}, title = {Using Sensor Dirt for Toolmark Analysis of Digital Photographs}, booktitle = {Advances in Digital Forensics IV}, year = {2008}, volume = {285}, pages = {193-206}}
-
On the Probability of a False Positive Match for Digital Camera Identification based on Sensor Dirt Location
South African Computer Journal, 2008, Vol. 41, pp. 21-28
BibTeX@article{Olivier2008, author = {Olivier, Martin S.}, title = {On the Probability of a False Positive Match for Digital Camera Identification based on Sensor Dirt Location}, journal = {South African Computer Journal}, year = {2008}, volume = {41}, pages = {21-28}}
-
Image Quality Estimation for JPEG-Compressed Images without the Original Image
Stanford Center for Image Systems Engineering, 2008
BibTeX@techreport{Petkov2008, author = {Petkov, Atanas and Cottier, Scott}, title = {Image Quality Estimation for JPEG-Compressed Images without the Original Image}, year = {2008}}
-
Detection of Double-Compression in JPEG Images for Applications in Steganography
IEEE Transactions on Information Forensics and Security, 2008, Vol. 3(2), pp. 247-258
BibTeX@article{Pevny2008, author = {Pevny, T. and Fridrich, J. }, title = {Detection of Double-Compression in JPEG Images for Applications in Steganography}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2008}, volume = {3}, number = {2}, pages = {247--258}}
-
Image tampering detection using Bayer interpolation and JPEG compression
e-Forensics ´08: Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop
ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), 2008, pp. 1-5
BibTeX@inproceedings{Poilpre2008, author = {Poilpré, Marie-Charlotte and Perrot, Patrick and Talbot, Hugues}, title = {Image tampering detection using Bayer interpolation and JPEG compression}, booktitle = {e-Forensics ´08: Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop}, publisher = {ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)}, year = {2008}, pages = {1--5}}
-
A Convolutive Mixing Model for Shifted Double JPEG Compression with Application to Passive Image Authentication
IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
2008, pp. 1661-1664
BibTeX@inproceedings{Qu2008, author = {Qu, Zhenhua and Luo, Weiqi and Huang, Jiwu}, title = {A Convolutive Mixing Model for Shifted Double JPEG Compression with Application to Passive Image Authentication}, booktitle = {IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP)}, year = {2008}, pages = {1661-1664}}
-
Reuters Handbook of Journalism
2008
BibTeX@electronic{REUTERS2008, author = {REUTERS}, title = {Reuters Handbook of Journalism}, year = {2008}}
-
Improving Color Modeling for Alpha Matting
Proceedings of the British Machine Vision Conference 2008, CiteSeerX - Scientific Literature Digital Library and Search Engine [http://citeseerx.ist.psu.edu/oai2] (United States), 2008, Vol. -, pp. 1155 - 1164
BibTeX@article{Rhemann2009, author = {Christoph Rhemann and Carsten Rother and Margrit Gelautz}, title = {Improving Color Modeling for Alpha Matting}, journal = {Proceedings of the British Machine Vision Conference 2008}, year = {2008}, volume = {-}, pages = {1155 - 1164}}
-
3-D Depth Reconstruction from a Single Still Image
International Journal of Computer Vision, Springer Netherlands, 2008, Vol. 76, pp. 53-69
BibTeX@article{Saxena2008, author = {Saxena, Ashutosh and Chung, Sung and Ng, Andrew}, title = {3-D Depth Reconstruction from a Single Still Image}, journal = {International Journal of Computer Vision}, publisher = {Springer Netherlands}, year = {2008}, volume = {76}, pages = {53-69}}
-
Algorithms, Architectures and Information Systems Security
Bagchi, A., Bhattacharya, B. B., Sur-kolay, S. & Nandy, S. C. (ed.)
Chapter Overview of State-of-the-art in Digital Image Forensics
World Scientific Publishing Co., Inc., 2008, pp. 325-348
BibTeX@inbook{Sencar2008, author = {Sencar, Husrev T. and Memon, Nasir}, title = {Algorithms, Architectures and Information Systems Security}, publisher = {World Scientific Publishing Co., Inc.}, year = {2008}, pages = {325-348}}
-
First Digit Law and its Application to Digital Forensics
International Workshop on Digital Watermarking
2008
BibTeX@inproceedings{Shi2008, author = {Shi, Yun Qing}, title = {First Digit Law and its Application to Digital Forensics}, booktitle = {International Workshop on Digital Watermarking}, year = {2008}}
-
Steganalysis Versus Splicing Detection
IWDW ´07: Proceedings of the 6th International Workshop on Digital Watermarking
Springer-Verlag, 2008, pp. 158-172
BibTeX@inproceedings{Shi2008a, author = {Shi, Yun Q. and Chen, Chunhua and Xuan, Guorong and Su, Wei}, title = {Steganalysis Versus Splicing Detection}, booktitle = {IWDW ´07: Proceedings of the 6th International Workshop on Digital Watermarking}, publisher = {Springer-Verlag}, year = {2008}, pages = {158--172}}
-
Conditions for effective detection and identification of primary quantization of re-quantized JPEG images
e-Forensics ´08: Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop
ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), 2008, pp. 1-6
BibTeX@inproceedings{Sorell2008, author = {Sorell, Matthew James}, title = {Conditions for effective detection and identification of primary quantization of re-quantized JPEG images}, booktitle = {e-Forensics ´08: Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop}, publisher = {ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)}, year = {2008}, pages = {1--6}}
-
Simultaneous super-resolution and blind deconvolution
Journal of Physics:Conference Series
2008
BibTeX@conference{Sroubek2008, author = {Sroubek, G Cristobal and J Flusser}, title = {Simultaneous super-resolution and blind deconvolution}, booktitle = {Journal of Physics:Conference Series}, year = {2008}}
-
Blind forensics of contrast enhancement in digital images
Proc. 15th IEEE Int. Conf. Image Processing ICIP 2008
2008, pp. 3112-3115
BibTeX@inproceedings{Stamm2008a, author = {Stamm, M. and Liu, K. J. R.}, title = {Blind forensics of contrast enhancement in digital images}, booktitle = {Proc. 15th IEEE Int. Conf. Image Processing ICIP 2008}, year = {2008}, pages = {3112--3115}}
-
Nearest-Neighbor and Bilinear Resampling Factor Estimation to Detect Blockiness or Blurriness of an Image
Journal of Electronic Imaging, 2008, Vol. 17(2), pp. 94-101
BibTeX@article{Suwendi2008, author = {Suwendi, Ariawan and Allebach, Jan P.}, title = {Nearest-Neighbor and Bilinear Resampling Factor Estimation to Detect Blockiness or Blurriness of an Image}, journal = {Journal of Electronic Imaging}, year = {2008}, volume = {17}, number = {2}, pages = {94-101}}
-
Digital Image Forensics via Intrinsic Fingerprints
IEEE Transactions on Information Forensics and Security, 2008, Vol. 3(1), pp. 101-117
BibTeX@article{Swaminathan2008, author = {Swaminathan, Ashwin and Min Wu and Liu, K. J. R.}, title = {Digital Image Forensics via Intrinsic Fingerprints}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2008}, volume = {3}, number = {1}, pages = {101--117}}
-
A pattern classification framework for theoretical analysis of component forensics
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2008
2008, pp. 1665-1668
BibTeX@inproceedings{Swaminathan2008b, author = {Swaminathan, Ashwin. and Min Wu and Liu, K. J. R.}, title = {A pattern classification framework for theoretical analysis of component forensics}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2008}, year = {2008}, pages = {1665--1668}}
-
Localization of sparse image tampering via random projections
Proc. 15th IEEE Int. Conf. Image Processing ICIP 2008
2008, pp. 2092-2095
BibTeX@inproceedings{Tagliasacchi2008, author = {Tagliasacchi, Marco and Valenzise, Giuseppe and Tubaro, Stefano}, title = {Localization of sparse image tampering via random projections}, booktitle = {Proc. 15th IEEE Int. Conf. Image Processing ICIP 2008}, year = {2008}, pages = {2092--2095}}
-
A fast method for image noise estimation using Laplacian operator and adaptive edge detection
Proc. 3rd International Symposium on Communications, Control and Signal Processing ISCCSP 2008
2008, pp. 1077-1081
BibTeX@inproceedings{Tai2008, author = {Shen-Chuan Tai and Shih-Ming Yang}, title = {A fast method for image noise estimation using Laplacian operator and adaptive edge detection}, booktitle = {Proc. 3rd International Symposium on Communications, Control and Signal Processing ISCCSP 2008}, year = {2008}, pages = {1077--1081}}
-
Adaptive feature selection for digital camera source identification
Proc. IEEE Int. Symp. Circuits and Systems ISCAS 2008
2008, pp. 412-415
BibTeX@inproceedings{Tsai2008, author = {Min-Jen Tsai and Cheng-Sheng Wang}, title = {Adaptive feature selection for digital camera source identification}, booktitle = {Proc. IEEE Int. Symp. Circuits and Systems ISCAS 2008}, year = {2008}, pages = {412--415}}
-
Local invariant feature detectors: a survey
Found. Trends. Comput. Graph. Vis., Now Publishers Inc., 2008, Vol. 3(3), pp. 177-280
BibTeX@article{Tuytelaars2008, author = {Tuytelaars, Tinne and Mikolajczyk, Krystian}, title = {Local invariant feature detectors: a survey}, journal = {Found. Trends. Comput. Graph. Vis.}, publisher = {Now Publishers Inc.}, year = {2008}, volume = {3}, number = {3}, pages = {177--280}}
-
Image Processing for Computer Graphics and Vision
Gries, D. & Schneider, F. B. (ed.)
Springer, 2008
BibTeX@book{Velho2008, author = {Velho, Luiz, and Frery, Alejandro C. and Gomes, Jonas}, title = {Image Processing for Computer Graphics and Vision}, publisher = {Springer}, year = {2008}}
-
Detecting Re-Projected Video
International Workshop on Information Hiding
2008, pp. 72-86
BibTeX@inproceedings{Wang2008b, author = {Wang, Weihong and Farid, Hany}, title = {Detecting Re-Projected Video}, booktitle = {International Workshop on Information Hiding}, year = {2008}, pages = {72-86}}
-
Digital Image Forgery Detection Based on the Consistency of Defocus Blur
Proc. IIHMSP ´08 International Conference on Intelligent Information Hiding and Multimedia Signal Processing
2008, pp. 192-195
BibTeX@inproceedings{Wang2008, author = {Wang, Xin and Xuan, Bo and long Peng, Si}, title = {Digital Image Forgery Detection Based on the Consistency of Defocus Blur}, booktitle = {Proc. IIHMSP ´08 International Conference on Intelligent Information Hiding and Multimedia Signal Processing}, year = {2008}, pages = {192--195}}
-
Estimation of rescaling factor and detection of image splicing
Proc. 11th IEEE Int. Conf. Communication Technology ICCT 2008
2008, pp. 676-679
BibTeX@inproceedings{Weimin2008, author = {Wei Weimin and Wang Shuozhong and Tang Zhenjun}, title = {Estimation of rescaling factor and detection of image splicing}, booktitle = {Proc. 11th IEEE Int. Conf. Communication Technology ICCT 2008}, year = {2008}, pages = {676--679}}
-
Image Processing on Modern CPUs and GPUs
Emory University, 2008(TR-2008-023)
BibTeX@techreport{Wendykier2008, author = {Wendykier, Piotr and Nagy, James G.}, title = {Image Processing on Modern CPUs and GPUs}, year = {2008}, number = {TR-2008-023}}
-
Geometrically robust image content authentication using Zernike moments
Proc. Int Machine Learning and Cybernetics Conf
2008, Vol. 5, pp. 2874-2879
BibTeX@inproceedings{Wo2008, author = {Yan Wo and Guo-Qiang Han and Bo Zhang}, title = {Geometrically robust image content authentication using Zernike moments}, booktitle = {Proc. Int Machine Learning and Cybernetics Conf}, year = {2008}, volume = {5}, pages = {2874--2879}}
-
Detection of Digital Doctoring in Exemplar-Based Inpainted Images
International Conference on Machine Learning and Cybernetics
2008, pp. 1222-1226
BibTeX@inproceedings{Wu2008, author = {Wu, Qiong and Sun, Shao-Jie and Zhu, Wei and Li, Guo-Hui and Tu, Dan}, title = {Detection of Digital Doctoring in Exemplar-Based Inpainted Images}, booktitle = {International Conference on Machine Learning and Cybernetics}, year = {2008}, pages = {1222-1226}}
-
Detecting Digital Audio Forgeries by Checking Frame Offsets
ACM Proceedings of the Multimedia and Security Workshop
2008, pp. 21-26
BibTeX@inproceedings{Yang2008, author = {Yang, Rui and Qu, Zhenhua and Huang, Jiwu}, title = {Detecting Digital Audio Forgeries by Checking Frame Offsets}, booktitle = {ACM Proceedings of the Multimedia and Security Workshop}, year = {2008}, pages = {21-26}}
-
Exposing Digital Forgeries by Detecting Traces of Smoothing
Proc. 9th Int. Conf. for Young Computer Scientists ICYCS 2008
2008, pp. 1440-1445
BibTeX@inproceedings{Ying2008, author = {Chen Ying and Wang Yuping}, title = {Exposing Digital Forgeries by Detecting Traces of Smoothing}, booktitle = {Proc. 9th Int. Conf. for Young Computer Scientists ICYCS 2008}, year = {2008}, pages = {1440--1445}}
-
Recaptured Photo Detection using Specularity Distribution
IEEE International Conference on Image Processing
2008
BibTeX@inproceedings{Yu2008, author = {Yu, Hang and Ng, Tian-Tsong and Sun, Qibin}, title = {Recaptured Photo Detection using Specularity Distribution}, booktitle = {IEEE International Conference on Image Processing}, year = {2008}}
-
Detection of digital forgeries using an image interpolation from digital images
Proc. IEEE Int. Symp. Consumer Electronics ISCE 2008
2008, pp. 1-4
BibTeX@inproceedings{Yun2008, author = {Yong-In Yun and Jung-Beom Lee and Da-un Jung and Dong-Hwan Har and Jong-Soo Choi}, title = {Detection of digital forgeries using an image interpolation from digital images}, booktitle = {Proc. IEEE Int. Symp. Consumer Electronics ISCE 2008}, year = {2008}, pages = {1--4}}
-
Digital Camera Identification Based on Canonical Correlation Analysis
IEEE Workshop on Multimedia Signal Processing
2008, pp. 769-773
BibTeX@inproceedings{Zhang2008d, author = {Zhang, Chi and Zhang, Hongbin}, title = {Digital Camera Identification Based on Canonical Correlation Analysis}, booktitle = {IEEE Workshop on Multimedia Signal Processing}, year = {2008}, pages = {769-773}}
-
A new approach for detecting Copy-Move forgery in digital images
Proc. 11th IEEE Singapore International Conference on Communication Systems ICCS 2008
2008, pp. 362-366
BibTeX@inproceedings{Zhang2008, author = {Zhang, Jing and Feng, Zhanlei and Su, Yuting}, title = {A new approach for detecting Copy-Move forgery in digital images}, booktitle = {Proc. 11th IEEE Singapore International Conference on Communication Systems ICCS 2008}, year = {2008}, pages = {362--366}}
-
Image Blind Forensics Using Artificial Neural Network
Proc. Int Computer Science and Software Engineering Conf
2008, Vol. 4, pp. 847-850
BibTeX@inproceedings{Zhang2008g, author = {Zhen Zhang and Yukun Bian and Xijian Ping}, title = {Image Blind Forensics Using Artificial Neural Network}, booktitle = {Proc. Int Computer Science and Software Engineering Conf}, year = {2008}, volume = {4}, pages = {847--850}}
-
An Effective Algorithm of Image Splicing Detection
Proc. International Conference on Computer Science and Software Engineering
2008, Vol. 1, pp. 1035-1039
BibTeX@inproceedings{Zhang2008a, author = {Zhang, Zhen and Kang, Jiquan and Ren, Yuan}, title = {An Effective Algorithm of Image Splicing Detection}, booktitle = {Proc. International Conference on Computer Science and Software Engineering}, year = {2008}, volume = {1}, pages = {1035--1039}}
-
A survey on passive-blind image forgery by doctor method detection
Proc. Int Machine Learning and Cybernetics Conf
2008, Vol. 6, pp. 3463-3467
BibTeX@inproceedings{Zhang2008c, author = {Zhen Zhang and Yuan Ren and Xi-Jian Ping and Zhi-Yong He and Shan-Zhong Zhang}, title = {A survey on passive-blind image forgery by doctor method detection}, booktitle = {Proc. Int Machine Learning and Cybernetics Conf}, year = {2008}, volume = {6}, pages = {3463--3467}}
-
Study of Image Splicing Detection
International Conference on Intelligent Computing
2008, pp. 1103-1110
BibTeX@inproceedings{Zhang2008b, author = {Zhang, Zhen and Zhou, Ying and Kang, Jiquan and Ren, Yuan}, title = {Study of Image Splicing Detection}, booktitle = {International Conference on Intelligent Computing}, year = {2008}, pages = {1103-1110}}
2007
-
Mit Bildern lügen
Metten, T. (ed.)
Chapter Wörter lügen manchmal, Bilder immer. Wissenschaft nach der Wende zum Bild.
Herbert von Halem Verlag, 2007
BibTeX@inbook{Albrecht2007, author = {Albrecht, Clemens}, title = {Mit Bildern lügen}, publisher = {Herbert von Halem Verlag}, year = {2007}}
-
Wavelet-Based Multiresolution Features for Detecting Duplications in Images
Machine Vision Application
2007, pp. 264-267
BibTeX@inproceedings{Bashar2007, author = {Bashar, Md. Khayrul and Noda, Keiji and Ohnishi, Noboru and Kudo, Hiroaki and Matsumoto, Tetsuya and Takeuchi, Yoshinori}, title = {Wavelet-Based Multiresolution Features for Detecting Duplications in Images}, booktitle = {Machine Vision Application}, year = {2007}, pages = {264-267}}
-
Photometric Stereo with General, Unknown Lighting
International Journal of Computer Vision, Springer Netherlands, 2007, Vol. 72, pp. 239-257
BibTeX@article{Basri2007, author = {Basri, Ronen and Jacobs, David and Kemelmacher, Ira}, title = {Photometric Stereo with General, Unknown Lighting}, journal = {International Journal of Computer Vision}, publisher = {Springer Netherlands}, year = {2007}, volume = {72}, pages = {239-257}}
-
Forensic Audio and Visual Evidence
International Forensic Science Symposium
2007, pp. 372-413
BibTeX@inproceedings{Bijhold2007, author = {Bijhold, Jurrien and Ruifrok, Arnout and Jessen, Michael and Geradts, Zeno J. and Ehrhardt, Sabine and Alberink, Ivo}, title = {Forensic Audio and Visual Evidence}, booktitle = {International Forensic Science Symposium}, year = {2007}, pages = {372-413}}
-
Blind Identification of Cellular Phone Cameras
Delp, E. J. & Wong, P. W. (ed.)
SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents
2007, Vol. 6505
BibTeX@inproceedings{Celiktutan2007a, author = {Celiktutan, Oya and Avcibas, Ismail and Sankur, Bulent}, title = {Blind Identification of Cellular Phone Cameras}, booktitle = {SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents}, year = {2007}, volume = {6505}}
-
Digital Camera Identification
Proc. IEEE 15th Signal Processing and Communications Applications SIU 2007
2007, pp. 1-4
BibTeX@inproceedings{Celiktutan2007, author = {Celiktutan, O. and Sankur, B. and Avcibas, I.}, title = {Digital Camera Identification}, booktitle = {Proc. IEEE 15th Signal Processing and Communications Applications SIU 2007}, year = {2007}, pages = {1--4}}
-
Blind Passive Media Forensics: Motivation and Opportunity
Multimedia Content Analysis and Mining
2007, pp. 57-59
BibTeX@inproceedings{Chang2007, author = {Chang, Shih-Fu}, title = {Blind Passive Media Forensics: Motivation and Opportunity}, booktitle = {Multimedia Content Analysis and Mining}, year = {2007}, pages = {57-59}}
-
Source digital camcorder identification using sensor photo response non-uniformity
III, E. J. D. & Wong, P. W. (ed.)
Proceeding of the SPIE, 2007
Security, Steganography, and Watermarking of Multimedia Contents IX, SPIE, 2007, Vol. 6505(1), pp. 65051G
BibTeX@conference{Chen2007b, author = {Mo Chen and Jessica Fridrich and Miroslav Goljan and Jan Lukaš}, title = {Source digital camcorder identification using sensor photo response non-uniformity}, booktitle = {Proceeding of the SPIE, 2007}, journal = {Security, Steganography, and Watermarking of Multimedia Contents IX}, publisher = {SPIE}, year = {2007}, volume = {6505}, number = {1}, pages = {65051G}}
-
Source Camera Identification Based on Camera Gain Histogram
IEEE International Conference on Image Processing
2007, Vol. 4, pp. IV-429-IV-432
BibTeX@inproceedings{Chen2007e, author = {Chen, Sz-Han and Hsu, Chiou-Ting}, title = {Source Camera Identification Based on Camera Gain Histogram}, booktitle = {IEEE International Conference on Image Processing}, year = {2007}, volume = {4}, pages = {IV-429-IV-432}}
-
Image splicing detection using 2-D phase congruency and statistical moments of characteristic function
Proc. SPIE
2007
BibTeX@inproceedings{Chen2007a, author = {Wen Chen and Yun Q. Shi}, title = {Image splicing detection using 2-D phase congruency and statistical moments of characteristic function}, booktitle = {Proc. SPIE}, year = {2007}}
-
Identifying Computer Graphics using HSV Color Model and Statistical Moments of Characteristic Functions
Proc. IEEE Int Multimedia and Expo Conf
2007, pp. 1123-1126
BibTeX@inproceedings{Chen2007c, author = {Wen Chen and Shi, Y. Q. and Guorong Xuan}, title = {Identifying Computer Graphics using HSV Color Model and Statistical Moments of Characteristic Functions}, booktitle = {Proc. IEEE Int Multimedia and Expo Conf}, year = {2007}, pages = {1123--1126}}
-
Digital still camera forensics
Small Scale Digital Device Forensics Journal, 2007, Vol. 1(1), pp. 1-8
BibTeX@article{Cohen2007, author = {Cohen, K.}, title = {Digital still camera forensics}, journal = {Small Scale Digital Device Forensics Journal}, year = {2007}, volume = {1}, number = {1}, pages = {1--8}}
-
Bildmanipulation: Wie Computer unsere Wirklichkeit verzerren (German)
Deussen, O. (ed.)
Spektrum Akademischer Verlag, 2007, pp. 185
BibTeX@book{Deussen2007, author = {Oliver Deussen}, title = {Bildmanipulation: Wie Computer unsere Wirklichkeit verzerren (German)}, publisher = {Spektrum Akademischer Verlag}, year = {2007}, pages = {185}}
-
New Features to Identify Computer Generated Images
Proc. IEEE International Conference on Image Processing ICIP 2007
2007, Vol. 4, pp. IV-433-IV-436
BibTeX@inproceedings{Dirik2007a, author = {Dirik, A. E. and Bayram, S. and Sencar, H. T. and Memon, N.}, title = {New Features to Identify Computer Generated Images}, booktitle = {Proc. IEEE International Conference on Image Processing ICIP 2007}, year = {2007}, volume = {4}, pages = {IV--433--IV--436}}
-
Source Camera Identification Based on Sensor Dust Characteristics
Proc. IEEE Workshop on Signal Processing Applications for Public Security and Forensics SAFE ´07
2007, pp. 1-6
BibTeX@inproceedings{Dirik2007, author = {Dirik, A. Emir and Sencar, Husrev T. and Memon, Nasir}, title = {Source Camera Identification Based on Sensor Dust Characteristics}, booktitle = {Proc. IEEE Workshop on Signal Processing Applications for Public Security and Forensics SAFE ´07}, year = {2007}, pages = {1--6}}
-
Detecting filtered cloning in digital images
MM&Sec ´07: Proceedings of the 9th workshop on Multimedia & security
ACM, 2007, pp. 43-50
BibTeX@inproceedings{Dybala2007, author = {Dybala, Brandon and Jennings, Brian and Letscher, David}, title = {Detecting filtered cloning in digital images}, booktitle = {MM&Sec ´07: Proceedings of the 9th workshop on Multimedia & security}, publisher = {ACM}, year = {2007}, pages = {43--50}}
-
Photorealistic Rendering: How Realistic Is It?
Vision Sciences
2007
BibTeX@inproceedings{Farid2007a, author = {Farid, Hany and Bravo, Mary J.}, title = {Photorealistic Rendering: How Realistic Is It?}, booktitle = {Vision Sciences}, year = {2007}}
-
Video Stabilization and Enhancement
Department of Computer Science, Dartmouth College, 2007(TR2007-605)
BibTeX@techreport{Farid2007, author = {Farid, Hany and Woodward, Jeffrey B.}, title = {Video Stabilization and Enhancement}, year = {2007}, number = {TR2007-605}}
-
Image upsampling via imposed edge statistics
ACM Trans. Graph., ACM, 2007, Vol. 26(3), pp. 95
BibTeX@article{Fattal2007, author = {Fattal, Raanan}, title = {Image upsampling via imposed edge statistics}, journal = {ACM Trans. Graph.}, publisher = {ACM}, year = {2007}, volume = {26}, number = {3}, pages = {95}}
-
Simulation of an image acquisition system
Proc. th Int Electronics Technology Spring Seminar
2007, pp. 357-360
BibTeX@inproceedings{Florin2007, author = {Florin, T. }, title = {Simulation of an image acquisition system}, booktitle = {Proc. th Int Electronics Technology Spring Seminar}, year = {2007}, pages = {357--360}}
-
Simulation of a Digital Camera Pipeline
Proc. Int. Symp. Signals, Circuits and Systems ISSCS 2007
2007, Vol. 2, pp. 1-4
BibTeX@inproceedings{Florin2007a, author = {Florin, T. }, title = {Simulation of a Digital Camera Pipeline}, booktitle = {Proc. Int. Symp. Signals, Circuits and Systems ISSCS 2007}, year = {2007}, volume = {2}, pages = {1--4}}
-
Das Bild im digitalen Zeitalter - Die Frage nach der Authentizität der Fotografie
2007
BibTeX@misc{Franz2007, author = {Franz, Janina}, title = {Das Bild im digitalen Zeitalter - Die Frage nach der Authentizität der Fotografie}, year = {2007}}
-
Imaging Sensor Noise as Digital X-ray for Revealing Forgeries
International Workshop on Information Hiding
2007, pp. 342-358
BibTeX@inproceedings{Fridrich2007, author = {Fridrich, Jessica and Chen, Mo and Goljan, Miroslav}, title = {Imaging Sensor Noise as Digital X-ray for Revealing Forgeries}, booktitle = {International Workshop on Information Hiding}, year = {2007}, pages = {342-358}}
-
A generalized Benford´s law for JPEG coefficients and its applications in image forensics
Proc. SPIE
2007, Vol. 6505
BibTeX@inproceedings{Fu2007, author = {Dongdong Fu and Yun Q. Shi}, title = {A generalized Benford´s law for JPEG coefficients and its applications in image forensics}, booktitle = {Proc. SPIE}, year = {2007}, volume = {6505}}
-
Forensics for Flatbed Scanners
Delp, E. J. & Wong, P. W. (ed.)
SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents
2007, Vol. 6505
BibTeX@inproceedings{Gloe2007b, author = {Gloe, Thomas and Franz, Elke and Winkler, Antje}, title = {Forensics for Flatbed Scanners}, booktitle = {SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents}, year = {2007}, volume = {6505}}
-
Can we trust digital image forensics?
MULTIMEDIA ´07: Proceedings of the 15th international conference on Multimedia
ACM, 2007, pp. 78-86
BibTeX@inproceedings{Gloe2007, author = {Gloe, Thomas and Kirchner, Matthias and Winkler, Antje and Böhme, Rainer}, title = {Can we trust digital image forensics?}, booktitle = {MULTIMEDIA ´07: Proceedings of the 15th international conference on Multimedia}, publisher = {ACM}, year = {2007}, pages = {78--86}}
-
Identifying Common Source Digital Camera from Image Pairs
IEEE International Conference on Image Processing
2007
BibTeX@inproceedings{Goljan2007, author = {Goljan, Miroslav and Chen, Mo and Fridrich, Jessica}, title = {Identifying Common Source Digital Camera from Image Pairs}, booktitle = {IEEE International Conference on Image Processing}, year = {2007}}
-
Digital Image Forgery Detection Using Artificial Neural Network and Independent Component Analysis
Applied Mathematics and Computation, 2007, Vol. 194(2), pp. 540-543
BibTeX@article{Gopi2007, author = {Gopi, E. S.}, title = {Digital Image Forgery Detection Using Artificial Neural Network and Independent Component Analysis}, journal = {Applied Mathematics and Computation}, year = {2007}, volume = {194}, number = {2}, pages = {540-543}}
-
Noise Features for Image Tampering Detection and Steganalysis
Proc. IEEE Int. Conf. Image Processing ICIP 2007
2007, Vol. 6
BibTeX@inproceedings{Gou2007, author = {Hongmei Gou and Swaminathan, A. and Min Wu}, title = {Noise Features for Image Tampering Detection and Steganalysis}, booktitle = {Proc. IEEE Int. Conf. Image Processing ICIP 2007}, year = {2007}, volume = {6}}
-
Robust scanner identification based on noise features
Proceedings of SPIE
2007, Vol. Volume 6505
BibTeX@inproceedings{Gou2007a, author = {Gou, Hongmei and Swaminathan, Ashwin and Wu, Min}, title = {Robust scanner identification based on noise features}, booktitle = {Proceedings of SPIE}, year = {2007}, volume = {Volume 6505}}
-
Applications of ENF Criterion in Forensic Audio, Video, Computer and Telecommunication Analysis
Forensic Science International, 2007, Vol. 167(2-3), pp. 136-145
BibTeX@article{Grigoras2007, author = {Grigoras, Catalin}, title = {Applications of ENF Criterion in Forensic Audio, Video, Computer and Telecommunication Analysis}, journal = {Forensic Science International}, year = {2007}, volume = {167}, number = {2-3}, pages = {136-145}}
-
Applications of ENF Analysis Method in Forensic Authentication of Digital Audio and Video Recordings
123rd AES Convention
2007
BibTeX@inproceedings{Grigoras2007a, author = {Grigoras, Catalin}, title = {Applications of ENF Analysis Method in Forensic Authentication of Digital Audio and Video Recordings}, booktitle = {123rd AES Convention}, year = {2007}}
-
SVD Based Source Cell-Phone Identification
Proc. IEEE 15th Signal Processing and Communications Applications SIU 2007
2007, pp. 1-4
BibTeX@inproceedings{Gul2007, author = {Gül, Gökhan and Avcibas, Ismail}, title = {SVD Based Source Cell-Phone Identification}, booktitle = {Proc. IEEE 15th Signal Processing and Communications Applications SIU 2007}, year = {2007}, pages = {1--4}}
-
Document Frauds: Identification and Linking Fake Document to Scanners and Printers
International Conference on Theory and Applications
2007, pp. 497-501
BibTeX@inproceedings{Gupta2007, author = {Gupta, Gaurav and Saha, Sanjoy Kumar and Chakraborty, Shayok and Mazumdar, Chandan}, title = {Document Frauds: Identification and Linking Fake Document to Scanners and Printers}, booktitle = {International Conference on Theory and Applications}, year = {2007}, pages = {497-501}}
-
Tamper Detection with Self-Correction Hybrid Spatial-DCT Domains Image Authentication Technique
Proc. IEEE Int Signal Processing and Information Technology Symp
2007, pp. 369-374
BibTeX@inproceedings{Hasan2007, author = {Hasan, Y. M. Y. and Hassan, A. M. }, title = {Tamper Detection with Self-Correction Hybrid Spatial-DCT Domains Image Authentication Technique}, booktitle = {Proc. IEEE Int Signal Processing and Information Technology Symp}, year = {2007}, pages = {369--374}}
-
Image Splicing Detection using Camera Response Function Consistency and Automatic Segmentation
Proc. IEEE Int Multimedia and Expo Conf
2007, pp. 28-31
BibTeX@inproceedings{Hsu2007, author = {Yu-Feng Hsu and Shih-Fu Chang}, title = {Image Splicing Detection using Camera Response Function Consistency and Automatic Segmentation}, booktitle = {Proc. IEEE Int Multimedia and Expo Conf}, year = {2007}, pages = {28--31}}
-
Image Sensor Noise Estimation and Reduction
2007
BibTeX@misc{Ibenthal2007, author = {Achim Ibenthal}, title = {Image Sensor Noise Estimation and Reduction}, year = {2007}}
-
Lighting and Optical Tools for Image Forensics
Department of Computer Science, Dartmouth College, 2007
BibTeX@phdthesis{Johnson2007c, author = {Johnson, Micah Kimo}, title = {Lighting and Optical Tools for Image Forensics}, school = {Department of Computer Science, Dartmouth College}, year = {2007}}
-
Exposing Digital Forgeries in Complex Lighting Environments
IEEE Transactions on Information Forensics and Security, 2007, Vol. 3(2), pp. 450-461
BibTeX@article{Johnson2007, author = {Johnson, Micah Kimo and Farid, Hany}, title = {Exposing Digital Forgeries in Complex Lighting Environments}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2007}, volume = {3}, number = {2}, pages = {450-461}}
-
Exposing Digital Forgeries Through Specular Highlights on the Eye
International Workshop on Information Hiding
2007, pp. 311-325
BibTeX@inproceedings{Johnson2007a, author = {Johnson, Micah Kimo and Farid, Hany}, title = {Exposing Digital Forgeries Through Specular Highlights on the Eye}, booktitle = {International Workshop on Information Hiding}, year = {2007}, pages = {311-325}}
-
An Authentication Method for Copy Areas of Images
Proc. Fourth Int. Conf. Image and Graphics ICIG 2007
2007, pp. 303-306
BibTeX@inproceedings{Ju2007, author = {Shenggen Ju and Jiliu Zhou and Kun He}, title = {An Authentication Method for Copy Areas of Images}, booktitle = {Proc. Fourth Int. Conf. Image and Graphics ICIG 2007}, year = {2007}, pages = {303--306}}
-
Automatic Removal of Chromatic Aberration from a Single Image
Proc. IEEE Conference on Computer Vision and Pattern Recognition CVPR ´07
2007, pp. 1-8
BibTeX@inproceedings{Kang2007, author = {Sing Bing Kang}, title = {Automatic Removal of Chromatic Aberration from a Single Image}, booktitle = {Proc. IEEE Conference on Computer Vision and Pattern Recognition CVPR ´07}, year = {2007}, pages = {1--8}}
-
Printer and Sensor Forensics
Proc. IEEE Workshop Signal Processing Applications for Public Security and Forensics SAFE ´07
2007, pp. 1-8
BibTeX@inproceedings{Khanna2007b, author = {Khanna, Nitin and Mikkilineni, Aravind K. and Chiang, Pei-Ju and Ortiz, Maria V. and Shah, Vivek and Suh, Sungjoo and Chiu, George T.-C. and Allebach, Jan P. and Delp, Edward J.}, title = {Printer and Sensor Forensics}, booktitle = {Proc. IEEE Workshop Signal Processing Applications for Public Security and Forensics SAFE ´07}, year = {2007}, pages = {1--8}}
-
Sensor Forensics: Printers, Cameras and Scanners, They Never Lie
Proc. IEEE Int Multimedia and Expo Conf
2007, pp. 20-23
BibTeX@inproceedings{Khanna2007c, author = {Khanna, N. and Mikkilineni, A. K. and Pei-Ju Chiang and Ortiz, M. V. and Sungjoo Suh and Chiu, G. T.-C. and Allebach, J. P. and Delp, E. J.}, title = {Sensor Forensics: Printers, Cameras and Scanners, They Never Lie}, booktitle = {Proc. IEEE Int Multimedia and Expo Conf}, year = {2007}, pages = {20--23}}
-
Scanner Identification Using Sensor Pattern Noise
Proceedings of SPIE
School of Electrical and Computer Engineering School of Mechanical Engineering Purdue University, West Lafayette, Indiana USA, 2007
BibTeX@inproceedings{Khanna2007, author = {Khanna, Nitin and Mikkilineni, Aravind K. and Chiu, George T. C. and Allebach, Jan P. and Delp, Edward J.}, title = {Scanner Identification Using Sensor Pattern Noise}, booktitle = {Proceedings of SPIE}, year = {2007}}
-
Forensic classification of imaging sensor types
Proceedings of SPIE
2007
BibTeX@inproceedings{Khanna2007a, author = {Khanna, Nitin and Mikkilineni, Aravind K. and Chiu, George T. C. and Allebach, Jan P. and Delp, Edward J.}, title = {Forensic classification of imaging sensor types}, booktitle = {Proceedings of SPIE}, year = {2007}}
-
Image Tamper Detection using Mathematical Morphology
Proc. IEEE Int. Conf. Image Processing ICIP 2007
2007, Vol. 6
BibTeX@inproceedings{Kihara2007, author = {Kihara, M. and Fujiyoshi, M. and Qing Tao Wan and Kiya, H. }, title = {Image Tamper Detection using Mathematical Morphology}, booktitle = {Proc. IEEE Int. Conf. Image Processing ICIP 2007}, year = {2007}, volume = {6}}
-
Tamper Hiding: Defeating Image Forensics
Furon, T., Cayre, F., Doerr, G. & Bas, P. (ed.)
International Workshop on Information Hiding
2007, pp. 326-341
BibTeX@inproceedings{Kirchner2007, author = {Kirchner, Matthias and Böhme, Rainer}, title = {Tamper Hiding: Defeating Image Forensics}, booktitle = {International Workshop on Information Hiding}, year = {2007}, pages = {326-341}}
-
A Survey on Digital Camera Image Forensic Methods
Proc. IEEE Int Multimedia and Expo Conf
2007, pp. 16-19
BibTeX@inproceedings{Lanh2007, author = {Tran Van Lanh and Kai-Sen Chong and Emmanuel, S. and Kankanhalli, M. S. }, title = {A Survey on Digital Camera Image Forensic Methods}, booktitle = {Proc. IEEE Int Multimedia and Expo Conf}, year = {2007}, pages = {16--19}}
-
A Sorted Neighborhood Approach for Detecting Duplicated Regions in Image Forgeries Based on DWT and SVD
Proc. IEEE Int Multimedia and Expo Conf
2007, pp. 1750-1753
BibTeX@inproceedings{Li2007, author = {Guohui Li and Qiong Wu and Dan Tu and Shaojie Sun}, title = {A Sorted Neighborhood Approach for Detecting Duplicated Regions in Image Forgeries Based on DWT and SVD}, booktitle = {Proc. IEEE Int Multimedia and Expo Conf}, year = {2007}, pages = {1750--1753}}
-
Mit Bildern lügen
Metten, T. (ed.)
Herbert von Halem Verlag, 2007
BibTeX@book{Liebert2007, author = {Wolf A. Liebert}, title = {Mit Bildern lügen}, publisher = {Herbert von Halem Verlag}, year = {2007}, edition = {1. Aufl.}}
-
Image Source Coding Forensics via Intrinsic Fingerprints
Proc. IEEE Int Multimedia and Expo Conf
2007, pp. 1127-1130
BibTeX@inproceedings{Lin2007, author = {Lin, W. S. and Tjoa, S. and Zhao, H. V. and Liu, K. J. R.}, title = {Image Source Coding Forensics via Intrinsic Fingerprints}, booktitle = {Proc. IEEE Int Multimedia and Expo Conf}, year = {2007}, pages = {1127--1130}}
-
Sixth-Order Statistics-Based Non-Data-Aided SNR Estimation
IEEE Communications Letters, 2007, Vol. 11(4), pp. 351-353
BibTeX@article{Lopez-Valcarce2007, author = {López-Valcarce, R. and Mosquera, C.}, title = {Sixth-Order Statistics-Based Non-Data-Aided SNR Estimation}, journal = {IEEE Communications Letters}, year = {2007}, volume = {11}, number = {4}, pages = {351--353}}
-
A Novel Method for Detecting Cropped and Recompressed Image Block
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2007
2007, Vol. 2
BibTeX@inproceedings{Luo2007, author = {Weiqi Luo and Zhenhua Qu and Jiwu Huang and Guoping Qiu}, title = {A Novel Method for Detecting Cropped and Recompressed Image Block}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2007}, year = {2007}, volume = {2}}
-
A survey of passive technology for digital image forensics
Frontiers of Computer Science in China, Higher Education Press, co-published with Springer-Verlag GmbH, 2007, Vol. 1, pp. 166-179
BibTeX@article{Luo2007a, author = {Luo, Weiqi and Qu, Zhenhua and Pan, Feng and Huang, Jiwu}, title = {A survey of passive technology for digital image forensics}, journal = {Frontiers of Computer Science in China}, publisher = {Higher Education Press, co-published with Springer-Verlag GmbH}, year = {2007}, volume = {1}, pages = {166-179}}
-
Detection of copy-move forgery using a method based on blur moment invariants.
Forensic Sci Int, Institute of Information Theory and Automation, Academy of Sciences of the Czech Republic, Prague, Czech Republic. mahdian@utia.cas.cz, 2007, Vol. 171(2-3), pp. 180-189
BibTeX@article{Mahdian2007, author = {Babak Mahdian and Stanislav Saic}, title = {Detection of copy-move forgery using a method based on blur moment invariants.}, journal = {Forensic Sci Int}, year = {2007}, volume = {171}, number = {2-3}, pages = {180--189}}
-
On Periodic Properties of Interpolation and Their Application To Image Authentication
Proc. Third Int. Symp. Information Assurance and Security IAS 2007
2007, pp. 439-446
BibTeX@inproceedings{Mahdian2007a, author = {Mahdian, B. and Saic, S.}, title = {On Periodic Properties of Interpolation and Their Application To Image Authentication}, booktitle = {Proc. Third Int. Symp. Information Assurance and Security IAS 2007}, year = {2007}, pages = {439--446}}
-
Detection of Copy Move Forgery Using a Method Based on Blur Moment Invariants
Forensic Science International, 2007, Vol. 171, pp. 180-189
BibTeX@article{Mahdian2007c, author = {Mahdian, Babak and Saic, Stanislav}, title = {Detection of Copy Move Forgery Using a Method Based on Blur Moment Invariants}, journal = {Forensic Science International}, year = {2007}, volume = {171}, pages = {180-189}}
-
Calibration and removal of lateral chromatic aberration in images
Pattern Recognition Letters, 2007, Vol. 28(1), pp. 125 - 135
BibTeX@article{Mallon2007, author = {John Mallon and Paul F. Whelan}, title = {Calibration and removal of lateral chromatic aberration in images}, journal = {Pattern Recognition Letters}, year = {2007}, volume = {28}, number = {1}, pages = {125 - 135}}
-
Detection of Malevolent Changes in Digital Video for Forensic Applications
Delp, E. J. & Wong, P. W. (ed.)
SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents
2007, Vol. 6505
BibTeX@inproceedings{Mondaini2007, author = {Mondaini, N. and Caldelli, Roberto and Piva, Alessandro and Barni, Mauro and Cappellini, Vito}, title = {Detection of Malevolent Changes in Digital Video for Forensic Applications}, booktitle = {SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents}, year = {2007}, volume = {6505}}
-
Detection of Region Duplication Forgery in Digital Images Using Wavelets and Log-Polar Mapping
Computational Intelligence and Multimedia Applications, International Conference on, IEEE Computer Society, 2007, Vol. 3, pp. 371-377
BibTeX@article{Myna2007, author = {A.N. Myna and M.G. Venkateshmurthy and C.G Patil}, title = {Detection of Region Duplication Forgery in Digital Images Using Wavelets and Log-Polar Mapping}, journal = {Computational Intelligence and Multimedia Applications, International Conference on}, publisher = {IEEE Computer Society}, year = {2007}, volume = {3}, pages = {371-377}}
-
Detection of Region Duplication Forgery in Digital Images Using Wavelets and Log-Polar Mapping
Proc. Int Conf. Computational Intelligence and Multimedia Applications Conf
2007, Vol. 3, pp. 371-377
BibTeX@inproceedings{Myrna2007, author = {Myrna, A. N. and Venkateshmurthy, M. G. and Patil, C. G. }, title = {Detection of Region Duplication Forgery in Digital Images Using Wavelets and Log-Polar Mapping}, booktitle = {Proc. Int Conf. Computational Intelligence and Multimedia Applications Conf}, year = {2007}, volume = {3}, pages = {371--377}}
-
Lessons Learned from Online Classification of Photo-Realistic Computer Graphics and Photographs
Department of Electrical Engineering Columbia University New York, NY 10027, 2007
BibTeX@techreport{Ng2007a, author = {Ng, Tian-tsong and Chang, Shih-fu}, title = {Lessons Learned from Online Classification of Photo-Realistic Computer Graphics and Photographs}, year = {2007}}
-
Using Geometry Invariants for Camera Response Function Estimation
Proc. IEEE Conference on Computer Vision and Pattern Recognition CVPR ´07
2007, pp. 1-8
BibTeX@inproceedings{Ng2007, author = {Ng, Tian-Tsong and Chang, Shih-Fu and Tsui, Mao-Pei}, title = {Using Geometry Invariants for Camera Response Function Estimation}, booktitle = {Proc. IEEE Conference on Computer Vision and Pattern Recognition CVPR ´07}, year = {2007}, pages = {1--8}}
-
Sensometrics: Identifying Pen Digitizers by Statistical Multimedia Signal Processing
SPIE Conference on Multimedia on Mobile Devices III
2007
BibTeX@inproceedings{Oermann2007, author = {Oermann, Andrea and Vielhauer, Claus and Dittmann, Jana}, title = {Sensometrics: Identifying Pen Digitizers by Statistical Multimedia Signal Processing}, booktitle = {SPIE Conference on Multimedia on Mobile Devices III}, year = {2007}}
-
Digital Image Processing
Wiley-Interscience, 2007
BibTeX@book{Pratt2007, author = {Pratt, William K.}, title = {Digital Image Processing}, publisher = {Wiley-Interscience}, year = {2007}}
-
Robust Hash for Detecting and Localizing Image Tampering
Proc. IEEE Int. Conf. Image Processing ICIP 2007
2007, Vol. 6
BibTeX@inproceedings{Roy2007, author = {Sujoy Roy and Qibin Sun}, title = {Robust Hash for Detecting and Localizing Image Tampering}, booktitle = {Proc. IEEE Int. Conf. Image Processing ICIP 2007}, year = {2007}, volume = {6}}
-
Changing History: Doctored Photographs Affect Memory for Past Public Events
Applied Cognitive Psychology, 2007, Vol. Volume 21 Issue 8(21), pp. 1005-1022
BibTeX@article{Sacchi2007, author = {Sacchi, Dario L. M. and Agnoli, Franca and Loftus, Elizabeth F.}, title = {Changing History: Doctored Photographs Affect Memory for Past Public Events}, journal = {Applied Cognitive Psychology}, year = {2007}, volume = {Volume 21 Issue 8}, number = {21}, pages = {1005-1022}}
-
The use of Photoshop
2007
BibTeX@electronic{Schlesinger2007, author = {David Schlesinger}, title = {The use of Photoshop}, year = {2007}}
-
Overview of State-of-Art in Digital Image Forensics
Proc. of WSPC
2007
BibTeX@inproceedings{Sencar2007, author = {H. T. Sencar and N. Memon}, title = {Overview of State-of-Art in Digital Image Forensics}, booktitle = {Proc. of WSPC}, year = {2007}}
-
A natural image model approach to splicing detection
MM&Sec ´07: Proceedings of the 9th workshop on Multimedia & security
ACM, 2007, pp. 51-62
BibTeX@inproceedings{Shi2007, author = {Shi, Yun Q. and Chen, Chunhua and Chen, Wen}, title = {A natural image model approach to splicing detection}, booktitle = {MM&Sec ´07: Proceedings of the 9th workshop on Multimedia & security}, publisher = {ACM}, year = {2007}, pages = {51--62}}
-
Reduction of blocking artifacts in JPEG compressed images
Digital Signal Processing, 2007, Vol. 17(1), pp. 225 - 243
BibTeX@article{Singh2007, author = {Sukhwinder Singh and Vinod Kumar and H.K. Verma}, title = {Reduction of blocking artifacts in JPEG compressed images}, journal = {Digital Signal Processing}, year = {2007}, volume = {17}, number = {1}, pages = {225 - 243}}
-
Image noise estimation using color information
HP Laboratories Israel HPL-2005-2(R.1), 2007
BibTeX@techreport{Staelin2007, author = {Carl Staelin and Hila Nachlieli}, title = {Image noise estimation using color information}, year = {2007}}
-
Improvements on Sensor Noise Based Source Camera Identification
Proc. IEEE International Conference on Multimedia and Expo
2007, pp. 24-27
BibTeX@inproceedings{Sutcu2007a, author = {Sutcu, Y. and Bayram, S. and Sencar, H. T. and Memon, N.}, title = {Improvements on Sensor Noise Based Source Camera Identification}, booktitle = {Proc. IEEE International Conference on Multimedia and Expo}, year = {2007}, pages = {24--27}}
-
Tamper Detection Based on Regularity of Wavelet Transform Coefficients
IEEE International Conference on Image Processing
2007
BibTeX@inproceedings{Sutcu2007, author = {Sutcu, Yagiz and Coskun, Baris and Sencar, Husrev T. and Memon, Nasir}, title = {Tamper Detection Based on Regularity of Wavelet Transform Coefficients}, booktitle = {IEEE International Conference on Image Processing}, year = {2007}}
-
A Component Estimation Framework for Information Forensics
Proc. IEEE 9th Workshop Multimedia Signal Processing MMSP 2007
2007, pp. 397-400
BibTeX@inproceedings{Swaminathan2007, author = {Swaminathan, Ashwin and Min Wu and Liu, K. J. R.}, title = {A Component Estimation Framework for Information Forensics}, booktitle = {Proc. IEEE 9th Workshop Multimedia Signal Processing MMSP 2007}, year = {2007}, pages = {397--400}}
-
Nonintrusive Component Forensics of Visual Sensors Using Output Images
IEEE Transactions on Information Forensics and Security, 2007, Vol. 2(1), pp. 91-106
BibTeX@article{Swaminathan2007b, author = {Swaminathan, Ashwin and Min Wu and K. J. Ray Liu}, title = {Nonintrusive Component Forensics of Visual Sensors Using Output Images}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2007}, volume = {2}, number = {1}, pages = {91--106}}
-
Intrinsic Fingerprints for Image Authentication and Steganalysis
SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents
2007
BibTeX@inproceedings{Swaminathan2007d, author = {Swaminathan, Ashwin and Wu, Min and Liu, K. J. Ray}, title = {Intrinsic Fingerprints for Image Authentication and Steganalysis}, booktitle = {SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents}, year = {2007}}
-
Optimization of Input Pattern for Semi Non-Intrusive Component Forensics of Digital Cameras
IEEE International Conference on Acoustics, Speech and Signal Processing
2007, pp. 225-228
BibTeX@inproceedings{Swaminathan2007e, author = {Swaminathan, Ashwin and Wu, Min and Liu, K. J. Ray}, title = {Optimization of Input Pattern for Semi Non-Intrusive Component Forensics of Digital Cameras}, booktitle = {IEEE International Conference on Acoustics, Speech and Signal Processing}, year = {2007}, pages = {225-228}}
-
Transform Coder Classification for Digital Image Forensics
Proc. IEEE Int. Conf. Image Processing ICIP 2007
2007, Vol. 6
BibTeX@inproceedings{Tjoa2007a, author = {Tjoa, S. and Lin, W. S. and Liu, K. J. R.}, title = {Transform Coder Classification for Digital Image Forensics}, booktitle = {Proc. IEEE Int. Conf. Image Processing ICIP 2007}, year = {2007}, volume = {6}}
-
Block Size Forensic Analysis in Digital Images
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2007
2007, Vol. 1
BibTeX@inproceedings{Tjoa2007, author = {Tjoa, S. and Lin, W. S. and Zhao, H. V. and Liu, K. J. R.}, title = {Block Size Forensic Analysis in Digital Images}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2007}, year = {2007}, volume = {1}}
-
Camera/Mobile Phone Source Identification for Digital Forensics
IEEE International Confernece on Acoustics, Speech, and Signal Processing
2007, Vol. 2, pp. II-221-II-224
BibTeX@inproceedings{Tsai2007, author = {Tsai, Min-Jen and Lai, Cheng-Liang and Liu, Jung}, title = {Camera/Mobile Phone Source Identification for Digital Forensics}, booktitle = {IEEE International Confernece on Acoustics, Speech, and Signal Processing}, year = {2007}, volume = {2}, pages = {II-221-II-224}}
-
Wavelet-based Light Reconstruction from a Single Image
CRV ´07: Proceedings of the Fourth Canadian Conference on Computer and Robot Vision
IEEE Computer Society, 2007, pp. 305-312
BibTeX@inproceedings{Upright2007, author = {Upright, Cameron and Cobzas, Dana and Jagersand, Martin}, title = {Wavelet-based Light Reconstruction from a Single Image}, booktitle = {CRV ´07: Proceedings of the Fourth Canadian Conference on Computer and Robot Vision}, publisher = {IEEE Computer Society}, year = {2007}, pages = {305--312}}
-
Identifying Source Cell Phone using Chromatic Aberration
Sampat, N., DiCarlo, J. M. & Martin, R. A. (ed.)
Proc. IEEE International Conference on Multimedia and Expo
Digital Photography II, SPIE, 2007, Vol. 6069(1), pp. 883-886
BibTeX@inproceedings{Van2007, author = {Lanh Tran Van and Emmanuel, S. and Kankanhalli, M. S.}, title = {Identifying Source Cell Phone using Chromatic Aberration}, booktitle = {Proc. IEEE International Conference on Multimedia and Expo}, journal = {Digital Photography II}, publisher = {SPIE}, year = {2007}, volume = {6069}, number = {1}, pages = {883--886}}
-
Exposing Digital Forgeries in Interlaced and Deinterlaced Video
IEEE Transactions on Information Forensics and Security, 2007, Vol. 2(3), pp. 438-449
BibTeX@article{Wang2007, author = {Weihong Wang and Farid, H.}, title = {Exposing Digital Forgeries in Interlaced and Deinterlaced Video}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2007}, volume = {2}, number = {3}, pages = {438--449}}
-
Exposing Digital Forgeries in Video by Detecting Duplication
ACM Multimedia and Security Workshop
2007, pp. 35-42
BibTeX@inproceedings{Wang2007b, author = {Wang, Weihong and Farid, Hany}, title = {Exposing Digital Forgeries in Video by Detecting Duplication}, booktitle = {ACM Multimedia and Security Workshop}, year = {2007}, pages = {35-42}}
-
Detecting Digital Image Forgeries by Measuring Inconsistencies of Blocking Artifact
Proc. IEEE International Conference on Multimedia and Expo
2007, Vol. EUPISCO, pp. 12-15
BibTeX@inproceedings{Ye2007, author = {Ye, Shuiming and Sun, Qibin and Chang, Ee-Chien}, title = {Detecting Digital Image Forgeries by Measuring Inconsistencies of Blocking Artifact}, booktitle = {Proc. IEEE International Conference on Multimedia and Expo}, year = {2007}, volume = {EUPISCO}, pages = {12--15}}
-
Detecting Digital Image Forgeries Through Weighted Local Entropy
Proc. IEEE International Symposium on Signal Processing and Information Technology
2007, pp. 62-67
BibTeX@inproceedings{Zhang2007, author = {Zhang, Chi and Zhang, Hongbin}, title = {Detecting Digital Image Forgeries Through Weighted Local Entropy}, booktitle = {Proc. IEEE International Symposium on Signal Processing and Information Technology}, year = {2007}, pages = {62--67}}
-
Blur Detection of Digital Forgery Using Mathematical Morphology
Nguyen, N., Grzech, A., Howlett, R. & Jain, L. (ed.)
Agent and Multi-Agent Systems: Technologies and Applications
Springer Berlin Heidelberg, 2007, Vol. 4496, pp. 990-998
BibTeX@incollection{Zhou2007a, author = {Zhou, Linna and Wang, Dongming and Guo, Yunbiao and Zhang, Jingfei}, title = {Blur Detection of Digital Forgery Using Mathematical Morphology}, booktitle = {Agent and Multi-Agent Systems: Technologies and Applications}, publisher = {Springer Berlin Heidelberg}, year = {2007}, volume = {4496}, pages = {990-998}}
-
Blur Detection of Digital Forgery Using Mathematical Morphology
KES-AMSTA ´07: Proceedings of the 1st KES International Symposium on Agent and Multi-Agent Systems
Springer-Verlag, 2007, pp. 990-998
BibTeX@inproceedings{Zhou2007, author = {Zhou, Linna and Wang, Dongming and Guo, Yunbiao and Zhang, Jingfei}, title = {Blur Detection of Digital Forgery Using Mathematical Morphology}, booktitle = {KES-AMSTA ´07: Proceedings of the 1st KES International Symposium on Agent and Multi-Agent Systems}, publisher = {Springer-Verlag}, year = {2007}, pages = {990--998}}
2006
-
Algorithm Theoretical Basis Document for Decorrelation Stretch
Jet Propulsion Laboratory 4800 Oak Grove Drive Pasadena, CA 91109, 2006
BibTeX@techreport{Alley2006, author = {Ronald E. Alley}, title = {Algorithm Theoretical Basis Document for Decorrelation Stretch}, year = {2006}}
-
Image manipulation detection
Journal of Electronic Imaging, SPIE, 2006, Vol. 15(4), pp. 041102
BibTeX@article{Bayram2006a, author = {Bayram, Sevinc and Avcıbaş, İsmail and Sankur, Bülent and Memon, Nasir}, title = {Image manipulation detection}, journal = {Journal of Electronic Imaging}, publisher = {SPIE}, year = {2006}, volume = {15}, number = {4}, pages = {041102}}
-
Improvements on source camera-model identification based on CFA interpolation
Proc. of the WG 11.9 Intl. Conf. on Digital Forensics
Proc. of the WG 11.9 Intl. Conf. on Digital Forensics, 2006
BibTeX@inproceedings{Bayram2006, author = {Sevinç Bayram and Husrev T. Sencar and Nasir D. Memon}, title = {Improvements on source camera-model identification based on CFA interpolation}, booktitle = {Proc. of the WG 11.9 Intl. Conf. on Digital Forensics}, journal = {Proc. of the WG 11.9 Intl. Conf. on Digital Forensics}, year = {2006}}
-
Experimentations with source camera identification and Online Social Networks
Journal of Ambient Intelligence and Humanized Computing, Springer Berlin / Heidelberg, 2006, Vol. -, pp. 1-10
BibTeX@article{Castiglione, author = {Castiglione, Aniello and Cattaneo, Giuseppe and Cembalo, Maurizio and Ferraro Petrillo, Umberto}, title = {Experimentations with source camera identification and Online Social Networks}, journal = {Journal of Ambient Intelligence and Humanized Computing}, publisher = {Springer Berlin / Heidelberg}, year = {2006}, volume = {-}, pages = {1-10}}
-
Source Cell-phone Identification
Proc. IEEE 14th Signal Processing and Communications Applications
2006, pp. 1-3
BibTeX@inproceedings{Celiktutan2006, author = {Celiktutan, O. and Avcibas, I. and Sankur, B. and Ayerden, N. P. and Capar, C. }, title = {Source Cell-phone Identification}, booktitle = {Proc. IEEE 14th Signal Processing and Communications Applications}, year = {2006}, pages = {1--3}}
-
Source camera identification using footprints from lens aberration
Sampat, N., DiCarlo, J. M. & Martin, R. A. (ed.)
Proc. SPIE
Digital Photography II, SPIE, 2006, Vol. 6069(1), pp. 60690J
BibTeX@inproceedings{Choi2006, author = {Kai San Choi and Edmund Y. Lam and Kenneth K. Y. Wong}, title = {Source camera identification using footprints from lens aberration}, booktitle = {Proc. SPIE}, journal = {Digital Photography II}, publisher = {SPIE}, year = {2006}, volume = {6069}, number = {1}, pages = {60690J}}
-
Source Camera Identification by JPEG Compression Statistics for Image Forensics
IEEE Region 10 Conference (TENCON 2006)
2006
BibTeX@inproceedings{Choi2006a, author = {Choi, Kai San and Lam, Edmund Y. and Wong, Kenneth K. Y.}, title = {Source Camera Identification by JPEG Compression Statistics for Image Forensics}, booktitle = {IEEE Region 10 Conference (TENCON 2006)}, year = {2006}}
-
Automatic Source Camera Identification using Intrinsic Lens Radial Distortion
Optics Express, 2006, Vol. 14(24), pp. 11551-11565
BibTeX@article{Choi2006c, author = {Choi, Kai San and Lam, Edmund Y. and Wong, Kenneth K. Y.}, title = {Automatic Source Camera Identification using Intrinsic Lens Radial Distortion}, journal = {Optics Express}, year = {2006}, volume = {14}, number = {24}, pages = {11551-11565}}
-
Feature Selection in Source Camera Identification
IEEE International Conference on Systems, Man and Cybernetics
2006, pp. 3176-3180
BibTeX@inproceedings{Choi2006d, author = {Choi, Kai San and Lam, Edmund Y. and Wong, Kenneth K. Y.}, title = {Feature Selection in Source Camera Identification}, booktitle = {IEEE International Conference on Systems, Man and Cybernetics}, year = {2006}, pages = {3176-3180}}
-
Detection of forgery in digital video
The 10th World MultiConference on Systemics Cybernetics and Informatics
2006, Vol. V, pp. 229-233
BibTeX@inproceedings{De2006, author = {De, A. and Chadha, H. and Gupta, S.}, title = {Detection of forgery in digital video}, booktitle = {The 10th World MultiConference on Systemics Cybernetics and Informatics}, year = {2006}, volume = {V}, pages = {229--233}}
-
Digital Image Forensics for Identifying Computer Generated and Digital Camera Images
Proc. IEEE Int Image Processing Conf
2006, pp. 2313-2316
BibTeX@inproceedings{Dehnie2006, author = {Dehnie, S. and Sencar, T. and Memon, N. }, title = {Digital Image Forensics for Identifying Computer Generated and Digital Camera Images}, booktitle = {Proc. IEEE Int Image Processing Conf}, year = {2006}, pages = {2313--2316}}
-
Exposing digital forgeries in scientific images
MM&Sec ´06: Proceedings of the 8th workshop on Multimedia and security
ACM, 2006, pp. 29-36
BibTeX@inproceedings{Farid2006, author = {Farid, Hany}, title = {Exposing digital forgeries in scientific images}, booktitle = {MM&Sec ´06: Proceedings of the 8th workshop on Multimedia and security}, publisher = {ACM}, year = {2006}, pages = {29--36}}
-
Digital Image Ballistics from JPEG Quantization
Department of Computer Science, Dartmouth College, 2006(TR2006-583)
BibTeX@techreport{Farid2006a, author = {Farid, Hany}, title = {Digital Image Ballistics from JPEG Quantization}, year = {2006}, number = {TR2006-583}}
-
Digital Doctoring: How to tell the real from the fake
Significance, 2006, Vol. 3(4), pp. 162-166
BibTeX@article{Farid2006b, author = {Farid, Hany}, title = {Digital Doctoring: How to tell the real from the fake}, journal = {Significance}, year = {2006}, volume = {3}, number = {4}, pages = {162-166}}
-
Removing camera shake from a single photograph
SIGGRAPH ´06: ACM SIGGRAPH 2006 Papers
ACM, 2006, pp. 787-794
BibTeX@inproceedings{Fergus2006, author = {Fergus, Rob and Singh, Barun and Hertzmann, Aaron and Roweis, Sam T. and Freeman, William T.}, title = {Removing camera shake from a single photograph}, booktitle = {SIGGRAPH ´06: ACM SIGGRAPH 2006 Papers}, publisher = {ACM}, year = {2006}, pages = {787--794}}
-
Detection of Image Splicing Based on Hilbert-Huang Transform and Moments of Characteristic Functions with Wavelet Decomposition
Jeon, B. (ed.)
International Workshop on Digital Watermarking
2006, pp. 177-187
BibTeX@inproceedings{Fu2006, author = {Fu, Dongdong and Shi, Yun Qing and Su, Wei}, title = {Detection of Image Splicing Based on Hilbert-Huang Transform and Moments of Characteristic Functions with Wavelet Decomposition}, booktitle = {International Workshop on Digital Watermarking}, year = {2006}, pages = {177-187}}
-
Covariant Derivatives and Vision
Leonardis, A., Bischof, H. & Pinz, A. (ed.)
Computer Vision -- ECCV 2006
Springer Berlin Heidelberg, 2006, Vol. 3954, pp. 56-69
BibTeX@incollection{Georgiev2006, author = {Georgiev, Todor}, title = {Covariant Derivatives and Vision}, booktitle = {Computer Vision -- ECCV 2006}, publisher = {Springer Berlin Heidelberg}, year = {2006}, volume = {3954}, pages = {56-69}}
-
Digital Image Forgery Detection using Artificial Neural Network and Auto Regressive Coefficients
Proc. Canadian Conference on Electrical and Computer Engineering CCECE ´06
2006, pp. 194-197
BibTeX@inproceedings{Gopi2006, author = {Gopi, E. S. and Lakshmanan, N. and Gokul, T. and KumaraGanesh, S. and Shah, P. R.}, title = {Digital Image Forgery Detection using Artificial Neural Network and Auto Regressive Coefficients}, booktitle = {Proc. Canadian Conference on Electrical and Computer Engineering CCECE ´06}, year = {2006}, pages = {194--197}}
-
Random Walks for Image Segmentation
IEEE Trans. on Pattern Analysis and Machine Intelligence, 2006, Vol. 28(11), pp. 1768-1783
BibTeX@article{Grady2006, author = {Leo Grady}, title = {Random Walks for Image Segmentation}, journal = {IEEE Trans. on Pattern Analysis and Machine Intelligence}, year = {2006}, volume = {28}, number = {11}, pages = {1768--1783}}
-
Putting Objects in Perspective
Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition
2006, Vol. 2, pp. 2137-2144
BibTeX@inproceedings{Hoiem2006, author = {Hoiem, D. and Efros, A. A. and Hebert, M.}, title = {Putting Objects in Perspective}, booktitle = {Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition}, year = {2006}, volume = {2}, pages = {2137--2144}}
-
Detecting Image Splicing using Geometry Invariants and Camera Characteristics Consistency
Proc. IEEE Int Multimedia and Expo Conf
2006, pp. 549-552
BibTeX@inproceedings{Hsu2006, author = {Hsu, Y.-F. and Chang, S.-F. }, title = {Detecting Image Splicing using Geometry Invariants and Camera Characteristics Consistency}, booktitle = {Proc. IEEE Int Multimedia and Expo Conf}, year = {2006}, pages = {549--552}}
-
Characterization of digital image noise properties based on RAW data
Proc. SPIE 6059, Image Quality and System Performance III, 2006, Vol. 6059, pp. 60590A-60590A-12
BibTeX@article{Hytti2006, author = {Hytti, Heli T.}, title = {Characterization of digital image noise properties based on RAW data}, journal = {Proc. SPIE 6059, Image Quality and System Performance III}, year = {2006}, volume = {6059}, pages = {60590A-60590A-12}}
-
Exposing Digital Forgeries by Detecting Traces of Image Splicing
Proc. 8th Int Signal Processing Conf
2006, Vol. 2
BibTeX@inproceedings{Jing2006, author = {Jing, W. and Hongbin, Z. }, title = {Exposing Digital Forgeries by Detecting Traces of Image Splicing}, booktitle = {Proc. 8th Int Signal Processing Conf}, year = {2006}, volume = {2}}
-
Exposing digital forgeries through chromatic aberration
MM&Sec ´06: Proceedings of the 8th workshop on Multimedia and security
ACM, 2006, pp. 48-55
BibTeX@inproceedings{Johnson2006, author = {Johnson, Micah Kimo and Farid, Hany}, title = {Exposing digital forgeries through chromatic aberration}, booktitle = {MM&Sec ´06: Proceedings of the 8th workshop on Multimedia and security}, publisher = {ACM}, year = {2006}, pages = {48--55}}
-
Metric Measurements on a Plane from a Single Image
Department of Computer Science, Dartmouth College, 2006(TR2006-579)
BibTeX@techreport{Johnson2006a, author = {Johnson, Micah Kimo and Farid, Hany}, title = {Metric Measurements on a Plane from a Single Image}, year = {2006}, number = {TR2006-579}}
-
Exposing Digital Forgeries Through Chromatic Aberration
ACM Multimedia and Security Workshop
2006, pp. 48-55
BibTeX@inproceedings{Johnson2006b, author = {Johnson, Micah Kimo and Farid, Hany}, title = {Exposing Digital Forgeries Through Chromatic Aberration}, booktitle = {ACM Multimedia and Security Workshop}, year = {2006}, pages = {48-55}}
-
Detecting Doctored JPEG Images Via DCT Coefficient Analysis
Lecture Notes in Computer Science, 2006, Vol. 3953/2006, pp. 423-435
BibTeX@article{JunfengHe2006, author = {Junfeng He, Zhouchen Lin, Lifeng Wang and Xiaoou Tang}, title = {Detecting Doctored JPEG Images Via DCT Coefficient Analysis}, journal = {Lecture Notes in Computer Science}, year = {2006}, volume = {3953/2006}, pages = {423-435}}
-
A survey of forensic characterization methods for physical devices
Digital Investigation, 2006, Vol. 3(Supplement 1), pp. 17 - 28
BibTeX@article{Khanna2006, author = {Nitin Khanna and Aravind K. Mikkilineni and Anthony F. Martone and Gazi N. Ali and George T.-C. Chiu and Jan P. Allebach and Edward J. Delp}, title = {A survey of forensic characterization methods for physical devices}, journal = {Digital Investigation}, year = {2006}, volume = {3}, number = {Supplement 1}, pages = {17 - 28}}
-
An Efficient Match-based Duplication Detection Algorithm
Canadian Conference on Computer and Robot Vision
2006
BibTeX@inproceedings{Langille2006, author = {Langille, Aaron and Gong, Minglun}, title = {An Efficient Match-based Duplication Detection Algorithm}, booktitle = {Canadian Conference on Computer and Robot Vision}, year = {2006}}
-
Detecting False Captioning Using Common Sense Reasoning
Digital Investigation, 2006, Vol. 3(Supplement 1), pp. 65-70
BibTeX@article{Lee2006, author = {Lee, Sangwon and Shamma, David A. and Gooch, Bruce}, title = {Detecting False Captioning Using Common Sense Reasoning}, journal = {Digital Investigation}, year = {2006}, volume = {3}, number = {Supplement 1}, pages = {65-70}}
-
Noise Estimation from a Single Image
Proc. IEEE Computer Society Conference on Computer Vision and Pattern Recognition
2006, Vol. 1, pp. 901-908
BibTeX@inproceedings{Liu2006, author = {Liu, Ce and Freeman, W. T. and Szeliski, R. and Kang, Sing Bing}, title = {Noise Estimation from a Single Image}, booktitle = {Proc. IEEE Computer Society Conference on Computer Vision and Pattern Recognition}, year = {2006}, volume = {1}, pages = {901--908}}
-
Image Based Source Camera Identification using Demosaicking
Proc. IEEE 8th Workshop on Multimedia Signal Processing
2006, pp. 419-424
BibTeX@inproceedings{Long2006, author = {Yangjing Long and Yizhen Huang}, title = {Image Based Source Camera Identification using Demosaicking}, booktitle = {Proc. IEEE 8th Workshop on Multimedia Signal Processing}, year = {2006}, pages = {419--424}}
-
Blind Fake Image Detection Scheme Using SVD
IEICE Transactions on Communications (Institute of Electronics, Information and Communication Engineers), 2006, Vol. E89-B, pp. 1726-1728
BibTeX@article{Lu2006, author = {Lu, Wei and Chung, Fu-Lai and Lu, Hongtao}, title = {Blind Fake Image Detection Scheme Using SVD}, journal = {IEICE Transactions on Communications (Institute of Electronics, Information and Communication Engineers)}, year = {2006}, volume = {E89-B}, pages = {1726-1728}}
-
Blind fake image detection scheme using SVD
IEICE TRANS. COMMUN, 2006, Vol. E89-B(5), pp. 1726-1728
BibTeX@article{Lu2006a, author = {Lu, Wei and Chung, Fu-lai and Lu, Hongtao}, title = {Blind fake image detection scheme using SVD}, journal = {IEICE TRANS. COMMUN}, year = {2006}, volume = {E89-B}, number = {5}, pages = {1726-1728}}
-
Detecting Digital Image Forgeries Using Sensor Pattern Noise
Delp, E. J. & Wong, P. W. (ed.)
SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents
2006, Vol. 6072
BibTeX@inproceedings{Lukas2006b, author = {Lukáš, Jan and Fridrich, Jessica and Goljan, Miroslav}, title = {Detecting Digital Image Forgeries Using Sensor Pattern Noise}, booktitle = {SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents}, year = {2006}, volume = {6072}}
-
Digital camera identification from sensor pattern noise
IEEE Transactions on Information Forensics and Security, 2006, Vol. 1(2), pp. 205-214
BibTeX@article{Lukas2006, author = {Lukáš, J. and Fridrich, J. and Goljan, M.}, title = {Digital camera identification from sensor pattern noise}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2006}, volume = {1}, number = {2}, pages = {205--214}}
-
Fast Wavelet Image Denoising Based on Local Variance and Edge Analysis
International Journal of Intelligent Technology, 2006, Vol. 1(2), pp. 165-175
BibTeX@article{Luo2006a, author = {Gaoyong Luo}, title = {Fast Wavelet Image Denoising Based on Local Variance and Edge Analysis}, journal = {International Journal of Intelligent Technology}, year = {2006}, volume = {1}, number = {2}, pages = {165--175}}
-
Robust Detection of Region-Duplication Forgery in Digital Image
Pattern Recognition, International Conference on, IEEE Computer Society, 2006, Vol. 4, pp. 746-749
BibTeX@article{Luo2006, author = {Weiqi Luo and Jiwu Huang and Guoping Qiu}, title = {Robust Detection of Region-Duplication Forgery in Digital Image}, journal = {Pattern Recognition, International Conference on}, publisher = {IEEE Computer Society}, year = {2006}, volume = {4}, pages = {746-749}}
-
Forensics of Things
IEEE Southwest Symposium on Image Analysis and Interpretation
2006, pp. 149-152
BibTeX@inproceedings{Martone2006, author = {Martone, Anthony F. and Mikkilineni, Aravind K. and Delp, Edward J.}, title = {Forensics of Things}, booktitle = {IEEE Southwest Symposium on Image Analysis and Interpretation}, year = {2006}, pages = {149-152}}
-
JPEG compression history estimation for color images
IEEE Transactions on Image Processing, 2006, Vol. 15(6), pp. 1365-1378
BibTeX@article{Neelamani2006, author = {Neelamani, R. and de Queiroz, R. and Fan, Zhigang and Dash, S. and Baraniuk, R. G.}, title = {JPEG compression history estimation for color images}, journal = {IEEE Transactions on Image Processing}, year = {2006}, volume = {15}, number = {6}, pages = {1365--1378}}
-
An Online System for Classifying Computer Graphics Images from Natural Photographs
SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents
2006
BibTeX@inproceedings{Ng2006a, author = {Ng, Tian-Tsong and Chang, Shih-Fu}, title = {An Online System for Classifying Computer Graphics Images from Natural Photographs}, booktitle = {SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents}, year = {2006}}
-
Passive-blind Image Forensics
In Multimedia Security Technologies for Digital Rights
2006
BibTeX@inproceedings{Ng2006, author = {Ng, Tian-tsong and Chang, Shih-fu and Lin, Ching-yung and Sun, Qibin}, title = {Passive-blind Image Forensics}, booktitle = {In Multimedia Security Technologies for Digital Rights}, year = {2006}}
-
Multimedia Security Technologies for Digital Rights
Chapter Passive-Blind Image Forensics
Elsevier, 2006, pp. 383-412
BibTeX@inbook{Ng2006b, author = {Ng, Tian-Tsong and Chang, Shih-Fu and Lin, Ching-Yung and Sun, Qibin}, title = {Multimedia Security Technologies for Digital Rights}, publisher = {Elsevier}, year = {2006}, pages = {383-412}}
-
On Resampling Detection and its Application to Detect Image Tampering
Proc. IEEE International Conference on Multimedia and Expo
2006, pp. 1325-1328
BibTeX@inproceedings{Prasad2006, author = {Prasad, S. and Ramakrishnan, K. R.}, title = {On Resampling Detection and its Application to Detect Image Tampering}, booktitle = {Proc. IEEE International Conference on Multimedia and Expo}, year = {2006}, pages = {1325--1328}}
-
Is it Fake or Real?
Brazilian Symposium of Computer Graphics and Image Processing
2006
BibTeX@inproceedings{Rocha2006, author = {Rocha, Anderson and Goldenstein, Siome}, title = {Is it Fake or Real?}, booktitle = {Brazilian Symposium of Computer Graphics and Image Processing}, year = {2006}}
-
Automatic source camera identification using the intrinsic lens radial distortion
Optics Express, 2006, Vol. 14(14), pp. 11551-11565
BibTeX@article{San2006, author = {Choi Kai San and Lam, Edmund Y. and Wong, Kenneth K. Y.}, title = {Automatic source camera identification using the intrinsic lens radial distortion}, journal = {Optics Express}, year = {2006}, volume = {14}, number = {14}, pages = {11551-11565}}
-
Image Tampering Identification using Blind Deconvolution
Proc. IEEE Int Image Processing Conf
2006, pp. 2309-2312
BibTeX@inproceedings{Swaminathan2006, author = {Swaminathan, Ashwin and Min Wu and Liu, K. J. R.}, title = {Image Tampering Identification using Blind Deconvolution}, booktitle = {Proc. IEEE Int Image Processing Conf}, year = {2006}, pages = {2309--2312}}
-
Non-Intrusive Forensic Analysis of Visual Sensors Using Output Images
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2008
2006, Vol. 5
BibTeX@inproceedings{Swaminathan2006a, author = {Swaminathan, Ashwin and Min Wu and Liu, K. J. R.}, title = {Non-Intrusive Forensic Analysis of Visual Sensors Using Output Images}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2008}, year = {2006}, volume = {5}}
-
Component Forensics of Digital Cameras: A Non-Intrusive Approach
Proc. 40th Annual Conf. Information Sciences and Systems
2006, pp. 1194-1199
BibTeX@inproceedings{Swaminathan2006c, author = {Swaminathan, Ashwin and Wu, M. and Liu, K. J. R.}, title = {Component Forensics of Digital Cameras: A Non-Intrusive Approach}, booktitle = {Proc. 40th Annual Conf. Information Sciences and Systems}, year = {2006}, pages = {1194--1199}}
-
Using Image Features to Identify Camera Sources
IEEE International Conference on Acoustics, Speech, and Signal Processing
2006, Vol. 2
BibTeX@inproceedings{Tsai2006, author = {Tsai, Min-Jen and Wu, Guan-Hui}, title = {Using Image Features to Identify Camera Sources}, booktitle = {IEEE International Conference on Acoustics, Speech, and Signal Processing}, year = {2006}, volume = {2}}
-
Three dimensional reconstruction of structured scenes based on vanishing points
Proceedings of the 7th Pacific Rim conference on Advances in Multimedia Information Processing
Springer-Verlag, 2006, pp. 935-942
BibTeX@inproceedings{Wang2006a, author = {Wang, Guanghui and Wang, Shewei and Gao, Xiang and Li, Yubing}, title = {Three dimensional reconstruction of structured scenes based on vanishing points}, booktitle = {Proceedings of the 7th Pacific Rim conference on Advances in Multimedia Information Processing}, publisher = {Springer-Verlag}, year = {2006}, pages = {935--942}}
-
Exposing Digital Forgeries in Video by Detecting Double MPEG Compression
ACM Multimedia and Security Workshop
2006, pp. 37-47
BibTeX@inproceedings{Wang2006d, author = {Wang, Weihong and Farid, Hany}, title = {Exposing Digital Forgeries in Video by Detecting Double MPEG Compression}, booktitle = {ACM Multimedia and Security Workshop}, year = {2006}, pages = {37-47}}
-
On Discrimination between Photorealistic and Photographic Images
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2006
2006, Vol. 2, pp. II
BibTeX@inproceedings{Wang2006, author = {Wang, Ying and Moulin, P.}, title = {On Discrimination between Photorealistic and Photographic Images}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2006}, year = {2006}, volume = {2}, pages = {II}}
-
Detecting Differences Between Photographs and Computer Generated Images
International Conference on Signal Processing, Pattern Recognition, and Applications
2006, pp. 268-273
BibTeX@inproceedings{Wu2006, author = {Wu, Jie and Kamath, Markad V. and Poehlman, Skip}, title = {Detecting Differences Between Photographs and Computer Generated Images}, booktitle = {International Conference on Signal Processing, Pattern Recognition, and Applications}, year = {2006}, pages = {268-273}}
-
Resampling Detection in Information Forensics
Journal of Computer Applications, 2006, Vol. 26(11), pp. 2596-2597
BibTeX@article{Zhu2006, author = {Zhu, Xiu Ming and Xuan, Guo Rong and Yao, Qiu Ming and Tong, Xue Feng and Shi, Yun Qing}, title = {Resampling Detection in Information Forensics}, journal = {Journal of Computer Applications}, year = {2006}, volume = {26}, number = {11}, pages = {2596-2597}}
2005
-
Image Processing
Wiley-Interscience, 2005
BibTeX@book{Acharya2005, author = {Acharya, Tinku and Ray, Ajoy K}, title = {Image Processing}, publisher = {Wiley-Interscience}, year = {2005}}
-
A new method for vanishing points detection in 3d reconstruction from a single view
Proceedings of the ISPRS Commission V, Citeseer, 2005, pp. 197-210
BibTeX@article{Aguilera2005, author = {Aguilera, DG and Lahoz, J.G. and Codes, J.F.}, title = {A new method for vanishing points detection in 3d reconstruction from a single view}, journal = {Proceedings of the ISPRS Commission V}, publisher = {Citeseer}, year = {2005}, pages = {197--210}}
-
Identification of Inkjet Printers for Forensic Applications
International Conference on Digital Printing Technologies
2005, pp. 235-238
BibTeX@inproceedings{Arslan2005, author = {Arslan, Osman and Kumontoy, Roy M. and Chiang, Pei-Ju and Mikkilineni, Aravind K. and Allebach, Jan P. and Chiu, George T.-C. and Delp, Edward J.}, title = {Identification of Inkjet Printers for Forensic Applications}, booktitle = {International Conference on Digital Printing Technologies}, year = {2005}, pages = {235-238}}
-
Image manipulation detection with binary similarity measures
Proc. European Signal Processing
2005
BibTeX@inproceedings{Bayram2005a, author = {Bayram, Sevinc and Avcıbaş, İsmail and Sankur, Bülent and Memon, Nasir}, title = {Image manipulation detection with binary similarity measures}, booktitle = {Proc. European Signal Processing}, year = {2005}}
-
Source camera identification based on CFA interpolation
Proc. IEEE International Conference on Image Processing ICIP 2005
2005, Vol. 3, pp. III-69-72
BibTeX@inproceedings{Bayram2005, author = {Bayram, S. and Sencar, H. and Memon, N. and Avcibas, I.}, title = {Source camera identification based on CFA interpolation}, booktitle = {Proc. IEEE International Conference on Image Processing ICIP 2005}, year = {2005}, volume = {3}, pages = {III--69-72}}
-
A non-local algorithm for image denoising
Proc. IEEE Computer Society Conference on Computer Vision and Pattern Recognition CVPR 2005
2005, Vol. 2, pp. 60-65 vol. 2
BibTeX@inproceedings{Buades2005, author = {Buades, A. and Coll, B. and Morel, J.-M. }, title = {A non-local algorithm for image denoising}, booktitle = {Proc. IEEE Computer Society Conference on Computer Vision and Pattern Recognition CVPR 2005}, year = {2005}, volume = {2}, pages = {60--65 vol. 2}}
-
Creating Realistic Shadows of Composited Objects
Proc. Seventh IEEE Workshops Application of Computer Vision WACV/MOTIONS ´05 Volume 1
2005, Vol. 1, pp. 294-299
BibTeX@inproceedings{Cao2005, author = {Xiaochun Cao and Shah, M. }, title = {Creating Realistic Shadows of Composited Objects}, booktitle = {Proc. Seventh IEEE Workshops Application of Computer Vision WACV/MOTIONS ´05 Volume 1}, year = {2005}, volume = {1}, pages = {294--299}}
-
Camera calibration and light source estimation from images with shadows
Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition CVPR 2005
2005, Vol. 2, pp. 918-923
BibTeX@inproceedings{Cao2005a, author = {Xiaochun Cao and Shah, M.}, title = {Camera calibration and light source estimation from images with shadows}, booktitle = {Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition CVPR 2005}, year = {2005}, volume = {2}, pages = {918--923}}
-
Distinguishing paintings from photographs
Computer Vision and Image Understanding, 2005, Vol. 100(3), pp. 249 - 273
BibTeX@article{Cutzu2005, author = {Florin Cutzu and Riad Hammoud and Alex Leykin}, title = {Distinguishing paintings from photographs}, journal = {Computer Vision and Image Understanding}, year = {2005}, volume = {100}, number = {3}, pages = {249 - 273}}
-
Detection of linear and cubic interpolation in JPEG compressed images
Proc. 2nd Canadian Conference on Computer and Robot Vision
2005, pp. 65-72
BibTeX@inproceedings{Gallagher2005, author = {Gallagher, A. C.}, title = {Detection of linear and cubic interpolation in JPEG compressed images}, booktitle = {Proc. 2nd Canadian Conference on Computer and Robot Vision}, year = {2005}, pages = {65--72}}
-
A universal noise removal algorithm with an impulse detector
IEEE Transactions on Image Processing, 2005, Vol. 14(11), pp. 1747-1754
BibTeX@article{Garnett2005, author = {R. Garnett and Huegerich, T. and Chui, C. and Wenjie He}, title = {A universal noise removal algorithm with an impulse detector}, journal = {IEEE Transactions on Image Processing}, year = {2005}, volume = {14}, number = {11}, pages = {1747--1754}}
-
Image reconstruction invariant to relighting
Eurographics 2005
2005, pp. 61-64
BibTeX@inproceedings{Georgiev2005, author = {Georgiev, Todor}, title = {Image reconstruction invariant to relighting}, booktitle = {Eurographics 2005}, year = {2005}, pages = {61--64}}
-
Vision, healing brush, and fiber bundles
Proc. SPIE 5666, Human Vision and Electronic Imaging X
2005, Vol. 293
BibTeX@inproceedings{Georgiev2005a, author = {Todor Georgiev}, title = {Vision, healing brush, and fiber bundles}, booktitle = {Proc. SPIE 5666, Human Vision and Electronic Imaging X}, year = {2005}, volume = {293}}
-
Digital detectives reveal art forgeries
Computing in Science & Engineering, 2005, Vol. 7(2), pp. 5-8
BibTeX@article{Gorder2005, author = {Gorder, P. F.}, title = {Digital detectives reveal art forgeries}, journal = {Computing in Science & Engineering}, year = {2005}, volume = {7}, number = {2}, pages = {5--8}}
-
Random walks for interactive alpha-matting
IASTED International Conference on Visualization, Imaging and Image Processing - VIIP
CiteSeerX - Scientific Literature Digital Library and Search Engine [http://citeseerx.ist.psu.edu/oai2] (United States), ACTA Press, 2005
BibTeX@conference{Grady2005, author = {Leo Grady and Thomas Schiwietz and Shmuel Aharon and Imaging and Rüdiger Westermann}, title = {Random walks for interactive alpha-matting}, booktitle = {IASTED International Conference on Visualization, Imaging and Image Processing - VIIP}, publisher = {ACTA Press}, year = {2005}}
-
Automatic photo pop-up
ACM SIGGRAPH 2005 Papers
ACM, 2005, pp. 577-584
BibTeX@inproceedings{Hoiem2005, author = {Hoiem, Derek and Efros, Alexei A. and Hebert, Martial}, title = {Automatic photo pop-up}, booktitle = {ACM SIGGRAPH 2005 Papers}, publisher = {ACM}, year = {2005}, pages = {577--584}}
-
Digital Image Tampering Synthesis and Identification
-, 2005
BibTeX@phdthesis{Hsiao2005, author = {Dun-Yu Hsiao}, title = {Digital Image Tampering Synthesis and Identification}, school = {-}, year = {2005}}
-
Detecting Digital Tampering by Blur Estimation
International Workshop on Systematic Approaches to Digital Forensic Engineering
2005, pp. 264-278
BibTeX@inproceedings{Hsiao2005a, author = {Hsiao, Dun-Yu and Pei, Soo-Chang}, title = {Detecting Digital Tampering by Blur Estimation}, booktitle = {International Workshop on Systematic Approaches to Digital Forensic Engineering}, year = {2005}, pages = {264-278}}
-
Can Digital Image Forgery Detection be Unevadable? A Case Study: Color Filter Array Interpolation Statistical Feature Recovery
Li, S., Pereira, F., Shum, H.-Y. & Tescher, A. G. (ed.)
SPIE Conference on Visual Communications and Image Processing
2005, Vol. 5960
BibTeX@inproceedings{Huang2005, author = {Huang, Yizhen}, title = {Can Digital Image Forgery Detection be Unevadable? A Case Study: Color Filter Array Interpolation Statistical Feature Recovery}, booktitle = {SPIE Conference on Visual Communications and Image Processing}, year = {2005}, volume = {5960}}
-
Exposing Digital Forgeries by Detecting Inconsistencies in Lighting
ACM Multimedia and Security Workshop
2005, pp. 1-10
BibTeX@inproceedings{Johnson2005, author = {Johnson, Micah Kimo and Farid, Hany}, title = {Exposing Digital Forgeries by Detecting Inconsistencies in Lighting}, booktitle = {ACM Multimedia and Security Workshop}, year = {2005}, pages = {1-10}}
-
Elimination of color fringes in digital photographs caused by lateral chromatic aberration
Proceedings of the XX International Symposium CIPA
2005, Vol. 26, pp. 403-408
BibTeX@inproceedings{Kaufmann2005, author = {Kaufmann, Viktor and Ladstädter, Richard}, title = {Elimination of color fringes in digital photographs caused by lateral chromatic aberration}, booktitle = {Proceedings of the XX International Symposium CIPA}, year = {2005}, volume = {26}, pages = {403--408}}
-
Image reconstruction in SNR units: a general method for SNR measurement.
Magn Reson Med, Laboratory of Cardiac Energetics, National Heart, Lung and Blood Institute, National Institutes of Health, DHHS, Bethesda, Maryland 20892-1061, USA. kellman@nih.gov, 2005, Vol. 54(6), pp. 1439-1447
BibTeX@article{Kellman2005, author = {Peter Kellman and Elliot R McVeigh}, title = {Image reconstruction in SNR units: a general method for SNR measurement.}, journal = {Magn Reson Med}, year = {2005}, volume = {54}, number = {6}, pages = {1439--1447}}
-
A practical single image based approach for estimating illumination distribution from shadows
Proc. Tenth IEEE Int. Conf. Computer Vision ICCV 2005
2005, Vol. 1, pp. 266-271
BibTeX@inproceedings{Kim2005, author = {Taeone Kim and Ki-Sang Hong}, title = {A practical single image based approach for estimating illumination distribution from shadows}, booktitle = {Proc. Tenth IEEE Int. Conf. Computer Vision ICCV 2005}, year = {2005}, volume = {1}, pages = {266--271}}
-
Determining the radiometric response function from a single grayscale image
Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition CVPR 2005
2005, Vol. 2, pp. 66-73
BibTeX@inproceedings{Lin2005a, author = {Lin, S. and Zhang, L.}, title = {Determining the radiometric response function from a single grayscale image}, booktitle = {Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition CVPR 2005}, year = {2005}, volume = {2}, pages = {66--73}}
-
Detecting Doctored Images Using Camera Response Normality and Consistency
CVPR ´05: Proceedings of the 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR´05) - Volume 1
IEEE Computer Society, 2005, pp. 1087-1092
BibTeX@inproceedings{Lin2005, author = {Lin, Zhouchen and Wang, Rongrong and Tang, Xiaoou and Shum, Heung-Yeung}, title = {Detecting Doctored Images Using Camera Response Normality and Consistency}, booktitle = {CVPR ´05: Proceedings of the 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR´05) - Volume 1}, publisher = {IEEE Computer Society}, year = {2005}, pages = {1087--1092}}
-
A new CFA interpolation framework
Signal Processing, 2005, Vol. 86, pp. 1559-1579
BibTeX@article{Lukac2005, author = {Lukac, Rastislav and Plataniotis, Konstantinos N. and Hatzinakos, Dimitrios and Aleksic, Marko}, title = {A new CFA interpolation framework}, journal = {Signal Processing}, year = {2005}, volume = {86}, pages = {1559-1579}}
-
Determining digital image origin using sensor imperfections
Said, A. & Apostolopoulos, J. G. (ed.)
Proceedings of the SPIE
Image and Video Communications and Processing 2005, SPIE, 2005, Vol. 5685(1), pp. 249-260
BibTeX@conference{Lukas2005a, author = {Jan Lukáš and Jessica Fridrich and Miroslav Goljan}, title = {Determining digital image origin using sensor imperfections}, booktitle = {Proceedings of the SPIE}, journal = {Image and Video Communications and Processing 2005}, publisher = {SPIE}, year = {2005}, volume = {5685}, number = {1}, pages = {249-260}}
-
Digital "bullet scratches" for images
Proc. IEEE International Conference on Image Processing ICIP 2005
2005, Vol. 3, pp. III-65-8
BibTeX@inproceedings{Lukas2005, author = {Jan Lukáš and Fridrich, J. and Goljan, M.}, title = {Digital "bullet scratches" for images}, booktitle = {Proc. IEEE International Conference on Image Processing ICIP 2005}, year = {2005}, volume = {3}, pages = {III--65-8}}
-
Natural Image Statistics for Digital Image Forensics
Department of Computer Science, Dartmouth College, 2005
BibTeX@phdthesis{Lyu2005a, author = {Lyu, Siwei}, title = {Natural Image Statistics for Digital Image Forensics}, school = {Department of Computer Science, Dartmouth College}, year = {2005}}
-
How Realistic is Photorealistic?
IEEE Transactions on Signal Processing, 2005, Vol. 53(2), pp. 845-850
BibTeX@article{Lyu2005, author = {Lyu, Siwei and Farid, Hany}, title = {How Realistic is Photorealistic?}, journal = {IEEE Transactions on Signal Processing}, year = {2005}, volume = {53}, number = {2}, pages = {845-850}}
-
Printer Forensics Using SVM Techniques
International Conference on Digital Printing Technologies
2005, pp. 223-226
BibTeX@inproceedings{Mikkilineni2005a, author = {Mikkilineni, Aravind K. and Arslan, Osman and Chiang, Pei-Ju and Kumontoy, Roy M. and Allebach, Jan P. and Chiu, George T.-C. and Delp, Edward J.}, title = {Printer Forensics Using SVM Techniques}, booktitle = {International Conference on Digital Printing Technologies}, year = {2005}, pages = {223-226}}
-
Printer identification based on graylevel co-occurrence features for security and forensic applications
III, E. J. D. & Wong, P. W. (ed.)
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII
Security, Steganography, and Watermarking of Multimedia Contents VII, SPIE, 2005, Vol. 5681(1), pp. 430-440
BibTeX@conference{Mikkilineni2005, author = {Aravind K. Mikkilineni and Pei-Ju Chiang and Gazi N. Ali and George T. C. Chiu and Jan P. Allebach and Edward J. Delp III}, title = {Printer identification based on graylevel co-occurrence features for security and forensic applications}, booktitle = {Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII}, journal = {Security, Steganography, and Watermarking of Multimedia Contents VII}, publisher = {SPIE}, year = {2005}, volume = {5681}, number = {1}, pages = {430-440}}
-
Columbia Photographic Images and Photorealistic Computer Graphics Dataset
ADVENT Technical Report, 203-2004-3, Columbia University, 2005
BibTeX@techreport{Ng2005, author = {Ng, Tian-Tsong and Chang, Shih-Fu and Hsu, Yu-Feng and Pepeljugoski, Martin}, title = {Columbia Photographic Images and Photorealistic Computer Graphics Dataset}, year = {2005}}
-
Physics-motivated Features for Distinguishing Photographic Images and Computer Graphics
ACM Multimedia
2005
BibTeX@inproceedings{Ng2005a, author = {Ng, Tian-Tsong and Chang, Shih-Fu and Hsu, Yu-Feng and Xie, Lexing and Tsui, Mao-Pei}, title = {Physics-motivated Features for Distinguishing Photographic Images and Computer Graphics}, booktitle = {ACM Multimedia}, year = {2005}}
-
Forensic Analysis of Digital Image Tampering
Advances in Digital Forensics, 2005, Vol. 194, pp. 259-270
BibTeX@article{Peterson2005, author = {Peterson, Gilbert}, title = {Forensic Analysis of Digital Image Tampering}, journal = {Advances in Digital Forensics}, year = {2005}, volume = {194}, pages = {259--270}}
-
Statistical Tools for Digital Forensics
Lecture Notes in Computer Science, 2005, Vol. 3200/2005, pp. 128-147
BibTeX@article{Popescu2004a, author = {Popescu, Alin C. and Farid, Hany}, title = {Statistical Tools for Digital Forensics}, journal = {Lecture Notes in Computer Science}, year = {2005}, volume = {3200/2005}, pages = {128-147}}
-
Exposing digital forgeries in color filter array interpolated images
IEEE Transactions on Signal Processing, 2005, Vol. 53(10), pp. 3948-3959
BibTeX@article{Popescu2005, author = {Popescu, Alin C. and Farid, Hany}, title = {Exposing digital forgeries in color filter array interpolated images}, journal = {IEEE Transactions on Signal Processing}, year = {2005}, volume = {53}, number = {10}, pages = {3948--3959}}
-
Exposing digital forgeries by detecting traces of resampling
IEEE Transactions on Signal Processing, 2005, Vol. 53(2), pp. 758-767
BibTeX@article{Popescu2005b, author = {Popescu, Alin C. and Farid, Hany}, title = {Exposing digital forgeries by detecting traces of resampling}, journal = {IEEE Transactions on Signal Processing}, year = {2005}, volume = {53}, number = {2}, pages = {758--767}}
-
Digital image reconstruction: Deblurring and denoising
Annu. Rev. Astron. Astrophys., 2005, Vol. 43, pp. 139-94
BibTeX@article{Puettner2005, author = {R.C. Puetter and T.R. Gosnell and Amos Yahil}, title = {Digital image reconstruction: Deblurring and denoising}, journal = {Annu. Rev. Astron. Astrophys.}, year = {2005}, volume = {43}, pages = {139--94}}
-
Robust estimation approach for blind denoising
IEEE Transactions on Image Processing, 2005, Vol. 14(11), pp. 1755-1765
BibTeX@article{Rabie2005, author = {Rabie, T.}, title = {Robust estimation approach for blind denoising}, journal = {IEEE Transactions on Image Processing}, year = {2005}, volume = {14}, number = {11}, pages = {1755--1765}}
-
Characterizing and Estimating Block DCT Image Compression Quantization Parameters
Proc. Conf Signals, Systems and Computers Record of the Thirty-Ninth Asilomar Conf
2005, pp. 1230-1234
BibTeX@inproceedings{Samadani2005, author = {Samadani, R.}, title = {Characterizing and Estimating Block DCT Image Compression Quantization Parameters}, booktitle = {Proc. Conf Signals, Systems and Computers Record of the Thirty-Ninth Asilomar Conf}, year = {2005}, pages = {1230--1234}}
-
Digital image tamper detection tools
Forschungszentrum Karlsruhe, Germany, 2005
BibTeX@mastersthesis{Voruganti2005, author = {Voruganti, Arun Kumar Raj}, title = {Digital image tamper detection tools}, school = {Forschungszentrum Karlsruhe, Germany}, year = {2005}}
-
Single view metrology from scene constraints
Image Vision Comput., Butterworth-Heinemann, 2005, Vol. 23(9), pp. 831-840
BibTeX@article{Wang2005, author = {Wang, Guanghui and Hu, Zhanyi and Wu, Fuchao and Tsui, Hung-Tat}, title = {Single view metrology from scene constraints}, journal = {Image Vision Comput.}, publisher = {Butterworth-Heinemann}, year = {2005}, volume = {23}, number = {9}, pages = {831--840}}
2004
-
Application of principal components analysis and gaussian mixture models to printer identification
International Conference on Digital Printing Technologies
2004, pp. 301-305
BibTeX@inproceedings{Ali2004, author = {Ali, Gazi N. and Chiang, Pei-Ju and Mikkilineni, Aravind K. and Chiu, George T.-C. and Delp, Edward J. and Allebach, Jan P.}, title = {Application of principal components analysis and gaussian mixture models to printer identification}, booktitle = {International Conference on Digital Printing Technologies}, year = {2004}, pages = {301-305}}
-
Using Extended File Information (EXIF) File Headers in Digital Evidence Analysis
International Journal of Digital Evidence, 2004, Vol. 2(3), pp. 1-5
BibTeX@article{Alvarez2004, author = {Alvarez, Paul}, title = {Using Extended File Information (EXIF) File Headers in Digital Evidence Analysis}, journal = {International Journal of Digital Evidence}, year = {2004}, volume = {2}, number = {3}, pages = {1-5}}
-
On image denoising methods
Technical Note, CMLA (Centre de Mathematiques et de Leurs Applications, 2004
BibTeX@techreport{AntoniBuades2004, author = {Antoni Buades, Bartomeu Coll, Jean Michel Morel}, title = {On image denoising methods}, year = {2004}}
-
A classifier design for detecting image manipulations
Proc. International Conference on Image Processing ICIP ´04
2004, Vol. 4, pp. 2645-2648 Vol. 4
BibTeX@inproceedings{Avcibas2004, author = {Avcibas, I. and Bayram, S. and Memon, N. and Ramkumar, M. and Sankur, B.}, title = {A classifier design for detecting image manipulations}, booktitle = {Proc. International Conference on Image Processing ICIP ´04}, year = {2004}, volume = {4}, pages = {2645--2648 Vol. 4}}
-
Forensic Imaging
Proceedings of the 14 th International Forensic Science Symposium, Lyon
2004
BibTeX@inproceedings{Bijhold2004, author = {Bijhold, J.and Geradts,Z. and Klasen, L.}, title = {Forensic Imaging}, booktitle = {Proceedings of the 14 th International Forensic Science Symposium, Lyon}, year = {2004}}
-
Creating and Detecting Doctored and Virtual Images: Implications to The Child Pornography Prevention Act
Department of Computer Science, Dartmouth College, 2004(TR2004-518)
BibTeX@techreport{Farid2004, author = {Farid, Hany}, title = {Creating and Detecting Doctored and Virtual Images: Implications to The Child Pornography Prevention Act}, year = {2004}, number = {TR2004-518}}
-
Photoshop healing brush: a tool for seamless cloning
2004
BibTeX@misc{Georgiev2004, author = {Georgiev, Todor}, title = {Photoshop healing brush: a tool for seamless cloning}, year = {2004}}
-
Digital Image Processing Using MATLAB®
Prentice Hall, 2004
BibTeX@book{Gonzalez2004, author = {Gonzalez, Rafael C. and Woods, Richard E. and Eddins, Steven L.}, title = {Digital Image Processing Using MATLAB®}, publisher = {Prentice Hall}, year = {2004}}
-
Modeling the space of camera response functions
IEEE Transactions on Pattern Analysis and Machine Intelligence, 2004, Vol. 26(10), pp. 1272-1282
BibTeX@article{Grossberg2004a, author = {Grossberg, M. D. and Nayar, S. K.}, title = {Modeling the space of camera response functions}, journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence}, year = {2004}, volume = {26}, number = {10}, pages = {1272--1282}}
-
Efficient Near-Duplicate Detection and Sub-image Retrieval
ACM International Conference on Multimedia
2004, pp. 869-876
BibTeX@inproceedings{Ke2004, author = {Ke, Yan and Sukthankar, Rahul and Huston, Larry}, title = {Efficient Near-Duplicate Detection and Sub-image Retrieval}, booktitle = {ACM International Conference on Multimedia}, year = {2004}, pages = {869-876}}
-
An efficient parts-based near-duplicate and sub-image retrieval system
MULTIMEDIA ´04: Proceedings of the 12th annual ACM international conference on Multimedia
ACM, 2004, pp. 869-876
BibTeX@inproceedings{Ke2004a, author = {Ke, Yan and Sukthankar, Rahul and Huston, Larry}, title = {An efficient parts-based near-duplicate and sub-image retrieval system}, booktitle = {MULTIMEDIA ´04: Proceedings of the 12th annual ACM international conference on Multimedia}, publisher = {ACM}, year = {2004}, pages = {869--876}}
-
Blind source camera identification
Proc. International Conference on Image Processing ICIP ´04
2004, Vol. 1, pp. 709-712
BibTeX@inproceedings{Kharrazi2004, author = {Mehdi Kharrazi and Sencar, H. T. and Memon, N.}, title = {Blind source camera identification}, booktitle = {Proc. International Conference on Image Processing ICIP ´04}, year = {2004}, volume = {1}, pages = {709--712}}
-
Distinctive image features from scale-invariant keypoints
International journal of computer vision, Springer, 2004, Vol. 60(2), pp. 91-110
BibTeX@article{Lowe2004, author = {Lowe, David G}, title = {Distinctive image features from scale-invariant keypoints}, journal = {International journal of computer vision}, publisher = {Springer}, year = {2004}, volume = {60}, number = {2}, pages = {91--110}}
-
Printer Identification Based on Textural Features
International Conference on Digital Printing Technologies
2004, pp. 306-311
BibTeX@inproceedings{Mikkilineni2004, author = {Mikkilineni, Aravind K. and Chiang, Pei-Ju and Ali, Gazi N. and Chiu, George T.-C. and Allebach, Jan P. and Delp, Edward J.}, title = {Printer Identification Based on Textural Features}, booktitle = {International Conference on Digital Printing Technologies}, year = {2004}, pages = {306-311}}
-
A model for image splicing
Proc. International Conference on Image Processing ICIP ´04
2004, Vol. 2, pp. 1169-1172
BibTeX@inproceedings{Ng2004a, author = {Ng, T.-T. and Chang, S.-F.}, title = {A model for image splicing}, booktitle = {Proc. International Conference on Image Processing ICIP ´04}, year = {2004}, volume = {2}, pages = {1169--1172}}
-
Blind Detection of Digital Photomontage using Higher Order Statistics
Columbia University, 2004(201-2004-1)
BibTeX@techreport{Ng2004b, author = {Tian-Tsong Ng and Shih-Fu Chang}, title = {Blind Detection of Digital Photomontage using Higher Order Statistics}, year = {2004}, number = {201-2004-1}}
-
Classifying Photographic and Photorealistic Computer Graphic Images using Natural Image Statistics
ADVENT Technical Report, 220-2006-6, Columbia University, 2004
BibTeX@techreport{Ng2004c, author = {Ng, Tian-Tsong and Chang, Shih-Fu}, title = {Classifying Photographic and Photorealistic Computer Graphic Images using Natural Image Statistics}, year = {2004}}
-
A Data Set of Authentic and Spliced Image Blocks
ADVENT Technical Report, 203-2004-3, Columbia University, 2004
BibTeX@techreport{Ng2004d, author = {Ng, Tian-Tsong and Chang, Shih-Fu}, title = {A Data Set of Authentic and Spliced Image Blocks}, year = {2004}}
-
Blind detection of photomontage using higher order statistics
Proc. International Symposium on Circuits and Systems ISCAS ´04
2004, Vol. 5, pp. V-688 - V-691
BibTeX@inproceedings{Ng2004, author = {Tian-Tsong Ng and Shih-Fu Chang and Qibin Sun}, title = {Blind detection of photomontage using higher order statistics}, booktitle = {Proc. International Symposium on Circuits and Systems ISCAS ´04}, year = {2004}, volume = {5}, pages = {V-688 -- V-691}}
-
Blind Detection of Photomontage Using Higher Order Statistics
International Symposium on Circuits and Systems
2004, pp. 688 - 691
BibTeX@inproceedings{Ng2004e, author = {Ng, Tian-Tsong and Chang, Shih-Fu and Sun, Qibin}, title = {Blind Detection of Photomontage Using Higher Order Statistics}, booktitle = {International Symposium on Circuits and Systems}, year = {2004}, pages = {688 -- 691}}
-
Eyes for relighting
SIGGRAPH ´04: ACM SIGGRAPH 2004 Papers
ACM, 2004, pp. 704-711
BibTeX@inproceedings{Nishino2004, author = {Nishino, Ko and Nayar, Shree K.}, title = {Eyes for relighting}, booktitle = {SIGGRAPH ´04: ACM SIGGRAPH 2004 Papers}, publisher = {ACM}, year = {2004}, pages = {704--711}}
-
Statistical Tools for Digital Image Forensics
Dartmouth College, 2004
BibTeX@phdthesis{Popescu2004, author = {Popescu, Alin C.}, title = {Statistical Tools for Digital Image Forensics}, school = {Dartmouth College}, year = {2004}}
-
Exposing digital forgeries by detecting duplicated image regions
Department of Computer Science Dartmouth College Hanover NH 03755, 2004(TR2004-515)
BibTeX@techreport{Popescu2004b, author = {Popescu, Alin C. and Farid, Hany}, title = {Exposing digital forgeries by detecting duplicated image regions}, year = {2004}, number = {TR2004-515}}
-
Full blind denoising through noise covariance estimation using Gaussian scale mixtures in the wavelet domain
Proc. International Conference on Image Processing ICIP ´04
2004, Vol. 2, pp. 1217-1220 Vol.2
BibTeX@inproceedings{Portilla2004, author = {Portilla, J.}, title = {Full blind denoising through noise covariance estimation using Gaussian scale mixtures in the wavelet domain}, booktitle = {Proc. International Conference on Image Processing ICIP ´04}, year = {2004}, volume = {2}, pages = {1217--1220 Vol.2}}
-
Von der Retusche zum Fake: Entwicklung, Methoden und Aspekte der Bildbearbeitung in der Pressefotografie
Hochschule für Angewandte Wissenschaften Hamburg, GRIN Verlag, 2004
BibTeX@mastersthesis{Rosendahl2004, author = {Rosendahl, E.}, title = {Von der Retusche zum Fake: Entwicklung, Methoden und Aspekte der Bildbearbeitung in der Pressefotografie}, publisher = {GRIN Verlag}, school = {Hochschule für Angewandte Wissenschaften Hamburg}, year = {2004}}
-
What´s in a picture? The temptation of image manipulation
The Journal of Cell Biology, 2004, Vol. 166(1), pp. 11-15
BibTeX@article{Rossner2004, author = {Rossner, Mike and Yamada, Kenneth M.}, title = {What´s in a picture? The temptation of image manipulation}, journal = {The Journal of Cell Biology}, year = {2004}, volume = {166}, number = {1}, pages = {11-15}}
-
Fundamentals of Probability and Statistics for Engineers
Wiley-Interscience, 2004
BibTeX@book{Soong2004, author = {Soong, T.T.}, title = {Fundamentals of Probability and Statistics for Engineers}, publisher = {Wiley-Interscience}, year = {2004}}
-
Forensic Analysis of Digital Image Tampering
AIR FORCE INSTITUTE OF TECHNOLOGY, 2004
BibTeX@mastersthesis{Sturak2004, author = {Sturak, JonathanR}, title = {Forensic Analysis of Digital Image Tampering}, school = {AIR FORCE INSTITUTE OF TECHNOLOGY}, year = {2004}}
-
Poisson matting
SIGGRAPH ´04: ACM SIGGRAPH 2004 Papers
ACM, 2004, pp. 315-321
BibTeX@inproceedings{Sun2004, author = {Sun, Jian and Jia, Jiaya and Tang, Chi-Keung and Shum, Heung-Yeung}, title = {Poisson matting}, booktitle = {SIGGRAPH ´04: ACM SIGGRAPH 2004 Papers}, publisher = {ACM}, year = {2004}, pages = {315--321}}
-
Image hashing resilient to geometric and filtering operations
Proc. IEEE 6th Workshop Multimedia Signal Processing
2004, pp. 355-358
BibTeX@inproceedings{Swaminathan2004, author = {Swaminathan, Ashwin and Yinian Mao and Min Wu}, title = {Image hashing resilient to geometric and filtering operations}, booktitle = {Proc. IEEE 6th Workshop Multimedia Signal Processing}, year = {2004}, pages = {355--358}}
-
Single view based measurement on space planes
Journal of Computer Science and Technology, Science Press, 2004, Vol. 19, pp. 374-382
BibTeX@article{Wang2004, author = {Wang, Guang-Hui and Hu, Zhan-Yi and Wu, Fu-Chao}, title = {Single view based measurement on space planes}, journal = {Journal of Computer Science and Technology}, publisher = {Science Press}, year = {2004}, volume = {19}, pages = {374-382}}
2003
-
Automated selection of DAB-labeled tissue for immunohistochemical quantification.
J Histochem Cytochem, Laboratory of Reparative Biology and Bioengineering, Department of Plastic Surgery, University of Texas M. D. Anderson Cancer Center and University of Texas Center for Biomedical Engineering, Houston 77030, USA., 2003, Vol. 51(5), pp. 575-584
BibTeX@article{Brey2003, author = {Eric M Brey and Zahid Lalani and Carol Johnston and Mark Wong and Larry V McIntire and Pauline J Duke and Charles W Patrick}, title = {Automated selection of DAB-labeled tissue for immunohistochemical quantification.}, journal = {J Histochem Cytochem}, year = {2003}, volume = {51}, number = {5}, pages = {575--584}}
-
Identification of Bitmap Compression History: JPEG Detection and Quantizer Estimation
IEEE Transactions on Image Processing, 2003, Vol. 12(2), pp. 230-235
BibTeX@article{Fan2003, author = {Fan, Zhigang and de Queiroz, Ricardo}, title = {Identification of Bitmap Compression History: JPEG Detection and Quantizer Estimation}, journal = {IEEE Transactions on Image Processing}, year = {2003}, volume = {12}, number = {2}, pages = {230-235}}
-
Higher-order Wavelet Statistics and their Application to Digital Forensics
Proc. Conference on Computer Vision and Pattern Recognition Workshop CVPRW ´03
2003, Vol. 8, pp. 94
BibTeX@inproceedings{Farid2003, author = {Farid, Hany and Lyu, Siwei}, title = {Higher-order Wavelet Statistics and their Application to Digital Forensics}, booktitle = {Proc. Conference on Computer Vision and Pattern Recognition Workshop CVPRW ´03}, year = {2003}, volume = {8}, pages = {94}}
-
Detection of Copy Move Forgery in Digital Images
Digital Forensic Research Workshop
2003
BibTeX@inproceedings{Fridrich2003, author = {Fridrich, Jessica and Soukal, David and Lukáš, Jan}, title = {Detection of Copy Move Forgery in Digital Images}, booktitle = {Digital Forensic Research Workshop}, year = {2003}}
-
What is the space of camera response functions?
Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition
2003, Vol. 2
BibTeX@inproceedings{Grossberg2003, author = {Grossberg, M. D. and Nayar, S. K.}, title = {What is the space of camera response functions?}, booktitle = {Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition}, year = {2003}, volume = {2}}
-
Determining the camera response from images: what is knowable?
IEEE Transactions on Pattern Analysis and Machine Intelligence, 2003, Vol. 25(11), pp. 1455-1467
BibTeX@article{Grossberg2003a, author = {Grossberg, M. D. and Nayar, S. K.}, title = {Determining the camera response from images: what is knowable?}, journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence}, year = {2003}, volume = {25}, number = {11}, pages = {1455--1467}}
-
Bilder, die lügen
der Geschichte der Bundesrepublik Deutschland, S. H. (ed.)
Bouvier Verlag Bonn, 2003
BibTeX@book{Huettler2003, author = {Hüttler, Hans Walter and Rösgen, Petra}, title = {Bilder, die lügen}, publisher = {Bouvier Verlag Bonn}, year = {2003}}
-
Fundamental study on identification of CMOS cameras
ur Rahman, Z., Schowengerdt, R. A. & Reichenbach, S. E. (ed.)
Visual Information Processing XII
Visual Information Processing XII, SPIE, 2003, Vol. 5108(1), pp. 202-209
BibTeX@conference{Kurosawa2003, author = {Kenji Kurosawa and Naoki Saitoh}, title = {Fundamental study on identification of CMOS cameras}, booktitle = {Visual Information Processing XII}, journal = {Visual Information Processing XII}, publisher = {SPIE}, year = {2003}, volume = {5108}, number = {1}, pages = {202-209}}
-
Differences of edge properties in photographs and paintings
Proc. Int. Conf. Image Processing ICIP 2003
2003, Vol. 3
BibTeX@inproceedings{Leykin2003, author = {Leykin, A. and Cutzu, F. }, title = {Differences of edge properties in photographs and paintings}, booktitle = {Proc. Int. Conf. Image Processing ICIP 2003}, year = {2003}, volume = {3}}
-
Estimation of primary quantization matrix in double compressed jpeg images
Proc. of DFRWS
2003
BibTeX@inproceedings{Lukas2003, author = {Jan Lukáš and Jessica Fridrich}, title = {Estimation of primary quantization matrix in double compressed jpeg images}, booktitle = {Proc. of DFRWS}, year = {2003}}
-
JPEG compression history estimation for color images
Proc. International Conference on Image Processing ICIP 2003
2003, Vol. 3, pp. III-245-8 vol.2
BibTeX@inproceedings{Neelamani2003, author = {Neelamani, R. and de Queiroz, R. and Fan, Zhigang and Baraniuk, R.}, title = {JPEG compression history estimation for color images}, booktitle = {Proc. International Conference on Image Processing ICIP 2003}, year = {2003}, volume = {3}, pages = {III--245-8 vol.2}}
-
Multichannel blind iterative image restoration
IEEE Transactions on Image Processing, 2003, Vol. 12(9), pp. 1094-1106
BibTeX@article{Sroubek2003, author = {Sroubek, F. and Flusser, J.}, title = {Multichannel blind iterative image restoration}, journal = {IEEE Transactions on Image Processing}, year = {2003}, volume = {12}, number = {9}, pages = {1094--1106}}
-
Estimating the directions to light sources using images of eye for reconstructing 3D human face
Department of Information and Image Sciences, Chiba University, 2003
BibTeX@techreport{Tsumara2003, author = {Tsumura, Norimichi and Dang, Minh Nguyet and Makino, Takao and Miyake, Yoichi}, title = {Estimating the directions to light sources using images of eye for reconstructing 3D human face}, year = {2003}}
2002
-
Discrimination of inkjet-printed counterfeits by spur marks and feature extraction by spatial frequency analysis
SPIE Conference on Optical Security and Counterfeit Deterrence Techniques IV
2002, pp. 129-137
BibTeX@inproceedings{Akao2002, author = {Akao, Yoshinori and Kobayashi, Kazuhiko and Sugawara, Shigeru and Seki, Yoko}, title = {Discrimination of inkjet-printed counterfeits by spur marks and feature extraction by spatial frequency analysis}, booktitle = {SPIE Conference on Optical Security and Counterfeit Deterrence Techniques IV}, year = {2002}, pages = {129-137}}
-
Adaptive Blind Signal and Image Processing
Wiley-Interscience, 2002
BibTeX@book{Cichocki2002, author = {Andrzej Cichocki and Shun-ichi Amari}, title = {Adaptive Blind Signal and Image Processing}, publisher = {Wiley-Interscience}, year = {2002}}
-
Digital Camera Identification
Journal of Forensic Identification, 2002, Vol. 52(5), pp. 621-631
BibTeX@article{Geradts2002, author = {Geradts, Zeno J. and Bijhold, Jurrien and Kieft, Martijn and Kurosawa, Kenji and Kuroki, Kenro and Saitoh, Naoki}, title = {Digital Camera Identification}, journal = {Journal of Forensic Identification}, year = {2002}, volume = {52}, number = {5}, pages = {621-631}}
-
Digital Image Processing
Springer, 2002
BibTeX@book{Jaehne2002, author = {Jähne, Bernd}, title = {Digital Image Processing}, publisher = {Springer}, year = {2002}, edition = {5}}
-
An Approach to Individual Video Camera Identification
Journal of Forensic Sciences, 2002, Vol. 47(1), pp. 97-102
BibTeX@article{Kuroki2002, author = {Kuroki, Kenro and Kurosawa, Kenji and Saitoh, Naoki}, title = {An Approach to Individual Video Camera Identification}, journal = {Journal of Forensic Sciences}, year = {2002}, volume = {47}, number = {1}, pages = {97-102}}
-
Demosaicking methods for Bayer color arrays
Journal of Electronic imaging, International Society for Optics and Photonics, 2002, Vol. 11(3), pp. 306-315
BibTeX@article{Ramanath2002, author = {Ramanath, R. and Snyder, W.E. and Bilbro, G.L. and Sander, W.A.}, title = {Demosaicking methods for Bayer color arrays}, journal = {Journal of Electronic imaging}, publisher = {International Society for Optics and Photonics}, year = {2002}, volume = {11}, number = {3}, pages = {306--315}}
-
CCD Fingerprint Method for Digital Still Cameras
SPIE Conference on Investigative Image Processing II
2002, pp. 37-48
BibTeX@inproceedings{Saitoh2002, author = {Saitoh, Naoki and Kurosawa, Kenji and Kuroki, Kenro and Akiba, Norimitsu and Geradts, Zeno J. and Bijhold, Jurrien}, title = {CCD Fingerprint Method for Digital Still Cameras}, booktitle = {SPIE Conference on Investigative Image Processing II}, year = {2002}, pages = {37-48}}
-
Super-resolution enhancement of native digital video versus digitized NTSC sequences
Proc. Fifth IEEE Southwest Symp. Image Analysis and Interpretation
2002, pp. 193-197
BibTeX@inproceedings{Schultz2002, author = {Schultz, R. R. }, title = {Super-resolution enhancement of native digital video versus digitized NTSC sequences}, booktitle = {Proc. Fifth IEEE Southwest Symp. Image Analysis and Interpretation}, year = {2002}, pages = {193--197}}
-
Document Verification and Traceability Through Image Quality Analysis
International Conference on Digital Printing Technologies
2002, pp. 214-217
BibTeX@inproceedings{Wolin2002, author = {Wolin, Dave}, title = {Document Verification and Traceability Through Image Quality Analysis}, booktitle = {International Conference on Digital Printing Technologies}, year = {2002}, pages = {214-217}}
-
Detection and restoration of tampered JPEG compressed images
J. Syst. Softw., Elsevier Science Inc., 2002, Vol. 64(2), pp. 151-161
BibTeX@article{Wu2002, author = {Wu, Hsien-Chu and Chang, Chin-Chen}, title = {Detection and restoration of tampered JPEG compressed images}, journal = {J. Syst. Softw.}, publisher = {Elsevier Science Inc.}, year = {2002}, volume = {64}, number = {2}, pages = {151--161}}
2001
-
US Secure Hash Algorithm 1 (SHA1)
Network Working Group, 2001(Request for Comments: 3174)
BibTeX@standard{Eastlake2001, author = {D. Eastlake and P. Jones}, title = {US Secure Hash Algorithm 1 (SHA1)}, year = {2001}, number = {Request for Comments: 3174}}
-
Blind inverse gamma correction
IEEE Transactions on Image Processing, 2001, Vol. 10(10), pp. 1428-1433
BibTeX@article{Farid2001, author = {Farid, H.}, title = {Blind inverse gamma correction}, journal = {IEEE Transactions on Image Processing}, year = {2001}, volume = {10}, number = {10}, pages = {1428--1433}}
-
Blind removal of image non-linearities
Proc. Eighth IEEE Int. Conf. Computer Vision ICCV 2001
2001, Vol. 1, pp. 76-81
BibTeX@inproceedings{Farid2001a, author = {Farid, Hany and Popescu, Alin C.}, title = {Blind removal of image non-linearities}, booktitle = {Proc. Eighth IEEE Int. Conf. Computer Vision ICCV 2001}, year = {2001}, volume = {1}, pages = {76--81}}
-
Methods for Identification of Images Acquired with Digital Cameras
Bramble, S. K., Carapezza, E. M. & Rudin, L. I. (ed.)
SPIE Conference on Enabling Technologies for Law Enforcement and Security
2001, Vol. 4232, pp. 505-512
BibTeX@inproceedings{Geradts2001, author = {Geradts, Zeno J. and Bijhold, Jurrien and Kieft, Martijn and Kurosawa, Kenji and Kuroki, Kenro and Saitoh, Naoki}, title = {Methods for Identification of Images Acquired with Digital Cameras}, booktitle = {SPIE Conference on Enabling Technologies for Law Enforcement and Security}, year = {2001}, volume = {4232}, pages = {505-512}}
-
Surface fitting approach for reducing blocking artifacts in low bit-rate DCT decoded images
Proc. IEEE Region 10 Int. Conf. TENCON Electrical and Electronic Technology
2001, Vol. 1, pp. 23-27
BibTeX@inproceedings{Kieu2001, author = {Kieu, T. and Nguyen, D. T. }, title = {Surface fitting approach for reducing blocking artifacts in low bit-rate DCT decoded images}, booktitle = {Proc. IEEE Region 10 Int. Conf. TENCON Electrical and Electronic Technology}, year = {2001}, volume = {1}, pages = {23--27}}
-
Aerial video surveillance and exploitation
Proceedings of the IEEE, 2001, Vol. 89(10), pp. 1518-1539
BibTeX@article{Kumar2001, author = {Kumar, R. and Sawhney, H. and Samarasekera, S. and Hsu, S. and Hai Tao and Yanlin Guo and Hanna, K. and Pope, A. and Wildes, R. and Hirvonen, D. and Hansen, M. and Burt, P.}, title = {Aerial video surveillance and exploitation}, journal = {Proceedings of the IEEE}, year = {2001}, volume = {89}, number = {10}, pages = {1518--1539}}
-
Quantigraphic Imaging: Estimating the camera response and exposures from differently exposed images
Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition CVPR 2001
2001, Vol. 1
BibTeX@inproceedings{Mann2001, author = {Mann, S. and Mann, R.}, title = {Quantigraphic Imaging: Estimating the camera response and exposures from differently exposed images}, booktitle = {Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition CVPR 2001}, year = {2001}, volume = {1}}
-
Quantitative evaluation of convolution-based methods for medical image interpolation
Medical Image Analysis, Elsevier Science, 2001, Vol. 5(2), pp. 111-126
BibTeX@article{Meijering2001, author = {Meijering, Erik HW and Niessen, Wiro J and Viergever, Max A and others}, title = {Quantitative evaluation of convolution-based methods for medical image interpolation}, journal = {Medical Image Analysis}, publisher = {Elsevier Science}, year = {2001}, volume = {5}, number = {2}, pages = {111--126}}
-
Automatic estimation of the projected light source direction
Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition CVPR 2001
2001, Vol. 1
BibTeX@inproceedings{Nillius2001, author = {Nillius, P. and Eklundh, J. O. }, title = {Automatic estimation of the projected light source direction}, booktitle = {Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition CVPR 2001}, year = {2001}, volume = {1}}
-
A New Technique for Authentication of Image/Video for Multimedia Applications
International Multimedia Conference on Multimedia and Security: New Challenges
2001, pp. 23-26
BibTeX@inproceedings{Tzeng2001, author = {Tzeng, Chih-Hsuan and Tsai, Wen-Hsiang}, title = {A New Technique for Authentication of Image/Video for Multimedia Applications}, booktitle = {International Multimedia Conference on Multimedia and Security: New Challenges}, year = {2001}, pages = {23-26}}
2000
-
The New Cognitive Neurosciences
Gazzaniga, M. S. (ed.)
Chapter 24 Lightness Perception and Lightness Illusions
The new cognitive neurosciences, MIT Press, 2000, pp. 339-351
BibTeX@inbook{Adelson2000, author = {Adelson, Edward H.}, title = {The New Cognitive Neurosciences}, journal = {The new cognitive neurosciences}, publisher = {MIT Press}, year = {2000}, pages = {339--351}, edition = {2nd}}
-
Anisotropic feature-preserving denoising of height fields and bivariate data
Graphics interface
2000, Vol. 11(10), pp. 145-152
BibTeX@inproceedings{Desbrun2000, author = {Desbrun, Mathieu and Meyer, Mark and Schröder, Peter and Barr, Alan H}, title = {Anisotropic feature-preserving denoising of height fields and bivariate data}, booktitle = {Graphics interface}, year = {2000}, volume = {11}, number = {10}, pages = {145--152}}
-
Maximum likelihood estimation of JPEG quantization table in the identification of bitmap compression history
Proc. Int Image Processing Conf
2000, Vol. 1, pp. 948-951
BibTeX@inproceedings{Fan2000, author = {Zhigang Fan and de Queiroz, R.}, title = {Maximum likelihood estimation of JPEG quantization table in the identification of bitmap compression history}, booktitle = {Proc. Int Image Processing Conf}, year = {2000}, volume = {1}, pages = {948--951}}
-
Using vanishing points for camera calibration and coarse 3D reconstruction from a single image
The Visual Computer, Springer-Verlag, 2000, Vol. 16, pp. 396-410
BibTeX@article{Guillou2000, author = {Guillou, E and Meneveaux, D. and Maisel, E. and Bouatouch, K.}, title = {Using vanishing points for camera calibration and coarse 3D reconstruction from a single image}, journal = {The Visual Computer}, publisher = {Springer-Verlag}, year = {2000}, volume = {16}, pages = {396-410}}
-
Multiple view geometry in computer vision
Cambridge Univ Press, 2000, Vol. 2
BibTeX@book{Hartley2000, author = {Hartley, Richard. and Zisserman, Andrew}, title = {Multiple view geometry in computer vision}, publisher = {Cambridge Univ Press}, year = {2000}, volume = {2}}
-
Independent component analysis: algorithms and applications
Neural Networks, 2000, Vol. 13(4-5), pp. 411 - 430
BibTeX@article{Hyvaerinen2000, author = {A. Hyvärinen and E. Oja}, title = {Independent component analysis: algorithms and applications}, journal = {Neural Networks}, year = {2000}, volume = {13}, number = {4-5}, pages = {411 - 430}}
-
Information technology --JPEG 2000 image coding system: Core coding system Recommendation T.800
ITU (International Telecommunication Union), 2000
BibTeX@standard{ITUT2000, author = {ITU-T and ISO/IEC}, title = {Information technology --JPEG 2000 image coding system: Core coding system Recommendation T.800}, year = {2000}}
-
Digital Image Authentication Using Image Filtering Techniques
Conference on Scientific Computing
2000
BibTeX@inproceedings{Lukas2000, author = {Lukáš, Jan}, title = {Digital Image Authentication Using Image Filtering Techniques}, booktitle = {Conference on Scientific Computing}, year = {2000}}
-
A comparison of SNR estimation techniques for the AWGN channel
IEEE Transactions on Communications, 2000, Vol. 48(10), pp. 1681-1691
BibTeX@article{Pauluzzi2000, author = {Pauluzzi, D. R. and Beaulieu, N. C.}, title = {A comparison of SNR estimation techniques for the AWGN channel}, journal = {IEEE Transactions on Communications}, year = {2000}, volume = {48}, number = {10}, pages = {1681--1691}}
1999
-
Photo Fakery: The History and Techniques of Photographic Deception and Manipulation
Brassey´s, 1999
BibTeX@book{Brugioni1999, author = {Brugioni, Dino A.}, title = {Photo Fakery: The History and Techniques of Photographic Deception and Manipulation}, publisher = {Brassey´s}, year = {1999}}
-
JPEG Compression Metric as a Quality Aware Image Transcoding
Proceedings of USITS' 99: The 2nd USENIX Symposium on Internet Technologies & Systems
1999
BibTeX@inproceedings{Chandra1999, author = {Surendar Chandra and Carla Schlatter Elli}, title = {JPEG Compression Metric as a Quality Aware Image Transcoding}, booktitle = {Proceedings of USITS' 99: The 2nd USENIX Symposium on Internet Technologies & Systems}, year = {1999}}
-
Single view metrology
Proc. Seventh IEEE Int Computer Vision Conf. The
1999, Vol. 1, pp. 434-441
BibTeX@inproceedings{Criminisi1999, author = {Criminisi, A. and Reid, I. and Zisserman, A.}, title = {Single view metrology}, booktitle = {Proc. Seventh IEEE Int Computer Vision Conf. The}, year = {1999}, volume = {1}, pages = {434--441}}
-
Detecting Digital Forgeries Using Bispectral Analysis
AI Lab, Massachusetts Institute of Technology, 1999(AIM-1657)
BibTeX@techreport{Farid1999, author = {Farid, Hany}, title = {Detecting Digital Forgeries Using Bispectral Analysis}, year = {1999}, number = {AIM-1657}}
-
Spatially adaptive statistical modeling of wavelet image coefficients and its application to denoising
Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 1999
1999, Vol. 6, pp. 3253-3256 vol.6
BibTeX@inproceedings{KivancMihcak1999, author = {Kivanc Mihcak, M. and Kozintsev, I. and Ramchandran, K.}, title = {Spatially adaptive statistical modeling of wavelet image coefficients and its application to denoising}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 1999}, year = {1999}, volume = {6}, pages = {3253--3256 vol.6}}
-
Low-complexity image denoising based on statistical modeling of wavelet coefficients
IEEE Signal Processing Letters, 1999, Vol. 6(12), pp. 300-303
BibTeX@article{KivancMihcak1999a, author = {Kivanc Mihcak, M. and Kozintsev, I. and Ramchandran, K. and Moulin, P.}, title = {Low-complexity image denoising based on statistical modeling of wavelet coefficients}, journal = {IEEE Signal Processing Letters}, year = {1999}, volume = {6}, number = {12}, pages = {300--303}}
-
CCD fingerprint method-identification of a video camera from videotaped images
Proc. Int. Conf. Image Processing ICIP 99
1999, Vol. 3, pp. 537-540
BibTeX@inproceedings{Kurosawa1999, author = {Kurosawa, K. and Kuroki, K. and Saitoh, N. }, title = {CCD fingerprint method-identification of a video camera from videotaped images}, booktitle = {Proc. Int. Conf. Image Processing ICIP 99}, year = {1999}, volume = {3}, pages = {537--540}}
-
Estimation of image noise variance
IEE Proceedings -Vision, Image and Signal Processing, 1999, Vol. 146(2), pp. 80-84
BibTeX@article{Rank1999, author = {Rank, K. and Lendl, M. and Unbehauen, R. }, title = {Estimation of image noise variance}, journal = {IEE Proceedings -Vision, Image and Signal Processing}, year = {1999}, volume = {146}, number = {2}, pages = {80--84}}
-
Object matching algorithms using robust Hausdorff distance measures
IEEE Transactions on Image Processing, 1999, Vol. 8(3), pp. 425-429
BibTeX@article{Sim1999, author = {Sim, Dong-Gyu and Kwon, Oh-Kyu and Park, Rae-Hong}, title = {Object matching algorithms using robust Hausdorff distance measures}, journal = {IEEE Transactions on Image Processing}, year = {1999}, volume = {8}, number = {3}, pages = {425--429}}
1998
-
Design of practical color filter array interpolation algorithms for digital cameras .2
Proc. International Conference on Image Processing ICIP 98
1998, Vol. 1, pp. 488-492
BibTeX@inproceedings{Adams1998, author = {Adams, J. E. , Jr.}, title = {Design of practical color filter array interpolation algorithms for digital cameras .2}, booktitle = {Proc. International Conference on Image Processing ICIP 98}, year = {1998}, volume = {1}, pages = {488--492}}
-
Information Technology -- Digital Compression and Coding of Continuous-tone Still Images -- Requirements and Guidelines Recommendation T.87
ITU (International Telecommunication Union), 1998
BibTeX@standard{ITUT1998, author = {ITU-T and ISO/IEC}, title = {Information Technology -- Digital Compression and Coding of Continuous-tone Still Images -- Requirements and Guidelines Recommendation T.87}, year = {1998}}
-
A pyramid approach to subpixel registration based on intensity
IEEE Transactions on Image Processing, 1998, Vol. 7(1), pp. 27-41
BibTeX@article{Thevenaz1998, author = {Thevenaz, P. and Ruttimann, Urs E. and Unser, M.}, title = {A pyramid approach to subpixel registration based on intensity}, journal = {IEEE Transactions on Image Processing}, year = {1998}, volume = {7}, number = {1}, pages = {27--41}}
1997
-
Fotos, die lügen. Politik mit gefälschten Bildern (German Edition)
Jaubert, A. (ed.)
Hain Verlag, Bodenheim, 1997
BibTeX@book{Jaubert1992, author = {Jaubert, Alain}, title = {Fotos, die lügen. Politik mit gefälschten Bildern (German Edition)}, publisher = {Hain Verlag, Bodenheim}, year = {1997}}
-
Analysis of Variance in Statistical Image Processing
Cambridge University Press, 1997
BibTeX@book{Kurz1997, author = {Ludwik Kurz and M. Hafed Benteftifa}, title = {Analysis of Variance in Statistical Image Processing}, publisher = {Cambridge University Press}, year = {1997}}
1996
-
Fast Noise Variance Estimation
Computer Vision and Image Understanding, 1996, Vol. 64(2), pp. 300 - 302
BibTeX@article{Immerkaer1996, author = {Immerkær, John}, title = {Fast Noise Variance Estimation}, journal = {Computer Vision and Image Understanding}, year = {1996}, volume = {64}, number = {2}, pages = {300 - 302}}
-
Noise removal via Bayesian wavelet coring
Proc. Conf. Int Image Processing
1996, Vol. 1, pp. 379-382
BibTeX@inproceedings{Simoncelli1996, author = {Simoncelli, E. P. and Adelson, E. H.}, title = {Noise removal via Bayesian wavelet coring}, booktitle = {Proc. Conf. Int Image Processing}, year = {1996}, volume = {1}, pages = {379--382}}
-
Steerable wedge filters for local orientation analysis
IEEE Trans. Image Processing, 1996, Vol. 5(9), pp. 1377-1382
BibTeX@article{Simoncelli1996a, author = {Simoncelli, E. P. and Farid, Hany}, title = {Steerable wedge filters for local orientation analysis}, journal = {IEEE Trans. Image Processing}, year = {1996}, volume = {5}, number = {9}, pages = {1377--1382}}
1995
-
Image Analysis for the Biological Sciences
John Wiley & Sons, 1995
BibTeX@book{Glasbey1995, author = {Glasbey, C. A. and Horgan, G. W.}, title = {Image Analysis for the Biological Sciences}, publisher = {John Wiley & Sons}, year = {1995}}
1993
-
Comparing images using the Hausdorff distance
IEEE Transactions on Pattern Analysis and Machine Intelligence, 1993, Vol. 15(9), pp. 850-863
BibTeX@article{Huttenlocher1993, author = {Huttenlocher, D. P. and Klanderman, G. A. and Rucklidge, W. J.}, title = {Comparing images using the Hausdorff distance}, journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence}, year = {1993}, volume = {15}, number = {9}, pages = {850--863}}
-
A multi-resolution technique for comparing images using the Hausdorff distance
Proc. CVPR ´93. IEEE Computer Society Conference on Computer Vision and Pattern Recognition
1993, pp. 705-706
BibTeX@inproceedings{Huttenlocher1993b, author = {Huttenlocher, D. P. and Rucklidge, W. J. }, title = {A multi-resolution technique for comparing images using the Hausdorff distance}, booktitle = {Proc. CVPR ´93. IEEE Computer Society Conference on Computer Vision and Pattern Recognition}, year = {1993}, pages = {705--706}}
1992
-
TIFF
Adobe Developers Association, 1992(6)
BibTeX@standard{Adobe1992, author = {Adobe Systems Incorporated}, title = {TIFF}, year = {1992}, number = {6}}
-
Correcting chromatic aberrations using image warping
Proc. CVPR ´92. IEEE Computer Society Conf Computer Vision and Pattern Recognition
1992, pp. 684-687
BibTeX@inproceedings{Boult1992, author = {Boult, T. E. and Wolberg, G. }, title = {Correcting chromatic aberrations using image warping}, booktitle = {Proc. CVPR ´92. IEEE Computer Society Conf Computer Vision and Pattern Recognition}, year = {1992}, pages = {684--687}}
-
JPEG File Interchange Format
C-Cube Microsystems, 1992(1)
BibTeX@standard{Hamilton1992, author = {Eric Hamilton}, title = {JPEG File Interchange Format}, year = {1992}, number = {1}}
-
Information Technology -- Digital Compression and Coding of Continuous-tone Still Images -- Requirements and Guidelines Recommendation T.81
ITU (International Telecommunication Union), 1992
BibTeX@standard{ITUT1992, author = {ITU-T and ISO/IEC}, title = {Information Technology -- Digital Compression and Coding of Continuous-tone Still Images -- Requirements and Guidelines Recommendation T.81}, year = {1992}}
-
Nonlinear total variation based noise removal algorithms
Physica D: Nonlinear Phenomena, 1992, Vol. 60(1-4), pp. 259 - 268
BibTeX@article{Rudin1992, author = {Leonid I. Rudin and Stanley Osher and Emad Fatemi}, title = {Nonlinear total variation based noise removal algorithms}, journal = {Physica D: Nonlinear Phenomena}, year = {1992}, volume = {60}, number = {1-4}, pages = {259 - 268}}
1990
-
A Fast Parallel Algorithm for Blind Estimation of Noise Variance
IEEE Transactions on Pattern Analysis and Machine Intelligence, IEEE Computer Society, 1990, Vol. 12, pp. 216-223
BibTeX@article{Meer1990, author = {P. Meer and J.M. Jolion and A. Rosenfeld}, title = {A Fast Parallel Algorithm for Blind Estimation of Noise Variance}, journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence}, publisher = {IEEE Computer Society}, year = {1990}, volume = {12}, pages = {216-223}}
1989
-
Fundamentals of Digital Image Processing
Prentice Hall, 1989
BibTeX@book{Jain1989, author = {Jain, Anil K.}, title = {Fundamentals of Digital Image Processing}, publisher = {Prentice Hall}, year = {1989}}
1988
-
Algorithms for Clustering Data
Prentice Hall, 1988
BibTeX@book{Jain1988, author = {Jain, Anil K. and Dubes, Richard C.}, title = {Algorithms for Clustering Data}, publisher = {Prentice Hall}, year = {1988}}
-
An edge detection model based on non-linear laplacefiltering
Gelsema, E. & Kanal, L. (ed.)
Pattern Recognition and Artificial Intelligence
Pattern Recognition and Artificial Intelligence, Elsevier Science Publishers B.V. (North-Holland), 1988, pp. 63-73
BibTeX@inproceedings{VanVliet1988, author = {Van Vliet, Lucas J. and Young, Ian T. and Beckers, Guus L.}, title = {An edge detection model based on non-linear laplacefiltering}, booktitle = {Pattern Recognition and Artificial Intelligence}, journal = {Pattern Recognition and Artificial Intelligence}, publisher = {Elsevier Science Publishers B.V. (North-Holland)}, year = {1988}, pages = {63-73}}
1976
-
Color imaging array
1976(3,971,065)
BibTeX@patent{Bayer1976, author = {Bryce E. Bayer}, title = {Color imaging array}, year = {1976}, number = {3,971,065}}
Version
3.09.1 Build 3396 - 28. Sep. 201p
Die Datenbank enthält 3396 bilbliografische Einträge zum Thema Bildforensik seit Patentierung des Bayer-Sensors 1986. Es stehen noch 632 Veröffenlichungen zur Aufnahme in die Datenbank aus.
Statiststics
Year | Paper |
---|---|
2020 | 16 |
2019 | 96 |
2018 | 310 |
2017 | 348 |
2016 | 365 |
2015 | 354 |
2014 | 250 |
2013 | 279 |
2012 | 234 |
2011 | 196 |
2010 | 204 |
2009 | 180 |
2008 | 116 |
2007 | 94 |
2006 | 55 |
2005 | 46 |
2004 | 32 |
2003 | 14 |
2002 | 12 |
2001 | 12 |
2000 | 11 |
1999 | 11 |
Wir freuen uns über Vorschläge zur Verbesserung der Datenbank. Kontakt:
mybibliographyhint [at] digital-image-forensic.com de